Deck 7: Authentication and Authorization With Java

Full screen (f)
exit full mode
Question
5)PAM modules cannot be stacked together to support "stacked authentication" where an application can use one or more PAM modules for authentication.
Use Space or
up arrow
down arrow
to flip the card.
Question
13)The JAAS framework defines the term ____ to represent the requester for a service.

A) resource
B) credential
C) subject
D) principal
Question
17)The ____ class is used by SaslServer to determine whether or not one entity can act on behalf of another entity in the SASL environment.

A) ChoiceCallback
B) AuthorizeCallback
C) LanguageCallback
D) RealmCallback
Question
19)The ____ class retrieves realm information for SaslClient and SaslServer.

A) ChoiceCallback
B) RealmCallback
C) LanguageCallback
D) AuthorizeCallback
Question
2)A good authentication technology should be platform and system dependent.
Question
18)The ___ class retrieves the locale used for localizing text.

A) ChoiceCallback
B) AuthorizeCallback
C) LanguageCallback
D) RealmCallback
Question
7)____ authentication is usually used with lightweight directory access protocol (LDAP) and Web authentication that transmits credentials across the network as an MD5 hash or message digest.

A) Passport
B) Digest
C) Kerberos
D) NTLM
Question
15)The ____ class represents a Java implementation of the PAM framework.

A) CallbackHandler
B) Principal
C) LoginContext
D) Subject
Question
12)With ____, authorization is implemented by allowing the administrator to control which users or groups have the right to perform various administrative functions or to take any action that affects systemwide resources.

A) administrative privileges
B) permissions inheritance
C) user-based authorization
D) discretionary access to securable objects
Question
6)To log all user roles and trace who, when, and what actions an entity performs, ____ is usually implemented with authentication and authorization.

A) sniffing
B) surveillance
C) auditing
D) ACL
Question
9)The idea of ____ is that all security contexts are linked to a user instead of an application.

A) discretionary access to securable objects
B) permissions inheritance
C) administrative privileges
D) user-based authorization
Question
8)____ authentication is an industry standard documented under RFC 1510 that is used with either a password or a smart card for interactive log on.

A) Kerberos
B) NTLM
C) LDAP
D) Digest
Question
3)Java 2 provides access controls based on where the code originated from and who signed the code.
Question
16)To support stacked authentication, each PAM module, using the LoginModule interface, supports the notion of two-phase authentication using the login() and ____ method.

A) commit()
B) logout()
C) submit()
D) reset()
Question
10)With ____, authorization is implemented when you control permissions for new objects created in a container object by setting inheritable permissions on the container.

A) user-based authorization
B) permissions inheritance
C) discretionary access to securable objects
D) administrative privileges
Question
14)Regarding JAAS, the term ____ is used to represent a name associated with a subject.

A) Subject
B) Resource
C) Credential
D) Principal
Question
Without authentication, it is impossible to assure who an entity is and whether or not to authorize any action at all.
Question
4)The Java security architecture itself has the ability to enforce authentication, or determining who runs the code, and authorization or determining what actions can be performed.
Question
20)The ____ PAM module prompts for a username and password. It then verifies the password against the password stored in a directory service configured using Java naming and directory interface (JNDI).

A) JndiLoginModule
B) KeyStoreLoginModule
C) SolarisLoginModule
D) UnixLoginModule
Question
11)____ enables authorization to be self-managed as an object owner can set permissions on all objects she or he created.

A) User-based authorization
B) Permissions inheritance
C) Administrative privileges
D) Discretionary access to securable objects
Question
33)Compare one-factor and multiple-factor authentication.
Question
38)Briefly describe the Refreshable interface.
Question
40)What are the general steps performed when authenticating a Subject in JAAS?
Question
31)A Subject can also own security-related attributes. These attributes are called ____________________ in JAAS.
Question
37)What are some of the benefits of using pluggable authentication modules?
Question
34)Does a "good" authentication technology that is platform/system independent and provides SSO exist today? Explain your answer.
Question
22)The ____ PAM module retrieves and makes available Solaris UID/GID/groups information for the current user.

A) NTLoginModule
B) SolarisSystem
C) UnixLoginModule
D) KeyStoreLoginModule
Question
24)The Java platform implements the concept of ____ to support thread execution across multiple modules with different context characteristics.

A) least privilege
B) least-common-denominator
C) private credentials
D) privilege credentials
Question
39)Briefly describe the Destroyable interface.
Question
21)The ____ PAM module provides a JAAS login module that prompts for a keystore alias and populates the subject with the alias's principal and credentials.

