Oracle
docs.oracle.com › en › java › javase › 11 › security › java-security-overview1.html
Java Security Overview
2 weeks ago - The Java platform also defines basic Kerberos classes, like KerberosPrincipal, KerberosTicket, KerberosKey, and KeyTab, which are located in the javax.security.auth.kerberos package. The access control architecture in the Java platform protects access to sensitive resources (for example, local files) or sensitive application code (for example, methods in a class).
Baeldung
baeldung.com › home › security › the basics of java security
The Basics of Java Security | Baeldung
January 25, 2024 - For example, when working on our system, we generally don’t want to have to read the full OAuth RFC and implement that ourselves. We often need quicker, higher-level ways to achieve security. This is where application frameworks come into the picture – these help us achieve our objective with much less boilerplate code. And, on the Java platform – generally that means Spring Security.
Videos
32:16
Java - Security Monitoring with JDK tools and JFR Events - YouTube
16:32
How to Handle Security Changes in Java 25 #RoadTo25 - YouTube
40:21
Java Security Evolution - Out with the Old, In with the New - YouTube
30:05
Security: Security Since Java 8 - YouTube
03:52
Understanding Java Security Best Practices for Secure Coding | ...
13:44
Java Basics - Java Security Vulnerability, Exploits and Mitigation ...
Oracle
java.com › en › download › help › jcp_security.html
Security level settings in the Java Control Panel
Unsigned application requesting unrestricted access to system The following resource is signed with a weak signature algorithm MD5withDSA and is treated as unsigned: http://example.net/ExampleApplication.jar · If you encounter either of the messages above, it is recommended that you contact the website where you are seeing this message or the application vendor and provide them with the message. The website or vendor needs to improve the security of the application, as the application is no longer secure using MD5withRSA or MD5withDSA. If you own, develop or maintain a Java application that is displaying these messages, it is recommend that you re-sign the JAR with a stronger algorithm.
OWASP Cheat Sheet Series
cheatsheetseries.owasp.org › cheatsheets › Java_Security_Cheat_Sheet.html
Java Security - OWASP Cheat Sheet Series
For example, this page (from Google's website) shows how to perform a hybrid encryption process where two parties want to share data based on their asymmetric key pair. The following code snippet shows how this functionality can be used to share secrets between Alice and Bob: Click here to view the "Tink hybrid encryption" code snippet. import static java.nio.charset.StandardCharsets.UTF_8; import com.google.crypto.tink.HybridDecrypt; import com.google.crypto.tink.HybridEncrypt; import com.google.crypto.tink.InsecureSecretKeyAccess; import com.google.crypto.tink.KeysetHandle; import com.google
Snyk
snyk.io › articles › java-security
Java Security in 2023- Snyk | Snyk
September 14, 2022 - Secure communication- Java also provides features to protect the integrity and privacy of data transfer between peers on an untrusted network. For example, the JSSE standard API enables secure sockets for TLS/DTLS data, SunJSSE offers cryptographic services, and Java Simple Authentication and Security Layer (SASL) creates an authentication protocol and offers an additional layer of security between client and server applications.
Medium
medium.com › @TechiesSpot › a-comprehensive-guide-to-java-security-e2abfcb1e667
A Comprehensive Guide to Java Security | by Techie's Spot | Medium
November 5, 2023 - Bytecode Verification: Java bytecode is subject to verification by the Java Virtual Machine (JVM) to prevent execution of malicious code. Classloaders: Classloaders manage the loading of classes and provide isolation between different class spaces. Security Managers: Security managers enforce security policies by controlling access to system resources and APIs.
Oracle
docs.oracle.com › javase › tutorial › security
Trail: Security Features in Java SE (The Java™ Tutorials)
Generating and Verifying Signatures walks you step by step through an example of writing a Java program using the JDK Security API to generate keys, to generate a digital signature for data using the private key, and to export the public key and the signature to files.
Oracle
docs.oracle.com › javase › 8 › docs › api › java › security › Security.html
Security (Java Platform SE 8 )
3 weeks ago - For example, "Signature.SHA1withDSA KeySize:1024" would be satisfied by any provider that implemented the SHA1withDSA signature algorithm with a keysize of 1024 (or larger). See the Java Cryptography Architecture Standard Algorithm Name Documentation for information about standard cryptographic service names, standard algorithm names and standard attribute names.
