Application Security
|
|
|
- Melinda Paul
- 9 years ago
- Views:
Transcription
1 2009 Marty Hall Declarative Web Application Security Originals of Slides and Source Code for Examples: Customized Java EE Training: Servlets, JSP, Struts, JSF/MyFaces/Facelets, Ajax, GWT, Spring, Hibernate/JPA, Java 5 & 6. Developed and taught by well-known author and developer. At public venues or onsite at your location Marty Hall For live Java training, please see training courses at coreser com/ Servlets, JSP, Struts, ts JSF, Ajax, GWT, Java 5, Java 6, Spring, Hibernate, JPA, and customized combinations of topics. Taught by the author of Core Servlets and JSP, More Servlets and JSP, and this tutorial. Available at public venues, Customized or customized Java EE Training: versions can be held on-site at your Servlets, JSP, Struts, JSF/MyFaces/Facelets, Ajax, GWT, Spring, Hibernate/JPA, Java 5 & 6. organization. Contact [email protected] for details. Developed and taught by well-known author and developer. At public venues or onsite at your location.
2 Agenda Major security concerns Declarative vs. programmatic security Using form-based authentication Steps Example Using BASIC authentication Steps Example 4 Major Issues Preventing unauthorized users from accessing sensitive i data. Access restriction Identifying which resources need protection Identifying who should have access to them Authentication Identifying users to determine if they are one of the authorized ones Preventing attackers from stealing network data while it is in transit. Encryption (usually with SSL) 5
3 Declarative Security 6 None of the individual servlets or JSP pages need any security-aware code. Instead, both of the major security aspects are handled by the server. To prevent unauthorized access Use the Web application deployment descriptor (web.xml) to declare that certain URLs need protection. Designate authentication method that server uses to identify users. At request time, the server automatically prompts users for usernames and passwords when they try to access restricted resources, automatically checks the results against a server-specific set of usernames and passwords, and automatically keeps track of which users have previously been authenticated. This process is completely transparent to the servlets and JSP pages. To safeguard network data Use the deployment descriptor to stipulate that certain URLs should be accessible only with SSL. If users try to use a regular HTTP connection to access one of these URLs, the server automatically redirects them to the HTTPS (SSL) equivalent. Programmatic Security 7 Protected servlets and JSP pages at least partially manage their own security. Much more work, but totally portable. No server-specific specific piece. Also no web.xml entries needed and a bit more flexibility is possible. To prevent unauthorized access Each servlet or JSP page must either authenticate the user or verify that the user has been authenticated previously. To safeguard network data Each servlet or JSP page has to check the network protocol used to access it. If users try to use a regular HTTP connection to access one of these URLs, the servlet or JSP page must manually redirect them to the HTTPS (SSL) equivalent.
4 Form-Based Authentication 8 When a not-yet-authenticated user tries to access a protected resource: Server automatically redirects user to Web page with an HTML form that asks for username and password Username and password checked against database of usernames, passwords, and roles (user categories) If login successful and role matches,,page shown If login unsuccesful, error page shown If login successful but role does not match, 403 error given (but you can use error-page and error-code) When an already authenticated user tries to access a protected resource: If role matches, page shown If role does not match, 403 error given Session tracking used to tell if user already authenticated BASIC Authentication 9 When a not-yet-authenticated user tries to access a protected resource: Server sends a 401 status code to browser Browser pops up dialog box asking for username and password, and they are sent with request in Authorization request header Username and password checked against database of usernames, passwords, and roles (user categories) If login successful and role matches, page shown If login unsuccesful or role does not match, 401 again When an already authenticated user tries to access a protected resource: If role matches, page shown If role does not match, 401 error given Request header used to tell if user already authenticated
5 10 Form-Based Authentication (Declarative Security) 1) Set up usernames, passwords, and roles. Designate a list of users and associated passwords and abstract role(s) such as normal user or administrator. This is a completely server-specific process. Simplest Tomcat approach: use install_dir/conf/tomcat-users.xml: <?xml version="1.0" encoding="iso "?> <tomcat-users> <user username="john" password="nhoj" roles="registered-user" /> <user username="jane" password="enaj" roles="registered-user" /> <user username="juan" password="nauj" roles="administrator" /> <user username="juana" password="anauj" roles="administrator,registered-user" /> </tomcat-users> 11 Form-Based Authentication (Continued) 2) Tell server that you are using form-based authentication. i Designate locations of login and login-failure page. Use the web.xml login-config element with authmethod of FORM and form-login-config with locations of pages. <web-app> <login-config> <auth-method>form</auth-method> <form-login-config> <form-login-page>/login.jsp</form-login-page> <form-error-page>/login-error.html</form-error-page> </form-login-config> fi </login-config> </web-app>
