JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Java CAPS Security Guide     Java CAPS Documentation
search filter icon
search icon

Document Information

Securing Your Java CAPS Environment

Java CAPS Security Overview

Security Concepts

Authentication and Authorization

Confidentiality

Non-Repudiation

Secure Transport

Physical Security

Network Security

User and Role Administration

Auditing and Monitoring

Security in Java CAPS

Related Information

Analyzing Your Security Requirements

Understand Your Environment

Hire Security Consultants or Use Diagnostic Software

Read Security Publications

Securing Your Environment

Secure Tokens

Securing Java CAPS Repository Components

Securing Repository Tools

Securing Enterprise Manager

Security in NetBeans

Securing the Production Environment

Securing Production Computers

Securing the GlassFish Server in Production

Securing Oracle Java CAPS JMS IQ Manager

Developing Secure Applications

Component Security Features

Web Services Security Standards in Java CAPS

Auditing and Monitoring

Java CAPS Security Overview

Java CAPS applications typically handle the transmission of sensitive or critical data that require a high-level of security. When developing Java CAPS applications, it is important to secure all processes in the application life cycle, including the development, testing, deployment, migration, upgrading, and patching phases.

The following topics provide an overview of security for Java CAPS:

Security Concepts

When developing integration applications, security is crucial in not only the applications you develop, but in the environments in which you develop and deploy applications as well. Many of the Java CAPS applications you create will be web services. Due to the nature of web services and the use of open access, this adds a new set of requirements to the security considerations.

Security measures can include, but are not limited to, any of the following:

Authentication and Authorization

Authentication and authorization fulfill the very basic security requirements of verifying the identify of each user (authentication) and verifying that each user has the security permissions needed to perform certain tasks and access certain information (authorization). Java CAPS employs user authentication and authorization for installing certain Repository-based projects, deploying projects, monitoring deployed projects, and using Java CAPS applications to access information. In addition to its own security features, Java CAPS uses the authentication and authorization features of GlassFish Server.

Confidentiality

Confidentiality means keeping private information private, from the code you develop to the messages processed through the applications you create. It can also mean keeping private the identities of the parties exchanging information. This is accomplished by encrypting data and by hiding the identities of each party involved in a transaction.

Non-Repudiation

When you develop applications whose mission is to exchange data between external systems, it is imperative that the content of the messages does not change and that the integrity of the content is maintained. A digital signature can validate the message, guaranteeing that a message has not been changed since it was signed and providing non-repudiation.

Secure Transport

Secure transport means ensuring that messages remain secure while they are in transit. The most widely use transport-level security protocol is Secure Sockets Layer (SSL), also known as Transport Layer Security (TLS). Java CAPS allows you to configure design-time and runtime tools to use SSL, and you can configure many individual components in Java CAPS applications to use SSL.

Physical Security

In addition to securing information and applications, the physical hardware you used should also be secured. In a production environment, make sure that the actual hardware that hosts applications and the code is stored in a secured room with no unauthorized access.

Network Security

Network security involves preventing unwanted access to your networks, as well as misuse or modification of network resources. Authentication and authorization are the first steps to securing your network, and you can limit traffic between networks by using both hardware and software to create firewalls. In addition, anti-virus software can help keep your network free of malware.

User and Role Administration

User access to information and applications needs to be managed throughout the development lifecycle. This includes tasks such as adding and removing user accounts, assigning users to roles, removing users from roles, and adding new roles. These activities control user access to tools used in development and testing, and control access to tools, applications, and information in the production environment.

Auditing and Monitoring

Once a system is in production, an audit record should be maintained of server activity and you should be able to monitor and maintain running applications. Java CAPS provides auditing through its server log, and provides monitoring and management tools with the Enterprise Manager and the JBI Monitoring and Management API.

Security in Java CAPS

Java CAPS supports standard security protocols, such as HTTP, Secure Sockets Layer (SSL), HTTP over SSL, Web Services Security (WSIT), X.509 certificates, and so on. Java CAPS can also be configured to use security realms, including the file, certificate, and LDAP realms.

Java CAPS provides user, group, and role management tools for Repository-based applications, such as the Java CAPS Suite Installer and Enterprise Manager. Java CAPS can also take advantage of security features provided by the GlassFish Server and NetBeans for secure coding and secure message transport.

At the transport level, Java CAPS can use the security features of GlassFish and of the Repository. For example, you can configure connections to the GlassFish Server, Enterprise Manager, and Suite Installer to be through SSL. In addition, transport-level security can be defined in Adapter and Binding Component properties. At the message level you can use data encryption, web services security (WS-Security) policies, certificates, and so on. Certain Java CAPS components can be configured for additional security, such as Adapters and Binding Components.

Related Information

Additional security information for Java CAPS can be found in the following locations. These documents are referenced throughout this book.


Note - Security information specific to Java CAPS components, such as Adapters and Binding Components, can be found in the documentation for those products.