Explains how to enforce user-based access controls using JAAS.
The authentication technology used for these tutorials is
very basic, just ensuring that the user specifies a particular
name and password. Thus, these tutorials can be run by everyone.
Similar tutorials for JAAS authentication and authorization, but
which demonstrate the use of a Kerberos LoginModule and thus which
require a Kerberos installation, can be found at
These two tutorials are a part of the
Java GSS-API and JAAS sequence of tutorials
that utilize Kerberos as the underlying technology
for authentication and secure communication.