🌐
Oracle
docs.oracle.com › en › java › javase › 11 › security › java-security-overview1.html
Java Security Overview
2 weeks ago - The Java platform also defines basic Kerberos classes, like KerberosPrincipal, KerberosTicket, KerberosKey, and KeyTab, which are located in the javax.security.auth.kerberos package. The access control architecture in the Java platform protects access to sensitive resources (for example, local files) or sensitive application code (for example, methods in a class).
🌐
Baeldung
baeldung.com › home › security › the basics of java security
The Basics of Java Security | Baeldung
January 25, 2024 - For example, when working on our system, we generally don’t want to have to read the full OAuth RFC and implement that ourselves. We often need quicker, higher-level ways to achieve security. This is where application frameworks come into the picture – these help us achieve our objective with much less boilerplate code. And, on the Java platform – generally that means Spring Security.
🌐
Oracle
java.com › en › download › help › jcp_security.html
Security level settings in the Java Control Panel
Unsigned application requesting unrestricted access to system The following resource is signed with a weak signature algorithm MD5withDSA and is treated as unsigned: http://example.net/ExampleApplication.jar · If you encounter either of the messages above, it is recommended that you contact the website where you are seeing this message or the application vendor and provide them with the message. The website or vendor needs to improve the security of the application, as the application is no longer secure using MD5withRSA or MD5withDSA. If you own, develop or maintain a Java application that is displaying these messages, it is recommend that you re-sign the JAR with a stronger algorithm.
🌐
OWASP Cheat Sheet Series
cheatsheetseries.owasp.org › cheatsheets › Java_Security_Cheat_Sheet.html
Java Security - OWASP Cheat Sheet Series
For example, this page (from Google's website) shows how to perform a hybrid encryption process where two parties want to share data based on their asymmetric key pair. The following code snippet shows how this functionality can be used to share secrets between Alice and Bob: Click here to view the "Tink hybrid encryption" code snippet. import static java.nio.charset.StandardCharsets.UTF_8; import com.google.crypto.tink.HybridDecrypt; import com.google.crypto.tink.HybridEncrypt; import com.google.crypto.tink.InsecureSecretKeyAccess; import com.google.crypto.tink.KeysetHandle; import com.google
🌐
Snyk
snyk.io › articles › java-security
Java Security in 2023- Snyk | Snyk
September 14, 2022 - Secure communication- Java also provides features to protect the integrity and privacy of data transfer between peers on an untrusted network. For example, the JSSE standard API enables secure sockets for TLS/DTLS data, SunJSSE offers cryptographic services, and Java Simple Authentication and Security Layer (SASL) creates an authentication protocol and offers an additional layer of security between client and server applications.
🌐
Oracle
docs.oracle.com › javase › tutorial › security
Trail: Security Features in Java SE (The Java™ Tutorials)
Generating and Verifying Signatures walks you step by step through an example of writing a Java program using the JDK Security API to generate keys, to generate a digital signature for data using the private key, and to export the public key and the signature to files.
🌐
Medium
medium.com › @TechiesSpot › a-comprehensive-guide-to-java-security-e2abfcb1e667
A Comprehensive Guide to Java Security | by Techie's Spot | Medium
November 5, 2023 - Bytecode Verification: Java bytecode is subject to verification by the Java Virtual Machine (JVM) to prevent execution of malicious code. Classloaders: Classloaders manage the loading of classes and provide isolation between different class spaces. Security Managers: Security managers enforce security policies by controlling access to system resources and APIs.
🌐
Oracle
docs.oracle.com › javase › 8 › docs › api › java › security › Security.html
Security (Java Platform SE 8 )
3 weeks ago - For example, "Signature.SHA1withDSA KeySize:1024" would be satisfied by any provider that implemented the SHA1withDSA signature algorithm with a keysize of 1024 (or larger). See the Java Cryptography Architecture Standard Algorithm Name Documentation for information about standard cryptographic service names, standard algorithm names and standard attribute names.
🌐
Medium
medium.com › @AlexanderObregon › understanding-javas-security-architecture-c5fa0925d318
Understanding Java’s Security Architecture
November 4, 2023 - Whenever an application tries to ... access in Java can be guarded by a permission. For example, file read access is guarded by a FilePermission object....