6 Form-Based Authentication (Continued) 3) Create a login page (HTML or JSP) HTML form with ACTION of j_security_check, METHOD of POST, textfield named j_username, and password field named j_password. <FORM ACTION="j_security_check" METHOD="POST"> <INPUT TYPE="TEXT" TEXT NAME="j j_username username"> <INPUT TYPE="PASSWORD" NAME="j_password"> </FORM> For the username, you can use a list box, combo box, or set of radio buttons instead of a textfield. 12 Form-Based Authentication (Continued) 4) Create page for failed login attempts. No specific content is mandated. Perhaps just username and password not found and give a link back to the login page. This can be either an HTML or a JSP document. 13
7 14 Form-Based Authentication (Continued) 5) Specify URLs to be password protected. Use security-constraint constraint element of web.xml. Two subelements: the first (web-resource-collection) designates URLs to which access should be restricted; the second (auth-constraint) specifies abstract roles that should have access to the given URLs. Using auth-constraint with no role-name means no direct access is allowed. <web-app...> <security-constraint> <web-resource-collection> <web-resource-name>sensitive</web-resource-name> <url-pattern>/sensitive/*</url-pattern> </web-resource-collection> <auth-constraint> <role-name>administrator</role-name> <role-name>executive</role-name> </auth-constraint> </security-constraint> <login-config>...</login-config> </web-app> Form-Based Authentication (Continued) 6) List all possible abstract roles (categories of users) that will be granted access to any resource Many servers do not enforce this, but technically required 15 <web-app...>... <security-role> <role-name>administrator</role-name> </security-role> <security-role> <role-name>executive</role-name> </security-role> </web-app>
8 Form-Based Authentication (Continued) 7) Specify which URLs require SSL. If server supports SSL, you can stipulate that certain resources are available only through encrypted HTTPS (SSL) connections. Use the user-data-constraint subelement of security-constraint. Only full J2EE servers are required to support SSL. <security-constraint> i <user-data-constraint> <transport-guarantee> t t CONFIDENTIAL </transport-guarantee> </user-data-constraint> </security-constraint> 16 Form-Based Authentication (Continued) 8) Turn off the invoker servlet. You protect certain URLs that are associated with registered servlet or JSP names. The format of default servlet URLs will probably not match the pattern. Thus, the security restrictions are bypassed when the default URLs are used. Disabling it In each Web application, redirect requests to other servlet by normal web.xml method <url-pattern>/servlet/*</url-pattern> Globally Server-specific mechanism (e.g. install_dir/conf/server.xml for Tomcat). 17
9 Example: Form-Based Security 18 Example: Step 1 Set up usernames, passwords, and roles. install_dir/conf/tomcat-users.xml <?xml version="1.0" encoding="iso "?> <tomcat-users> <user username="john" password="nhoj" roles="registered-user" /> <user username="jane" password="enaj" roles="registered-user" /> <user username="juan" password="nauj" roles="administrator" i /> <user username="juana" password="anauj" roles="administrator,registered-user" /> <!-- --> </tomcat-users> 19
10 Example: Step 2 20 Tell server that you are using form-based authentication. i Designate locations of login and login-failure page. <login-config> <auth-method>form</auth-method> <form-login-config> <form-login-page> /admin/login.jsp </form-login-page> <form-error-page> /admin/login-error.jsp </form-error-page> </form-login-config> </login-config> Example: Step 3 21 Create a login page <BODY> <TABLE BORDER=5 ALIGN="CENTER"> <TR><TH CLASS="TITLE">Log In</TABLE> <P> <H3>Sorry, you must log in before accessing this resource.</h3> <FORM ACTION="j_security_check" METHOD="POST"> <TABLE> <TR><TD>User name: <INPUT TYPE="TEXT" NAME="j_username"> <TR><TD>Password: <INPUT TYPE="PASSWORD" NAME="j_password"> <TR><TH><INPUT TYPE="SUBMIT" VALUE="Log In"> </TABLE> </FORM></BODY></HTML>
11 Example: Step 3 (Result) 22 Example: Step 4 Create page for failed login attempts. <BODY> <TABLE BORDER=5 ALIGN="CENTER"> <TR><TH CLASS="TITLE">Begone!</TABLE> <H3>Begone, ye unauthorized peon.</h3> </BODY> </HTML> 23
12 Example: Access Rules Home page Anyone Investing page Registered users Administrators Stock purchase page Registered users Via SSL only Delete account page Administrators 24 Example: Step 5 Specify URLs to be password protected. 25 <!-- Protect everything within the "investing" directory. --> <security-constraint> <web-resource-collection> <web-resource-name>investing </web-resource-name> <url-pattern>/investing/*</url-pattern> </web-resource-collection> collection> <auth-constraint> <role-name>registered-user</role-name> <role-name>administrator</role-name> </auth-constraint> </security-constraint>
13 Example: Step 5 (Continued) <!-- Only users in the administrator role can access the delete-account.jsp page within the admin directory. --> <security-constraint> constraint> <web-resource-collection> <web-resource-name>account Deletion </web-resource-name> <url-pattern>/admin/delete-account.jsp </url-pattern> </web-resource-collection> <auth-constraint> <role-name>administrator</role-name> </auth-constraint> </security-constraint> 26 Example: Step 5 (Results) First attempt to access account status page Result of successful login and later attempts to access account status page 27
