Running Derby under a security manager

When running within an application or application server with a Java security manager enabled, Derby must be granted certain permissions to execute and access database files.

For more information about permissions and examples of creating permission objects and granting permissions, see the Security Architecture specification at

Related concepts
Identity in Derby
Basic security configuration tasks
Working with user authentication
Users and authorization identifiers
User authorizations
Encrypting databases on disk
Signed jar files
Notes on the Derby security features
User authentication and authorization examples