A) NTLoginModule
B) SolarisLoginModule
C) UnixLoginModule
D) KeyStoreLoginModule
Question
27)____________________ is the assurance that an entity is who it claims to be.
Question
28)____________________ is concerned with what an identity is allowed to do.
Question
36)What are the main goals of JAAS?
Question
41)What are some of the levels that can be set to specify the impact of the success or failure of a given log-in procedure on the overall JAAS authentication procedure?
Question
30)Authentication in JAAS is performed in a pluggable and stackable fashion. It is based on a concept called the ___________________ framework.
Question
26)In Java, a(n) ____ is used to make system resource access decisions based on the context it encapsulates.

A) AccessController
B) ACLController
C) AccessPolicyContext
D) AccessControlContext
Question
23)The ____ PAM module retrieves and makes available Unix UID/GID/groups information for the current user.

A) UnixLoginModule
B) SolarisSystem
C) SolarisLoginModule
D) UnixSystem
Question
29)____________________ is a list attached to an object in a system. It consists of control expressions, each of which grants or denies some ability to a particular user or group of users.
Question
35)Briefly describe authorization.
Question
25)In Java, the ____ class does this comparison. It programmatically checks permissions and obtains the current Subject associated with the active access control context as well.

A) AccessPolicy
B) ACLController
C) AccessController
D) AccessControlContext
Question
Match between columns
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Role-based authorization
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Single sign-on
a traditional authentication method for Windows operating systems using a simple challenge response protocol
NTSystem PAM
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Negotiate
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Resource
a traditional authentication method for Windows operating systems using a simple challenge response protocol
NTLM authentication
a traditional authentication method for Windows operating systems using a simple challenge response protocol
PAM
a traditional authentication method for Windows operating systems using a simple challenge response protocol
SASL
a traditional authentication method for Windows operating systems using a simple challenge response protocol
LoginContext
protocol that picks one of the available authentication methods for a system
Role-based authorization
protocol that picks one of the available authentication methods for a system
Single sign-on
protocol that picks one of the available authentication methods for a system
NTSystem PAM
protocol that picks one of the available authentication methods for a system
Negotiate
protocol that picks one of the available authentication methods for a system
Resource
protocol that picks one of the available authentication methods for a system
NTLM authentication
protocol that picks one of the available authentication methods for a system
PAM
protocol that picks one of the available authentication methods for a system
SASL
protocol that picks one of the available authentication methods for a system
LoginContext
the core authentication class in JAAS
Role-based authorization
the core authentication class in JAAS
Single sign-on
the core authentication class in JAAS
NTSystem PAM
the core authentication class in JAAS
Negotiate
the core authentication class in JAAS
Resource
the core authentication class in JAAS
NTLM authentication
the core authentication class in JAAS
PAM
the core authentication class in JAAS
SASL
the core authentication class in JAAS
LoginContext
a framework for authentication and authorization in Internet protocols
Role-based authorization
a framework for authentication and authorization in Internet protocols
Single sign-on
a framework for authentication and authorization in Internet protocols
NTSystem PAM
a framework for authentication and authorization in Internet protocols
Negotiate
a framework for authentication and authorization in Internet protocols
Resource
a framework for authentication and authorization in Internet protocols
NTLM authentication
a framework for authentication and authorization in Internet protocols
PAM
a framework for authentication and authorization in Internet protocols
SASL
a framework for authentication and authorization in Internet protocols
LoginContext
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Role-based authorization
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Single sign-on
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
NTSystem PAM
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Negotiate
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Resource
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
NTLM authentication
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
PAM
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
SASL
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
LoginContext
a place where a number of services are being offered
Role-based authorization
a place where a number of services are being offered
Single sign-on
a place where a number of services are being offered
NTSystem PAM
a place where a number of services are being offered
Negotiate
a place where a number of services are being offered
Resource
a place where a number of services are being offered
NTLM authentication
a place where a number of services are being offered
PAM
a place where a number of services are being offered
SASL
a place where a number of services are being offered
LoginContext
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Role-based authorization
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Single sign-on
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
NTSystem PAM
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Negotiate
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Resource
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
NTLM authentication
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
PAM
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
SASL
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
LoginContext
retrieves and makes available NT security information for the current user
Role-based authorization
retrieves and makes available NT security information for the current user
Single sign-on
retrieves and makes available NT security information for the current user
NTSystem PAM
retrieves and makes available NT security information for the current user
Negotiate
retrieves and makes available NT security information for the current user
Resource
retrieves and makes available NT security information for the current user
NTLM authentication
retrieves and makes available NT security information for the current user
PAM
retrieves and makes available NT security information for the current user
SASL
retrieves and makes available NT security information for the current user
LoginContext
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Role-based authorization
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Single sign-on
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
NTSystem PAM
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Negotiate
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Resource
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
NTLM authentication
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
PAM
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
SASL
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
LoginContext
Question
42)Briefly describe the java.security.policy class.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/42
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 7: Authentication and Authorization With Java
1
5)PAM modules cannot be stacked together to support "stacked authentication" where an application can use one or more PAM modules for authentication.
False
2
13)The JAAS framework defines the term ____ to represent the requester for a service.

