What does admin security protect

The configuration of administrative security for a security domain involves configuring the following technologies:

  • Authentication of HTTP clients

  • Authentication of IIOP clients

  • Administrative console security

  • Naming security

  • Use of SSL transports

  • Role-based authorization checks of servlets, enterprise beans, and mbeans

  • Propagation of identities (RunAs)

  • The common user registry

  • The authentication mechanism

  • Other security information that defines the behavior of a security domain includes:

    1. The authentication protocol (Remote Method Invocation over the Internet Inter-ORB Protocol (RMI/IIOP) security)

    2. Other miscellaneous attributes