14 Example: Step 6 6) List all possible abstract roles (types of users) that will be granted access to any resource <web-app...>... <security-role> role> <role-name>registered-user</role-name> </security-role> <security-role> <role-name>administrator</role-name> </security-role> </web-app> 28 Example: Step 7 Specify which URLs require SSL. 29 <!-- URLs of the form require SSL and are thus redirected to --> <security-constraint> <web-resource-collection> <web-resource-name>purchase </web-resource-name> <url-pattern>/ssl/*</url-pattern> </web-resource-collection> <auth-constraint> <role-name>registered-user</role-name> </auth-constraint> <user-data-constraint> <transport-guarantee>confidential </transport-guarantee> </user-data-constraint> </security-constraint>
15 Example: Step 7 (Results) or / / kj 30 Example: Step 8 Turn off the invoker servlet <!-- Turn off invoker. Send requests to index.jsp. --> <servlet-mapping> <servlet-name>redirector</servlet-name> <url-pattern>/servlet/*</url-pattern> </servlet-mapping> <welcome-file-list> <welcome-file>index.jsp</welcome-file> <welcome-file>index.html</welcome-file> i l l </welcome-file-list> 31
16 Example: Step 8 (Continued) /** Servlet that simply redirects users to the * Web application home page. */ public class RedirectorServlet extends HttpServlet { public void doget(httpservletrequest request, HttpServletResponse response) throws ServletException, IOException { response.sendredirect(request.getcontextpath()); sendredirect(request } } public void dopost(httpservletrequest request, HttpServletResponse response) throws ServletException, IOException { doget(request, response); } 32 Example: Step 8 (Results) Attempt to access /h / /A hi 33
17 34 Form-Based vs. BASIC Authentication Advantages of form-based Consistent t look and dfeel Fits model users expect from ecommerce sites Disadvantage of form-based Can fail if server is using URL rewriting for session tracking. Can fail if browser has cookies disabled. Advantages of BASIC Doesn't rely on session tracking Easier when you are doing it yourself (programmatic) Disadvantage of BASIC Small popup dialog box seems less familiar to most users Other auth-method options CLIENT-CERT (X 509 certificates) DIGEST (Not widely supported by browsers) BASIC Authentication 1. Set up usernames, passwords, and roles. Same as for form-based authentication. Server-specific. 2. Tell the server that you are using BASIC authentication. Designate the realm name. Use the web.xml login-config element with an auth-method subelement of BASIC and a realmname subelement (generally used as part of the title of the dialog box that the browser opens). <login-config> <auth-method>basic</auth-method> <realm-name>some Name</realm-name> </login-config> 35
18 BASIC Authentication (Continued) 3. Specify which URLs should be password protected. Same as with form-based authentication. 4. List all possible roles (categories of users) that will access any protected resource Same as with form-based authentication 5. Specify which URLs should be available only with SSL. Same as with form-based authentication. 6. Turn off the invoker servlet. Same as with form-based authentication. 36 Example: BASIC Authentication Home page Anyone Financial plan Employees or executives Business plan Executives only 37
19 Example: BASIC Authentication (Step 1) Set up usernames, passwords, and roles. <?xml version="1.0" encoding="iso "?> <tomcat-users> <user username="gates" password="llib" roles="employee" /> <user username="ellison" password="yrral" roles="employee" /> <user username="mcnealy" password="ttocs" roles="executive" /> </tomcat-users> 38 Note: file that contains these passwords and those of declarative example is online at Example: BASIC Authentication (Step 2) Tell the server that you are using BASIC authentication. i Designate the realm name. <login-config> <auth-method>basic</auth-method> <realm-name>intranet</realm-name> </login-config> 39
20 40 Example: BASIC Authentication (Step 3) Specify which URLs should be password protected. <security-constraint> <web-resource-collection> <web-resource-name> Financial Plan </web-resource-name> <url-pattern> /financial-plan.html </url-pattern> </web-resource-collection> <auth-constraint> <role-name>employee</role-name> <role-name>executive</role-name> </auth-constraint> </security-constraint> Example: BASIC Authentication (Step 3 Continued) <security-constraint> <web-resource-collection> <web-resource-name> Business Plan </web-resource-name> <url-pattern> /business-plan.html </url-pattern> </web-resource-collection> <auth-constraint> <role-name>executive</role-name> e e ecut e o e a e </auth-constraint> </security-constraint> 41
21 Example: BASIC Authentication (Step 4) <web-app...>... <security-role> <role-name>employee</role-name> </security-role> <security-role> <role-name>executive</role-name> </security-role> role> </web-app> 42 Example: BASIC Authentication (Results) First attempt For business plan Failed login User not found Denied User not in executive role Success User in executive role You can use the errorpage and error-code elements to define custom pages status code 403. See lecture on web.xml. 43
22 Summary 44 Main security issues Preventing access by unauthorized users Preventing attackers from stealing network data Declarative security Much less work than programmatic security Requires server-specific password setup Form-based authentication Attempts to access restricted resources get redirected to login page. HTML form gathers username and password. Session tracking tracks authenticated users. BASIC authentication Attempts to access restricted resources results in dialog box. Dialog gathers username and password. HTTP headers track authenticated users Marty Hall Questions? Customized Java EE Training: Servlets, JSP, Struts, JSF/MyFaces/Facelets, Ajax, GWT, Spring, Hibernate/JPA, Java 5 & 6. Developed and taught by well-known author and developer. At public venues or onsite at your location.