A) resource
B) credential
C) subject
D) principal
C
3
17)The ____ class is used by SaslServer to determine whether or not one entity can act on behalf of another entity in the SASL environment.

A) ChoiceCallback
B) AuthorizeCallback
C) LanguageCallback
D) RealmCallback
B
4
19)The ____ class retrieves realm information for SaslClient and SaslServer.

A) ChoiceCallback
B) RealmCallback
C) LanguageCallback
D) AuthorizeCallback
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
5
2)A good authentication technology should be platform and system dependent.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
6
18)The ___ class retrieves the locale used for localizing text.

A) ChoiceCallback
B) AuthorizeCallback
C) LanguageCallback
D) RealmCallback
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
7
7)____ authentication is usually used with lightweight directory access protocol (LDAP) and Web authentication that transmits credentials across the network as an MD5 hash or message digest.

A) Passport
B) Digest
C) Kerberos
D) NTLM
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
8
15)The ____ class represents a Java implementation of the PAM framework.

A) CallbackHandler
B) Principal
C) LoginContext
D) Subject
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
9
12)With ____, authorization is implemented by allowing the administrator to control which users or groups have the right to perform various administrative functions or to take any action that affects systemwide resources.

A) administrative privileges
B) permissions inheritance
C) user-based authorization
D) discretionary access to securable objects
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
10
6)To log all user roles and trace who, when, and what actions an entity performs, ____ is usually implemented with authentication and authorization.

A) sniffing
B) surveillance
C) auditing
D) ACL
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
11
9)The idea of ____ is that all security contexts are linked to a user instead of an application.

A) discretionary access to securable objects
B) permissions inheritance
C) administrative privileges
D) user-based authorization
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
12
8)____ authentication is an industry standard documented under RFC 1510 that is used with either a password or a smart card for interactive log on.

A) Kerberos
B) NTLM
C) LDAP
D) Digest
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
13
3)Java 2 provides access controls based on where the code originated from and who signed the code.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
14
16)To support stacked authentication, each PAM module, using the LoginModule interface, supports the notion of two-phase authentication using the login() and ____ method.

A) commit()
B) logout()
C) submit()
D) reset()
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
15
10)With ____, authorization is implemented when you control permissions for new objects created in a container object by setting inheritable permissions on the container.

A) user-based authorization
B) permissions inheritance
C) discretionary access to securable objects
D) administrative privileges
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
16
14)Regarding JAAS, the term ____ is used to represent a name associated with a subject.

A) Subject
B) Resource
C) Credential
D) Principal
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
17
Without authentication, it is impossible to assure who an entity is and whether or not to authorize any action at all.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
18
4)The Java security architecture itself has the ability to enforce authentication, or determining who runs the code, and authorization or determining what actions can be performed.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
19
20)The ____ PAM module prompts for a username and password. It then verifies the password against the password stored in a directory service configured using Java naming and directory interface (JNDI).

A) JndiLoginModule
B) KeyStoreLoginModule
C) SolarisLoginModule
D) UnixLoginModule
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
20
11)____ enables authorization to be self-managed as an object owner can set permissions on all objects she or he created.

A) User-based authorization
B) Permissions inheritance
C) Administrative privileges
D) Discretionary access to securable objects
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
21
33)Compare one-factor and multiple-factor authentication.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
22
38)Briefly describe the Refreshable interface.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
23
40)What are the general steps performed when authenticating a Subject in JAAS?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
24
31)A Subject can also own security-related attributes. These attributes are called ____________________ in JAAS.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
25
37)What are some of the benefits of using pluggable authentication modules?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
26
34)Does a "good" authentication technology that is platform/system independent and provides SSO exist today? Explain your answer.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
27
22)The ____ PAM module retrieves and makes available Solaris UID/GID/groups information for the current user.

A) NTLoginModule
B) SolarisSystem
C) UnixLoginModule
D) KeyStoreLoginModule
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
28
24)The Java platform implements the concept of ____ to support thread execution across multiple modules with different context characteristics.

A) least privilege
B) least-common-denominator
C) private credentials
D) privilege credentials
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
29
39)Briefly describe the Destroyable interface.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
30
21)The ____ PAM module provides a JAAS login module that prompts for a keystore alias and populates the subject with the alias's principal and credentials.

A) NTLoginModule
B) SolarisLoginModule
C) UnixLoginModule
D) KeyStoreLoginModule
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
31
27)____________________ is the assurance that an entity is who it claims to be.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
32
28)____________________ is concerned with what an identity is allowed to do.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
33
36)What are the main goals of JAAS?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
34
41)What are some of the levels that can be set to specify the impact of the success or failure of a given log-in procedure on the overall JAAS authentication procedure?
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
35
30)Authentication in JAAS is performed in a pluggable and stackable fashion. It is based on a concept called the ___________________ framework.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
36
26)In Java, a(n) ____ is used to make system resource access decisions based on the context it encapsulates.

