To create a properties file realm.
要创建属性文件域,需要完成以下工作。
To create a Properties File realm from the admin console.
要从管理控制台创建属性文件域,请执行以下操作。
Properties file realm: Credentials stored in properties files on disk.
属性文件域:存储在磁盘上属性文件中的凭据。
You have successfully created a properties file realm called SampleSecurityRealm.
您已经成功地创建了一个名为 SampleSecurityRealm 的属性文件域。
Certificate properties file realm: Uses digital certificates and properties files on disk.
证书属性文件域:使用磁盘上的数字证书和属性文件。
A security realm based on PropertiesFileLoginModule is generally referred to as a properties file realm.
我们通常将基于PropertiesFileLoginModule的安全领域称为属性文件域。
You also created a properties file realm and configured a Web application's security using that realm.
您还创建了属性文件域,并使用该域配置了Web应用程序的安全性。
Let us look at an example creating a Properties File realm using the admin console and see how it works.
让我们看一个使用管理控制台创建属性文件域的示例,并了解它是如何工作的。
For example, access to the Community Edition admin console is secured by means of a properties file realm named geronimo-admin.
例如,名为geronimo -admin的属性文件域可以确保对CommunityEdition管理控制台的安全访问。
The default realm is a property file realm, as well as a realm for Derby, but you can configure the LDAP as a security realm.
该缺省域是一个属性文件域,也是一个用于Derby 的域,但也可以将LDAP配置为安全域。
This is a more robust security realm than the properties file realm, but for this you need to create tables and enter data in the database.
这是一种比属性文件域更加可靠的安全领域,但是为了实现该域,您需要创建相应的表,并在数据库中输入数据。
The previous section discussed the prerequisites and explained how to create the necessary artifacts for a properties file realm, a database realm, and an LDAP realm.
前面的部分讨论了一些先决条件,并说明了如何为属性文件域、数据库域、ldap域创建所需的构件。
At this point, you have created a properties file realm, configured a Web application to authenticate against this security realm, and verified the authorization for resources in the application.
此时,您已经创建了一个属性文件域,并将Web应用程序配置为根据这个安全领域进行身份验证,还验证了该应用程序中对资源的授权。
The auditing feature enables you to configure a security realm that logs all login attempts to a file.
审核特性允许您配置一个安全领域,以便将所有登录尝试记录到一个文件中。
When the problem exceeds the file system realm, it often goes to the volume group level.
问题若超出了文件系统的范畴时,通常会转向卷组级别。
This file contains the REALM definition and various configuration options for the KDC.
此文件包含REALM定义和KDC的各种配置选项。
This configuration file is comprised of sections for specifying logging options, admin server and KDC server instance information for a particular realm, and values of options for Kerberos, etc.
这个配置文件由多个部分组成,分别用来指定登录选项、某个特定领域的管理服务器和KDC服务器的实例信息以及Kerberos各选项的值等。
The access control list file below allows all principals with admin instance for our realm VMKRB5 all accesses.
下面所示的访问控制列表文件允许具有admin实例的所有主体对领域VMKRB5进行全面访问。
If you look into the default j2ee-tomcat-server.xml configuration file, you'll see that a tomcat JAAS realm has been configured at the engine level, as shown in Listing 3.
如果仔细观察默认的j2ee -tomcat - server . xml配置文件,就会看到tomcatJAAS领域已在引擎级别进行了配置,如清单3中所示。
The server.xml file also sets up this realm.
xml文件也设置了此领域。
With the example of the ldif file, which was imported above into the LDAP server, you need to enter the following value, [o=ibm,c=us], into the names of sub entries in the realm, as shown in Figure 6.
对于在上面导入到LDAP服务器的ldif文件的示例,您需要输入以下值,[o=ibm,c=us],作为领域中的子条目名,如图 6 所示。
Update this file with the Kerberos realm and LDAP suffix information.
使用kerberos域和LDAP后缀信息更新这个文件。
This file has been modified for the enterprise integration, including a data source realm.
已经修改了该文件,以便进行企业集成,它包括一个数据源域。
The already configured base entries in the realm are shown; in this case, you will see the base entries corresponding to the file-based and database repositories (Figure 17).
这时将显示域中已经配置的基本项;在此情况下,您将看到与基于文件的存储库和数据库存储库对应的基本项(图17)。
The file my-realm.xml defines three GBeans that coordinate authentication type, login usage, and the security realm users log in to.
文件my - realm . xml定义了三个GBeans用来协调身份验证类型、登录用法以及用户登录到的安全领域。
In Listing 1, the pluto-properties-file-realm security realm is configured to enforce application-specific authentication policy, which ACTS as an entry point into login domains.
在清单1中,pluto - properties - file -realm安全领域被配置为强制执行特定于应用程序的验证策略,它用作登录域的入口点。
The [realm] stanza of the /etc/krb5/krb5.conf file contains the information that the NAS client uses when looking for the IBM NAS servers.
etc/krb5/krb5.conf 文件的 [realm]节包含NAS客户端在查找IBM NAS 服务器时所使用的信息。
The SQL to create these tables, provided in db-realm-tables.sql file in the included download file, is shown in Listing 9.
本文所提供的下载文件中的db - realm -tables .sql文件提供了创建这些表的sql语句,如清单9所示。
Then the name of the realm that you're going to use is identified in the <security-realm-name> tag, which you already defined in the my-realm.xml file, and the mappings are defined in the tag.
然后,在
File-realm-demo: Demonstrates how to setup security restrictions using a flat file of users and groups.
file - realm - demo:展示如何使用用户和组的平面文件设置安全约束。
应用推荐