Recommended readings. Lecture 11 - Securing Web. Applications. Security. Declarative Security
Recommended readings Lecture 11 Securing Web http://www.theserverside.com/tt/articles/content/tomcats ecurity/tomcatsecurity.pdf http://localhost:8080/tomcat-docs/security-managerhowto.html http://courses.coreservlets.com/course-
Web Applications. For live Java training, please see training courses at
2009 Marty Hall Using and Deploying Web Applications Originals of Slides and Source Code for Examples: http://courses.coreservlets.com/course-materials/msajsp.html Customized Java EE Training: http://courses.coreservlets.com/
Controlling Web Application Behavior
2006 Marty Hall Controlling Web Application Behavior The Deployment Descriptor: web.xml JSP, Servlet, Struts, JSF, AJAX, & Java 5 Training: http://courses.coreservlets.com J2EE Books from Sun Press: http://www.coreservlets.com
Building Web Services with Apache Axis2
2009 Marty Hall Building Web Services with Apache Axis2 Part I: Java-First (Bottom-Up) Services Customized Java EE Training: http://courses.coreservlets.com/ Servlets, JSP, Struts, JSF/MyFaces/Facelets,
Java Web Programming. Student Workbook
Student Workbook Java Web Programming Mike Naseef, Jamie Romero, and Rick Sussenbach Published by ITCourseware, LLC., 7245 South Havana Street, Suite 100, Centennial, CO 80112 Editors: Danielle Hopkins
Web Applications. Originals of Slides and Source Code for Examples: http://courses.coreservlets.com/course-materials/msajsp.html
2009 Marty Hall Using and Deploying Web Applications Originals of Slides and Source Code for Examples: http://courses.coreservlets.com/course-materials/msajsp.html Customized Java EE Training: http://courses.coreservlets.com/
Securing a Web Service
1 Securing a Web Service HTTP Basic Authentication and HTTPS/SSL Authentication and Encryption - Read Chaper 32 of the J2EE Tutorial - protected session, described later in this chapter, which ensur content
An Overview of Servlet & JSP Technology
2007 Marty Hall An Overview of Servlet & JSP Technology 2 Customized J2EE Training: http://courses.coreservlets.com/ Servlets, JSP, Struts, JSF, EJB3, Ajax, Java 5, Java 6, etc. Ruby/Rails coming soon.
Creating Java EE Applications and Servlets with IntelliJ IDEA
Creating Java EE Applications and Servlets with IntelliJ IDEA In this tutorial you will: 1. Create IntelliJ IDEA project for Java EE application 2. Create Servlet 3. Deploy the application to JBoss server
& JSP Technology Originals of Slides and Source Code for Examples: http://courses.coreservlets.com/course-materials/csajsp2.html
2009 Marty Hall An Overview of Servlet & JSP Technology Originals of Slides and Source Code for Examples: http://courses.coreservlets.com/course-materials/csajsp2.html 2 Customized Java EE Training: http://courses.coreservlets.com/
JHU/EP Server Originals of Slides and Source Code for Examples: http://courses.coreservlets.com/course-materials/csajsp2.html
2010 Marty Hall Deploying Apps to the JHU/EP Server Originals of Slides and Source Code for Examples: http://courses.coreservlets.com/course-materials/csajsp2.html 2 Customized Java EE Training: http://courses.coreservlets.com/
Supplement IV.E: Tutorial for Tomcat. For Introduction to Java Programming By Y. Daniel Liang
Supplement IV.E: Tutorial for Tomcat For Introduction to Java Programming By Y. Daniel Liang This supplement covers the following topics: Obtaining and Installing Tomcat Starting and Stopping Tomcat Choosing
JVA-122. Secure Java Web Development
JVA-122. Secure Java Web Development Version 7.0 This comprehensive course shows experienced developers of Java EE applications how to secure those applications and to apply best practices with regard
Please send your comments to: [email protected]
Sun Certified Web Component Developer Study Guide - v2 Sun Certified Web Component Developer Study Guide...1 Authors Note...2 Servlets...3 The Servlet Model...3 The Structure and Deployment of Modern Servlet
Setup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account.