Find elsewhere
🌐
Berkeley Security
security.berkeley.edu › education-awareness › java-security-best-practices
Java Security Best Practices | Information Security Office
... Update Java on Mac OS X. ... The following tips are for users that have a business requirement to run Java applications in a browser: Use one browser exclusively for Java and one browser for all other web browsing. Example #1 - Internet Explorer for Java only, Firefox for all other web browsing:
🌐
Oracle
docs.oracle.com › javase › 7 › docs › technotes › guides › security › overview › jsoverview.html
Overview of Java SE Security
The Java platform also defines basic Kerberos classes, like KerberosPrincipal, KerberosTicket, KerberosKey, and KeyTab, which are located in the javax.security.auth.kerberos package. The access control architecture in the Java platform protects access to sensitive resources (for example, local files) or sensitive application code (for example, methods in a class).
🌐
SecureCoding
securecoding.com › home › blog › how java.security works
How Java.Security Works | SecureCoding
October 10, 2021 - Here is an example of how to set up a username and password in Java code through JndiLoginModule. The implementation gets the username and password from the user and verifies it against a directory service configured in JNDI: The above is an example of an instance of the LoginContext to perform the login. Here is an example of a login configuration: Secure communication implementation is one of the key pillars to reducing network vulnerability.
🌐
Spring
docs.spring.io › spring-security › reference › servlet › configuration › java.html
Java Configuration :: Spring Security
To address this issue, Spring Security introduces the concept of an ObjectPostProcessor, which can be used to modify or replace many of the Object instances created by the Java Configuration. For example, to configure the filterSecurityPublishAuthorizationSuccess property on FilterSecurityInterceptor, you can use the following:
🌐
Reintech
reintech.io › blog › java-security-securing-applications-and-protecting-user-data
Java security: Securing applications and protecting user data | Reintech media
April 18, 2023 - HTTPS is the secure version of HTTP that uses SSL/TLS to encrypt data transmitted between the client and the server. Java supports HTTPS via the HttpsURLConnection class. Here's an example of making an HTTPS request:
🌐
Oracle
docs.oracle.com › cd › E12839_01 › core.1111 › e10043 › introjps.htm
1 Overview of Java Security Models
The security manager is not mandatory for Java policies to be in effect: whether an application chooses to enforce Java policies depends on how permissions are checked by the application. For example, an application can use the method AccessController.checkPermission to enforce Java policies without the security manager being turned on.
🌐
Snyk
snyk.io › blog › 10-java-security-best-practices
10 Java security best practices | Snyk
September 17, 2019 - But even a more subtle case than this can be equally harmful. For example, the exposure of unique identifiers in your system is a Java security vulnerability if that identifier can be used in another call to retrieve additional data.
🌐
Oracle
docs.oracle.com › en › java › javase › 17 › docs › api › java.base › java › security › Security.html
Security (Java SE 17 & JDK 17)
January 20, 2026 - For example, "Signature.SHA1withDSA KeySize:1024" would be satisfied by any provider that implemented the SHA1withDSA signature algorithm with a keysize of 1024 (or larger). See the Java Security Standard Algorithm Names Specification for information about standard cryptographic service names, ...
🌐
Android Developers
developer.android.com › api reference › java.security
java.security | API reference | Android Developers
Skip to main content · English · Deutsch · Español – América Latina · Français · Indonesia · Polski · Português – Brasil · Tiếng Việt · 中文 – 简体
🌐
Java Tips
javatips.net › api › java.security.security
Java Examples for java.security.Security - Javatips.net
} else if (in.equals("debug")) { // TODO we currently have just the debug level } else if (in.equals("halt")) { System.exit(0); } else if (in.equals("cleardnscache")) { java.security.Security.setProperty("networkaddress.cache.ttl", "0"); Thread.yield(); System.gc(); java.security.Security.setProperty("networkaddress.cache.ttl", "-1"); } else if (in.equals("newnym")) { java.security.Security.setProperty("networkaddress.cache.ttl", "0"); Thread.yield(); System.gc(); java.security.Security.setProperty("networkaddress.cache.ttl", "-1"); // TODO make new circuits and new connections must use these circuits } else { return false; } return true; }