Berkeley Security
security.berkeley.edu › education-awareness › java-security-best-practices
Java Security Best Practices | Information Security Office
... Update Java on Mac OS X. ... The following tips are for users that have a business requirement to run Java applications in a browser: Use one browser exclusively for Java and one browser for all other web browsing. Example #1 - Internet Explorer for Java only, Firefox for all other web browsing:
SecureCoding
securecoding.com › home › blog › how java.security works
How Java.Security Works | SecureCoding
October 10, 2021 - Here is an example of how to set up a username and password in Java code through JndiLoginModule. The implementation gets the username and password from the user and verifies it against a directory service configured in JNDI: The above is an example of an instance of the LoginContext to perform the login. Here is an example of a login configuration: Secure communication implementation is one of the key pillars to reducing network vulnerability.
Oracle
docs.oracle.com › javase › 7 › docs › technotes › guides › security › overview › jsoverview.html
Overview of Java SE Security
The Java platform also defines basic Kerberos classes, like KerberosPrincipal, KerberosTicket, KerberosKey, and KeyTab, which are located in the javax.security.auth.kerberos package. The access control architecture in the Java platform protects access to sensitive resources (for example, local files) or sensitive application code (for example, methods in a class).
Spring
docs.spring.io › spring-security › reference › servlet › configuration › java.html
Java Configuration :: Spring Security
To address this issue, Spring Security introduces the concept of an ObjectPostProcessor, which can be used to modify or replace many of the Object instances created by the Java Configuration. For example, to configure the filterSecurityPublishAuthorizationSuccess property on FilterSecurityInterceptor, you can use the following:
Reintech
reintech.io › blog › java-security-securing-applications-and-protecting-user-data
Java security: Securing applications and protecting user data | Reintech media
January 29, 2026 - TLS (Transport Layer Security) encrypts data in transit and verifies server identity through certificates. The basic HTTPS example needs enhancement for production use. Here's an implementation with proper error handling, timeout configuration, and certificate validation: import javax.net.ssl.*; import java.io.BufferedReader; import java.io.InputStreamReader; import java.net.URL; import java.security.cert.X509Certificate; import java.util.stream.Collectors; public class SecureHttpsClient { public static String makeSecureRequest(String urlString) throws Exception { URL url = new URL(urlString);
Oracle
docs.oracle.com › cd › E12839_01 › core.1111 › e10043 › introjps.htm
1 Overview of Java Security Models
The security manager is not mandatory for Java policies to be in effect: whether an application chooses to enforce Java policies depends on how permissions are checked by the application. For example, an application can use the method AccessController.checkPermission to enforce Java policies without the security manager being turned on.
Oracle
docs.oracle.com › en › java › javase › 17 › docs › api › java.base › java › security › Security.html
Security (Java SE 17 & JDK 17)
January 20, 2026 - For example, "Signature.SHA1withDSA KeySize:1024" would be satisfied by any provider that implemented the SHA1withDSA signature algorithm with a keysize of 1024 (or larger). See the Java Security Standard Algorithm Names Specification for information about standard cryptographic service names, ...
Android Developers
developer.android.com › api reference › java.security
java.security | API reference | Android Developers
Skip to main content · English · Deutsch · Español – América Latina · Français · Indonesia · Polski · Português – Brasil · Tiếng Việt · 中文 – 简体
Java Tips
javatips.net › api › java.security.security
Java Examples for java.security.Security - Javatips.net
} else if (in.equals("debug")) { // TODO we currently have just the debug level } else if (in.equals("halt")) { System.exit(0); } else if (in.equals("cleardnscache")) { java.security.Security.setProperty("networkaddress.cache.ttl", "0"); Thread.yield(); System.gc(); java.security.Security.setProperty("networkaddress.cache.ttl", "-1"); } else if (in.equals("newnym")) { java.security.Security.setProperty("networkaddress.cache.ttl", "0"); Thread.yield(); System.gc(); java.security.Security.setProperty("networkaddress.cache.ttl", "-1"); // TODO make new circuits and new connections must use these circuits } else { return false; } return true; }