Security Guide for Connectivity with the J2EE Engine

J2EE Connector Architecture Security

The J2EE Connector Architecture (JCA) enables connectivity to back-end systems such as Enterprise Information Systems (EIS), using resource adapters. The adapters are modules that are deployed on a J2EE compatible application server and provide unified access to the resource system for any application components that are also installed on the server.

For information about how to implement security functions when using the resource adaptors, see Implementing Security Functions.

Remote Method Invocation

Java Remote Method Invocation (RMI) enables the creation of Java-to-Java applications between remote Java Virtual Machines (JVMs).  An example of the use of RMI is the communication between external Java applications and the SAP Web AS.

You can use RMI either using the P4 protocol, which is an SAP-proprietary protocol, or the Internet Inter-ORB Protocol (IIOP).

The security aspects involved when using RMI are described in the following topics:

·        Authentication for RMI-P4 Clients

·        Using P4 Protocol Over a Secure Connection

·        Security for RMI-IIOP Applications

·        Configuring the J2EE Engine for IIOP Security

See also:

Connectivity and Interoperability