Implementing Row-Level Security in Java Applications
Learn how to enforce row-level security across your JEE application, from database to cache. From Oracle Fusion Middleware Regional Director Lonneke Dikmans.
I spent a ton of time developing a java application as an interface to a unix file system. We use xterm and I use a lot of swing elements to make the interface user friendly. The user will start the java application from the command-line in xterm and the application opens in its own JFrame.
... (1 Reply)
Hello all,
Any idea with which release of BDB row/record level locking was introduced? Am sure many/somebody are working with BDB.
I tried searching the forum and this what I could get.
https://www.unix.com/software-releases-rss-news/88232-berkeley-db-java-edition-3-3-74-default-branch.html... (1 Reply)
I have installed ubuntu. And I have create users ans groups.
Suppose if the user enter into through Putty SSH. He should have access only to home folder and cannot move to other than $HOME. User should not able to root files and /$ files.
Kindly provide solution.
Regards
Vasanth kumar (3 Replies)
Hi guys, may I know what kind of security applications do UNIX and Windows have in common? This is related to a project that is approaching its deadline, so would you all please be kind enough to help me? Thank You. (0 Replies)
secconfig(8) System Manager's Manual secconfig(8)NAME
secconfig, secsetup - Security features setup graphical interface (Enhanced Security)
SYNOPSIS
/usr/sbin/sysman secconfig
NOTE: The secsetup utility has been replaced by the secconfig graphical interface.
DESCRIPTION
The utility is a graphical interface used to select the level of system security needed. It can convert from Base to enhanced security
mode, and configure base and enhanced security features. If you are using secconfig to enable Enhanced security, you must first have
loaded the enhanced security subsets.
You can run while the system is in multiuser mode. However, if you change the security level, the change is not completed until you reboot
the system.
For both base and enhanced security, the secconfig utility allows you to enable segment sharing, to enable access control lists (ACLs), and
to restrict the setting of the execute bit to root only.
For enhanced security, the secconfig utility additionally allows you to configure security support from simple shadow passwords all the way
to a strict C2 level of security. Shadow password support is an easy method for system administrators, who do not wish to use all of the
extended security features, to move each user's password out of /etc/passwd and into the extended user profile database (auth.db. You can
use the Custom mode if you wish to select additional security features, such as breakin detection and evasion, automatic database trimming,
and password controls.
When converting from base to enhanced security, secconfig updates the system default database (/etc/auth/system/default) and uses the con-
vuser utility to migrate user accounts.
While it is possible to convert user accounts from enhanced back to base, the default encryption algorithms and supported password lengths
differ between base and enhanced security, and thus user account conversions do not succeed without a password change.
NOTE: Because of the page table sharing mechanism used for shared libraries, the normal file system permissions are not adequate to protect
against unauthorized reading. The secconfig interface allows you to disable segment sharing. The change in segment sharing takes effect
at the next reboot.
FILES RELATED INFORMATION acl(4), authcap(4), default(4), convuser(8),
Security delim off
secconfig(8)