Setup Corporate (Microsoft Exchange) Email This tutorial will walk you through the steps of setting up your corporate email account. Microsoft Exchange Email Support Exchange Server Information You will
<Insert Picture Here> Hudson Security Architecture. Winston Prakash. Click to edit Master subtitle style
Hudson Security Architecture Click to edit Master subtitle style Winston Prakash Hudson Security Architecture Hudson provides a security mechanism which allows Hudson Administrators
The Google Web Toolkit (GWT): The Model-View-Presenter (MVP) Architecture Official MVP Framework
2013 Marty Hall & Yaakov Chaikin The Google Web Toolkit (GWT): The Model-View-Presenter (MVP) Architecture Official MVP Framework (GWT 2.5 Version) Originals of Slides and Source Code for Examples: http://courses.coreservlets.com/course-materials/gwt.html
You Are Hacked End-to-End Java EE Security in Practice. Karthik Shyamsunder, Principal Technologist Phani Pattapu, Engineer
You Are Hacked End-to-End Java EE Security in Practice Karthik Shyamsunder, Principal Technologist Phani Pattapu, Engineer Who Are We? Karthik Shyamsunder Principal Technologist, Verisign Adjunct Faculty,
2. Follow the installation directions and install the server on ccc
Installing a Web Server 1. Install a sample web server, which supports Servlets/JSPs. A light weight web server is Apache Tomcat server. You can get the server from http://tomcat.apache.org/ 2. Follow
Servlet and JSP Filters
2009 Marty Hall Servlet and JSP Filters Originals of Slides and Source Code for Examples: http://courses.coreservlets.com/course-materials/msajsp.html Customized Java EE Training: http://courses.coreservlets.com/
Hadoop Streaming. 2012 coreservlets.com and Dima May. 2012 coreservlets.com and Dima May
2012 coreservlets.com and Dima May Hadoop Streaming Originals of slides and source code for examples: http://www.coreservlets.com/hadoop-tutorial/ Also see the customized Hadoop training courses (onsite
2.8. Session management
2.8. Session management Juan M. Gimeno, Josep M. Ribó January, 2008 Session management. Contents Motivation Hidden fields URL rewriting Cookies Session management with the Servlet/JSP API Examples Scopes
Session Tracking Customized Java EE Training: http://courses.coreservlets.com/
2012 Marty Hall Session Tracking Originals of Slides and Source Code for Examples: http://courses.coreservlets.com/course-materials/csajsp2.html 2 Customized Java EE Training: http://courses.coreservlets.com/
Security Code Review- Identifying Web Vulnerabilities
Security Code Review- Identifying Web Vulnerabilities Kiran Maraju, CISSP, CEH, ITIL, SCJP Email: [email protected] 1 1.1.1 Abstract Security Code Review- Identifying Web Vulnerabilities This paper
How To Understand The Architecture Of Java 2Ee, J2Ee, And J2E (Java) In A Wordpress Blog Post
Understanding Architecture and Framework of J2EE using Web Application Devadrita Dey Sarkar,Anavi jaiswal, Ankur Saxena Amity University,UTTAR PRADESH Sector-125, Noida, UP-201303, India Abstract: This
Handling the Client Request: Form Data
2012 Marty Hall Handling the Client Request: Form Data Originals of Slides and Source Code for Examples: http://courses.coreservlets.com/course-materials/csajsp2.html 3 Customized Java EE Training: http://courses.coreservlets.com/
How To Protect Your Computer From Being Hacked On A J2Ee Application (J2Ee) On A Pc Or Macbook Or Macintosh (Jvee) On An Ipo (J 2Ee) (Jpe) On Pc Or
Pistoia_ch03.fm Page 55 Tuesday, January 6, 2004 1:56 PM CHAPTER3 Enterprise Java Security Fundamentals THE J2EE platform has achieved remarkable success in meeting enterprise needs, resulting in its widespread
Managed Beans II Advanced Features
2014 Marty Hall Managed Beans II Advanced Features Originals of Slides and Source Code for Examples: http://www.coreservlets.com/jsf-tutorial/jsf2/ Customized Java EE Training: http://courses.coreservlets.com/
Sample HP OO Web Application
HP OO 10 OnBoarding Kit Community Assitstance Team Sample HP OO Web Application HP OO 10.x Central s rich API enables easy integration of the different parts of HP OO Central into custom web applications.
