站内搜索: 请输入搜索关键词
当前页面: 在线文档首页 > JDK 5 Documentation v1.5.0, Java 2 SDK 英文文档

Uses of Package javax.security.auth (Java 2 Platform SE 5.0) - JDK 5 Documentation v1.5.0, Java 2 SDK 英文文档

JavaTM 2 Platform
Standard Ed. 5.0

Uses of Package
javax.security.auth

Packages that use javax.security.auth
java.security Provides the classes and interfaces for the security framework. 
javax.management.remote Interfaces for remote access to JMX MBean servers. 
javax.management.remote.rmi The RMI connector is a connector for the JMX Remote API that uses RMI to transmit client requests to a remote MBean server. 
javax.security.auth This package provides a framework for authentication and authorization. 
javax.security.auth.kerberos This package contains utility classes related to the Kerberos network authentication protocol. 
javax.security.auth.login This package provides a pluggable authentication framework. 
javax.security.auth.spi This package provides the interface to be used for implementing pluggable authentication modules. 
javax.security.auth.x500 This package contains the classes that should be used to store X500 Principal and X500 Private Crendentials in a Subject
 

Classes in javax.security.auth used by java.security
Destroyable
          Objects such as credentials may optionally implement this interface to provide the capability to destroy its contents.
DestroyFailedException
          Signals that a destroy operation failed.
Subject
           A Subject represents a grouping of related information for a single entity, such as a person.
 

Classes in javax.security.auth used by javax.management.remote
Subject
           A Subject represents a grouping of related information for a single entity, such as a person.
 

Classes in javax.security.auth used by javax.management.remote.rmi
Subject
           A Subject represents a grouping of related information for a single entity, such as a person.
 

Classes in javax.security.auth used by javax.security.auth
DestroyFailedException
          Signals that a destroy operation failed.
Policy
          Deprecated. as of JDK version 1.4 -- Replaced by java.security.Policy. java.security.Policy has a method:
        public PermissionCollection getPermissions
            (java.security.ProtectionDomain pd)
 
 
and ProtectionDomain has a constructor:
        public ProtectionDomain
            (CodeSource cs,
             PermissionCollection permissions,
             ClassLoader loader,
             Principal[] principals)
 
These two APIs provide callers the means to query the Policy for Principal-based Permission entries.
RefreshFailedException
          Signals that a refresh operation failed.
Subject
           A Subject represents a grouping of related information for a single entity, such as a person.
 

Classes in javax.security.auth used by javax.security.auth.kerberos
Destroyable
          Objects such as credentials may optionally implement this interface to provide the capability to destroy its contents.
DestroyFailedException
          Signals that a destroy operation failed.
Refreshable
          Objects such as credentials may optionally implement this interface to provide the capability to refresh itself.
RefreshFailedException
          Signals that a refresh operation failed.
 

Classes in javax.security.auth used by javax.security.auth.login
Subject
           A Subject represents a grouping of related information for a single entity, such as a person.
 

Classes in javax.security.auth used by javax.security.auth.spi
Subject
           A Subject represents a grouping of related information for a single entity, such as a person.
 

Classes in javax.security.auth used by javax.security.auth.x500
Destroyable
          Objects such as credentials may optionally implement this interface to provide the capability to destroy its contents.
 


JavaTM 2 Platform
Standard Ed. 5.0

Submit a bug or feature
For further API reference and developer documentation, see Java 2 SDK SE Developer Documentation. That documentation contains more detailed, developer-targeted descriptions, with conceptual overviews, definitions of terms, workarounds, and working code examples.

Copyright 2004 Sun Microsystems, Inc. All rights reserved. Use is subject to license terms. Also see the documentation redistribution policy.