Defense against attacks  Client authentication


Chapter 2: Securing Component Access

Components can be invoked by clients, other components, or servlets and JSPs. This chapter describes the various methods used to authenticate and authorize each type of client.





Copyright © 2005. Sybase Inc. All rights reserved. Client authentication

View this book as PDF