15-415 Database Applications Recitation 10. Project 3: CMUQFlix CMUQ s Movies Recommendation System
15-415 Database Applications Recitation 10 Project 3: CMUQFlix CMUQ s Movies Recommendation System Project Objective 1. Set up a front-end website with PostgreSQL back-end 2. Allow users to login, like
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
Volume 1: Core Technologies Marty Hall Larry Brown. An Overview of Servlet & JSP Technology
Core Servlets and JavaServer Pages / 2e Volume 1: Core Technologies Marty Hall Larry Brown An Overview of Servlet & JSP Technology 1 Agenda Understanding the role of servlets Building Web pages dynamically
Virtual Machine (VM) For Hadoop Training
2012 coreservlets.com and Dima May Virtual Machine (VM) For Hadoop Training Originals of slides and source code for examples: http://www.coreservlets.com/hadoop-tutorial/ Also see the customized Hadoop
Integrating Apex into Federated Environment using SAML 2.0. Jon Tupman Portalsoft Solutions Ltd
Integrating Apex into Federated Environment using SAML 2.0 Jon Tupman Portalsoft Solutions Ltd Introduction Migration challenge Federated vs Single sign-on SAML process flow Integrating Apex and Weblogic
Complete Java Web Development
Complete Java Web Development JAVA-WD Rev 11.14 4 days Description Complete Java Web Development is a crash course in developing cutting edge Web applications using the latest Java EE 6 technologies from
Using weblock s Servlet Filters for Application-Level Security
Using weblock s Servlet Filters for Application-Level Security September 2006 www.2ab.com Introduction Access management is a simple concept. Every business has information that needs to be protected from
TypingMaster Intra. LDAP / Active Directory Installation. Technical White Paper (2009-9)
TypingMaster Intra LDAP / Active Directory Installation Technical White Paper (2009-9) CONTENTS Contents... 2 TypingMaster Intra LDAP / Active Directory White Paper... 3 Background INFORMATION... 3 Overall
Hello World RESTful web service tutorial
Hello World RESTful web service tutorial Balázs Simon ([email protected]), BME IIT, 2015 1 Introduction This document describes how to create a Hello World RESTful web service in Eclipse using JAX-RS
Keycloak SAML Client Adapter Reference Guide
Keycloak SAML Client Adapter Reference Guide SAML 2.0 Client Adapters 1.7.0.Final Preface... v 1. Overview... 1 2. General Adapter Config... 3 2.1. SP Element... 4 2.2. SP Keys and Key elements... 5 2.2.1.
SSC - Web applications and development Introduction and Java Servlet (II)
SSC - Web applications and development Introduction and Java Servlet (II) Shan He School for Computational Science University of Birmingham Module 06-19321: SSC Outline Outline of Topics Servlet Configuration
Configuring IBM WebSphere Application Server 7.0 for Web Authentication with SAS 9.3 Web Applications
Configuration Guide Configuring IBM WebSphere Application Server 7.0 for Web Authentication with SAS 9.3 Web Applications Configuring the System for Web Authentication This document explains how to configure
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Apache Roller, Acegi Security and Single Sign-on
Apache Roller, Acegi Security and Single Sign-on Matt Raible [email protected] http://raibledesigns.com Matt Raible Apache Roller, Acegi Security and Single Sign-on Slide 1 Today s Agenda Introductions
The Google Web Toolkit (GWT): Declarative Layout with UiBinder Basics
2013 Marty Hall & Yaakov Chaikin The Google Web Toolkit (GWT): Declarative Layout with UiBinder Basics (GWT 2.5 Version) Originals of Slides and Source Code for Examples: http://courses.coreservlets.com/course-materials/gwt.html
2011 Marty Hall An Overview of Servlet & JSP Technology Customized Java EE Training: http://courses.coreservlets.com/
2011 Marty Hall An Overview of Servlet & JSP Technology Originals of Slides and Source Code for Examples: http://courses.coreservlets.com/course-materials/csajsp2.html 3 Customized Java EE Training: http://courses.coreservlets.com/
In this chapter, we lay the foundation for all our further discussions. We start
01 Struts.qxd 7/30/02 10:23 PM Page 1 CHAPTER 1 Introducing the Jakarta Struts Project and Its Supporting Components In this chapter, we lay the foundation for all our further discussions. We start by
JBoss SOAP Web Services User Guide. Version: 3.3.0.M5
JBoss SOAP Web Services User Guide Version: 3.3.0.M5 1. JBoss SOAP Web Services Runtime and Tools support Overview... 1 1.1. Key Features of JBossWS... 1 2. Creating a Simple Web Service... 3 2.1. Generation...
JWIG Yet Another Framework for Maintainable and Secure Web Applications
JWIG Yet Another Framework for Maintainable and Secure Web Applications Anders Møller Mathias Schwarz Aarhus University Brief history - Precursers 1999: Powerful template system Form field validation,
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
Web Application Programmer's Guide
Web Application Programmer's Guide JOnAS Team ( Florent BENOIT) - March 2009 - Copyright OW2 consortium 2008-2009 This work is licensed under the Creative Commons Attribution-ShareAlike License. To view
Map Reduce Workflows
2012 coreservlets.com and Dima May Map Reduce Workflows Originals of slides and source code for examples: http://www.coreservlets.com/hadoop-tutorial/ Also see the customized Hadoop training courses (onsite
Outline. CS 112 Introduction to Programming. Recap: HTML/CSS/Javascript. Admin. Outline
Outline CS 112 Introduction to Programming Web Programming: Backend (server side) Programming with Servlet, JSP q Admin and recap q Server-side web programming overview q Servlet programming q Java servlet
LICENSE4J AUTO LICENSE GENERATION AND ACTIVATION SERVER USER GUIDE
LICENSE4J AUTO LICENSE GENERATION AND ACTIVATION SERVER USER GUIDE VERSION 1.6.0 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Server Roles... 4 Installation... 9 Server WAR Deployment...
