Understanding Java Access Control List ( Java ACL )

Java has a special package called the java.security.acl which has all the interfaces needed to implement the access control to the agents and the agent groups. A default implementation of the ACL package is also provided by Sun in sun.security.acl.

The Acl interface in the java.security.acl package has the access control list. Group of owners are related to the Acl interface and these owners are represented as Principal objects. The Principal is the user or the agent. The keys and the certificates of the Principal are checked when the Acl interface is implemented.

An AclEntry object represents an entry in the access control list. This entry gives information on the permissions available for the agent to access a particular resource. The addEntry() method is used to add an Acl entry. The permission for the resource being protected by defined in the AclEntry and these permissions are given to the Principal.

The Permission interface has the different types of permissions allowed for that particular resource. Documentation with examples on how to work with the java.security.acl is available in the internet. You can use these documents to understand how Acl is implemented in Java.

Oracle Announces Java 8

HBase is massively scalable -- and hugely complex
Apache HBase describes itself as "the Hadoop database," which can be a bit confusing, as Hadoop is typically understood to refer to the popular MapReduce processing framework. But Hadoop is really an umbrella name for an entire ecosystem of technologies, some of which HBase uses to create a distributed, column-oriented database built on the same principles as Google's Bigtable. HBase does not ...

Panasonic's Power Supply Container: A solar power plant in a box
In an effort to bring reliable electricity supplies to emerging regions and remote island communities, Panasonic has developed an expandable, portable, self-contained photovoltaic system. The "Power Supply Container" comes equipped with 12 of Panasonic's HIT240 solar modules on the roof and generates approximately 3 kW of electricity, with 24 lead-acid batteries capable of storing 17.2 kWh of ...


Recommended Resource

| What is an Access Control List?| Access Denied by Access Control List' error message | Understanding Access Control List (ACL) | Editing Access Control List (ACL) | Understanding the Access List Control based Security Model | Tutorial on using Access Control List | Understanding Access Control List with some Examples | Understanding Squid Access Control List | What is the use of an Access Control List | Understanding Java Access Control List ( Java ACL ) |


FREE Subscription

Stay Current With the Latest Technology Developments Realted to .NET. Signup for Our Newsletter and Receive New Articles Through Email.



Note : We never rent, trade, or sell our email lists to anyone. We assure that your privacy is respected and protected.


| Privacy Policy for www.dotnet-guide.com | Disclosure | Contact |

Copyright - © 2004 - 2014 - All Rights Reserved.