Security management

The J2EE Connector Architecture security contract extends the J2EE security model to provide secure connections to EIS.

To create a connection to an EIS, a signon to the EIS must occur to authenticate the connection requester. Generally, a signon involves one or more of the following steps:

  1. Determine the resource principal under whose security context the connection will be made.
  2. Authenticate the resource principal.
  3. Establish secure communications.
  4. Determine authorization (access control).

This signon can include re-authentication if the EIS supports it.