CONTROLLING WEB APPLICATION BEHAVIOR WITH
CONTROLLING WEB APPLICATION BEHAVIOR WITH WEB.XML Chapter Topics in This Chapter Customizing URLs Turning off default URLs Initializing servlets and JSP pages Preloading servlets and JSP pages Declaring
HBase Java Administrative API
2012 coreservlets.com and Dima May HBase Java Administrative API Originals of slides and source code for examples: http://www.coreservlets.com/hadoop-tutorial/ Also see the customized Hadoop training courses
ACI Commerce Gateway Hosted Payment Page Guide
ACI Commerce Gateway Hosted Payment Page Guide Inc. All rights reserved. All information contained in this document is confidential and proprietary to ACI Worldwide Inc. This material is a trade secret
HDFS Installation and Shell
2012 coreservlets.com and Dima May HDFS Installation and Shell Originals of slides and source code for examples: http://www.coreservlets.com/hadoop-tutorial/ Also see the customized Hadoop training courses
InternetVista Web scenario documentation
InternetVista Web scenario documentation Version 1.2 1 Contents 1. Change History... 3 2. Introduction to Web Scenario... 4 3. XML scenario description... 5 3.1. General scenario structure... 5 3.2. Steps
Configuring iplanet 6.0 Web Server For SSL and non-ssl Redirect
Introduction Configuring iplanet 6.0 Web Server For SSL and non-ssl Redirect This document describes the process for configuring an iplanet web server for the following situation: Require that clients
Forms, CGI Objectives. HTML forms. Form example. Form example...
The basics of HTML forms How form content is submitted GET, POST Elements that you can have in forms Responding to forms Common Gateway Interface (CGI) Later: Servlets Generation of dynamic Web content
Java EE 6 New features in practice Part 3
Java EE 6 New features in practice Part 3 Java and all Java-based marks are trademarks or registered trademarks of Sun Microsystems, Inc. in the U.S. and other countries. License for use and distribution
Web Container Components Servlet JSP Tag Libraries
Web Application Development, Best Practices by Jeff Zhuk, JavaSchool.com ITS, Inc. [email protected] Web Container Components Servlet JSP Tag Libraries Servlet Standard Java class to handle an HTTP request
Collax Web Security. Howto. This howto describes the setup of a Web proxy server as Web content filter.
Collax Web Security Howto This howto describes the setup of a Web proxy server as Web content filter. Requirements Collax Business Server Collax Security Gateway Collax Platform Server including Collax
Debugging Ajax Pages: Firebug
2010 Marty Hall Ajax: Development and Debugging g Tools Originals of Slides and Source Code for Examples: http://courses.coreservlets.com/course-materials/ajax.html Customized Java EE Training: http://courses.coreservlets.com/
Using different Security Policies on Group Level for AD within one Portal. SSL-VPN Security on Group Level. Introduction
SSL-VPN Using different Security Policies on Group Level for AD within one Portal SSL-VPN Security on Group Level Introduction Security on the SSL-VPN is done via Policies which allows or denies access
Is your data safe out there? -A white Paper on Online Security
Is your data safe out there? -A white Paper on Online Security Introduction: People should be concerned of sending critical data over the internet, because the internet is a whole new world that connects
An Introduction to Application Security in J2EE Environments
An Introduction to Application Security in J2EE Environments Dan Cornell Denim Group, Ltd. www.denimgroup.com Overview Background What is Application Security and Why is It Important? Specific Reference
c. Write a JavaScript statement to print out as an alert box the value of the third Radio button (whether or not selected) in the second form.
Practice Problems: These problems are intended to clarify some of the basic concepts related to access to some of the form controls. In the process you should enter the problems in the computer and run
Intell-a-Keeper Reporting System Technical Programming Guide. Tracking your Bookings without going Nuts! http://www.acorn-is.
Intell-a-Keeper Reporting System Technical Programming Guide Tracking your Bookings without going Nuts! http://www.acorn-is.com 877-ACORN-99 Step 1: Contact Marian Talbert at Acorn Internet Services at
Development of Object-Oriented Analysis and Design Methodology for Secure Web Applications
, pp.71-80 http://dx.doi.org/10.14257/ijsia.2014.8.1.07 Development of Object-Oriented Analysis and Design Methodology for Secure Web Applications Kyung-Soo Joo 1 and Jung-Woong Woo 2 1 Department of Computer
New Single Sign-on Options for IBM Lotus Notes & Domino. 2012 IBM Corporation
New Single Sign-on Options for IBM Lotus Notes & Domino 2012 IBM Corporation IBM s statements regarding its plans, directions, and intent are subject to change or withdrawal without notice at IBM s sole
Here are the steps to configure Outlook Express for use with Salmar's Zimbra server. Select "Tools" and then "Accounts from the pull down menu.
