The preceding graphic shows a RMI Security Module deployment