Go to main content
1/8
Contents
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
1
Introduction to Coherence Security
1.1
Conceptual Overview of Coherence Security
1.2
Overview of Security Configuration
2
Enabling General Security Measures
2.1
Specifying Coherence Privileges in the Java Security Policy File
2.2
Using Host-Based Authorization
2.2.1
Specifying Cluster Member Authorized Hosts
2.2.2
Specifying Extend Client Authorized Hosts
2.2.3
Using a Filter Class to Determine Authorization
2.3
Managing Rogue Clients
3
Using the Access Controller
3.1
Overview of the Access Controller
3.2
Enabling the Default Access Controller Implementation
4
Securing Extend Client Connections
4.1
Using Identity Tokens to Restrict Client Connections
4.1.1
Creating a Custom Identity Transformer
4.1.2
Enabling a Custom Identity Transformer
4.1.3
Creating a Custom Identity Asserter
4.1.4
Enabling a Custom Identity Asserter
4.1.5
Using Custom Security Types
4.1.6
Understanding Custom Identity Token Interoperability
4.2
Associating Identities with Extend Services
4.3
Implementing Extend Client Authorization
4.3.1
Creating Authorization Interceptor Classes
4.3.2
Enabling Authorization Interceptor Classes
5
Using SSL to Secure Communication
5.1
Overview of SSL
5.2
Using SSL to Secure TCMP Communication
5.2.1
Defining a SSL Socket Provider
5.2.2
Using the Pre-Defined SSL Socket Provider
5.3
Using SSL to Secure Extend Client Communication
5.3.1
Configuring a Cluster-Side SSL Socket Provider
5.3.1.1
Configure a SSL Socket Provider Per Proxy Service
5.3.1.2
Configure a SSL Socket Provider for All Proxy Services
5.3.2
Configure a Java Client-Side SSL Socket Provider
5.3.2.1
Configure a SSL Socket Provider Per Remote Service
5.3.2.2
Configure a SSL Socket Provider for All Remote Services
5.3.3
Configure a .NET Client-Side Stream Provider
Scripting on this page enhances content navigation, but does not change the content in any way.