Salmar Consulting Inc. Setting up Outlook Express to use Zimbra Marcel Gagné, February 2010 Here are the steps to configure Outlook Express for use with Salmar's Zimbra server. Open Outlook Express. Select
Using Form Tools (admin)
EUROPEAN COMMISSION DIRECTORATE-GENERAL INFORMATICS Directorate A - Corporate IT Solutions & Services Corporate Infrastructure Solutions for Information Systems (LUX) Using Form Tools (admin) Commission
5. At the Windows Component panel, select the Internet Information Services (IIS) checkbox, and then hit Next.
Installing IIS on Windows XP 1. Start 2. Go to Control Panel 3. Go to Add or RemovePrograms 4. Go to Add/Remove Windows Components 5. At the Windows Component panel, select the Internet Information Services
Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications
Configuring Integrated Windows Authentication for JBoss with SAS 9.2 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring
Advanced Java Client API
2012 coreservlets.com and Dima May Advanced Java Client API Advanced Topics Originals of slides and source code for examples: http://www.coreservlets.com/hadoop-tutorial/ Also see the customized Hadoop
Programming on the Web(CSC309F) Tutorial: Servlets && Tomcat TA:Wael Aboelsaadat
Programming on the Web(CSC309F) Tutorial: Servlets && Tomcat TA:Wael Aboelsaadat Acknowledgments : This tutorial is based on a series of articles written by James Goodwill about Tomcat && Servlets. 1 Tomcat
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Course Name: Course in JSP Course Code: P5
Course Name: Course in JSP Course Code: P5 Address: Sh No BSH 1,2,3 Almedia residency, Xetia Waddo Duler Mapusa Goa E-mail Id: [email protected] Tel: (0832) 2465556 (0832) 6454066 Course Code: P5 3i
Sichere Software- Entwicklung für Java Entwickler
Sichere Software- Entwicklung für Java Entwickler Dominik Schadow Senior Consultant Trivadis GmbH 05/09/2012 BASEL BERN LAUSANNE ZÜRICH DÜSSELDORF FRANKFURT A.M. FREIBURG I.BR. HAMBURG MÜNCHEN STUTTGART
Web Programming II JSP (Java Server Pages) ASP request processing. The Problem. The Problem. Enterprise Application Development using J2EE
Enterprise Application Development using J2EE Shmulik London Lecture #6 Web Programming II JSP (Java Server Pages) How we approached it in the old days (ASP) Multiplication Table Multiplication
Exam Prep. Sun Certified Web Component Developer (SCWCD) for J2EE Platform
Exam Prep Sun Certified Web Component Developer (SCWCD) for J2EE Platform Core Servlets & JSP book: www.coreservlets.com More Servlets & JSP book: www.moreservlets.com Servlet and JSP Training Courses:
Understanding Tomcat Security
Understanding Tomcat Security Anil Saldhana Project Lead JBoss Security and Identity Management Red Hat Inc Speaker Introduction Apache Web Services Program Management Committee. Apache Scout Project Lead.
T320 E-business technologies: foundations and practice
T320 E-business technologies: foundations and practice Block 3 Part 2 Activity 2: Generating a client from WSDL Prepared for the course team by Neil Simpkins Introduction 1 WSDL for client access 2 Static
Integrating LivePerson with Salesforce
Integrating LivePerson with Salesforce V 9.2 March 2, 2010 Implementation Guide Description Who should use this guide? Duration This guide describes the process of integrating LivePerson and Salesforce
NGASI AppServer Manager SaaS/ASP Hosting Automation for Cloud Computing Administrator and User Guide
NGASI AppServer Manager SaaS/ASP Hosting Automation for Cloud Computing Administrator and User Guide NGASI SaaS Hosting Automation is a JAVA SaaS Enablement infrastructure that enables web hosting services
Implementing the Shop with EJB
Exercise 2 Implementing the Shop with EJB 2.1 Overview This exercise is a hands-on exercise in Enterprise JavaBeans (EJB). The exercise is as similar as possible to the other exercises (in other technologies).
NeoMail Guide. Neotel (Pty) Ltd
NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Copyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
CORISECIO. Quick Installation Guide Open XML Gateway
Quick Installation Guide Open XML Gateway Content 1 FIRST STEPS... 3 2 INSTALLATION... 3 3 ADMINCONSOLE... 4 3.1 Initial Login... 4 3.1.1 Derby Configuration... 5 3.1.2 Password Change... 6 3.2 Logout...
Siteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
Workshop for WebLogic introduces new tools in support of Java EE 5.0 standards. The support for Java EE5 includes the following technologies:
Oracle Workshop for WebLogic 10g R3 Hands on Labs Workshop for WebLogic extends Eclipse and Web Tools Platform for development of Web Services, Java, JavaEE, Object Relational Mapping, Spring, Beehive,
Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