A) AccessController
B) ACLController
C) AccessPolicyContext
D) AccessControlContext
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
37
23)The ____ PAM module retrieves and makes available Unix UID/GID/groups information for the current user.

A) UnixLoginModule
B) SolarisSystem
C) SolarisLoginModule
D) UnixSystem
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
38
29)____________________ is a list attached to an object in a system. It consists of control expressions, each of which grants or denies some ability to a particular user or group of users.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
39
35)Briefly describe authorization.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
40
25)In Java, the ____ class does this comparison. It programmatically checks permissions and obtains the current Subject associated with the active access control context as well.

A) AccessPolicy
B) ACLController
C) AccessController
D) AccessControlContext
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
41
Match between columns
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Role-based authorization
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Single sign-on
a traditional authentication method for Windows operating systems using a simple challenge response protocol
NTSystem PAM
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Negotiate
a traditional authentication method for Windows operating systems using a simple challenge response protocol
Resource
a traditional authentication method for Windows operating systems using a simple challenge response protocol
NTLM authentication
a traditional authentication method for Windows operating systems using a simple challenge response protocol
PAM
a traditional authentication method for Windows operating systems using a simple challenge response protocol
SASL
a traditional authentication method for Windows operating systems using a simple challenge response protocol
LoginContext
protocol that picks one of the available authentication methods for a system
Role-based authorization
protocol that picks one of the available authentication methods for a system
Single sign-on
protocol that picks one of the available authentication methods for a system
NTSystem PAM
protocol that picks one of the available authentication methods for a system
Negotiate
protocol that picks one of the available authentication methods for a system
Resource
protocol that picks one of the available authentication methods for a system
NTLM authentication
protocol that picks one of the available authentication methods for a system
PAM
protocol that picks one of the available authentication methods for a system
SASL
protocol that picks one of the available authentication methods for a system
LoginContext
the core authentication class in JAAS
Role-based authorization
the core authentication class in JAAS
Single sign-on
the core authentication class in JAAS
NTSystem PAM
the core authentication class in JAAS
Negotiate
the core authentication class in JAAS
Resource
the core authentication class in JAAS
NTLM authentication
the core authentication class in JAAS
PAM
the core authentication class in JAAS
SASL
the core authentication class in JAAS
LoginContext
a framework for authentication and authorization in Internet protocols
Role-based authorization
a framework for authentication and authorization in Internet protocols
Single sign-on
a framework for authentication and authorization in Internet protocols
NTSystem PAM
a framework for authentication and authorization in Internet protocols
Negotiate
a framework for authentication and authorization in Internet protocols
Resource
a framework for authentication and authorization in Internet protocols
NTLM authentication
a framework for authentication and authorization in Internet protocols
PAM
a framework for authentication and authorization in Internet protocols
SASL
a framework for authentication and authorization in Internet protocols
LoginContext
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Role-based authorization
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Single sign-on
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
NTSystem PAM
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Negotiate
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
Resource
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
NTLM authentication
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
PAM
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
SASL
divides authentication into the authentication interface library, and the actual authentication mechanism-specific modules
LoginContext
a place where a number of services are being offered
Role-based authorization
a place where a number of services are being offered
Single sign-on
a place where a number of services are being offered
NTSystem PAM
a place where a number of services are being offered
Negotiate
a place where a number of services are being offered
Resource
a place where a number of services are being offered
NTLM authentication
a place where a number of services are being offered
PAM
a place where a number of services are being offered
SASL
a place where a number of services are being offered
LoginContext
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Role-based authorization
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Single sign-on
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
NTSystem PAM
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Negotiate
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
Resource
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
NTLM authentication
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
PAM
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
SASL
a feature that enables users to access resources over the network without having to repeatedly supply their credentials
LoginContext
retrieves and makes available NT security information for the current user
Role-based authorization
retrieves and makes available NT security information for the current user
Single sign-on
retrieves and makes available NT security information for the current user
NTSystem PAM
retrieves and makes available NT security information for the current user
Negotiate
retrieves and makes available NT security information for the current user
Resource
retrieves and makes available NT security information for the current user
NTLM authentication
retrieves and makes available NT security information for the current user
PAM
retrieves and makes available NT security information for the current user
SASL
retrieves and makes available NT security information for the current user
LoginContext
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Role-based authorization
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Single sign-on
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
NTSystem PAM
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Negotiate
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
Resource
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
NTLM authentication
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
PAM
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
SASL
allows fine-grained control over the mapping between access control and tasks performed in the deployment area
LoginContext
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
42
42)Briefly describe the java.security.policy class.
Unlock Deck
Unlock for access to all 42 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 42 flashcards in this deck.