What are the general steps performed when authenticating a Subject in JAAS?
What will be an ideal response?
The following general steps are performed when authenticating a Subject:
1. An application instantiates a LoginContext.
2. According to the configuration, the LoginContext loads all of the PAM modules configured for that application.
3. The application invokes the LoginContext login method.
4. The login method invokes the loaded PAM modules one after another. Each PAM module attempts to authenticate the subject. When all required modules are successful, PAM modules associate relevant Principals and credentials with a Subject object that represents the subject being authenticated.
5. Authentication status is returned to the application from the LoginContext.
6. If authentication succeeded, no exception will be thrown and the application can retrieve the Subject from the LoginContext.
You might also like to view...
When using tables to simulate frames, what is the significant difference in the behavior of tables and frames? How can you simulate this behavior using a table?
What will be an ideal response?
Describe the concept of nonrepudiation, and what technologies it uses.
What will be an ideal response?
Company A and Company B both supply contractual services to a fast paced and growing auto parts manufacturer with a small local Area Network (LAN) at its local site. Company A performs in- house billing and invoices services for the local auto parts manufactacturer. Company B provides in-house parts and widgets services for the local auto parts manufacturers. Which of the following is the BEST method to mitigate security risk within the environment?
A. Virtual Private Network B. Role-Based access C. Network segmentation D. Public Key Infrastructure
A characteristic of reflection attacks is the lack of _______ traffic.
A. backscatter B. network C. three-way D. botnet