JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Java CAPS Security Guide     Java CAPS Documentation
search filter icon
search icon

Document Information

Securing Your Java CAPS Environment

Java CAPS Security Overview

Security Concepts

Authentication and Authorization

Confidentiality

Non-Repudiation

Secure Transport

Physical Security

Network Security

User and Role Administration

Auditing and Monitoring

Security in Java CAPS

Related Information

Analyzing Your Security Requirements

Understand Your Environment

Hire Security Consultants or Use Diagnostic Software

Read Security Publications

Securing Your Environment

Secure Tokens

Securing Java CAPS Repository Components

Securing Repository Tools

Securing Enterprise Manager

Security in NetBeans

Securing the Production Environment

Securing Production Computers

Securing the GlassFish Server in Production

Securing Oracle Java CAPS JMS IQ Manager

Developing Secure Applications

Component Security Features

Web Services Security Standards in Java CAPS

Auditing and Monitoring

Analyzing Your Security Requirements

Before you begin to develop Java CAPS applications and deploy them to a production environment, determine your security needs and make sure that you take the appropriate security measures. The following sections provide a starting point for analyzing your security requirements:

Keep in mind the security requirements for all the different environments in which you work, including development, testing, and production.

Understand Your Environment

To better understand your security needs, ask yourself the following questions:

Hire Security Consultants or Use Diagnostic Software

Whether you deploy the Java CAPS applications on the internet or on an intranet, it is a good idea to hire an independent security expert to review your security plan and procedures, audit your installed systems, and recommend improvements. Oracle On Demand offers services and products that can help you to secure a GlassFish Server production environment. For more information, see the Oracle On Demand page.

Read Security Publications

Read about security issues: