[jboss-cvs] JBossAS SVN: r70307 - projects/docs/trunk/AS_4/Server_Configuration_Guide/ja-JP.
jboss-cvs-commits at lists.jboss.org
jboss-cvs-commits at lists.jboss.org
Mon Mar 3 03:33:42 EST 2008
Author: noriko
Date: 2008-03-03 03:33:42 -0500 (Mon, 03 Mar 2008)
New Revision: 70307
Modified:
projects/docs/trunk/AS_4/Server_Configuration_Guide/ja-JP/J2EE_Security_On_JBOSS.po
Log:
initial translation completed
Modified: projects/docs/trunk/AS_4/Server_Configuration_Guide/ja-JP/J2EE_Security_On_JBOSS.po
===================================================================
--- projects/docs/trunk/AS_4/Server_Configuration_Guide/ja-JP/J2EE_Security_On_JBOSS.po 2008-03-03 05:55:50 UTC (rev 70306)
+++ projects/docs/trunk/AS_4/Server_Configuration_Guide/ja-JP/J2EE_Security_On_JBOSS.po 2008-03-03 08:33:42 UTC (rev 70307)
@@ -1,34 +1,38 @@
+# translation of J2EE_Security_On_JBOSS.po to Japanese
# Language /tmp/mike/JBEAP420/JBAS translations for JBEAP package.
-# Copyright (C) 2007 Free Software Foundation, Inc.
+# Copyright (C) 2007, 2008 Free Software Foundation, Inc.
+#
# Automatically generated, 2007.
-#
+# Noriko Mizumoto <noriko at redhat.com>, 2008.
msgid ""
msgstr ""
-"Project-Id-Version: JBEAP 420\n"
+"Project-Id-Version: J2EE_Security_On_JBOSS\n"
"Report-Msgid-Bugs-To: http://bugs.kde.org\n"
"POT-Creation-Date: 2007-11-05 06:01+0000\n"
-"PO-Revision-Date: 2001-02-09 01:25+0100\n"
-"Last-Translator: Automatically generated\n"
-"Language-Team: none\n"
+"PO-Revision-Date: 2008-03-03 18:26+1000\n"
+"Last-Translator: Noriko Mizumoto <noriko at redhat.com>\n"
+"Language-Team: Japanese <fedora-trans-ja at redhat.com>\n"
"MIME-Version: 1.0\n"
"Content-Type: text/plain; charset=UTF-8\n"
"Content-Transfer-Encoding: 8bit\n"
+"X-Generator: KBabel 1.11.4\n"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:6
#, no-c-format
msgid "Security on JBoss"
-msgstr ""
+msgstr "JBoss ã§ã®ã»ãã¥ãªãã£ã«ã¤ãã¦"
#. Tag: subtitle
#: J2EE_Security_On_JBOSS.xml:7
#, no-c-format
msgid "J2EE Security Configuration and Architecture"
-msgstr ""
+msgstr "J2EE ã®ã»ãã¥ãªãã£è¨å®ã¨ã¢ã¼ããã¯ãã£"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:8
#, no-c-format
+#, fuzzy
msgid ""
"Security is a fundamental part of any enterprise application. You need to be "
"able to restrict who is allowed to access your applications and control what "
@@ -45,17 +49,18 @@
"getting into the JBoss security implementation details, we will review EJB "
"and servlet specification security models, as well as JAAS to establish the "
"foundation for these details."
-msgstr ""
+msgstr "ãããã®ã¨ã³ã¿ã¼ãã©ã¤ãºã¢ããªã±ã¼ã·ã§ã³ã«ã¨ã£ã¦ãæ¬ ãããªãã®ãã»ãã¥ãªãã£ã§ãã ã¢ããªã±ã¼ã·ã§ã³ã¸ã®ã¢ã¯ã»ã¹ã許å¯ããã¦ã¼ã¶ã¼ãå¶éãã ã¢ããªã±ã¼ã·ã§ã³ã¦ã¼ã¶ã¼ãå®è¡ã§ããæä½ãå¶å¾¡ã§ããªããã°ãªãã¾ããã J2EE ä»æ§ã¯ EJB ããã³ ã¦ã§ãã³ã³ãã¼ãã³ãç¨ã®ã·ã³ãã«ãªãã¼ã«ãã¼ã¹ã®ã»ãã¥ãªãã£ã¢ãã«ãå®ç¾©ãã¦ãã¾ãã ã»ãã¥ãªãã£é¢é£ãå¦çãã JBoss ã³ã³ãã¼ãã³ããã¬ã¼ã ã¯ã¼ã¯ã¯ JBossSX æ¡å¼µãã¬ã¼ã ã¯ã¼ã¯ã«ãªãã¾ãã JBossSX ã»ãã¥ãªãã£æ¡å¼µã¯ãã¼ã«ãã¼ã¹ã®å®£è¨å J2EE ã»ãã¥ãªãã£ã¢ãã«ããã³ã»ãã¥ãªãã£ãããã·å±¤çµç±ã®ã«ã¹ã¿ã ã»ãã¥ãªãã£ã®çµ±åã®ä¸¡æ¹ã«å¯¾ãããµãã¼ããæä¾ãã¾ãã宣è¨åã»ãã¥ãªãã£ã¢ãã«ã®ããã©ã«ãå®è£
㯠JAAS (Java Authentication and Authorization Service) ãã!
°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¨ãµãã¸ã§ã¯ãããã¼ã¹ã¨ãã¦ãã¾ãã ã»ãã¥ãªãã£ãããã·å±¤ã«ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:12
#, no-c-format
msgid "J2EE Declarative Security Overview"
-msgstr ""
+msgstr "J2EE 宣è¨åã»ãã¥ãªãã£æ¦è¦"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:13
#, no-c-format
+#, fuzzy
msgid ""
"The J2EE security model declarative in that you describe the security roles "
"and permissions in a standard XML descriptor rather than embedding security "
@@ -66,7 +71,7 @@
"account. The security requirements, roles and permissions will vary "
"independently of how you access the bank account, based on what bank is "
"managing the account, where the ATM is located, and so on."
-msgstr ""
+msgstr "ãã¸ãã¹ã³ã³ãã¼ãã³ãã«ã»ãã¥ãªãã£ãçµã¿è¾¼ãæ¹æ³ã§ã¯ãªãã æ¨æºã® XML è¨è¿°åã«ã»ãã¥ãªãã£ã¼ãã¼ã«ããã³ãã¼ããã·ã§ã³ãè¨è¿°ããã¨ããç¹ã«ãã㦠J2EE ã»ãã¥ãªãã£ã¢ãã«"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:16
@@ -78,13 +83,13 @@
"using the <literal>ejb-jar.xml</literal> and <literal>web.xml</literal> "
"deployment descriptors. The following sections look at the purpose and usage "
"of the various security elements."
-msgstr ""
+msgstr "J2EE ã¢ããªã±ã¼ã·ã§ã³ã®å®å
¨åã¯ã æ¨æºã® J2EE ãããã¤ã¡ã³ãè¨è¿°åã使ã£ãã¢ããªã±ã¼ã·ã§ã³ã»ãã¥ãªãã£è¦ä»¶ã®è©³ç´°ã«åºã¥ãã¦ãã¾ãã <literal>ejb-jar.xml</literal> ããã³ <literal>web.xml</literal> ãããã¤ã¡ã³ãè¨è¿°åã使ã£ã¦ã¨ã³ã¿ã¼ãã©ã¤ãºã¢ããªã±ã¼ã·ã§ã³å
ã§ã® EJB ãã¦ã§ãã³ã³ãã¼ãã³ãã¸ã®ã¢ã¯ã»ã¹ã®å®å
¨åãå³ãã¾ãã次ã®ã»ã¯ã·ã§ã³ã§ã¯å種ã»ãã¥ãªãã£ã¨ã¬ã¡ã³ãã®ç®çã¨ä½¿ãæ¹ã«ã¤ãã¦è¦ã¦ããã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:20
#, no-c-format
msgid "Security References"
-msgstr ""
+msgstr "ã»ãã¥ãªãã£åç
§"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:21
@@ -104,12 +109,16 @@
"be defined by using the role-based <literal>method-permissions</literal> "
"elements."
msgstr ""
+"EJB ããã³ãµã¼ãã¬ããã¯ãããã <xref linkend=\"Security_References-"
+"The_security_role_ref_element\"/> ã§ç¤ºãããã« 1 ã¤ã¾ãã¯è¤æ°ã® <literal>security-role-ref</"
+"literal> ã¨ã¬ã¡ã³ãã宣è¨ãããã¨ãã§ãã¾ãã ãã®ã¨ã¬ã¡ã³ãã¯ã³ã³ãã¼ãã³ãã<literal>isCallerInRole(String)</literal> ã¡ã½ããã«å¯¾ã㦠<literal>role-name</literal> å¤ãå¼æ°ã¨ãã¦ä½¿ç¨ãã¦ãããã¨ã宣è¨ãã¦ãã¾ãã <literal>isCallerInRole</literal> ã¡ã½ããã使ç¨ãããã¨ã§ã ã³ã³ãã¼ãã³ãã¯å¼ã³åºãå´ã <literal>security-role-ref/"
+"role-name</literal> ã¨ã¬ã¡ã³ãã§å®£è¨ããã¦ãããã¼ã«ã«ãããã©ããã確èªãããã¨ãã§ãã¾ãã <literal>role-name</literal> ã¨ã¬ã¡ã³ãå¤ã¯ <literal>role-link</literal> ã¨ã¬ã¡ã³ãã使ã£ã¦ <literal>security-role</literal> ã¨ã¬ã¡ã³ãã«ãªã³ã¯ããªããã°ãªãã¾ããã <literal>isCallerInRole</literal> ã®ä¸è¬çãªä½¿ãæ¹ã¯ã ãã¼ã«ãã¼ã¹ã® <literal>method-permissions</literal> ã¨ã¬ã¡ã³ãã使ã£ã¦å®ç¾©ã§ããªãã»ãã¥ãªãã£ãã§ãã¯ãè¡ããã¨ã§ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:25
#, no-c-format
msgid "The security-role-ref element"
-msgstr ""
+msgstr "security-role-ref ã¨ã¬ã¡ã³ã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:32
@@ -117,7 +126,7 @@
msgid ""
"shows the use of <literal>security-role-ref</literal> in an <literal>ejb-jar."
"xml</literal>."
-msgstr ""
+msgstr "<literal>ejb-jar.xml</literal> ã® <literal>security-role-ref</literal> ã®ä½¿ãæ¹ã示ãã¦ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:35
@@ -125,7 +134,7 @@
msgid ""
"An ejb-jar.xml descriptor fragment that illustrates the security-role-ref "
"element usage."
-msgstr ""
+msgstr "security-role-ref ã¨ã¬ã¡ã³ãã®ä½¿ãæ¹ã示ã ejb-jar.xml è¨è¿°åã®ä¸é¨ã§ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:36
@@ -146,6 +155,20 @@
" ...\n"
"</ejb-jar>"
msgstr ""
+"<!-- A sample ejb-jar.xml fragment -->\n"
+"<ejb-jar>\n"
+" <enterprise-beans>\n"
+" <session>\n"
+" <ejb-name>ASessionBean</ejb-name>\n"
+" ...\n"
+" <security-role-ref>\n"
+" <role-name>TheRoleICheck</role-name>\n"
+" <role-link>TheApplicationRole</role-link>\n"
+" </security-role-ref>\n"
+" </session>\n"
+" </enterprise-beans>\n"
+" ...\n"
+"</ejb-jar>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:37
@@ -153,7 +176,7 @@
msgid ""
"shows the use of <literal>security-role-ref</literal> in a <literal>web.xml</"
"literal>."
-msgstr ""
+msgstr "<literal>web.xml</literal> ã® <literal>security-role-ref</literal> ã®ä½¿ãæ¹ã示ãã¦ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:40
@@ -161,7 +184,7 @@
msgid ""
"An example web.xml descriptor fragment that illustrates the security-role-"
"ref element usage."
-msgstr ""
+msgstr "security-role-ref ã¨ã¬ã¡ã³ãã®ä½¿ãæ¹ã示ããµã³ãã« web.xml è¨è¿°åã®ä¸é¨ã§ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:41
@@ -179,12 +202,23 @@
" ...\n"
"</web-app>"
msgstr ""
+"<web-app>\n"
+" <servlet>\n"
+" <servlet-name>AServlet</servlet-name>\n"
+" ...\n"
+" <security-role-ref>\n"
+" <role-name>TheServletRole</role-name>\n"
+" <role-link>TheApplicationRole</role-link>\n"
+" </security-role-ref>\n"
+" </servlet>\n"
+" ...\n"
+"</web-app>"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:46
#, no-c-format
msgid "Security Identity"
-msgstr ""
+msgstr "ã»ãã¥ãªã㣠ID"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:47
@@ -193,13 +227,13 @@
"An EJB has the capability to specify what identity an EJB should use when it "
"invokes methods on other components using the <literal>security-identity</"
"literal> element, shown in"
-msgstr ""
+msgstr "EJB ã«ã¯ <literal>security-identity</literal> ã¨ã¬ã¡ã³ãã使ã£ã¦ä»ã®ã³ã³ãã¼ãã³ãã§ã¡ã½ãããå¼ã³åºãå ´åã« EJB ã使ç¨ãã¹ã ID ãæå®ãããã¨ãã§ããæ©è½ãããã¾ãã 次ã«ä¾ã示ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:51
#, no-c-format
msgid "The security-identity element"
-msgstr ""
+msgstr "security-identity ã¨ã¬ã¡ã³ã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:58
@@ -212,7 +246,7 @@
"propagated as the security identity for method invocations made by the EJB. "
"Propagation of the caller's identity is the default used in the absence "
"of an explicit <literal>security-identity</literal> element declaration."
-msgstr ""
+msgstr "å¼ã³åºã ID ã¯ãã®ç¾å¨ã®å¼ã³åºãå´ã¾ãã¯ç¹å®ã®ãã¼ã«ã«ãããã¨ãã§ãã¾ãã ã¢ããªã±ã¼ã·ã§ã³ã®ã¢ãã»ã³ãã©ã¯ <literal>use-caller-identity</literal> åã¨ã¬ã¡ã³ããä»ã㦠<literal>security-identity</literal> ã¨ã¬ã¡ã³ãã使ç¨ãç¾å¨ã®å¼ã³åºãå´ã® ID ãã»ãã¥ãªã㣠ID ã¨ã㦠EJB ã«ããå®è¡ãããã¡ã½ããå¼ã³åºãã«å¯¾ãã¦ä¼æãããããæ示ãã¾ãã å¼ã³åºãå´ã® ID ã®ä¼æã¯æ示ç㪠<literal>security-identity</literal> ã¨ã¬ã¡ã³ã宣è¨ããªãå ´åã«ä½¿ç¨ãããããã©ã«ãã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:61
@@ -234,6 +268,8 @@
"following descriptor fragment that illustrates <literal>security-identity</"
"literal> element usage."
msgstr ""
+"代ããã«ã ã¢ããªã±ã¼ã·ã§ã³ã®ã¢ãã»ã³ãã©ã¯ <literal>run-as/role-"
+"name</literal> åã¨ã¬ã¡ã³ãã使ã£ã¦ <literal>role-name</literal> å¤ã§ä¸ããããç¹å®ã®ã»ãã¥ãªãã£ãã¼ã«ãã»ãã¥ãªã㣠ID ã¨ã㦠EJB ã«ããå®è¡ãããã¡ã½ããå¼ã³åºãã«å¯¾ãã¦ä½¿ç¨ãããããæå®ãããã¨ãã§ãã¾ãã ãã㯠<literal>EJBContext.getCallerPrincipal()</literal> ã¡ã½ããã§è¦ãããå¼ã³åºãå´ã® ID ãå¤æ´ãããã®ã§ã¯ãªãã®ã§æ³¨æãã¦ãã ããã å¼ã³åºãå´ã®ã»ãã¥ãªãã£ãã¼ã«ã¯ <literal>run-as/role-name</literal> ã¨ã¬ã¡ã³ãå¤ã§æå®ãããåä¸ãã¼ã«ã«è¨å®ããã¾ãã <literal>run-as</literal> ã¨ã¬ã¡ã³ãã®ä½¿ãæ¹ã®ã²ã¨ã¤ã¨ãã¦ã å¤é¨ã¯ã©ã¤ã¢ã³ã群ãå
é¨ EJB ã«ã¢ã¯ã»ã¹ããã®ãé²ããã¨ãã§ãã¾ãã ããã¯å¤é¨ã¯ã©ã¤ã¢ã³ãã«å²ãå½ã¦ããããã¨ã®ãªããã¼ã«ã¸ã®ã¢ã¯ã»ã¹ãå¶éããå
é¨ EJB <literal>method-permission</literal> ã¨ã¬ã¡ã³ããå²!
ãå½ã¦ããã¨ã«ããå®è¡ã§ãã¾ãã å
é¨ EJB ã使ãå¿
è¦ããã EJB ã¯å¶éããããã¼ã«ã«ç¸å½ãã <literal>run-as/role-name</literal> ã§è¨å®ãã¾ãã 次ã®è¨è¿°åã®ä¸é¨ã¯ <literal>security-identity</literal> ã¨ã¬ã¡ã³ãã®ä½¿ç¨ä¾ã示ãã¦ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:64
@@ -264,10 +300,35 @@
" <!-- ... -->\n"
"</ejb-jar>"
msgstr ""
+"<!-- A sample ejb-jar.xml fragment -->\n"
+"<ejb-jar>\n"
+" <enterprise-beans>\n"
+" <session>\n"
+" <ejb-name>ASessionBean</ejb-name>\n"
+" <!-- ... -->\n"
+" <security-identity>\n"
+" <use-caller-identity/>\n"
+" </security-identity>\n"
+" </session>\n"
+" <session>\n"
+" <ejb-name>RunAsBean</ejb-name>\n"
+" <!-- ... -->\n"
+" <security-identity>\n"
+" <run-as>\n"
+" <description>A private internal role</"
+"description>\n"
+" <role-name>InternalRole</role-name>\n"
+" </run-as>\n"
+" </security-identity>\n"
+" </session>\n"
+" </enterprise-beans>\n"
+" <!-- ... -->\n"
+"</ejb-jar>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:65
#, no-c-format
+#, fuzzy
msgid ""
"When you use <literal>run-as</literal> to assign a specific role to outgoing "
"calls, JBoss associates a principal named <literal>anonymous</literal>. If "
@@ -277,6 +338,8 @@
"principal named <literal>internal</literal> with <literal>RunAsBean</"
"literal> from the prior example."
msgstr ""
+"<literal>run-as</literal> ã使ã£ã¦ç¹å®ã®ãã¼ã«ãçºä¿¡ã³ã¼ã«ã«å²ãå½ã¦ãå ´åã JBoss 㯠<literal>anonymous</literal> ã¨ããååã® principal ãé¢é£ä»ãã¾ãã ãã®ã³ã¼ã«ã«å¥ã® principal ãé¢é£ä»ãããå ´åã <literal>jboss.xml</literal> ãã¡ã¤ã«å
ã® bean 㧠<literal>run-as-principal</literal> ãé¢é£ä»ããå¿
è¦ãããã¾ãã 次ã®ä¾ã§ã¯ <literal>internal</literal> ã¨ããååã® principal ãåè¿°ã®ä¾ããã® <literal>RunAsBean</"
+"literal> ã«é¢é£ä»ãã¦ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:68
@@ -289,6 +352,12 @@
" </security-identity>\n"
"</session>"
msgstr ""
+"<session>\n"
+" <ejb-name>RunAsBean</ejb-name>\n"
+" <security-identity>\n"
+" <run-as-principal>internal</run-as-principal>\n"
+" </security-identity>\n"
+"</session>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:69
@@ -297,7 +366,7 @@
"The <literal>run-as</literal> element is also available in servlet "
"definitions in a <literal>web.xml</literal> file. The following example "
"shows how to assign the role <literal>InternalRole</literal> to a servlet:"
-msgstr ""
+msgstr "<literal>run-as</literal> ã¨ã¬ã¡ã³ã㯠<literal>web.xml</literal> ãã¡ã¤ã«ã®ãµã¼ãã¬ããå®ç¾©ã§ã使ç¨ãããã¨ãã§ãã¾ãã 次ã®ä¾ã§ã¯ãã¼ã«ããµã¼ãã¬ããã«å²ãå½ã¦ãæ¹æ³ã«ã¤ãã¦ç¤ºãã¦ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:72
@@ -311,6 +380,13 @@
" </run-as>\n"
"</servlet>"
msgstr ""
+"<servlet>\n"
+" <servlet-name>AServlet</servlet-name>\n"
+" <!-- ... -->\n"
+" <run-as> \n"
+" <role-name>InternalRole</role-name>\n"
+" </run-as>\n"
+"</servlet>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:73
@@ -322,7 +398,7 @@
"a specific principal to go along with the <literal>run-as</literal> role. "
"The following fragment shows how to associate a principal named "
"<literal>internal</literal> to the servlet in the prior example."
-msgstr ""
+msgstr "ãã®ãµã¼ãã¬ããããã®ã³ã¼ã«ã¯ anonymous <literal>principal</literal> ã«é¢é£ä»ãããã¾ãã <literal>run-as-principal</literal> ã¨ã¬ã¡ã³ãã¯ã <literal>run-as</literal> ãã¼ã«ã¨å
±ã«ç¹å®ã® principal ãå²ãå½ã¦ããã <literal>jboss-web.xml</literal>ãã¡ã¤ã«ã§ä½¿ç¨ãããã¨ãã§ãã¾ãã 次ã®ä¾ã§ã¯ <literal>internal</literal> ã¨ããååã® principal ãåè¿°ã®ä¾ã®ãµã¼ãã¬ããã«é¢é£ä»ããæ¹æ³ã示ãã¦ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:76
@@ -333,12 +409,16 @@
" <run-as-principal>internal</run-as-principal>\n"
"</servlet>"
msgstr ""
+"<servlet>\n"
+" <servlet-name>AServlet</servlet-name>\n"
+" <run-as-principal>internal</run-as-principal>\n"
+"</servlet>"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:80
#, no-c-format
msgid "Security roles"
-msgstr ""
+msgstr "ã»ãã¥ãªãã£ãã¼ã«"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:81
@@ -350,7 +430,7 @@
"logical security roles by declaring <literal>security-role</literal> "
"elements. The <literal>role-name</literal> value is a logical application "
"role name like Administrator, Architect, SalesManager, etc."
-msgstr ""
+msgstr "<literal>security-role-ref</literal> ã¾ã㯠<literal>security-identity</literal> ã¨ã¬ã¡ã³ãã®ããããã§åç
§ãããã»ãã¥ãªãã£ãã¼ã«åã¯ã¢ããªã±ã¼ã·ã§ã³ã®å®£è¨ãã¼ã«ã®ã²ã¨ã¤ã«ãããã³ã°ããå¿
è¦ãããã¾ãã ã¢ããªã±ã¼ã·ã§ã³ã¢ãã»ã³ãã©ã¯ <literal>security-role</literal> ã宣è¨ãããã¨ã§è«ççãªã»ãã¥ãªãã£ãã¼ã«ãå®ç¾©ãã¾ãã <literal>role-name</literal> å¤ã¯ Administratorã Architectã SalesManager ãªã©ã®ããã«è«çã¢ããªã±ã¼ã·ã§ã³ãã¼ã«åã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:84
@@ -364,13 +444,13 @@
"environment. The deployment descriptor roles are application constructs with "
"application domain-specific names. For example, a banking application might "
"use role names such as BankManager, Teller, or Customer."
-msgstr ""
+msgstr "J2EE ä»æ§ã§ã¯ã ãããã¤ã¡ã³ãè¨è¿°åå
ã®ã»ãã¥ãªãã£ãã¼ã«ã¯ã¢ããªã±ã¼ã·ã§ã³ã®è«çã»ãã¥ãªãã£ãã¥ã¼ã®å®ç¾©ã«ä½¿ç¨ããããã¨ãéè¦ã¨ãªããã注æããæ¨ãè¨è¿°ããã¦ãã¾ãã J2EE ãããã¤ã¡ã³ãè¨è¿°åã§å®ç¾©ããããã¼ã«ã¯ç®çã®ã¨ã³ã¿ã¼ãã©ã¤ãºã®ç¨¼åç°å¢ã«åå¨ããã¦ã¼ã¶ã¼ã°ã«ã¼ãã ã¦ã¼ã¶ã¼ã principalã ãã®ä»ã®ã³ã³ã»ãããªã©ã¨æ··åããªãããã«ãã¦ãã ããã ãããã¤ã¡ã³ãè¨è¿°åã®ãã¼ã«ã¯ã¢ããªã±ã¼ã·ã§ã³ãã¡ã¤ã³åºæã®ååãæã¤ã¢ããªã±ã¼ã·ã§ã³æ§æã«ãªãã¾ãã ãã¨ãã°ã éè¡æ¥åã¢ããªã±ã¼ã·ã§ã³ã¯ BankManagerã Tellerã Customer ãªã©ã¨ãã£ããã¼ã«åã使ç¨ããããããã¾ããã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:88
#, no-c-format
msgid "The security-role element"
-msgstr ""
+msgstr "security-role ã¨ã¬ã¡ã³ã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:95
@@ -390,6 +470,8 @@
"> shows the usage of the <literal>security-role</literal> in an <literal>ejb-"
"jar.xml</literal> file."
msgstr ""
+"JBoss ã§ã¯ã <literal>security-role</literal> ã¨ã¬ã¡ã³ã㯠<literal>security-role-ref/role-name</literal> å¤ãã³ã³ãã¼ãã³ããã¼ã«ãåç
§ããè«çãã¼ã«ã«ãããã³ã°ããããã ãã«ä½¿ç¨ããã¾ãã ã¦ã¼ã¶ã¼ã®å²ãå½ã¦ãã¼ã«ã¯ã¢ããªã±ã¼ã·ã§ã³ã®ã»ãã¥ãªãã£ç®¡çã®åçãªæ©è½ã§ããã JBossSX å®è£
ã«ã¤ãã¦èª¬æããéã«ç解ãã¦ããã¾ãã JBoss ã¯ã¡ã½ãããã¼ããã·ã§ã³ã®å®£è¨ã« <literal>security-role</literal> ã¨ã¬ã¡ã³ãã®å®ç¾©ãå¿
è¦ã¨ãã¾ããã ãããã <literal>security-role</literal> ã¨ã¬ã¡ã³ãã®è©³ç´°å®ç¾©ã¯è¤æ°ã®ã¢ããªã±ã¼ã·ã§ã³ãµã¼ãã¼å
¨ä½ã«å¯¾ãã移æ¤æ§ã®ç¢ºä¿ããããã¤ã¡ã³ãè¨è¿°åã®ç®¡çã¨ããç®çããè¡ã£ã¦ãããæ¹ãããã§ãããã <xref linkend=\"Security_roles-An_ejb_jar."
+"xml_descriptor_fragment_that_illustrates_the_security_role_element_usage.\"/> ã§ã¯ã <literal>ejb-jar.xml</literal> ãã¡ã¤ã«å
ã® <literal>security-role</literal> ã®ä½¿ãæ¹ã示ãã¦ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:98
@@ -397,7 +479,7 @@
msgid ""
"An ejb-jar.xml descriptor fragment that illustrates the security-role "
"element usage."
-msgstr ""
+msgstr "security-role ã¨ã¬ã¡ã³ãã®ä½¿ãæ¹ã示ã ejb-jar.xml è¨è¿°åã®ä¸é¨ã§ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:99
@@ -415,6 +497,17 @@
" </assembly-descriptor>\n"
"</ejb-jar>"
msgstr ""
+"<!-- A sample ejb-jar.xml fragment -->\n"
+"<ejb-jar>\n"
+" <!-- ... -->\n"
+" <assembly-descriptor>\n"
+" <security-role>\n"
+" <description>The single application role</"
+"description>\n"
+" <role-name>TheApplicationRole</role-name>\n"
+" </security-role>\n"
+" </assembly-descriptor>\n"
+"</ejb-jar>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:100
@@ -422,7 +515,7 @@
msgid ""
"shows the usage of the <literal>security-role</literal> in an <literal>web."
"xml</literal> file."
-msgstr ""
+msgstr "<literal>web.xml</literal> ãã¡ã¤ã«å
ã® <literal>security-role</literal> ã®ä½¿ãæ¹ã示ãã¦ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:103
@@ -430,7 +523,7 @@
msgid ""
"An example web.xml descriptor fragment that illustrates the security-role "
"element usage."
-msgstr ""
+msgstr "security-role ã¨ã¬ã¡ã³ãã®ä½¿ãæ¹ã示ããµã³ãã«ã® web.xml è¨è¿°åã®ä¸é¨ã§ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:104
@@ -445,12 +538,20 @@
" </security-role>\n"
"</web-app>"
msgstr ""
+"<!-- A sample web.xml fragment -->\n"
+"<web-app>\n"
+" <!-- ... -->\n"
+" <security-role>\n"
+" <description>The single application role</description>\n"
+" <role-name>TheApplicationRole</role-name>\n"
+" </security-role>\n"
+"</web-app>"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:109
#, no-c-format
msgid "EJB method permissions"
-msgstr ""
+msgstr "EJB ã¡ã½ããã®ãã¼ããã·ã§ã³"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:110
@@ -459,13 +560,13 @@
"An application assembler can set the roles that are allowed to invoke an "
"EJB's home and remote interface methods through method-permission "
"element declarations."
-msgstr ""
+msgstr "ã¢ããªã±ã¼ã·ã§ã³ã¢ãã»ã³ãã©ã¯ method-permission ã¨ã¬ã¡ã³ãã®å®£è¨ã使ã£ã¦ EJB ã®ãã¼ã ããã³ãªã¢ã¼ãã¤ã³ã¿ã¼ãã§ã¼ã¹ã®ã¡ã½ããã®å¼ã³åºãã許å¯ããããã¼ã«ãè¨å®ãããã¨ãã§ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:114
#, no-c-format
msgid "The method-permissions element"
-msgstr ""
+msgstr "method-permission ã¨ã¬ã¡ã³ã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:121
@@ -482,19 +583,19 @@
"accessible by a role using a <literal>method-permission</literal> element, "
"the EJB methods default to being excluded from use. This is equivalent to "
"defaulting the methods into the <literal>exclude-list</literal>."
-msgstr ""
+msgstr "å <literal>method-permission</literal> ã¨ã¬ã¡ã³ãã«ã¯ã ã¡ã½ããåã¨ã¬ã¡ã³ãã«ãã£ã¦èå¥ãããããã« EJB ã¡ã½ããã¸ã®ã¢ã¯ã»ã¹ã許å¯ãããè«çãã¼ã«ãå®ç¾©ãããã¼ã«åã®åã¨ã¬ã¡ã³ãã 1 ã¤ã¾ãã¯è¤æ°å«ã¾ãã¦ãã¾ãã èªè¨¼ã¦ã¼ã¶ã¼ãªã誰ã§ãã¡ã½ããåã¨ã¬ã¡ã³ãã§èå¥ãããã¡ã½ããã«ã¢ã¯ã»ã¹ã§ãããã¨ã宣è¨ããããã« <literal>role-name</literal> ã¨ã¬ã¡ã³ãã§ã¯ãªã <literal>unchecked</literal> ã¨ã¬ã¡ã³ããæå®ãããã¨ãã§ãã¾ãã ããã«ã <literal>exclude-list</literal> ã¨ã¬ã¡ã³ããæã¤ã¡ã½ããã«ã¯èª°ãã¢ã¯ã»ã¹ã§ããªããã¨å®£è¨ãããã¨ãã§ãã¾ãã EJB ã« <literal>method-permission</literal> ã¨ã¬ã¡ã³ãã使ã£ããã¼ã«ã§ã¢ã¯ã»ã¹å¯è½ã§ããã¨å®£è¨ããã¦ããªãã¡ã½ãããããå ´åã EJB ã¡ã½ããã¯ä½¿ç¨ããé¤å¤ããããããã©ã«ãã!
§è¨å®ãã¾ãã ããã¯ã¡ã½ããã <literal>exclude-list</literal> ã«ããã©ã«ãè¨å®ããã®ã¨åçã§ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:125
#, no-c-format
msgid "The method element"
-msgstr ""
+msgstr "ã¡ã½ããã¨ã¬ã¡ã³ã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:132
#, no-c-format
msgid "There are three supported styles of method element declarations."
-msgstr ""
+msgstr "ã¡ã½ããã¨ã¬ã¡ã³ãã®å®£è¨ã«ã¯ãµãã¼ãããã¦ãã 3 種é¡ã®ã¹ã¿ã¤ã«ãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:135
@@ -502,7 +603,7 @@
msgid ""
"The first is used for referring to all the home and component interface "
"methods of the named enterprise bean:"
-msgstr ""
+msgstr "1 çªç®ã®ã¹ã¿ã¤ã«ã¯ named enterprise bean ã®å
¨ãã¼ã ããã³ã³ã³ãã¼ãã³ãã¤ã³ã¿ã¼ãã§ã¼ã¹ã®ã¡ã½ããã«å¯¾ããåç
§ã«ä½¿ç¨ããã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:138
@@ -513,6 +614,10 @@
" <method-name>*</method-name>\n"
"</method>"
msgstr ""
+"<method>\n"
+" <ejb-name>EJBNAME</ejb-name>\n"
+" <method-name>*</method-name>\n"
+"</method>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:139
@@ -520,7 +625,7 @@
msgid ""
"The second style is used for referring to a specified method of the home or "
"component interface of the named enterprise bean:"
-msgstr ""
+msgstr "2 çªç®ã®ã¹ã¿ã¤ã«ã¯ãã¼ã ã®æå®ã¡ã½ããã¾ã㯠named enterprise bean ã®ã³ã³ãã¼ãã³ãã¤ã³ã¿ã¼ãã§ã¼ã¹ã«å¯¾ããåç
§ã«ä½¿ç¨ããã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:142
@@ -531,6 +636,10 @@
" <method-name>METHOD</method-name>\n"
" </method>"
msgstr ""
+"<method>\n"
+" <ejb-name>EJBNAME</ejb-name>\n"
+" <method-name>METHOD</method-name>\n"
+" </method>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:143
@@ -538,7 +647,7 @@
msgid ""
"If there are multiple methods with the same overloaded name, this style "
"refers to all of the overloaded methods."
-msgstr ""
+msgstr "åããªã¼ãã¼ãã¼ãåãæã¤è¤æ°ã®ã¡ã½ãããããå ´åã ãã®ã¹ã¿ã¤ã«ã¯ãªã¼ãã¼ãã¼ãã¡ã½ãããã¹ã¦ãåç
§ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:146
@@ -546,7 +655,7 @@
msgid ""
"The third style is used to refer to a specified method within a set of "
"methods with an overloaded name:"
-msgstr ""
+msgstr "3 çªç®ã®ã¹ã¿ã¤ã«ã¯ãªã¼ãã¼ãã¼ãååãæã¤ã¡ã½ããã»ããå
ã®æå®ã¡ã½ããã«å¯¾ããåç
§ã«ä½¿ç¨ããã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:149
@@ -562,6 +671,15 @@
" </method-params>\n"
"</method>"
msgstr ""
+"<method>\n"
+" <ejb-name>EJBNAME</ejb-name>\n"
+" <method-name>METHOD</method-name>\n"
+" <method-params>\n"
+" <method-param>PARAMETER_1</method-param>\n"
+" <!-- ... -->\n"
+" <method-param>PARAMETER_N</method-param>\n"
+" </method-params>\n"
+"</method>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:150
@@ -572,7 +690,7 @@
"name of the corresponding method parameter type. If there are multiple "
"methods with the same overloaded signature, the permission applies to all of "
"the matching overloaded methods."
-msgstr ""
+msgstr "ã¡ã½ããã¯æå®ã¨ã³ã¿ã¼ãã©ã¤ãº bean ã®ãã¼ã ã¾ãã¯ãªã¢ã¼ãã¤ã³ã¿ã¼ãã§ã¼ã¹å
ã§å®ç¾©ãããªããã°ãªãã¾ããã method-param ã¨ã¬ã¡ã³ãå¤ã¯è©²å½ããã¡ã½ãããã©ã¡ã¼ã¿ã¿ã¤ãã®å®å
¨ä¿®é£¾åã«ãªãã¾ãã ãªã¼ãã¼ãã¼ããããåãç½²åãæã¤è¤æ°ã®ã¡ã½ãããããå ´åã ãã¼ããã·ã§ã³ã¯ä¸è´ãããªã¼ãã¼ãã¼ãã¡ã½ãããã¹ã¦ã«é©ç¨ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:153
@@ -581,7 +699,7 @@
"The optional <literal>method-intf</literal> element can be used to "
"differentiate methods with the same name and signature that are defined in "
"both the home and remote interfaces of an enterprise bean."
-msgstr ""
+msgstr "ãªãã·ã§ã³ã® <literal>method-intf</literal> ã¨ã¬ã¡ã³ãã¯ã¨ã³ã¿ã¼ãã©ã¤ãº bean ã®ãã¼ã ããã³ãªã¢ã¼ãã¤ã³ã¿ã¼ãã§ã¼ã¹ã®ä¸¡æ¹ã§å®ç¾©ãããåãååã¨ç½²åãæã¤è¤æ°ã®ã¡ã½ãããåºå¥ããããã«ä½¿ç¨ãããã¨ãã§ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:156
@@ -589,7 +707,7 @@
msgid ""
"provides complete examples of the <literal>method-permission</literal> "
"element usage."
-msgstr ""
+msgstr "<literal>method-permission</literal> ã¨ã¬ã¡ã³ãã®ä½¿ç¨ä¾ã示ãã¦ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:159
@@ -597,7 +715,7 @@
msgid ""
"An ejb-jar.xml descriptor fragment that illustrates the method-permission "
"element usage."
-msgstr ""
+msgstr "method-permission ã¨ã¬ã¡ã³ãã®ä½¿ãæ¹ã示ã ejb-jar.xml è¨è¿°åã®ä¸é¨ã§ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:160
@@ -671,12 +789,79 @@
" </assembly-descriptor>\n"
"</ejb-jar>"
msgstr ""
+"<ejb-jar>\n"
+" <assembly-descriptor>\n"
+" <method-permission>\n"
+" <description>The employee and temp-employee roles may "
+"access any\n"
+" method of the EmployeeService bean </description>\n"
+" <role-name>employee</role-name>\n"
+" <role-name>temp-employee</role-name>\n"
+" <method>\n"
+" <ejb-name>EmployeeService</ejb-name>\n"
+" <method-name>*</method-name>\n"
+" </method>\n"
+" </method-permission>\n"
+" <method-permission>\n"
+" <description>The employee role may access the "
+"findByPrimaryKey,\n"
+" getEmployeeInfo, and the updateEmployeeInfo(String) method "
+"of\n"
+" the AardvarkPayroll bean </description>\n"
+" <role-name>employee</role-name>\n"
+" <method>\n"
+" <ejb-name>AardvarkPayroll</ejb-name>\n"
+" <method-name>findByPrimaryKey</method-name>\n"
+" </method>\n"
+" <method>\n"
+" <ejb-name>AardvarkPayroll</ejb-name>\n"
+" <method-name>getEmployeeInfo</method-name>\n"
+" </method>\n"
+" <method>\n"
+" <ejb-name>AardvarkPayroll</ejb-name>\n"
+" <method-name>updateEmployeeInfo</method-name>\n"
+" <method-params>\n"
+" <method-param>java.lang.String</method-"
+"param>\n"
+" </method-params>\n"
+" </method>\n"
+" </method-permission>\n"
+" <method-permission>\n"
+" <description>The admin role may access any method of the\n"
+" EmployeeServiceAdmin bean </description>\n"
+" <role-name>admin</role-name>\n"
+" <method>\n"
+" <ejb-name>EmployeeServiceAdmin</ejb-name>\n"
+" <method-name>*</method-name>\n"
+" </method>\n"
+" </method-permission>\n"
+" <method-permission>\n"
+" <description>Any authenticated user may access any method "
+"of the\n"
+" EmployeeServiceHelp bean</description>\n"
+" <unchecked/>\n"
+" <method>\n"
+" <ejb-name>EmployeeServiceHelp</ejb-name>\n"
+" <method-name>*</method-name>\n"
+" </method>\n"
+" </method-permission>\n"
+" <exclude-list>\n"
+" <description>No fireTheCTO methods of the EmployeeFiring "
+"bean may be\n"
+" used in this deployment</description>\n"
+" <method>\n"
+" <ejb-name>EmployeeFiring</ejb-name>\n"
+" <method-name>fireTheCTO</method-name>\n"
+" </method>\n"
+" </exclude-list>\n"
+" </assembly-descriptor>\n"
+"</ejb-jar>"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:165
#, no-c-format
msgid "Web Content Security Constraints"
-msgstr ""
+msgstr "ã¦ã§ãã³ã³ãã³ãã®ã»ãã¥ãªãã£å¶é"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:166
@@ -687,12 +872,14 @@
"This set of information is declared by using the <literal>web.xml</"
"literal><literal>security-constraint</literal> element."
msgstr ""
+"ã¦ã§ãã¢ããªã±ã¼ã·ã§ã³ã§ã¯ã ä¿è·ã³ã³ãã³ããèå¥ãã URL ãã¿ã¼ã³ã§ã³ã³ãã³ãã¸ã®ã¢ã¯ã»ã¹ã許å¯ããããã¼ã«ã«ãã£ã¦ã»ãã¥ãªãã£ãå®ç¾©ãã¾ãã ãã®æ
å ±ä¸å¼ã¯ <literal>web.xml</"
+"literal><literal>security-constraint</literal> ã¨ã¬ã¡ã³ãã使ã£ã¦å®£è¨ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:170
#, no-c-format
msgid "The security-constraint element"
-msgstr ""
+msgstr "security-constraint ã¨ã¬ã¡ã³ã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:177
@@ -707,7 +894,7 @@
"request to correspond to an attempt to access secured content. The "
"<literal>http-method</literal> element value specifies a type of HTTP "
"request to allow."
-msgstr ""
+msgstr "å®å
¨åãå³ãã³ã³ãã³ã㯠1 ã¤ã¾ãã¯è¤æ°ã® <literal>web-resource-collection</literal> ã¨ã¬ã¡ã³ãã使ã£ã¦å®£è¨ãã¾ãã å <literal>web-resource-collection</literal> ã¨ã¬ã¡ã³ãã«ã¯ãªãã·ã§ã³ã® <literal>url-pattern</literal> ã¨ã¬ã¡ã³ãã®ã·ãªã¼ãºã ç¶ãã¦ãªãã·ã§ã³ã® <literal>http-method</literal> ã¨ã¬ã¡ã³ãã®ã·ãªã¼ãºãå«ã¾ãã¦ãã¾ãã <literal>url-pattern</literal> ã¨ã¬ã¡ã³ãå¤ã¯ã ã»ãã¥ã¢ãªã³ã³ãã³ãã¸ã®ã¢ã¯ã»ã¹è©¦è¡ã«è©²å½ããè¦æ±ã¨ä¸è´ããè¦æ± URL ã«å¯¾ãã URL ãã¿ã¼ã³ãæå®ãã¾ãã <literal>http-method</literal> ã¨ã¬ã¡ã³ãå¤ã¯è¨±å¯ãã HTTP è¦æ±ã®ã¿ã¤ããæå®ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:180
@@ -731,6 +918,8 @@
"<literal>CONFIDENTIAL</literal> flag indicates that the use of SSL is "
"required."
msgstr ""
+"ãªãã·ã§ã³ã® <literal>user-data-constraint</literal> ã¨ã¬ã¡ã³ãã¯ã¯ã©ã¤ã¢ã³ããããµã¼ãã¼ã¸ã®æ¥ç¶ã®ãã©ã³ã¹ãã¼ã層ã«å¯¾ããè¦ä»¶ãæå®ãã¾ãã è¦ä»¶ã¯ã³ã³ãã³ãã®æ´åæ§ (éä¿¡ããã»ã¹ä¸ã®ãã¼ã¿ã®æ¹ãããé²ããã¨) ãç®çã¨ãã¦ãæ©å¯æ§ (ãã©ã³ã¸ããä¸ã®èªã¿åããé²ããã¨) ãç®çã¨ãã¦ãæ§ãã¾ããã transport-guarantee ã¨ã¬ã¡ã³ãå¤ã¯ä¿è·ãããã¹ãã¯ã©ã¤ã¢ã³ãã¨ãµã¼ãã¼éã®éä¿¡ã«å¯¾ãã¦ãã®åº¦åããæå®ãã¾ãã å¤ã«ã¯ <literal>NONE</literal>ã <literal>INTEGRAL</literal>ã <literal>CONFIDENTIAL</literal> ãããã¾ãã <literal>NONE</literal> ã®å¤ã¯ã ã¢ããªã±ã¼ã·ã§ã³ã¯ãã©ã³ã¹ãã¼ãã®ä¿è¨¼ãä¸åå¿
è¦ã¨ããªãã¨ããæå³ã«ãªãã¾ãã <literal>INTEGRAL</literal> ã®å¤ã¯ã ã¢ããªã±ã¼ã·ã§ã³ã¯ã¯ã©ã¤ã¢ã³ãã¨ãµã¼ãã¼éã§éä¿¡ããããã¼ã¿ã¯ãã©!
ã³ã¸ããä¸ã«å¤æ´ãã§ããªãæ¹æ³ã§éä¿¡ããããã¨ãå¿
è¦ã¨ããã¨ããæå³ã«ãªãã¾ãã <literal>CONFIDENTIAL</literal> ã®å¤ã¯ã ã¢ããªã±ã¼ã·ã§ã³ã¯éä¿¡ã®ã³ã³ãã³ããä½è
ããç£è¦ããã®ãé²ãæ段ãç¨ãã¦ãã¼ã¿ãéä¿¡ããããã¨ãå¿
è¦ã¨ããã¨ããæå³ã«ãªãã¾ãã ã»ã¨ãã©ã®å ´åã <literal>INTEGRAL</literal> ã¾ã㯠"
+"<literal>CONFIDENTIAL</literal> ã®ãã©ã°ããå ´å㯠SSL ã®ä½¿ç¨ãå¿
è¦ã¨ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:183
@@ -740,17 +929,18 @@
"the authentication method that should be used, the realm name that should be "
"used for rhw application, and the attributes that are needed by the form "
"login mechanism."
-msgstr ""
+msgstr "ãªãã·ã§ã³ã® <literal>login-config</literal> ã¨ã¬ã¡ã³ãã¯ã 使ç¨ãããã¹ãèªè¨¼ã¡ã½ããã rhw ã¢ããªã±ã¼ã·ã§ã³ã«ä½¿ç¨ãããã¹ãã¬ã«ã åã ããã¦ãã©ã¼ã ãã°ã¤ã³ã¡ã«ããºã ã§å¿
è¦ã¨ãããå±æ§ã®ãããããè¨å®ããããã«ä½¿ç¨ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:187
#, no-c-format
msgid "The login-config element"
-msgstr ""
+msgstr "login-config ã¨ã¬ã¡ã³ã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:194
#, no-c-format
+#, fuzzy
msgid ""
"The <literal>auth-method</literal> child element specifies the "
"authentication mechanism for the web application. As a prerequisite to "
@@ -764,7 +954,7 @@
"well as error pages that should be used in form-based login. If the "
"<literal>auth-method</literal> value is not <literal>FORM</literal>, then "
"<literal>form-login-config</literal> and its child elements are ignored."
-msgstr ""
+msgstr "<literal>auth-method</literal> åã¨ã¬ã¡ã³ãã¯ã¦ã§ãã¢ããªã±ã¼ã·ã§ã³ç¨ã®èªè¨¼ã¡ã«ããºã ãæå®ãã¾ãã æ¿èªå¶éã«ãã£ã¦ä¿è·ããã¦ããã¦ã§ããªã½ã¼ã¹ã¸ã®ã¢ã¯ã»ã¹åå¾ã«å¯¾ããåææ¡ä»¶ã®ããã«ã a user must have authenticated using the configured mechanism. åæ³ã® Legal <literal>auth-method</literal> å¤ã¯ <literal>BASIC</literal>ã <literal>DIGEST</literal>ã <literal>FORM</literal>ã <literal>CLIENT-CERT</literal> ã«ãªãã¾ãã <literal>realm-name</literal> åã¨ã¬ã¡ã³ã㯠HTTP ãã¼ã·ãã¯ããã³ãã¤ã¸ã§ã¹ãèªè¨¼ã§ä½¿ç¨ãããã¬ã«ã åãæå®ãã¾ãã <literal>form-login-config</literal> åã¨ã¬ã¡ã³ãã¯ãã°ã¤ã³ã®ä»ã ãã©ã¼ã ãã¼ã¹ã®ãã°ã¤ã³ã§ä½¿ç¨ãããã¹ãã¨ã©ã¼ãã¼ã¸ãæå®ãã¾ãã <literal>auth-method</literal> å¤ã <literal>FORM</literal> ã§ã¯ãªãå ´åã <literal>form-login-config</literal> ã¨ã!
ã®åã¨ã¬ã¡ã³ãã¯ç¡è¦ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:197
@@ -778,6 +968,10 @@
"role. There is no required transport guarantee and the authentication method "
"used for obtaining the user identity is BASIC HTTP authentication."
msgstr ""
+"ä¾ã¨ãã¦ã <xref linkend=\"Web_Content_Security_Constraints-_A_web."
+"xml_descriptor_fragment_which_illustrates_the_use_of_the_security_constraint_and_related_elements."
+"\"/> ã® <literal>web.xml</literal> è¨è¿°åã®ä¸é¨ã¯ã ã¦ã§ãã¢ããªã±ã¼ã·ã§ã³ã® <literal>/"
+"restricted</literal> ãã¹é
ä¸ã«ãã URL ã¯ãã¹ã¦ <literal>AuthorizedUser</literal> ãã¼ã«ãå¿
è¦ã¨ãããã¨ã示ãã¦ãã¾ãã å¿
è¦ã¨ãªããã©ã³ã¹ãã¼ãã®ä¿è¨¼ã¯ãªãã ã¦ã¼ã¶ã¼ ID ã®åå¾ã«ä½¿ç¨ãããèªè¨¼ã¡ã½ãã㯠BASIC HTTP èªè¨¼ã«ãªãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:200
@@ -785,7 +979,7 @@
msgid ""
"A web.xml descriptor fragment which illustrates the use of the security-"
"constraint and related elements."
-msgstr ""
+msgstr "security-constraint ããã³é¢é£ããã¨ã¬ã¡ã³ãã®ä½¿ãæ¹ã示ã web.xml è¨è¿°åã®ä¸é¨ã§ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:201
@@ -819,12 +1013,39 @@
" </security-role>\n"
"</web-app>"
msgstr ""
+"<web-app>\n"
+" <!-- ... -->\n"
+" <security-constraint>\n"
+" <web-resource-collection>\n"
+" <web-resource-name>Secure Content</web-resource-"
+"name>\n"
+" <url-pattern>/restricted/*</url-pattern>\n"
+" </web-resource-collection>\n"
+" <auth-constraint>\n"
+" <role-name>AuthorizedUser</role-name>\n"
+" </auth-constraint>\n"
+" <user-data-constraint>\n"
+" <transport-guarantee>NONE</transport-guarantee>\n"
+" </user-data-constraint>\n"
+" </security-constraint>\n"
+" <!-- ... -->\n"
+" <login-config>\n"
+" <auth-method>BASIC</auth-method>\n"
+" <realm-name>The Restricted Zone</realm-name>\n"
+" </login-config>\n"
+" <!-- ... -->\n"
+" <security-role>\n"
+" <description>The role required to access restricted content "
+"</description>\n"
+" <role-name>AuthorizedUser</role-name>\n"
+" </security-role>\n"
+"</web-app>"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:206
#, no-c-format
msgid "Enabling Declarative Security in JBoss"
-msgstr ""
+msgstr "JBoss ã§å®£è¨åã»ãã¥ãªãã£ãæå¹ã«ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:207
@@ -841,12 +1062,14 @@
"security configuration are discussed in <xref linkend=\"Security_on_JBoss-"
"The_JBoss_Security_Model\"/>."
msgstr ""
+"ããã¾ã§ã§èª¬æãã¦ãã J2EE ã»ãã¥ãªãã£ã¨ã¬ã¡ã³ãã¯ã¢ããªã±ã¼ã·ã§ã³å´ããã¿ãã»ãã¥ãªãã£è¦ä»¶ã«ã¤ãã¦ã®ã¿ã§ããã J2EE ã»ãã¥ãªãã£ã¨ã¬ã¡ã³ãã¯è«çãã¼ã«ã宣è¨ããããã ã¢ããªã±ã¼ã·ã§ã³å°å
¥å´ã¯ãã®ãã¼ã«ãã¢ããªã±ã¼ã·ã§ã³ãã¡ã¤ã³ããå°å
¥ç°å¢ã«ãããã³ã°ããããã§ãã J2EE ã®ä»æ§ã¯ãããã¢ããªã±ã¼ã·ã§ã³ã®ãµã¼ãã¼åºæã®è©³ç´°ãçç¥ãã¦ãã¾ãã JBoss ã§ã¯ã ã¢ããªã±ã¼ã·ã§ã³ãã¼ã«ã®å°å
¥ç°å¢ã¸ã®ãããã³ã°ã«ã¯ JBoss ãµã¼ãã¼åºæã®ãããã¤ã¡ã³ãè¨è¿°åã使ã£ã J2EE ã»ãã¥ãªãã£ã¢ãã«ãå®è£
ããã»ãã¥ãªãã£ç®¡çã®æå®ãå¿
è¦ã¨ãªãã¾ãã ã»ãã¥ãªãã£è¨å®åãã®è©³ç´°ã«ã¤ãã¦ã¯ <xref linkend=\"Security_on_JBoss-"
+"The_JBoss_Security_Model\"/> ã§èª¬æããã¦ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:215
#, no-c-format
msgid "An Introduction to JAAS"
-msgstr ""
+msgstr "JAAS ã«ã¤ãã¦"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:216
@@ -857,13 +1080,13 @@
"implementation details of JBossSX. The following sections provide an "
"introduction to JAAS to prepare you for the JBossSX architecture discussion "
"later in this chapter."
-msgstr ""
+msgstr "JBossSX ãã¬ã¼ã ã¯ã¼ã¯ã¯ JAAS API ããã¼ã¹ã¨ãã¦ãã¾ãã JBossSX ã®å®è£
ã«ã¤ãã¦è©³ããç解ããã«ã¯ã JAAS API ã®åºæ¬çãªã¨ã¬ã¡ã³ããç解ãã¦ãããã¨ãéè¦ã¨ãªãã¾ãã æ¬ç« ã®å¾åã§åºã¦ãã JBossSX ã¢ã¼ããã¯ãã£ã«é²ãåã«ã 次ã®ã»ã¯ã·ã§ã³ã§ JAAS ã«ã¤ãã¦å°ã説æããã¦ããã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:220
#, no-c-format
msgid "What is JAAS?"
-msgstr ""
+msgstr "JAAS ã¨ã¯"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:221
@@ -877,7 +1100,7 @@
"for JDK 1.3 and is bundled with JDK 1.4+. Because the JBossSX framework uses "
"only the authentication capabilities of JAAS to implement the declarative "
"role-based J2EE security model, this introduction focuses on only that topic."
-msgstr ""
+msgstr " JAAS 1.0 API ã¯ã¦ã¼ã¶ã¼èªè¨¼ããã³æ¿èªãç®çã¨ãã¦è¨è¨ããã Java ããã±ã¼ã¸ã®ã»ããããæ§æããã¦ãã¾ãã æ¨æºã® PAM (Pluggable Authentication Module) ãã¬ã¼ã ã¯ã¼ã¯ã® Java ãã¼ã¸ã§ã³ãå®è£
ãã ã¦ã¼ã¶ã¼ãã¼ã¹ã®æ¿èªã«å¯¾å¿ãããã Java 2 Platform ã®ã¢ã¯ã»ã¹å¶å¾¡ã¢ã¼ããã¯ãã£ãäºææ¡å¼µãã¦ãã¾ãã JAAS ã¯æåã JDK 1.3 ã®æ¡å¼µããã±ã¼ã¸ã¨ãã¦ãªãªã¼ã¹ããã JDK 1.4+ ã«å梱ããã¦ãã¾ããã JBossSX ãã¬ã¼ã ã¯ã¼ã¯ã¯å®£è¨åãã¼ã«ãã¼ã¹ã® J2EE ã»ãã¥ãªãã£ã¢ãã«ã®å®è£
ã« JAAS ã®æ¿èªæ©è½ã®ã¿ã使ç¨ãã¦ããã®ã§ã æ¬ã»ã¯ã·ã§ã³ã§ã¯ãã®é¨åã«ã¤ãã¦ã®ã¿ç¦ç¹ãç½®ãã¦é²ãã¦ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:224
@@ -890,13 +1113,13 @@
"achieved without changing the JBossSX security manager implementation. All "
"that needs to change is the configuration of the authentication stack that "
"JAAS uses."
-msgstr ""
+msgstr "JAAS èªè¨¼ã¯ãã©ã°ãå¯è½ãªæ¹æ³ã§å®è¡ããã¾ãã ããã«ãã Java ã¢ããªã±ã¼ã·ã§ã³ã¯åºç¤ã¨ãªãèªè¨¼æè¡ã«ä¾åãããã¨ãªãã JBossSX ã»ãã¥ãªãã£ç®¡çã¯ç°ãªãã»ãã¥ãªãã£ã¤ã³ãã©ã¹ãã©ã¯ãã£ã§åä½ãããã¨ãã§ããããã«ãªãã¾ãã ã»ãã¥ãªãã£ã¤ã³ãã©ã¹ãã©ã¯ãã£ã¨ã®çµ±å㯠JBossSX ã»ãã¥ãªãã£ç®¡çã®å®è£
ãå¤æ´ãããã¨ãªãè¡ããã¨ãå¯è½ã§ãã å¤æ´ãå¿
è¦ã¨ãªãã®ã¯ã JAAS ã使ç¨ããèªè¨¼ã¹ã¿ãã¯ã®è¨å®ã®ã¿ã§ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:228
#, no-c-format
msgid "The JAAS Core Classes"
-msgstr ""
+msgstr "JAAS ã³ã¢ã¯ã©ã¹"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:229
@@ -906,33 +1129,31 @@
"authentication, and authorization. The following list presents only the "
"common and authentication classes because these are the specific classes "
"used to implement the functionality of JBossSX covered in this chapter."
-msgstr ""
+msgstr "JAAS ã³ã¢ã¯ã©ã¹ç¾¤ã¯ã å
±éã èªè¨¼ã æ¿èªã® 3 ã¤ã®ã«ãã´ãªã¼ã«åºåãããã¨ãã§ãã¾ãã å
±éã¨èªè¨¼ã®ã¯ã©ã¹ãæ¬ç« ã§èª¬æããã¦ãã JBossSX ã®æ©è½ã®å®è£
ã«ä½¿ç¨ãããã¯ã©ã¹ã§ããããã 次ã®ä¸è¦§ã§ã¯å
±éã¨èªè¨¼ã®ã¯ã©ã¹ã®ã¿ã示ãã¾ãã "
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:232
#, no-c-format
msgid "The are the common classes:"
-msgstr ""
+msgstr "å
±éã®ã¯ã©ã¹ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:237
#, no-c-format
-msgid ""
-"<literal>Subject</literal> (<literal>javax.security.auth.Subject</literal>)"
-msgstr ""
+msgid "<literal>Subject</literal> (<literal>javax.security.auth.Subject</literal>)"
+msgstr "<literal>Subject</literal> (<literal>javax.security.auth.Subject</literal>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:242
#, no-c-format
-msgid ""
-"<literal>Principal</literal> (<literal>java.security.Principal</literal>)"
-msgstr ""
+msgid "<literal>Principal</literal> (<literal>java.security.Principal</literal>)"
+msgstr "<literal>Principal</literal> (<literal>java.security.Principal</literal>)"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:247
#, no-c-format
msgid "These are the authentication classes:"
-msgstr ""
+msgstr "èªè¨¼ã®ã¯ã©ã¹ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:252
@@ -941,6 +1162,8 @@
"<literal>Callback</literal> (<literal>javax.security.auth.callback.Callback</"
"literal>)"
msgstr ""
+"<literal>Callback</literal> (<literal>javax.security.auth.callback.Callback</"
+"literal>)"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:257
@@ -949,6 +1172,8 @@
"<literal>CallbackHandler</literal> (<literal>javax.security.auth.callback."
"CallbackHandler</literal>)"
msgstr ""
+"<literal>CallbackHandler</literal> (<literal>javax.security.auth.callback."
+"CallbackHandler</literal>)"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:262
@@ -957,6 +1182,8 @@
"<literal>Configuration</literal> (<literal>javax.security.auth.login."
"Configuration</literal>)"
msgstr ""
+"<literal>Configuration</literal> (<literal>javax.security.auth.login."
+"Configuration</literal>)"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:267
@@ -965,6 +1192,8 @@
"<literal>LoginContext</literal> (<literal>javax.security.auth.login."
"LoginContext</literal>)"
msgstr ""
+"<literal>LoginContext</literal> (<literal>javax.security.auth.login."
+"LoginContext</literal>)"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:272
@@ -973,12 +1202,14 @@
"<literal>LoginModule</literal> (<literal>javax.security.auth.spi."
"LoginModule</literal>)"
msgstr ""
+"<literal>LoginModule</literal> (<literal>javax.security.auth.spi."
+"LoginModule</literal>)"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:278
#, no-c-format
msgid "The Subject and Principal Classes"
-msgstr ""
+msgstr "Subject ã¯ã©ã¹ã¨ Principal ã¯ã©ã¹"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:279
@@ -993,7 +1224,7 @@
"The JAAS APIs use the existing Java 2 <literal>java.security.Principal</"
"literal> interface to represent a principal, which is essentially just a "
"typed name."
-msgstr ""
+msgstr "ãªã½ã¼ã¹ã¸ã®ã¢ã¯ã»ã¹ãæ¿èªããã«ã¯ã ã¾ãã¢ããªã±ã¼ã·ã§ã³ã¯ãã®è¦æ±å
ãèªè¨¼ããå¿
è¦ãããã¾ãã JAAS ãã¬ã¼ã ã¯ã¼ã¯ã¯è¦æ±å
ã表ãããã®ç¨èª subject ãå®ç¾©ãã¾ãã <literal>Subject</literal> ã¯ã©ã¹ã¯ JAAS ã®ä¸å¤®ã¯ã©ã¹ã«ãªãã¾ãã <literal>Subject</literal> ã¯äººããµã¼ãã¹ãªã©åä¸ã¨ã³ãã£ãã£ã®æ
å ±ã表ãã¾ãã æ
å ±ã¯ãã®ã¨ã³ãã£ãã£æ¬äººã ãããªãã¯ã®è¨¼ææ¸ã ãã©ã¤ãã¼ãã®è¨¼ææ¸ãªã©ã«æ¸¡ãã¾ãã JAAS API ã¯æ¢åã® Java 2 <literal>java.security.Principal</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ã使ç¨ãã¦æ¬äººã表ãã¾ãã åºæ¬çã«ã¯åã«å
¥åãããååã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:282
@@ -1005,7 +1236,7 @@
"principal (123-45-6789), and a username principal (johnd), all of which help "
"distinguish the subject from other subjects. To retrieve the principals "
"associated with a subject, two methods are available:"
-msgstr ""
+msgstr "èªè¨¼ã®ããã»ã¹ã§ã subject ã¯é¢é£ ID ã¾ã㯠principal ãä»ãã¦ç§»æ¤ããã¾ãã subject ã¯ããããã® principal ãæã¤ãã¨ãã§ãã¾ãã ãã¨ãã°ã ã²ã¨ãã®äººãååã® principal (John Doe)ã ã½ã¼ã·ã£ã«ã»ãã¥ãªãã£çªå·ã® principal (123-45-6789)ã ã¦ã¼ã¶ã¼åã® principal (johnd) ãæã¤ãã¨ãã§ãã ãããã¯ãã¹ã¦ä»ã® subject ãããã® subject ãåºå¥ããã®ã«å½¹ç«ã¡ã¾ãã subject ã«é¢é£ã¥ãããã principal ãæ¤ç´¢ããã«ã¯ã 2 ã¤ã®æ¹æ³ãããã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:285
@@ -1014,6 +1245,8 @@
"public Set getPrincipals() {...}\n"
"public Set getPrincipals(Class c) {...}"
msgstr ""
+"public Set getPrincipals() {...}\n"
+"public Set getPrincipals(Class c) {...}"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:286
@@ -1027,12 +1260,15 @@
"literal>, so an instance in the principals set may represent a logical "
"grouping of other principals or groups of principals."
msgstr ""
+"æåã®æ¹æ³ã¯ subject ã«å«ã¾ãããã¹ã¦ã® principal ãè¿ãã¾ãã 2 çªç®ã®æ¹æ³ã¯ <literal>c</"
+"literal> ã®ã¤ã³ã¹ã¿ã³ã¹ã¾ãã¯ãã®ãµãã¯ã©ã¹ã®ã²ã¨ã¤ã§ãã principal ã®ã¿ãè¿ãã¾ãã subject ã«ä¸è´ãã principal ããªãã¨ç©ºã®ã»ãããè¿ããã¾ãã <literal>java.security.acl.Group</"
+"literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ã¯ <literal>java.security.Principal</literal> ã®ãµãã¤ã³ã¿ã¼ãã§ã¼ã¹ã§ããããã principal ã»ããå
ã®ã¤ã³ã¹ã¿ã³ã¹ã¯ä»ã® principal ã¾ã㯠principal ã®ã°ã«ã¼ãã®è«ççãªã°ã«ã¼ãåãã表ãå¯è½æ§ãããã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:292
#, no-c-format
msgid "Authentication of a Subject"
-msgstr ""
+msgstr "Subject ã®èªè¨¼"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:293
@@ -1040,17 +1276,18 @@
msgid ""
"Authentication of a subject requires a JAAS login. The login procedure "
"consists of the following steps:"
-msgstr ""
+msgstr "subject ã®èªè¨¼ã«ã¯ JAAS ãã°ã¤ã³ãå¿
è¦ã¨ãªãã¾ãã ãã°ã¤ã³ã®æé ã¯æ¬¡ã®ã¹ãããããæãç«ã¡ã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:298
#, no-c-format
+#, fuzzy
msgid ""
"An application instantiates a <literal>LoginContext</literal> and passes in "
"the name of the login configuration and a <literal>CallbackHandler</literal> "
"to populate the <literal>Callback</literal> objects, as required by the "
"configuration <literal>LoginModule</literal>s."
-msgstr ""
+msgstr "ã¢ããªã±ã¼ã·ã§ã³ã¯ <literal>LoginContext</literal> ã®ã¤ã³ã¹ã¿ã³ã¹ãä½æããã°ã¤ã³è¨å®ã®ååããã³ <literal>CallbackHandler</literal> ã«æ¸¡ã㦠<literal>LoginModule</literal> ã®è¨å®ã§è¦ãããããã« <literal>Callback</literal> ãªãã¸ã§ã¯ãã移æ¤ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:303
@@ -1060,14 +1297,13 @@
"literal> to load all the <literal>LoginModules</literal> included in the "
"named login configuration. If no such named configuration exists the "
"<literal>other</literal> configuration is used as a default."
-msgstr ""
+msgstr "<literal>LoginContext</literal> 㯠<literal>Configuration</literal> ã« named ãã°ã¤ã³è¨å®ã«å«ã¾ãããã¹ã¦ã® <literal>LoginModules</literal> ããã¼ãããããæ示ãã¾ãã ãã®ãã㪠named è¨å®ãåå¨ãã¦ããªãå ´åã <literal>other</literal> è¨å®ãããã©ã«ãã¨ãã¦ä½¿ç¨ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:308
#, no-c-format
-msgid ""
-"The application invokes the <literal>LoginContext.login</literal> method."
-msgstr ""
+msgid "The application invokes the <literal>LoginContext.login</literal> method."
+msgstr "ã¢ããªã±ã¼ã·ã§ã³ã¯ <literal>LoginContext.login</literal> ã¡ã½ãããå¼ã³åºãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:313
@@ -1081,7 +1317,7 @@
"array of <literal>Callback</literal> objects. Upon success, the "
"<literal>LoginModule</literal>s associate relevant principals and "
"credentials with the subject."
-msgstr ""
+msgstr "ãã°ã¤ã³ã¡ã½ããã¯ãã¼ãããããã¹ã¦ã® <literal>LoginModule</literal> ãå¼ã³åºãã¾ãã å <literal>LoginModule</literal> 㯠subject ã®èªè¨¼ã試è¡ããã®ã§ã é¢é£ã¥ãããã <literal>CallbackHandler</literal> 㧠handle ã¡ã½ãããå¼ã³åºãèªè¨¼ããã»ã¹ã«å¿
è¦ã¨ãªãæ
å ±ãåå¾ãã¾ãã å¿
è¦ã¨ãªãæ
å ±ã¯ handle ã¡ã½ããã« <literal>Callback</literal> ãªãã¸ã§ã¯ãã®ã¢ã¬ã¤ã®å½¢å¼ã§æ¸¡ããã¾ãã æåããã¨ã <literal>LoginModule</literal> ã¯é¢é£ã® principal ã¨è¨¼ææ¸ã subject ã«çµã³ä»ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:318
@@ -1091,7 +1327,7 @@
"application. Success is represented by a return from the login method. "
"Failure is represented through a LoginException being thrown by the login "
"method."
-msgstr ""
+msgstr "<literal>LoginContext</literal> ã¯ã¢ããªã±ã¼ã·ã§ã³ã«å¯¾ããèªè¨¼ç¶æ
ãè¿ãã¾ãã ãã°ã¤ã³ã¡ã½ããããã®æ»ãã¯æåã§ãã ãã°ã¤ã³ã¡ã½ããã«ãã£ã¦ LoginException ãæããããã¨å¤±æã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:323
@@ -1099,7 +1335,7 @@
msgid ""
"If authentication succeeds, the application retrieves the authenticated "
"subject using the <literal>LoginContext.getSubject</literal> method."
-msgstr ""
+msgstr "èªè¨¼ãæåãããã ã¢ããªã±ã¼ã·ã§ã³ã¯ <literal>LoginContext.getSubject</literal> ã¡ã½ããã使ã£ã¦èªè¨¼ããã subject ãæ¤ç´¢ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:328
@@ -1108,7 +1344,7 @@
"After the scope of the subject authentication is complete, all principals "
"and related information associated with the subject by the login method can "
"be removed by invoking the <literal>LoginContext.logout</literal> method."
-msgstr ""
+msgstr "subject èªè¨¼ã®ã¹ã³ã¼ããå®äºãããã ãã°ã¤ã³ã¡ã½ãã㧠subject ã«é¢é£ã¥ããããæ
å ±ããã³ principal ããã¹ã¦ <literal>LoginContext.logout</literal> ã¡ã½ãããå¼ã³åºãã¦åé¤ãããã¨ãã§ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:333
@@ -1123,7 +1359,7 @@
"authentication services. Therefore, you can plug different login modules "
"into an application without changing the application itself. The following "
"code shows the steps required by an application to authenticate a subject."
-msgstr ""
+msgstr "<literal>LoginContext</literal> ã¯ã©ã¹ã¯èªè¨¼ãã¦ãã subject ã®åºæ¬ã¡ã½ãããæä¾ãã åºç¤ã¨ãªãèªè¨¼æè¡ã«ä¾åããå¿
è¦ã®ãªãã¢ããªã±ã¼ã·ã§ã³ã®éçºæ段ãæä¾ãã¾ãã <literal>LoginContext</literal> ã¯ç¹å®ã®ã¢ããªã±ã¼ã·ã§ã³ç¨ã«è¨å®ãããèªè¨¼ãµã¼ãã¹ã確å®ãããã <literal>Configuration</literal> ã«æ示ãã¾ãã <literal>LoginModule</literal> ã¯ã©ã¹ç¾¤ã¯èªè¨¼ãµã¼ãã¹ã表ãã¾ãã ãããã£ã¦ã ç°ãªããã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãã¢ããªã±ã¼ã·ã§ã³èªä½ãå¤æ´ãããã¨ãªã 1 ã¤ã®ã¢ããªã±ã¼ã·ã§ã³ã«ãã©ã°ã¤ã³ãããã¨ãå¯è½ã§ãã 次ã®ã³ã¼ãã§ã¯ subject ã®èªè¨¼ã«ã¢ããªã±ã¼ã·ã§ã³ãå¿
è¦ã¨ããã¹ãããã示ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:336
@@ -1174,6 +1410,50 @@
" }\n"
"}"
msgstr ""
+"CallbackHandler handler = new MyHandler();\n"
+"LoginContext lc = new LoginContext(\"some-config\", handler);\n"
+"\n"
+"try {\n"
+" lc.login();\n"
+" Subject subject = lc.getSubject();\n"
+"} catch(LoginException e) {\n"
+" System.out.println(\"authentication failed\");\n"
+" e.printStackTrace();\n"
+"}\n"
+" \n"
+"// Perform work as authenticated Subject\n"
+"// ...\n"
+"\n"
+"// Scope of work complete, logout to remove authentication info\n"
+"try {\n"
+" lc.logout();\n"
+"} catch(LoginException e) {\n"
+" System.out.println(\"logout failed\");\n"
+" e.printStackTrace();\n"
+"}\n"
+" \n"
+"// A sample MyHandler class\n"
+"class MyHandler \n"
+" implements CallbackHandler\n"
+"{\n"
+" public void handle(Callback[] callbacks) throws\n"
+" IOException, UnsupportedCallbackException\n"
+" {\n"
+" for (int i = 0; i < callbacks.length; i++) {\n"
+" if (callbacks[i] instanceof NameCallback) {\n"
+" NameCallback nc = (NameCallback)callbacks[i];\n"
+" nc.setName(username);\n"
+" } else if (callbacks[i] instanceof PasswordCallback) {\n"
+" PasswordCallback pc = (PasswordCallback)callbacks[i];\n"
+" pc.setPassword(password);\n"
+" } else {\n"
+" throw new UnsupportedCallbackException(callbacks[i],\n"
+" \"Unrecognized "
+"Callback\");\n"
+" }\n"
+" }\n"
+" }\n"
+"}"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:337
@@ -1187,7 +1467,7 @@
"authentication process. For example, one <literal>LoginModule</literal> may "
"perform username/password-based authentication, while another may interface "
"to hardware devices such as smart card readers or biometric authenticators."
-msgstr ""
+msgstr "<literal>LoginModule</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ã®å®è£
ãä½æãããã¨ã§éçºè
ã«ããèªè¨¼æè¡ãçµ±åããã¾ãã ããã«ããã 管çè
ã¯ç°ãªãèªè¨¼æè¡ã 1 ã¤ã®ã¢ããªã±ã¼ã·ã§ã³ã«ãã©ã°ã¤ã³ãããã¨ãã§ããããã«ãªãã¾ãã è¤æ°ã® <literal>LoginModule</literal> ããã§ã¼ã³åã 1 ã¤ä»¥ä¸ã®èªè¨¼æè¡ãèªè¨¼ããã»ã¹ã«å ãããã¨ãå¯è½ã§ãã ãã¨ãã°ã ãã <literal>LoginModule</literal> ã§ã¦ã¼ã¶ã¼åã¨ãã¹ã¯ã¼ããã¼ã¹ã®èªè¨¼ãè¡ãã å¥ã® <literal>LoginModule</literal> ã¯ã¹ãã¼ãã«ã¼ããæä½èªè¨¼æ©è½ãªã©ã®ãã¼ãã¦ã§ã¢ããã¤ã¹ã«æ¥ç¶ãããã¨ãã§ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:340
@@ -1197,7 +1477,7 @@
"<literal>LoginContext</literal> object against which the client creates and "
"issues the login method. The process consists of two phases. The steps of "
"the process are as follows:"
-msgstr ""
+msgstr "<literal>LoginModule</literal> ã®ã©ã¤ããµã¤ã¯ã«ã¯ã ã¯ã©ã¤ã¢ã³ããä½æã çºè¡ãããã°ã¤ã³ã¡ã½ããã«å¯¾ã㦠<literal>LoginContext</literal> ãªãã¸ã§ã¯ãã«ãã調æ´ããã¾ãã ããã»ã¹ã¯ 2 ã¤ã®æ®µéã§æãç«ã£ã¦ãã¾ãã ããã»ã¹ã®ã¹ãããã¯ä»¥ä¸ã®éãã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:345
@@ -1205,7 +1485,7 @@
msgid ""
"The <literal>LoginContext</literal> creates each configured "
"<literal>LoginModule</literal> using its public no-arg constructor."
-msgstr ""
+msgstr "<literal>LoginContext</literal> ããã®å¼æ°ç¡ãã®ãããªãã¯ã³ã³ã¹ãã©ã¯ã¿ã使ã£ã¦è¨å®ãããå <literal>LoginModule</literal> ãä½æãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:350
@@ -1217,6 +1497,9 @@
"initialize(Subject subject, CallbackHandler callbackHandler, Map "
"sharedState, Map options)</literal>."
msgstr ""
+"å <literal>LoginModule</literal> ã¯ãã®åæåã¡ã½ããã¸ã®ã³ã¼ã«ã§åæåããã¾ãã <literal>Subject</literal> å¼æ°ã¯ null 以å¤ã«ãªããã¨ãä¿è¨¼ããã¾ãã åæåã¡ã½ããã®ç½²åã¯ã <literal>public void "
+"initialize(Subject subject, CallbackHandler callbackHandler, Map "
+"sharedState, Map options)</literal> ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:355
@@ -1234,7 +1517,7 @@
"<literal>LoginException</literal> indicates failure. A return value of true "
"indicates that the method succeeded, whereas a return valueof false "
"indicates that the login module should be ignored."
-msgstr ""
+msgstr "<literal>login</literal> ã¡ã½ãããèªè¨¼ããã»ã¹ãéå§ããããå¼ã³åºããã¾ãã ãã¨ãã°ã ããã¡ã½ããå®è£
ã¯ã¦ã¼ã¶ã¼ã«ã¦ã¼ã¶ã¼åã¨ãã¹ã¯ã¼ãã®å
¥åãæ±ãã NIS ã LDAP ãªã©ã®ãã¼ãã³ã°ãµã¼ãã¹ã«ä¿åããã¦ãããã¼ã¿ã«å¯¾ãã¦ãã®æ
å ±ã確èªããå ´åãããã¾ãã å¥ã®å®è£
ã¯ã¹ãã¼ãã«ã¼ããçä½èªè¨¼ããã¤ã¹ã«æ¥ç¶ããããã åç´ã«åºç¤ã¨ãªããªãã¬ã¼ãã£ã³ã°ã·ã¹ãã ããã¦ã¼ã¶ã¼æ
å ±ãæ½åºããããããã¾ããã å <literal>LoginModule</literal> ã«ããã¦ã¼ã¶ã¼ ID ã®æ¤è¨¼ã¯ JAAS èªè¨¼ã®ãã§ã¼ãº 1 ã¨ã¿ãªããã¾ãã <literal>login</literal> ã¡ã½ããã®ç½²å㯠<literal>boolean login() throws LoginException</literal> ã«ãªãã¾ãã <literal>LoginException</literal> ã¯å¤±æã示ãã¦ãã¾ãã true ã®è¿ãå¤ã¯ã¡ã½ãããæåãããã¨ã示ãã false ã®è¿ãå¤!
ã¯ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãç¡è¦ãããã§ããããã¨ã示ãã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:360
@@ -1254,6 +1537,8 @@
"method succeeded, whereas a return of false indicates that the login module "
"should be ignored."
msgstr ""
+"<literal>LoginContext</literal> ã®å
¨ä½çãªèªè¨¼ãæåããã¨ã <literal>commit</literal> ãå <literal>LoginModule</literal> ã§å¼ã³åºããã¾ãã ãã§ã¼ãº 1 ã <literal>LoginModule</"
+"literal> ã«å¯¾ãã¦æåããã¨ã ã³ãããã¡ã½ããããã§ã¼ãº 2 ã§ç¶ãé¢é£ã® principalã ãããªãã¯è¨¼ææ¸ã ãã©ã¤ãã¼ã証ææ¸ãªã©ã subject ã«çµã³ä»ãã¾ãã ãã§ã¼ãº 1 ã <literal>LoginModule</literal> ã«å¤±æããã¨ã <literal>commit</literal> ã¯ã¦ã¼ã¶ã¼åããã¹ã¯ã¼ããªã©ä»¥åã«ä¿åãã¦ããèªè¨¼ç¶æ
ããã¹ã¦åé¤ãã¾ãã <literal>commit</literal> ã¡ã½ããã®ç½²å㯠<literal>boolean commit() throws LoginException</literal> ã«ãªãã¾ãã <literal>LoginException</literal> ãæããããã¨ã³ããããã§ã¼ãºå®äºã®å¤±æã¨ãããã¨ã«ãªãã¾ãã true ãè¿ãããã¨ã¡ã½ããã®æåã§ã false ãè¿ãããå ´åã¯ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãç¡è¦ãããã§ããããã¨ã示ãã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:365
@@ -1269,7 +1554,7 @@
"<literal>LoginException</literal>. A return of true indicates that the "
"method succeeded, whereas a return of false indicates that the login module "
"should be ignored."
-msgstr ""
+msgstr "<literal>LoginContext</literal> ã®å
¨ä½çãªèªè¨¼ã失æããã¨ã <literal>abort</literal> ã¡ã½ãããå <literal>LoginModule</literal> ã§å¼ã³åºããã¾ãã <literal>LoginModule</literal> ã¡ã½ããã¯ãã°ã¤ã³ã¾ãã¯åæåã®ã¡ã½ããã«ãã£ã¦ä½æããããã¹ã¦ã®èªè¨¼ç¶æ
ãåé¤ãããã¯ç ´æ£ãã¾ãã <literal>abort</literal> ã¡ã½ããã®ç½²å㯠<literal>boolean abort() throws LoginException</literal> ã«ãªãã¾ãã <literal>LoginException</literal> ãæãããã㨠<literal>abort</literal> ãã§ã¼ãºå®äºã®å¤±æã¨ãããã¨ã«ãªãã¾ãã true ãè¿ãããã¨ã¡ã½ããã¯æåã§ã false ãè¿ãããå ´åã¯ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¯ç¡è¦ãããã§ããããã¨ã示ãã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:370
@@ -1287,7 +1572,7 @@
"<literal>LoginException</literal>. A return of true indicates that the "
"method succeeded, whereas a return of false indicates that the login module "
"should be ignored."
-msgstr ""
+msgstr "ãã°ã¤ã³æåã®å¾ã«èªè¨¼ç¶æ
ãåé¤ããããã ã¢ããªã±ã¼ã·ã§ã³ã¯ <literal>LoginContext</literal> 㧠<literal>logout</literal> ãå¼ã³åºãã¾ãã ããã«ããã å <literal>LoginModule</literal> 㧠<literal>logout</literal> ã¡ã½ããã®å¼åºãèµ·ããã¾ãã <literal>logout</literal> ã¡ã½ãã㯠<literal>commit</literal> åä½ã®ã¨ãã«å½å subject ã«é¢é£ä»ãããã¦ãã principal ã¨è¨¼ææ¸ãåé¤ãã¾ãã 証ææ¸ã¯åé¤æã«ç ´æ£ãããã¹ãã§ãã <literal>logout</literal> ã¡ã½ããã®ç½²å㯠<literal>boolean logout() throws LoginException</literal> ã«ãªãã¾ãã <literal>LoginException</literal> ãæããããã¨ãã°ã¢ã¦ãããã»ã¹å®äºã失æãããã¨ã«ãªãã¾ãã true ãè¿ãããã¨ã¡ã½ãããæåã§ã false ãè¿ãããã¨ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¯ç¡è¦ãããã§ããããã¨ã示ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:375
@@ -1310,7 +1595,7 @@
"might simply obtain credential information by using an application server "
"API. The <literal>callbackhandler</literal> interface has one method to "
"implement:"
-msgstr ""
+msgstr "<literal>LoginModule</literal> ãèªè¨¼æ
å ±ãåå¾ããããã¦ã¼ã¶ã¼ã¨äº¤ä¿¡ããªããã°ãªããªãå ´åã <literal>CallbackHandler</literal> ãªãã¸ã§ã¯ãã使ç¨ãã¾ãã ã¢ããªã±ã¼ã·ã§ã³ã¯ <literal>CallbackHandler</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ãå®è£
ãã¦ãã® LoginContext ã«æ¸¡ãã¾ãã ãããç´æ¥ã åºç¤ã¨ãªããã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã«ãã®ã¤ã³ã¿ã¼ãã§ã¼ã¹ã転éãã¾ãã ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¯ <literal>CallbackHandler</literal> ã使ç¨ãã¦ã ãã¹ã¯ã¼ããã¹ãã¼ãã«ã¼ã PIN ãªã©ã®ã¦ã¼ã¶ã¼ããã®å
¥åãåéãã ç¶æ
æ
å ±ãªã©ãã¦ã¼ã¶ã¼ã«æä¾ãã両æ¹ã®å½¹å²ãæããã¾ãã ã¢ããªã±ã¼ã·ã§ã³ã«ãã <literal>CallbackHandler</literal> ã®æå®ã許å¯ãããã¨ã«ããã åºç¤ã¨ãªã <literal>LoginModule</literal> ã¯ã¢ããªã±ã¼ã·ã§ã³ãã¦ã¼ã¶ã¼ã¨è¡ã交信æ¹æ³ã«ä¾åããªãç¶æ
ãç¶æã!
ã¾ãã ãã¨ãã°ã GUI ã¢ããªã±ã¼ã·ã§ã³ç¨ã® <literal>CallbackHandler</literal> ã®å®è£
ã¯ã¦ã£ã³ãã¦ã表示ãã¦ã¦ã¼ã¶ã¼ã®å
¥åãæ±ããå ´åãããã¾ãã ä¸æ¹ã ã¢ããªã±ã¼ã·ã§ã³ãµã¼ãã¼ãªã© GUI ã§ã¯ãªãç°å¢ã® <literal>callbackhandler</literal> ã®å®è£
ã¯åç´ã«ã¢ããªã±ã¼ã·ã§ã³ãµã¼ãã¼ API ã使ã£ã¦è¨¼ææ¸æ
å ±ãåå¾ããããããã¾ããã <literal>callbackhandler</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ã«ã¯å®è£
ããã¡ã½ãããã²ã¨ã¤ããã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:378
@@ -1320,6 +1605,9 @@
" throws java.io.IOException, \n"
" UnsupportedCallbackException;"
msgstr ""
+"void handle(Callback[] callbacks)\n"
+" throws java.io.IOException, \n"
+" UnsupportedCallbackException;"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:379
@@ -1337,17 +1625,18 @@
"does not understand how to use a <literal>Callback</literal> object passed "
"into the handle method, it throws an <literal>UnsupportedCallbackException</"
"literal> to abort the login call."
-msgstr ""
+msgstr "<literal>Callback</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ã¯æå¾ã«èª¬æããèªè¨¼ã¯ã©ã¹ã§ãã ããã©ã«ãã®å®è£
ãããã¤ãæä¾ããã¦ãããã®ç¨ã®ã¿ã°ã¤ã³ã¿ã¼ãã§ã¼ã¹ã§ã åã®ä¾ã§ä½¿ç¨ãã <literal>NameCallback</literal> ã <literal>PasswordCallback</literal> ãå«ãã§ãã¾ãã <literal>LoginModule</literal> 㯠<literal>Callback</literal> ã使ã£ã¦èªè¨¼ã¡ã«ããºã ã§å¿
è¦ã¨ãããæ
å ±ãè¦æ±ãã¾ãã èªè¨¼ã®ãã°ã¤ã³ãã§ã¼ãºã§ã <literal>LoginModule</literal> 㯠<literal>Callback</literal> ã®ã¢ã¬ã¤ãç´æ¥ã <literal>CallbackHandler.handle</literal> ã¡ã½ããã«æ¸¡ãã¾ãã <literal>callbackhandler</literal> ããã³ãã«ã¡ã½ããã«æ¸¡ããã <literal>Callback</literal> ãªãã¸ã§ã¯ãã®ä½¿ãæ¹ãããããªãå ´åã <literal>UnsupportedCallbackException</literal> ãæãã¦ãã°ã¤ã³ã³ã¼ã«ãä¸æ¢ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:391
#, no-c-format
msgid "The JBoss Security Model"
-msgstr ""
+msgstr "JBoss ã»ãã¥ãªãã£ã¢ãã«"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:392
#, no-c-format
+#, fuzzy
msgid ""
"Similar to the rest of the JBoss architecture, security at the lowest level "
"is defined as a set of interfaces for which alternate implementations may be "
@@ -1358,7 +1647,7 @@
"The_key_security_model_interfaces_and_their_relationship_to_the_JBoss_server_EJB_container_elements."
"\"/> shows a class diagram of the security interfaces and their relationship "
"to the EJB container architecture."
-msgstr ""
+msgstr "JBoss ã¢ã¼ããã¯ãã£ã®ä»ã®é¨åã¨åæ§ã æä½éã¬ãã«ã§ã®ã»ãã¥ãªãã£ã¯"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:396
@@ -1366,7 +1655,7 @@
msgid ""
"The key security model interfaces and their relationship to the JBoss server "
"EJB container elements."
-msgstr ""
+msgstr "éè¦ã¨ãªãã»ãã¥ãªãã£ã¢ãã«ã®ã¤ã³ã¿ã¼ãã§ã¼ã¹ããã³ãã® JBoss ãµã¼ãã¼ EJB ã³ã³ããã¨ã¬ã¡ã³ãã«å¯¾ããé¢é£æ§"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:403
@@ -1381,6 +1670,10 @@
"The_key_security_model_interfaces_and_their_relationship_to_the_JBoss_server_EJB_container_elements."
"\"/> are summarized in the following list."
msgstr ""
+"æ°´è²ã®ã¯ã©ã¹ç¾¤ã¯ã»ãã¥ãªãã£ã¤ã³ã¿ã¼ãã§ã¼ã¹ã表ãã é»è²ã®ã¯ã©ã¹ç¾¤ã¯ EJB ã³ã³ãã層ã表ãã¦ãã¾ãã J2EE ã»ãã¥ãªãã£ã¢ãã«ã®å®è£
ã«å¿
è¦ã¨ãªã 2 ã¤ã®ã¤ã³ã¿ã¼ãã§ã¼ã¹ã¯ <literal>org.jboss.security.AuthenticationManager</literal> 㨠<literal>org.jboss.security."
+"RealmMapping</literal> ã§ãã <xref linkend=\"The_JBoss_Security_Model-"
+"The_key_security_model_interfaces_and_their_relationship_to_the_JBoss_server_EJB_container_elements."
+"\"/> ã«ç¤ºãã¦ããã»ãã¥ãªãã£ã¤ã³ã¿ã¼ãã§ã¼ã¹ã®ãã¼ã«ã«ã¤ãã¦ã¯ä»¥ä¸ã®ä¸è¦§ã§è¦ç´ãã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:408
@@ -1394,7 +1687,7 @@
"is invoked to determine whether a user identity and associated credentials "
"as known in the operational environment are valid proof of the user's "
"identity."
-msgstr ""
+msgstr "<emphasis role=\"bold\">AuthenticationManager</emphasis>: ãã®ã¤ã³ã¿ã¼ãã§ã¼ã¹ã¯ principal ã«é¢é£ä»ããããç½²åæ¸ãæ¤è¨¼ããå½¹ç®ãæããã¾ãã principal ã¨ã¯ã¦ã¼ã¶ã¼åã éç¨è
çªå·ã ã½ã¼ã·ã£ã«ã»ãã¥ãªãã£çªå·ãªã©ã® ID ã¨ãªãã¾ãã 証æ証ã¯ãã¹ã¯ã¼ãã ã»ãã·ã§ã³ãã¼ã ãã¸ã¿ã«ç½²åãªã©ã® ID ã証æãããã®ã«ãªãã¾ãã <literal>isValid</literal> ã¡ã½ããã¯ãã®ç¨¼åç°å¢å
ã§æ¢ç¥ã®ã¦ã¼ã¶ã¼ ID ã¨é¢é£ã¥ãããã証ææ¸ãã¦ã¼ã¶ã¼ã® ID ã®æå¹ãªè¨¼æã¨ãªããã©ããã確å®ããããã«å¼ã³åºããã¾ãã "
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:413
@@ -1407,18 +1700,19 @@
"<literal>doesUserHaveRole</literal> method validates that the user identity "
"in the operation environment has been assigned the indicated role from the "
"application domain."
-msgstr ""
+msgstr "<emphasis role=\"bold\">RealmMapping</emphasis>: ãã®ã¤ã³ã¿ã¼ãã§ã¼ã¹ã¯ principal ãããã³ã°ã¨ãã¼ã«ãããã³ã°ãè¡ãã¾ãã <literal>getPrincipal</literal> ã¡ã½ããã¯ã¦ã¼ã¶ã¼ ID ã稼åç°å¢ã§æ¢ç¥ã¨ãã¦åãã ã¢ããªã±ã¼ã·ã§ã³ãã¡ã¤ã³ ID ãè¿ãã¾ãã <literal>doesUserHaveRole</literal> ã¡ã½ããã¯ç¨¼åç°å¢å
ã®ã¦ã¼ã¶ã¼ ID ãã¢ããªã±ã¼ã·ã§ã³ãã¡ã¤ã³ããæ示ããããã¼ã«ãå²ãå½ã¦ããã¦ãããã¨ãæ¤è¨¼ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:418
#, no-c-format
+#, fuzzy
msgid ""
"<emphasis role=\"bold\">SecurityProxy</emphasis>: This interface describes "
"the requirements for a custom <literal>SecurityProxyInterceptor</literal> "
"plugin. A <literal>SecurityProxy</literal> allows for the externalization of "
"custom security checks on a per-method basis for both the EJB home and "
"remote interface methods."
-msgstr ""
+msgstr "<emphasis role=\"bold\">SecurityProxy</emphasis>: ãã®ã¤ã³ã¿ã¼ãã§ã¼ã¹ã¯ã«ã¹ã¿ã ã® <literal>SecurityProxyInterceptor</literal> ãã©ã°ã¤ã³ã®è¦ä»¶ãè¨è¿°ãã¾ãã <literal>SecurityProxy</literal> ã¯"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:423
@@ -1428,7 +1722,7 @@
"subinterface of <literal>AuthenticationManager</literal> that adds accessor "
"methods for obtaining the security domain name of the security manager and "
"the current thread's authenticated <literal>Subject</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">SubjectSecurityManager</emphasis>: ã»ãã¥ãªãã£ç®¡çã®ã»ãã¥ãªãã£ãã¡ã¤ã³åããã³ç¾ã¹ã¬ããã®èªè¨¼ <literal>Subject</literal> ãåå¾ããããã®ã¢ã¯ã»ã¹æ©æ§ã¡ã½ããã追å ãã <literal>AuthenticationManager</literal> ã®ãµãã¤ã³ã¿ã¼ãã§ã¼ã¹ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:428
@@ -1443,7 +1737,7 @@
"TrustManagerFactory</literal> interfaces. This interface is a work in "
"progress that will be the basis of a multi-domain security architecture that "
"will better support ASP style deployments of applications and resources."
-msgstr ""
+msgstr "<emphasis role=\"bold\">SecurityDomain</emphasis>: <literal>AuthenticationManager</literal>ã <literal>RealmMapping</literal>ã <literal>SubjectSecurityManager</literal> ã®ã¤ã³ã¿ã¼ãã§ã¼ã¹ã®æ¡å¼µã§ãã JAAS Subject ããã¼ã¹ã¨ããç·åçãªã»ãã¥ãªãã£ã¤ã³ã¿ã¼ãã§ã¼ã¹ã¸ã®åãã§ããã <literal>java.security.KeyStore</literal>ã JSSE <literal>com.sun.net.ssl.KeyManagerFactory</literal>ã <literal>com.sun.net.ssl.TrustManagerFactory</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ã«ãªãã¾ãã ãã®ã¤ã³ã¿ã¼ãã§ã¼ã¹ã¯æªå®æã§ããã ã¢ããªã±ã¼ã·ã§ã³ããªã½ã¼ã¹ã® ASP ã¹ã¿ã¤ã«ã®éçºããµãã¼ããããã«ããã¡ã¤ã³ã»ãã¥ãªãã£ã¢ã¼ããã¯ãã£ã®åºç¤ã¨ãªãäºå®ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:433
@@ -1467,6 +1761,16 @@
"The_relationship_between_the_JBossSX_framework_implementation_classes_and_the_JBoss_server_EJB_container_layer."
"\"/>."
msgstr ""
+"<literal>AuthenticationManager</literal>ã <literal>RealmMapping</literal>ã <literal>SecurityProxy</literal> ã®åã¤ã³ã¿ã¼ãã§ã¼ã¹ã«ã¯ JAAS é¢é£ã®ã¯ã©ã¹ã«å¯¾ããé¢é£æ§ã¯ãªãã®ã§æ³¨æãã¦ãã ããã JBossSX ãã¬ã¼ã ã¯ã¼ã¯ã¯ JAAS ã«å¤§ããä¾åãã¾ããã J2EE ã»ãã¥ãªãã£ã¢ãã«ã®å®è£
ã«è¦ãããåºæ¬çãªã»ãã¥ãªãã£ã¤ã³ã¿ã¼ãã§ã¼ã¹ã¯ä¾åãã¾ããã JBossSX ãã¬ã¼ã ã¯ã¼ã¯ã¯ JAAS ããã¼<xref "
+"linkend=\"The_JBoss_Security_Model-"
+"The_relationship_between_the_JBossSX_framework_implementation_classes_and_the_JBoss_server_EJB_container_layer."
+"\"/>ã¹ã¨ããåºæ¬çãªã»ãã¥ãªãã£ãã©ã°ã¤ã³ã¤ã³ã¿ã¼ãã§ã¼ã¹ã®åãªãå®è£
ã§ãã ããã«ã¤ãã¦ã¯ <xref "
+"linkend=\"The_JBoss_Security_Model-"
+"The_relationship_between_the_JBossSX_framework_implementation_classes_and_the_JBoss_server_EJB_container_layer."
+"\"/> ã®ã³ã³ãã¼ãã³ãå³ã§ç¤ºãã¾ãã ãã®ãã©ã°ã¤ã³ã¢ã¼ããã¯ãã£ã®çµæã ãã®ããã«æãã° JAAS ã使ç¨ããªãç¬èªã®ã«ã¹ã¿ã ã»ãã¥ãªãã£ç®¡çå®è£
㧠JAAS ãã¼ã¹ã® JBossSX å®è£
ã¯ã©ã¹ãèªç±ã«ç½®ãæãããã¨ãã§ããããã«ãªãã¾ãã ç½®ãæããæ¹æ³ã«ã¤ãã¦ã¯ã <xref "
+"linkend=\"The_JBoss_Security_Model-"
+"The_relationship_between_the_JBossSX_framework_implementation_classes_and_the_JBoss_server_EJB_container_layer."
+"\"/> 㧠JBossSX ã®è¨å®ã«ä½¿ç¨ã§ãã JBossSX MBean ã確èªãã¦ãã ããã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:437
@@ -1474,7 +1778,7 @@
msgid ""
"The relationship between the JBossSX framework implementation classes and "
"the JBoss server EJB container layer."
-msgstr ""
+msgstr "JBossSX ãã¬ã¼ã ã¯ã¼ã¯å®è£
ã®ã¯ã©ã¹ç¾¤ã¨ JBoss ãµã¼ãã¼ EJB ã³ã³ãã層ã¨ã®é¢ä¿"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:445
@@ -1495,6 +1799,10 @@
"xml_deployment_descriptors.\"/> shows the JBoss-specific EJB and web "
"application deployment descriptor's security-related elements."
msgstr ""
+"æ¬ç« ã®åé ã§ã® J2EE æ¨æºã»ãã¥ãªãã£ã¢ãã«ã®èª¬æã¯ã ã»ãã¥ãªãã£ãæå¹ã«ããããã« JBoss ãµã¼ãã¼åºæã®ãããã¤ã¡ã³ãè¨è¿°åã使ç¨ããå ´åã®è¦ä»¶ã説æãã¦çµäºãã¾ããã ãã®è¨å®ã«é¢ãã詳細ãããã«è¨ãã¾ãã <xref linkend="
+"\"Enabling_Declarative_Security_in_JBoss_Revisited-"
+"The_security_element_subsets_of_the_JBoss_server_jboss.xml_and_jboss_web."
+"xml_deployment_descriptors.\"/> ã§ã¯ã JBoss åºæã® EJB ããã³ ã¦ã§ãã¢ããªã±ã¼ã·ã§ã³ã®ãããã¤ã¡ã³ãè¨è¿°åã®ã»ãã¥ãªãã£é¢é£ã¨ã¬ã¡ã³ãã示ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:450
@@ -1502,7 +1810,7 @@
msgid ""
"The security element subsets of the JBoss server jboss.xml and jboss-web.xml "
"deployment descriptors."
-msgstr ""
+msgstr "JBoss ãµã¼ãã¼ã® jboss.xml 㨠jboss-web.xml ã®åãããã¤ã¡ã³ãè¨è¿°åã®ã»ãã¥ãªãã£ã¨ã¬ã¡ã³ãã®ãµãã»ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:457
@@ -1516,7 +1824,7 @@
"domain in effect for all EJBs in the deployment unit. This is the typical "
"usage because mixing security managers within a deployment unit complicates "
"inter-component operation and administration."
-msgstr ""
+msgstr "<literal>security-domain</literal> ã¨ã¬ã¡ã³ãã®å¤ã¯ JBoss ã EJB ããã³ã¦ã§ãã³ã³ããç¨ã«ä½¿ç¨ããã»ãã¥ãªãã£ç®¡çã¤ã³ã¿ã¼ãã§ã¼ã¹å®è£
ã® JNDI åãæå®ãã¾ãã <literal>AuthenticationManager</literal> ããã³ <literal>RealmMapping</literal> ã®ä¸¡ã¤ã³ã¿ã¼ãã§ã¼ã¹ãå®è£
ãããªãã¸ã§ã¯ãã§ãã ãããã¬ãã«ã®ã¨ã¬ã¡ã³ãã¨ãã¦æå®ããã¨ã å°å
¥ã¦ãããå
ã®ãã¹ã¦ã® EJB ã«å¯¾ãã¦æ¡ç¨ãããã»ãã¥ãªãã£ãã¡ã¤ã³ãå®ç¾©ãã¾ãã 1 å°å
¥ã¦ãããå
ã§è¤æ°ã®ã»ãã¥ãªãã£ç®¡çãæ··å¨ãããã¨å
é¨ã³ã³ãã¼ãã³ãã®åä½ã管çãè¤éã«ãªãããã ãããä¸è¬çãªä½¿ç¨æ¹æ³ã¨ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:460
@@ -1525,7 +1833,7 @@
"To specify the security domain for an individual EJB, you specify the "
"<literal>security-domain</literal> at the container configuration level. "
"This will override any top-level security-domain element."
-msgstr ""
+msgstr "åå¥ EJB ã«å¯¾ãã¦ã»ãã¥ãªãã£ãã¡ã¤ã³ãæå®ããã«ã¯ã ã³ã³ããã®è¨å®ã¬ãã«ã§ <literal>security-domain</literal> ãæå®ãã¾ãã ããã¯ãããã¬ãã«ã® security-domain ã¨ã¬ã¡ã³ããä¸æ¸ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:463
@@ -1540,7 +1848,7 @@
"target EJB to obtain a non-null <literal>Principal</literal> for the caller "
"using the <literal>getUserPrincipal</literal> method. This is a J2EE "
"specification requirement."
-msgstr ""
+msgstr "<literal>unauthenticated-principal</literal> ã¨ã¬ã¡ã³ãã¯èªè¨¼ã®ãªãã¦ã¼ã¶ã¼ã EJB ãå¼ã³åºããå ´åã« <literal>EJBContext.getUserPrincipal</literal> ã¡ã½ããã«ãã£ã¦è¿ããã <literal>Principal</literal> ãªãã¸ã§ã¯ãã«ä½¿ç¨ããååãæå®ãã¾ãã ããã¯èªè¨¼ã®ãªãå¼ã³åºãå´ã«ç¹æ®ãªãã¼ããã·ã§ã³ãä¸ãããã®ã§ã¯ãªãã®ã§æ³¨æãã¦ãã ããã 主ãªç®çã¯ã å®å
¨ã§ã¯ãªããµã¼ãã¬ããããã³ JSP ãã¼ã¸ãå®å
¨ã§ã¯ãªã EJB ãå¼ã³åºãã ç®çã® EJB ã« <literal>getUserPrincipal</literal> ã¡ã½ããã使ã£ã¦å¼ã³åºãå´ã® null ã§ã¯ãªã <literal>Principal</literal> ãåå¾ããããã¨ãã§ããããã«ãããã¨ã§ãã ãã㯠J2EE ä»æ§è¦ä»¶ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:466
@@ -1559,7 +1867,7 @@
"The <literal>org.jboss.security.SubjectSecurityProxy</literal> is an example "
"<literal>SecurityProxy</literal> implementation used by the default JBossSX "
"installation."
-msgstr ""
+msgstr "<literal>security-proxy</literal> ã¨ã¬ã¡ã³ãã¯ã ã»ãã¥ãªãã£è«çã EJB å®è£
ã«çµã¿è¾¼ããã¨ãªã EJB 宣è¨åã»ãã¥ãªãã£ã¢ãã«ã®ç¯å²ãè¶ããã»ãã¥ãªãã£ãã§ãã¯ãè¦æ±ãã¨ã«è¨±å¯ããã«ã¹ã¿ã ã®ã»ãã¥ãªãã£ãããã·å®è£
ãèå¥ãã¾ãã <literal>org.jboss.security.SecurityProxy</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ã®å®è£
ã ãããã¯å
±éã¤ã³ã¿ã¼ãã§ã¼ã¹ãã¾ã£ããå®è£
ãããã¨ãªãå®å
¨åãå³ã EJB ã®ãã¼ã«ã«ã¤ã³ã¿ã¼ãã§ã¼ã¹ã ãã¼ã«ã«ãã¼ã ã ãªã¢ã¼ãã ãããã¯ãã¼ã å
ã§ã¡ã½ãããå®è£
ããåãªããªãã¸ã§ã¯ãã§ãããã¾ãã ç¹å®ã®ã¯ã©ã¹ã <literal>SecurityProxy</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ãå®è£
ããªãå ´åã ã¤ã³ã¹ã¿ã³ã¹ã¯ã¡ã½ããã®å¼ã³åºãããã®ãªãã¸ã§ã¯ãã«å§ä»»ãã <literal>SecurityProxy</literal> å®è£
å
ã«ã©ãããããªããã°ãªãã¾ãã!
ã <literal>org.jboss.security.SubjectSecurityProxy</literal> ã¯ããã©ã«ãã® JBossSX ã¤ã³ã¹ãã¼ã«ã§ä½¿ç¨ããã <literal>SecurityProxy</literal> å®è£
ä¾ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:469
@@ -1578,6 +1886,11 @@
"\"/>, and the full source code is available in the <literal>src/main/org/"
"jboss/book/security/ex1</literal> directory of the book examples."
msgstr ""
+"å¹³å¡ãªã¹ãã¼ãã¬ã¹ã»ãã·ã§ã³ bean ã®ã³ã³ããã¹ãã®ã«ã¹ã¿ã <literal>SecurityProxy</literal> ã®ä¾ãè¦ã¦ã¿ã¾ãã ã«ã¹ã¿ã <literal>SecurityProxy</literal> 㯠bean ã® <literal>echo</literal> ã¡ã½ããããã®å¼æ°ã¨ã㦠4 æåã®åèªã使ã£ã¦å¼ã³åºããè¡ãè
ãããªããã¨ãæ¤è¨¼ãã¾ãã ã»ãã¥ãªãã£ã³ã³ããã¹ãã¯ã¡ã½ããã®å¼æ°ã§ããå¼ã³åºãå´ã®ããããã£ã§ã¯ãªãããã <literal>FourLetterEchoInvoker</literal> ãã¼ã«ãå®ç¾©ã§ããªãã®ã§ã ããã¯ãã¼ã«ãã¼ã¹ã®ã»ãã¥ãªãã£ã§ã¯ã§ããªããã§ãã¯ã«ãªãã¾ãã ã«ã¹ã¿ã <literal>SecurityProxy</literal> ã®ã³ã¼ãã <xref linkend="
+"\"Enabling_Declarative_Security_in_JBoss_Revisited-"
+"The_example_1_custom_EchoSecurityProxy_implementation_that_enforces_the_echo_argument_based_security_constraint."
+"\"/> ã«ç¤ºãã¾ãã å®å
¨ãªã½ã¼ã¹ã³ã¼ãã¯ããã¯ãµã³ãã«ã® <literal>src/main/org/"
+"jboss/book/security/ex1</literal> ãã£ã¬ã¯ããªãã覧ãã ããã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:472
@@ -1585,7 +1898,7 @@
msgid ""
"The example 1 custom EchoSecurityProxy implementation that enforces the echo "
"argument-based security constraint."
-msgstr ""
+msgstr "ä¾ 1ã echo å¼æ°ãã¼ã¹ã®ã»ãã¥ãªãã£å¶éãå¼·å¶å®è¡ããã«ã¹ã¿ã EchoSecurityProxy å®è£
"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:473
@@ -1654,6 +1967,68 @@
" }\n"
"}"
msgstr ""
+"package org.jboss.book.security.ex1;\n"
+" \n"
+"import java.lang.reflect.Method;\n"
+"import javax.ejb.EJBContext;\n"
+" \n"
+"import org.apache.log4j.Category;\n"
+" \n"
+"import org.jboss.security.SecurityProxy;\n"
+" \n"
+"/** A simple example of a custom SecurityProxy implementation\n"
+" * that demonstrates method argument based security checks.\n"
+" * @author Scott.Stark at jboss.org\n"
+" * @version $Revision: 1.12 $\n"
+" */\n"
+"public class EchoSecurityProxy implements SecurityProxy\n"
+"{\n"
+" Category log = Category.getInstance(EchoSecurityProxy.class);\n"
+" Method echo;\n"
+" \n"
+" public void init(Class beanHome, Class beanRemote,\n"
+" Object securityMgr)\n"
+" throws InstantiationException\n"
+" {\n"
+" log.debug(\"init, beanHome=\"+beanHome\n"
+" + \", beanRemote=\"+beanRemote\n"
+" + \", securityMgr=\"+securityMgr);\n"
+" // Get the echo method for equality testing in invoke\n"
+" try {\n"
+" Class[] params = {String.class};\n"
+" echo = beanRemote.getDeclaredMethod(\"echo\", params);\n"
+" } catch(Exception e) {\n"
+" String msg = \"Failed to finde an echo(String) method\";\n"
+" log.error(msg, e);\n"
+" throw new InstantiationException(msg);\n"
+" }\n"
+" }\n"
+" \n"
+" public void setEJBContext(EJBContext ctx)\n"
+" {\n"
+" log.debug(\"setEJBContext, ctx=\"+ctx);\n"
+" }\n"
+" \n"
+" public void invokeHome(Method m, Object[] args)\n"
+" throws SecurityException\n"
+" {\n"
+" // We don't validate access to home methods\n"
+" }\n"
+"\n"
+" public void invoke(Method m, Object[] args, Object bean)\n"
+" throws SecurityException\n"
+" {\n"
+" log.debug(\"invoke, m=\"+m);\n"
+" // Check for the echo method\n"
+" if (m.equals(echo)) {\n"
+" // Validate that the msg arg is not 4 letter word\n"
+" String arg = (String) args[0];\n"
+" if (arg == null || arg.length() == 4)\n"
+" throw new SecurityException(\"No 4 letter words\");\n"
+" }\n"
+" // We are not responsible for doing the invoke\n"
+" }\n"
+"}"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:474
@@ -1686,6 +2061,10 @@
"xml_descriptor_which_configures_the_EchoSecurityProxy_as_the_custom_security_proxy_for_the_EchoBean."
"\"/>."
msgstr ""
+"<literal>EchoSecurityProxy</literal> ã <literal>EchoBean</literal> ã®ã«ã¹ã¿ã ãããã·ã¨ãã¦ã¤ã³ã¹ãã¼ã«ããé¢é£ã¥ãããã <literal>jboss.xml</literal> è¨è¿°åã <xref linkend="
+"\"Enabling_Declarative_Security_in_JBoss_Revisited-The_jboss."
+"xml_descriptor_which_configures_the_EchoSecurityProxy_as_the_custom_security_proxy_for_the_EchoBean."
+"\"/> ã«ç¤ºãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:480
@@ -1693,7 +2072,7 @@
msgid ""
"The jboss.xml descriptor, which configures the EchoSecurityProxy as the "
"custom security proxy for the EchoBean."
-msgstr ""
+msgstr "EchoBean ã®ã«ã¹ã¿ã ã»ãã¥ãªãã£ãããã·ã¨ã㦠EchoSecurityProxy ãè¨å®ãã jboss.xml è¨è¿°å"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:481
@@ -1711,6 +2090,17 @@
" </enterprise-beans>\n"
"</jboss>"
msgstr ""
+"<jboss>\n"
+" <security-domain>java:/jaas/other</security-domain>\n"
+" \n"
+" <enterprise-beans>\n"
+" <session>\n"
+" <ejb-name>EchoBean</ejb-name>\n"
+" <security-proxy>org.jboss.book.security.ex1."
+"EchoSecurityProxy</security-proxy>\n"
+" </session>\n"
+" </enterprise-beans>\n"
+"</jboss>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:482
@@ -1720,6 +2110,8 @@
"<literal>EchoBean.echo</literal> method with the arguments <literal>Hello</"
"literal> and <literal>Four</literal> as illustrated in this fragment:"
msgstr ""
+"次ã«ç¤ºãããã«ã <literal>EchoBean.echo</literal> ã¡ã½ãããå¼æ° <literal>Hello</"
+"literal> 㨠<literal>Four</literal> ã§å¼ã³åºããã¨ããã¯ã©ã¤ã¢ã³ããå®è¡ãã¦ã«ã¹ã¿ã ãããã·ããã¹ããã¦ã¿ã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:485
@@ -1744,6 +2136,24 @@
" }\n"
"}"
msgstr ""
+"public class ExClient\n"
+"{\n"
+" public static void main(String args[])\n"
+" throws Exception\n"
+" {\n"
+" Logger log = Logger.getLogger(\"ExClient\");\n"
+" log.info(\"Looking up EchoBean\");\n"
+"\n"
+" InitialContext iniCtx = new InitialContext();\n"
+" Object ref = iniCtx.lookup(\"EchoBean\");\n"
+" EchoHome home = (EchoHome) ref;\n"
+" Echo echo = home.create();\n"
+"\n"
+" log.info(\"Created Echo\");\n"
+" log.info(\"Echo.echo('Hello') = \"+echo.echo(\"Hello\"));\n"
+" log.info(\"Echo.echo('Four') = \"+echo.echo(\"Four\"));\n"
+" }\n"
+"}"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:486
@@ -1752,7 +2162,7 @@
"The first call should succeed, while the second should fail due to the fact "
"that <literal>Four</literal> is a four-letter word. Run the client as "
"follows using Ant from the examples directory:"
-msgstr ""
+msgstr "æåã®ã³ã¼ã«ã¯æåããã¯ãã§ãã 2 çªç®ã®ã³ã¼ã«ã¯ <literal>Four</literal> ã 4 æåã®åèªã§ãããã失æããã¯ãã§ãã examples ãã£ã¬ã¯ããªãã Ant ã使ã£ã¦æ¬¡ã®ããã«ã¯ã©ã¤ã¢ã³ããå®è¡ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:489
@@ -1772,6 +2182,19 @@
" [java] Caused by: java.lang.SecurityException: No 4 letter words\n"
"..."
msgstr ""
+"[examples]$ ant -Dchap=security -Dex=1 run-example\n"
+"run-example1:\n"
+"...\n"
+" [echo] Waiting for 5 seconds for deploy...\n"
+" [java] [INFO,ExClient] Looking up EchoBean\n"
+" [java] [INFO,ExClient] Created Echo\n"
+" [java] [INFO,ExClient] Echo.echo('Hello') = Hello\n"
+" [java] Exception in thread \"main\" java.rmi.AccessException: "
+"SecurityException; nested exception is: \n"
+" [java] java.lang.SecurityException: No 4 letter words\n"
+"...\n"
+" [java] Caused by: java.lang.SecurityException: No 4 letter words\n"
+"..."
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:490
@@ -1784,13 +2207,13 @@
"exception is that the <literal>SecurityException(\"No 4 letter words\")</"
"literal> generated by the <literal>EchoSecurityProxy</literal> was thrown to "
"abort the attempted method invocation as desired."
-msgstr ""
+msgstr "<literal>echo('Hello')</literal> ã¡ã½ããã®ã³ã¼ã«ã¯æå¾
éãæåãã <literal>echo('Four')</literal> ã¡ã½ããã®ã³ã¼ã«ã¯ä¹±éãªè¡¨ç¤ºã¨ãªãä¾å¤ã«ãªãã ãããæå¾
éãã§ãã ä¸è¨ã®åºåã¯ç´é¢ã®å¶ç´ä¸ã çç¥ããã¦ãã¾ãã ãã®ä¾å¤ã§éè¦ã¨ãªãé¨åã¯ã å¸æéã試è¡ãããã¡ã½ããå¼ã³åºããä¸æ¢ãããã <literal>EchoSecurityProxy</literal> ã«ãã£ã¦çæããã <literal>SecurityException(\"No 4 letter words\")</literal> ãæããããã¨ããé¨åã§ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:498
#, no-c-format
msgid "The JBoss Security Extension Architecture"
-msgstr ""
+msgstr "JBoss ã»ãã¥ãªãã£æ¡å¼µã¢ã¼ããã¯ãã£"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:499
@@ -1805,7 +2228,7 @@
"or LDAP server to a sophisticated security software suite. The integration "
"flexibility is achieved using the pluggable authentication model available "
"in the JAAS framework."
-msgstr ""
+msgstr "åè¿°ã®ä¸è¬ç㪠JBoss ã»ãã¥ãªãã£å±¤ã«ã¤ãã¦ã®èª¬æã§ã¯ã JBossSX ã»ãã¥ãªãã£æ¡å¼µãã¬ã¼ã ã¯ã¼ã¯ã¯ã»ãã¥ãªãã£å±¤ã¤ã³ã¿ã¼ãã§ã¼ã¹ã®å®è£
ã§ããã¨è¨è¼ãã¦ãã¾ãã ãã㯠JBossSX ãã¬ã¼ã ã¯ã¼ã¯ã®ä¸»è¦ãªç®çã¨ãªãã¾ãã å®è£
ã®è©³ç´°ã¯ã æ¢åã®ã»ãã¥ãªãã£ã¤ã³ãã©ã¹ãã©ã¯ãã£ã«çµ±åããéã®ã«ã¹ã¿ãã¤ãºãå¤æ§ã§ããç¹ã§èå³æ·±ããã®ãããã¾ãã ã»ãã¥ãªãã£ã¤ã³ãã©ã¹ãã©ã¯ãã£ã¯ãã¼ã¿ãã¼ã¹ã LDAP ãµã¼ãã¼ããé«åº¦ãªã»ãã¥ãªãã£ã½ããã¦ã§ã¢ã¹ã£ã¼ãã¾ã§ãªãã§ãæ§ãã¾ããã JAAS ãã¬ã¼ã ã¯ã¼ã¯ã®ãã©ã°å¯è½ãªèªè¨¼ã¢ãã«ã使ç¨ããã¨æè»æ§ã®ããçµ±åãå®ç¾ã§ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:502
@@ -1820,6 +2243,10 @@
"the EJB and web container layers based on the <literal>security-domain</"
"literal> element of the corresponding component deployment descriptor."
msgstr ""
+"JBossSX ãã¬ã¼ã ã¯ã¼ã¯ã®å¿èé¨å㯠<literal>org.jboss.security.plugins."
+"JaasSecurityManager</literal> ã§ãã ãã㯠<literal>AuthenticationManager</literal> 㨠<literal>RealmMapping</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ã®ããã©ã«ãå®è£
ã«ãªãã¾ãã <xref linkend=\"The_JBoss_Security_Extension_Architecture-"
+"The_relationship_between_the_security_domain_component_deployment_descriptor_value_the_component_container_and_the_JaasSecurityManager."
+"\"/> ã§ã¯ã <literal>JaasSecurityManager</literal> ã該å½ã³ã³ãã¼ãã³ããããã¤ã¡ã³ãè¨è¿°åã® <literal>security-domain</literal> ã¨ã¬ã¡ã³ãããã¼ã¹ã¨ãã EJB ããã³ã¦ã§ãã³ã³ããã®å±¤ã«ã©ã®ããã«çµ±ååãè¡ããã示ãã¦ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:506
@@ -1844,7 +2271,7 @@
"perform its role. When a secured component is requested, the security "
"interceptor delegates security checks to the security manager instance "
"associated with the container."
-msgstr ""
+msgstr "ã»ãã¥ãªãã£ãã¡ã¤ã³ <literal>jwdomain</literal> ã®é
ä¸ã§å®å
¨åããã EJB ããã³ã¦ã§ãã³ã³ãã³ãã®ä¸¡æ¹ãå«ãã¨ã³ã¿ã¼ãã©ã¤ãºã¢ããªã±ã¼ã·ã§ã³ã示ãã¦ãã¾ãã EJB ããã³ã¦ã§ãã³ã³ããã«ã¯ã»ãã¥ãªãã£ã¤ã³ã¿ã¼ã»ãã¿ãå«ãè¦æ±ã¤ã³ã¿ã¼ã»ãã¿ã¢ã¼ããã¯ãã£ãããã ã³ã³ããã»ãã¥ãªãã£ã¢ãã«ãå¼·å¶å®æ½ãã¾ãã å°å
¥æã«ã <literal>jboss.xml</literal> 㨠<literal>jboss-web.xml</literal> è¨è¿°åã® <literal>security-domain</literal> ã¨ã¬ã¡ã³ãå¤ãã³ã³ããã«é¢é£ä»ããããã»ãã¥ãªãã£ç®¡çã¤ã³ã¹ã¿ã³ã¹ãåå¾ããããã«ä½¿ç¨ããã¾ãã 次ã«ã»ãã¥ãªãã£ã¤ã³ã¿ã¼ã»ãã¿ã¯ã»ãã¥ãªãã£ç®¡çã使ã£ã¦ãã®ãã¼ã«ãå®è¡ãã¾ãã ã»ãã¥ã¢ãªã³ã³ãã¼ãã³ããè¦æ±ãããã¨ã ã»ãã¥ãªãã£ã¤ã³ã¿ã¼ã»ãã¿ã¯ã»ãã¥ãªãã£ãã§ãã¯ãã³ã³ããã!
«é¢é£ã¥ããããã»ãã¥ãªãã£ç®¡çã¤ã³ã¹ã¿ã³ã¹ã«å§ä»»ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:516
@@ -1858,16 +2285,19 @@
"<literal>JaasSecurityManager</literal> implementation and its use of JAAS in "
"the following section."
msgstr ""
+"JBossSX <literal>JaasSecurityManager</literal> å®è£
ã¯ã <literal>security-"
+"domain</literal> ã¨ã¬ã¡ã³ãå¤ã¨ä¸è´ããååã®é
ä¸ã«è¨å®ããã JAAS ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®å®è¡ã«ãã£ã¦å¾ããã <literal>Subject</literal> ã¤ã³ã¹ã¿ã³ã¹ã«é¢é£ã¥ããããæ
å ±ãå
ã«ã»ãã¥ãªãã£ãã§ãã¯ãè¡ãã¾ãã 次ã®ã»ã¯ã·ã§ã³ã§ã¯ <literal>JaasSecurityManager</literal> å®è£
ã¨ãã® JAAS ã®ä½¿ç¨ã«ã¤ãã¦è©³ããè¦ã¦ããã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:520
#, no-c-format
msgid "How the JaasSecurityManager Uses JAAS"
-msgstr ""
+msgstr "JaasSecurityManager ã«ãã JAAS ã®ä½¿ç¨æ¹æ³"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:521
#, no-c-format
+#, fuzzy
msgid ""
"The <literal>JaasSecurityManager</literal> uses the JAAS packages to "
"implement the <literal>AuthenticationManager</literal> and "
@@ -1879,7 +2309,7 @@
"mapping behavior. Thus, you can use the <literal>JaasSecurityManager</"
"literal> across different security domains simply by plugging in different "
"login module configurations for the domains."
-msgstr ""
+msgstr "<literal>JaasSecurityManager</literal> 㯠JAAS ããã±ã¼ã¸ç¾¤ã使ã£ã¦ <literal>AuthenticationManager</literal> ããã³ <literal>RealmMapping</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹åä½ãå®è£
ãã¾ãã ç¹ã«ã ãã®åä½ã¯ã»ãã¥ãªãã£ãã¡ã¤ã³ã«ä¸è´ããååé
ä¸ã§è¨å®ããããã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®ã¤ã³ã¹ã¿ã³ã¹ã®å®è¡ããå²ãå½ã¦ããã¦ãã <literal>JaasSecurityManager</literal> "
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:524
@@ -1894,7 +2324,7 @@
"assigned a security domain named <literal>jwdomain</literal> using the "
"<literal>jboss.xml</literal> descriptor <literal>security-domain</literal> "
"element."
-msgstr ""
+msgstr "JAAS èªè¨¼ããã»ã¹ã«ããã <literal>JaasSecurityManager</literal> ã®ä½¿ç¨è©³ç´°ã説æããããã EJB ãã¼ã ã¡ã½ããå¼ã³åºãã®ã¯ã©ã¤ã¢ã³ãå¼ã³åºããè¦ã¦ããã¾ãã åææ¡ä»¶ã¨ãªãè¨å®ã¯ã EJB ã JBoss ãµã¼ãã¼å
ã«å°å
¥ããã¦ãã¦ã ãã®ãã¼ã ã¤ã³ã¿ã¼ãã§ã¼ã¹ã¡ã½ããã <literal>ejb-jar.xml</literal> è¨è¿°åå
ã® <literal>method-permission</literal> ã¨ã¬ã¡ã³ãã使ã£ã¦å®å
¨ã«ããã¦ãããã¨ã ã¾ã <literal>jboss.xml</literal> è¨è¿°å <literal>security-domain</literal> ã¨ã¬ã¡ã³ãã使ã£ã¦ <literal>jwdomain</literal> ã¨ããååã®ã»ãã¥ãªãã£ãã¡ã¤ã³ãå²ãå½ã¦ããã¦ãããã¨ã«ãªãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:528
@@ -1902,7 +2332,7 @@
msgid ""
"An illustration of the steps involved in the authentication and "
"authorization of a secured EJB home method invocation."
-msgstr ""
+msgstr "å®å
¨åãå³ããã EJB ãã¼ã ã¡ã½ããå¼ã³åºãã®èªè¨¼ã¨æ¿èªã«é¢é£ããæé ã®å³è§£"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:535
@@ -1910,7 +2340,7 @@
msgid ""
"provides a view of the client to server communication we will discuss. The "
"numbered steps shown are:"
-msgstr ""
+msgstr "ãããã説æããã¯ã©ã¤ã¢ã³ããããµã¼ãã¼ã¸ã®éä¿¡ãå³è§£ãã¦ãã¾ãã ã¹ãããçªå·ãã¨ä»¥ä¸ã«ç¤ºãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:540
@@ -1935,6 +2365,9 @@
"later authentication on the server. The identity of the client is not "
"authenticated on the client."
msgstr ""
+"ã¯ã©ã¤ã¢ã³ãã¯ã¾ã JAAS ãã°ã¤ã³ãè¡ãèªè¨¼ã«å¯¾ã㦠principal ã¨è¨¼ææ¸ã確ç«ããªããã°ãªãã¾ããã å³ã§ã¯ <emphasis>Client Side Login (ã¯ã©ã¤ã¢ã³ãå´ã®ãã°ã¤ã³)</emphasis> ã¨è¨ããã¦ãã¾ãã ããã JBoss ã§ã¯ã©ã¤ã¢ã³ãããã®ãã°ã¤ã³ ID ã確ç«ããæ¹æ³ã§ãã JNDI "
+"<literal>InitialContext</literal> ããããã£çµç±ã§ãã°ã¤ã³æ
å ±ãæ示ãããµãã¼ããå¥ã®è¨å®ã§æä¾ããã¾ãã JAAS ãã°ã¤ã³ã«ãã <literal>LoginContext</"
+"literal> ã®ä½æã 使ç¨ããè¨å®åã渡ããããã¨ã«ãªãã¾ãã ãã® 1 度ããã®ãã°ã¤ã³ã¯ãã°ã¤ã³ã® principal ã¨è¨¼ææ¸ãå¾ã«ç¶ããã¹ã¦ã® EJB ã¡ã½ããå¼ã³åºãã«é¢é£ä»ãã¾ãã ãã®ããã»ã¹ã¯ã¦ã¼ã¶ã¼ãèªè¨¼ããªãå ´åãããã®ã§æ³¨æãã¦ãã ããã ã¯ã©ã¤ã¢ã³ãå´ã®ãã°ã¤ã³ã®æ§è³ªã¯ã¯ã©ã¤ã¢ã³ãã使ç¨ãããã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®è¨å®ã«ä¾åãã¾ãã ãã®ä¾ã§ã¯ã <literal>other</literal> ã¯ã©ã¤ã¢ã³ãå´ãã°ã¤ã³è¨å®ã¨ã³ããªã¯ <literal>ClientLoginModule</literal> ã¢ã¸ã¥ã¼ã« (<literal>org.jboss.security.ClientLoginModule</literal>) ã使ç¨ããããè¨å®ããã¦ãã¾ãã ããã¯åç´ã«ãµã¼ãã¼ä¸ã§å¾ã»ã©è¡ãããèªè¨¼ç¨ã«ã¦ã¼ã¶ã¼åã¨ãã¹ã¯ã¼ãã JBoss EJB å¼ã³åºã層ã«ãã¤ã³ãããããã©ã«ãã®ã¯ã©ã¤ã¢ã³ãå´ã¢ã¸ã¥ã¼ã«ã§ãã ã¯ã©ã¤ã¢ã³ãã® ID ã¯ã¯ã©ã!
¤ã¢ã³ãä¸ã§ã¯èªè¨¼ããã¾ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:545
@@ -1946,16 +2379,17 @@
"server. The invocation includes the method arguments passed by the client "
"along with the user identity and credentials from the client-side JAAS login "
"performed in step 1."
-msgstr ""
+msgstr "å¾åã ã¯ã©ã¤ã¢ã³ã㯠EJB ãã¼ã ã¤ã³ã¿ã¼ãã§ã¼ã¹ãåå¾ãã¦ãã bean ã®ä½æã試è¡ãã¾ãã ãã®ã¤ãã³ãã«ã¯ <emphasis>Home Method Invocation</emphasis> ã®ã©ãã«ãä»ãããã¾ãã ãã®çµæã ãã¼ã ã¤ã³ã¿ã¼ãã§ã¼ã¹ã®ã¡ã½ããå¼ã³åºãã JBoss ãµã¼ãã¼ã«éä¿¡ããããã¨ã«ãªãã¾ãã å¼ã³åºãã«ã¯ã ã¹ããã 1 ã§è¡ãããã¯ã©ã¤ã¢ã³ãå´ JAAS ãã°ã¤ã³ããã®ã¦ã¼ã¶ã¼ ID ããã³è¨¼ææ¸ã¨å
±ã«ã¯ã©ã¤ã¢ã³ãã«ãã£ã¦æ¸¡ãããã¡ã½ããã®å¼æ°ãå«ã¾ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:550
#, no-c-format
+#, fuzzy
msgid ""
"On the server side, the security interceptor first requires authentication "
"of the user invoking the call, which, as on the client side, involves a JAAS "
"login."
-msgstr ""
+msgstr "ãµã¼ãã¼å´ã§ã¯ã æåã«ã»ãã¥ãªãã£ã¤ã³ã¿ã¼ã»ãã¿ãã¦ã¼ã¶ã¼å¼ã³åºãã³ã¼ã«ã®èªè¨¼ãå¿
è¦ã¨ãã ããã¯ã¯ã©ã¤ã¢ã³ãå´ã§ã¯ JAAS ãã°ã¤ã³ãå¿
è¦ã¨ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:555
@@ -1967,7 +2401,7 @@
"EJB security domain is <literal>jwdomain</literal>. If the JAAS login "
"authenticates the user, a JAAS <literal>Subject</literal> is created that "
"contains the following in its <literal>PrincipalsSet</literal>:"
-msgstr ""
+msgstr "EJB ãå®å
¨åããã¦ããç¶æ
ã§ã»ãã¥ãªãã£ãã¡ã¤ã³ã¯ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®é¸æãè¡ãã¾ãã ã»ãã¥ãªãã£ãã¡ã¤ã³å㯠<literal>LoginContext</literal> ã³ã³ã¹ãã©ã¯ã¿ã«æ¸¡ããããã°ã¤ã³è¨å®ã¨ã³ããªåã¨ãã¦ä½¿ç¨ããã¾ãã EJB ã»ãã¥ãªãã£ãã¡ã¤ã³ã¯ <literal>jwdomain</literal> ã«ãªãã¾ãã JAAS ãã°ã¤ã³ãã¦ã¼ã¶ã¼ãèªè¨¼ããã¨ã JAAS <literal>Subject</literal> ãä½æããã ãã® <literal>PrincipalsSet</literal> å
ã«ã¯æ¬¡ãå«ã¾ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:560
@@ -1975,7 +2409,7 @@
msgid ""
"A <literal>java.security.Principal</literal> that corresponds to the client "
"identity as known in the deployment security environment."
-msgstr ""
+msgstr "<literal>java.security.Principal</literal>ã å°å
¥ã»ãã¥ãªãã£ç°å¢ã§æ¢ç¥ã®ã¯ã©ã¤ã¢ã³ã ID ã«è©²å½ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:565
@@ -1989,7 +2423,7 @@
"literal>. These roles are used to validate the roles assigned to methods in "
"<literal>ejb-jar.xml</literal> and the <literal>EJBContext.isCallerInRole"
"(String)</literal> method implementation."
-msgstr ""
+msgstr "<literal>Roles</literal> ã¨ããååã® <literal>java.security.acl.Group</literal>ã ã¢ããªã±ã¼ã·ã§ã³ãã¡ã¤ã³ããã¦ã¼ã¶ã¼ã«å²ãå½ã¦ããããã¼ã«åãå«ã¿ã¾ãã ããããã¼ã«åã表示ããããã« <literal>org.jboss.security.SimplePrincipal</literal> ãªãã¸ã§ã¯ãã使ç¨ããã¾ãã <literal>SimplePrincipal</literal> ã¯åç´ãªæååãã¼ã¹ã® <literal>Principal</literal> å®è£
ã§ãã ãããã®ãã¼ã«ã使ã£ã¦ <literal>ejb-jar.xml</literal> ã«ããã¡ã½ããã«å²ãå½ã¦ããããã¼ã«ããã³ <literal>EJBContext.isCallerInRole(String)</literal> ã¡ã½ããå®è£
ã確èªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:570
@@ -2007,7 +2441,7 @@
"mapping the deployment security environment principal is used as the "
"<literal>getCallerPrincipal</literal> method value. That is, the operational "
"principal is the same as the application domain principal."
-msgstr ""
+msgstr "ãªãã·ã§ã³ã® <literal>CallerPrincipal</literal> ã¨ããååã® <literal>java.security.acl.Group</literal>ã ã¢ããªã±ã¼ã·ã§ã³ãã¡ã¤ã³ã®å¼ã³åºãå´ã® ID ã«è©²å½ããåä¸ã® <literal>org.jboss.security.SimplePrincipal</literal> ãå«ã¿ã¾ãã <literal>CallerPrincipal</literal> ã®å¯ä¸ã®ã°ã«ã¼ãã¡ã³ãã¼ã¯ <literal>EJBContext.getCallerPrincipal()</literal> ã¡ã½ããã«ãã£ã¦è¿ãããå¤ã«ãªãã¾ãã 稼åã»ãã¥ãªãã£ç°å¢ã§æ¢ç¥ã® <literal>Principal</literal> ãã¢ããªã±ã¼ã·ã§ã³ã«å¯¾ãã¦æ¢ç¥ã®ååãæ㤠<literal>Principal</literal> ã«ãããã³ã°ãè¡ããããã«ãããã¨ããã®ãããã³ã°ã®ç®çã§ãã <literal>CallerPrincipal</literal> ãããã³ã°ããªãã¨ã å°å
¥ã»ãã¥ãªãã£ç°å¢ã® principal ã <literal>getCallerPrincipal</literal> ã¡ã½ããå¤ã¨ãã¦ä½¿ç¨ããã¾ãã ã¤ã¾ãã 稼å principal ã¯ã¢ããªã±ã¼ã·ã§ã³ãã!
¡ã¤ã³ã® principal ã¨åããã®ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:577
@@ -2020,16 +2454,21 @@
"An_illustration_of_the_steps_involved_in_the_authentication_and_authorization_of_a_secured_EJB_home_method_invocation."
"\"/>. Performing the authorization this entails the following steps:"
msgstr ""
+"ã»ãã¥ãªãã£ã¤ã³ã¿ã¼ã»ãã¿ãã§ãã¯ã®æå¾ã®ã¹ãããã¯ã èªè¨¼ã¦ã¼ã¶ã¼ãè¦æ±ã¡ã½ãããå¼ã³åºããã¨ãã§ãããã¼ããã·ã§ã³ãæã£ã¦ããã確èªãããã¨ã§ãã ããã¯ã <xref linkend="
+"\"How_the_JaasSecurityManager_Uses_JAAS-"
+"An_illustration_of_the_steps_involved_in_the_authentication_and_authorization_of_a_secured_EJB_home_method_invocation."
+"\"/> ã«ç¤ºãããã« <emphasis>Server Side Authorization (ãµã¼ãã¼å´ã®æ¿èª)</emphasis> ã¨ããã©ãã«ãä»ãã¦ãã¾ãã æ¿èªãè¡ãã¨æ¬¡ã®ã¹ããããå¼ãèµ·ãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:582
#, no-c-format
+#, fuzzy
msgid ""
"Obtain the names of the roles allowed to access the EJB method from the EJB "
"container. The role names are determined by <literal>ejb-jar.xml</literal> "
"descriptor role-name elements of all <literal>method-permission</literal> "
"elements containing the invoked method."
-msgstr ""
+msgstr "EJB ã³ã³ãããã EJB ã¡ã½ããã¸ã®ã¢ã¯ã»ã¹ã許å¯ããããã¼ã«åãåå¾ãã¾ãã ãã®ãã¼ã«å㯠<literal>ejb-jar.xml</literal> è¨è¿°åã® role-name ã¨ã¬ã¡ã³ãã®å¼ã³åºãã¡ã½ãããå«ããã¹ã¦ã® <literal>method-permission</literal> ã¨ã¬ã¡ã³ãã«ãã£ã¦ç¢ºå®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:587
@@ -2044,11 +2483,12 @@
"group contains a <literal>SimplePrincipal</literal> with the assigned role "
"name. Access is allowed if any role name is a member of the <literal>Roles</"
"literal> group. Access is denied if none of the role names are members."
-msgstr ""
+msgstr "å²ãå½ã¦ããããã¼ã«ããªãã ã¾ãã¯ã¡ã½ããã <literal>exclude-list</literal> ã¨ã¬ã¡ã³ãã«æå®ããã¦ããå ´åã ã¡ã½ããã¸ã®ã¢ã¯ã»ã¹ã¯æå¦ããã¾ãã ãã以å¤ã¯ã <literal>doesUserHaveRole</literal> ã¡ã½ãããã»ãã¥ãªãã£ç®¡çã§ã»ãã¥ãªãã£ã¤ã³ã¿ã¼ã»ãã¿ã«ããå¼ã³åºããã¦ã å¼ã³åºãå´ãå²ãå½ã¦ããããã¼ã«åãæã£ã¦ãããã確èªããã¾ãã ãã®ã¡ã½ããã¯ãã¼ã«åã使ã£ã¦å復ãã èªè¨¼ã¦ã¼ã¶ã¼ã® Subject <literal>Roles</literal> ã°ã«ã¼ãã«å²ãå½ã¦ãã¼ã«åãæ㤠<literal>SimplePrincipal</literal> ãå«ã¾ãã¦ãããã©ããããã§ãã¯ãã¾ãã ããããã®ãã¼ã«åã <literal>Roles</literal> ã°ã«ã¼ãã®ã¡ã³ãã¼ã§ããã°ã¢ã¯ã»ã¹ã許å¯ããã¾ãã ãããã®ãã¼ã«åãã¡ã³ãã¼ã§ã¯ãªãå ´åã¯ã¢ã¯ã»ã¹ãæå¦ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:592
#, no-c-format
+#, fuzzy
msgid ""
"If the EJB was configured with a custom security proxy, the method "
"invocation is delegated to it. If the security proxy wants to deny access to "
@@ -2057,7 +2497,7 @@
"method is allowed and the method invocation passes to the next container "
"interceptor. Note that the <literal>SecurityProxyInterceptor</literal> "
"handles this check and this interceptor is not shown."
-msgstr ""
+msgstr "EJB ãã«ã¹ã¿ã ã®ã»ãã¥ãªãã£ãããã·ã§è¨å®ããã¦ããå ´åã ã¡ã½ããå¼ã³åºãã¯ããã«å§ä»»ããã¾ãã ã»ãã¥ãªãã£ãããã·ãå¼ã³åºãå´ã«å¯¾ãã¦ã¢ã¯ã»ã¹ãæå¦ãããå ´åã <literal>java.lang.SecurityException</literal> ãæãã¾ãã <literal>SecurityException</literal> ãæããããªãã£ãå ´åã EJB ã¡ã½ããã¸ã®ã¢ã¯ã»ã¹ã¯è¨±å¯ããã¡ã½ããå¼ã³åºãã¯æ¬¡ã®ã³ã³ããã¤ã³ã¿ã¼ã»ãã¿ã«æ¸¡ãã¾ã(??渡ããã¾ã??)ã <literal>SecurityProxyInterceptor</literal> ããã®ãã§ãã¯ãå¦çãããããã®ã¤ã³ã¿ã¼ã»ãã¿ã¯è¡¨ç¤ºãããªãã®ã§æ³¨æãã¦ãã ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:599
@@ -2076,17 +2516,18 @@
"the associated MBean service is discussed in following section. In the "
"absence of any user-defined cache, a default cache that maintains credential "
"information for a configurable period of time is used."
-msgstr ""
+msgstr "ã»ãã¥ãªãã£æ
å ±ã¯åè¦æ±ãã¨æ示ããèªè¨¼ãããªããã°ãªããªãè¦æ±ã®ã¹ãã¼ãã¬ã¹å±æ§ã¨ãã¦å¦çãããããã å®å
¨åããã EJB ã¡ã½ããå¼ã³åºãã¾ãã¯å®å
¨åãããã¦ã§ãã³ã³ãã³ãã¢ã¯ã»ã¹ã¯ãã¹ã¦å¼ã³åºãå´ã®èªè¨¼ã¨æ¿èªãå¿
è¦ã«ãªãã¾ãã JAAS ãã°ã¤ã³ãã¯ã©ã¤ã¢ã³ããããµã¼ãã¼ã¸ã®äº¤ä¿¡ãå¿
è¦ã¨ããå ´åã è¤éãªæ¼ç®ã¨ãªãå¯è½æ§ãããã¾ãã ãªããªãã <literal>JaasSecurityManager</literal> ã¯ååæåãããã°ã¤ã³ããã® principal ããã³è¨¼ææ¸æ
å ±ã®ä¿åã«ä½¿ç¨ããèªè¨¼ãã£ãã·ã¥ã®æ¦å¿µããµãã¼ãããããã§ãã 次ã®ã»ã¯ã·ã§ã³ã®é¢é£ MBean ãµã¼ãã¹ã§è¨è¼ããã¦ããããã« <literal>JaasSecurityManager</literal> è¨å®ã®ä¸é¨ã¨ãã¦èªè¨¼ãã£ãã·ã¥ã®ã¤ã³ã¹ã¿ã³ã¹ãæå®ãããã¨ãã§ãã¾ãã ã¦ã¼ã¶ã¼å®ç¾©ã®ãã£ãã·ã¥ãã!
ªãå ´åã è¨å®å¯è½ãªæéä¸ã«è¨¼ææ¸æ
å ±ã管çããããã©ã«ãã®ãã£ãã·ã¥ã使ç¨ããã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:605
#, no-c-format
msgid "The JaasSecurityManagerService MBean"
-msgstr ""
+msgstr "JaasSecurityManagerService MBean"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:606
#, no-c-format
+#, fuzzy
msgid ""
"The <literal>JaasSecurityManagerService</literal> MBean service manages "
"security managers. Although its name begins with <emphasis>Jaas</emphasis>, "
@@ -2098,7 +2539,7 @@
"implementation by providing an alternate implementation of the "
"<literal>AuthenticationManager</literal> and <literal>RealmMapping</literal> "
"interfaces."
-msgstr ""
+msgstr "<literal>JaasSecurityManagerService</literal> MBean ãµã¼ãã¹ã¯ã»ãã¥ãªãã£ç®¡çã管çãã¾ãã ãã®åå㯠<emphasis>Jaas</emphasis> ã§å§ã¾ãã¾ããã å¦çããã»ãã¥ãªãã£ç®¡çã¯ãã®å®è£
㧠JAAS ã使ç¨ããå¿
è¦ã¯ããã¾ããã ãã®ååã¯ã ããã©ã«ãã®ã»ãã¥ãªãã£ç®¡çå®è£
ã <literal>JaasSecurityManager</literal> ã§ãããã¨ã«ç±æ¥ãã¦ãã¾ãã <literal>JaasSecurityManagerService</literal> ã®ä¸»ãªå½¹å²ã¯ã»ãã¥ãªãã£ç®¡çå®è£
ãå¤å¨ããããã¨ã§ãã <literal>AuthenticationManager</literal> ããã³ <literal>RealmMapping</literal> ã®åã¤ã³ã¿ã¼ãã§ã¼ã¹ã®ä»£æ¿å®è£
ãæä¾ãããã¨ã§ã»ãã¥ãªãã£ç®¡çå®è£
ãå¤æ´ãããã¨ãã§ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:609
@@ -2125,7 +2566,7 @@
"<literal>SecurityManagerClassName</literal> attribute using a constructor "
"that takes the name of the security domain. For example, consider the "
"following container security configuration snippet:"
-msgstr ""
+msgstr "<literal>JaasSecurityManagerService</literal> ã® 2 çªç®ã«åºæ¬ã¨ãªãå½¹å²ã¯ JNDI <literal>javax.naming.spi.ObjectFactory</literal> å®è£
ãæä¾ãããã¨ã§ã»ãã¥ãªãã£ç®¡çå®è£
ã®ãããã³ã°ã«ã³ã¼ãä¸è¦ã®ã·ã³ãã«ãªç®¡çã¨ãªã JNDI åãå®ç¾ãããã¨ã§ãã <literal>security-domain</literal> ãããã¤ã¡ã³ãè¨è¿°åã¨ã¬ã¡ã³ãã使ã£ã¦ã»ãã¥ãªãã£ç®¡çå®è£
ã® JNDI åãæå®ãããã¨ã§ã»ãã¥ãªãã£ãæå¹ã«ããã¨è¨è¼ããã¦ãã¾ãã JNDIåãæå®ããå ´åã 使ç¨ãããªãã¸ã§ã¯ããã¤ã³ãã£ã³ã°ãããã«ãªããã°ãªãã¾ããã ã»ãã¥ãªãã£ç®¡çã®ãã¤ã³ãã£ã³ã°ã«å¯¾ãã JNDI åã®è¨å®ãç°¡ç¥åããããã <literal>JaasSecurityManagerService</literal> ã¯ã <literal>java:/jaas</literal> åé
ä¸ã« JNDI ObjectFactory ã¨ãã¦æ¬¡ã®ãã¼ãã³ã°ã·ã¹ãã åç
§ãããèªä½ã¨çµåãããã¨ã§ã»ãã¥ã!
ªãã£ç®¡çã¤ã³ã¹ã¿ã³ã¹ããååã¸ã®é¢é£ã管çãã¾ãã ããã«ããã <literal>java:/jaas/XYZ</literal> ã¨ããå½¢å¼ã®å½åè¦åã <literal>security-domain</literal> ã¨ã¬ã¡ã³ãã®å¤ã¨ãã¦ä½¿ç¨ãããã¨ãã§ããããã«ãªãã <literal>XYZ</literal> ã»ãã¥ãªãã£ãã¡ã¤ã³ã®ã»ãã¥ãªãã£ç®¡çã¤ã³ã¹ã¿ã³ã¹ãå¿
è¦ã«å¿ãã¦ä½æãããããã«ãªãã¾ãã ã»ãã¥ãªãã£ãã¡ã¤ã³ã®ååãåãã³ã³ã¹ãã©ã¯ã¿ã使ç¨ãã <literal>SecurityManagerClassName</literal> å±æ§ã«ãã£ã¦æå®ãããã¯ã©ã¹ã®ã¤ã³ã¹ã¿ã³ã¹ãä½æãããã¨ã«ããæåã®æ¤ç´¢ã§ <literal>java:/jaas/XYZ</literal> ãã¤ã³ãã£ã³ã°ã«å¯¾ãã¦ãã¡ã¤ã³ <literal>XYZ</literal> ã®ã»ãã¥ãªãã£ç®¡çãä½æããã¾ãã ãã¨ãã°ã 次ã«ç¤ºãã³ã³ããã»ãã¥ãªãã£è¨å®ã®ä¸é¨ãè¦ã¦ã¿ã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:612
@@ -2138,6 +2579,12 @@
" <!-- ... -->\n"
"</jboss>"
msgstr ""
+"<jboss>\n"
+" <!-- Configure all containers to be secured under the \"hades\" "
+"security domain -->\n"
+" <security-domain>java:/jaas/hades</security-domain>\n"
+" <!-- ... -->\n"
+"</jboss>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:613
@@ -2149,7 +2596,7 @@
"AuthenticationManager and RealmMapping security interfaces and will be of "
"the type specified by the <literal>JaasSecurityManagerService</"
"literal><literal>SecurityManagerClassName</literal> attribute."
-msgstr ""
+msgstr "åå <literal>java:/jaas/hades</literal> ãæ¤ç´¢ãã㨠<literal>hades</literal> ã¨ããååã®ã»ãã¥ãªãã£ãã¡ã¤ã³ã«é¢é£ä»ãããã¦ããã»ãã¥ãªãã£ç®¡çã¤ã³ã¹ã¿ã³ã¹ãè¿ããã¾ãã ãã®ã»ãã¥ãªãã£ç®¡ç㯠AuthenticationManager ããã³ RealmMapping ã®åã»ãã¥ãªãã£ã¤ã³ã¿ã¼ãã§ã¼ã¹ãå®è£
ãã <literal>JaasSecurityManagerService</literal><literal>SecurityManagerClassName</literal> å±æ§ã«ãã£ã¦æå®ãããã¿ã¤ãã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:616
@@ -2159,7 +2606,7 @@
"default for use in the standard JBoss distribution, and you can often use "
"the default configuration as is. The configurable attributes of the "
"<literal>JaasSecurityManagerService</literal> include:"
-msgstr ""
+msgstr "<literal>JaasSecurityManagerService</literal> MBean ã¯ããã©ã«ãã§ã¯æ¨æº JBoss ãã£ã¹ããªãã¥ã¼ã·ã§ã³ã§ä½¿ç¨ãããããè¨å®ããã ã¾ãããã©ã«ãã®è¨å®ããã®ã¾ã¾ä½¿ç¨ã§ããå ´åãå¤ãããã¾ãã <literal>JaasSecurityManagerService</literal> ã®è¨å®å¯è½ãªå±æ§ã«ã¯æ¬¡ã®ãããªãã®ãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:621
@@ -2171,7 +2618,7 @@
"literal> and <literal>org.jboss.security.RealmMapping</literal> interfaces. "
"If not specified this defaults to the JAAS-based <literal>org.jboss.security."
"plugins.JaasSecurityManager</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">SecurityManagerClassName</emphasis>: ã»ãã¥ãªãã£ç®¡çå®è£
ãæä¾ããã¯ã©ã¹åã§ãã å®è£
㯠<literal>org.jboss.security.AuthenticationManager</literal> ããã³ <literal>org.jboss.security.RealmMapping</literal> ã®ä¸¡ã¤ã³ã¿ã¼ãã§ã¼ã¹ããµãã¼ããã¦ããªããã°ãªãã¾ããã æå®ããªãã¨ã JAAS ãã¼ã¹ã® <literal>org.jboss.security.plugins.JaasSecurityManager</literal> ã«ããã©ã«ãè¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:626
@@ -2186,6 +2633,8 @@
"literal>) does not meet your needs. This is a rather deep configuration that "
"generally should not be set unless you know what you are doing."
msgstr ""
+"<emphasis role=\"bold\">CallbackHandlerClassName</emphasis>: <literal>JaasSecurityManager</literal> ã«ãã£ã¦ä½¿ç¨ããã <literal>javax.security.auth.callback."
+"CallbackHandler</literal> å®è£
ãæä¾ããã¯ã©ã¹åã§ãã ããã©ã«ãã®å®è£
(<literal>org.jboss.security.auth.callback.SecurityAssociationHandler</literal>) ããã¼ãºã«é©åããªãå ´å㯠<literal>JaasSecurityManager</literal> ã§ä½¿ç¨ããããã³ãã©ãä¸æ¸ããããã¨ãã§ãã¾ãã ããã¯ã è¨å®å
容ãçç¥ãã¦ããªãéãä¸è¬çã«ã¯è¡ãããã¹ãã§ã¯ãªãé«åº¦ã§è©³ç´°ãªè¨å®ã¨ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:631
@@ -2197,6 +2646,8 @@
"defaults to <literal>org.jboss.security.SubjectSecurityProxyFactory</"
"literal>."
msgstr ""
+"<emphasis role=\"bold\">SecurityProxyFactoryClassName</emphasis>: <literal>org.jboss.security."
+"SecurityProxyFactory</literal>å®è£
ãæä¾ããã¯ã©ã¹åã§ãã æå®ããã¦ããªãã¨ã ããã©ã«ã㧠<literal>org.jboss.security.SubjectSecurityProxyFactory</literal> ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:636
@@ -2210,7 +2661,7 @@
"looking up the <literal>CachePolicy</literal> for a domain. If this fails, "
"the location is treated as a single <literal>CachePolicy</literal> for all "
"security domains. As a default, a timed cache policy is used."
-msgstr ""
+msgstr "<emphasis role=\"bold\">AuthenticationCacheJndiName</emphasis>: ã»ãã¥ãªãã£è¨¼æã®ãã£ãã·ã¥ããªã·ã¼ã®å ´æãæå®ãã¾ãã æåã¯ã ã»ãã¥ãªãã£ãã¡ã¤ã³ãã¨ã« <literal>CachePolicy</literal> ã¤ã³ã¹ã¿ã³ã¹ãè¿ããã¨ãã§ãã <literal>ObjectFactory</literal> ã®å ´æã¨ãã¦æ±ããã¾ãã ããã¯ãã¡ã¤ã³ã® <literal>CachePolicy</literal> ãæ¤ç´¢ããã¨ãã«ãã®ååã«ã»ãã¥ãªãã£ãã¡ã¤ã³ã®ååã追å ãããã¨ã§è¡ããã¾ãã ããã失æããã¨ã ãã®å ´æã¯ãã¹ã¦ã®ã»ãã¥ãªãã£ãã¡ã¤ã³ã«å¯¾ãã¦åä¸ã® <literal>CachePolicy</literal> ã¨ãã¦æ±ããã¾ãã ããã©ã«ãã§ã¯ã æéå¶éãè¨ãããã£ãã·ã¥ããªã·ã¼ã使ç¨ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:641
@@ -2225,7 +2676,7 @@
"to force authentication to occur every time. This has no affect if the "
"<literal>AuthenticationCacheJndiName</literal> has been changed from the "
"default value."
-msgstr ""
+msgstr "<emphasis role=\"bold\">DefaultCacheTimeout</emphasis>: ç§åä½ã®æéå¶éãè¨ããããããã©ã«ããã£ãã·ã¥ããªã·ã¼ã¿ã¤ã ã¢ã¦ããæå®ãã¾ãã ããã©ã«ãå¤ã¯ 1800 ç§ (30 å) ã«ãªãã¾ãã ã¿ã¤ã ã¢ã¦ãã«ä½¿ç¨ããå¤ã¯é »ç¹ã«è¡ãããèªè¨¼åä½éã®ãã¬ã¼ããªãã§ã 証ææ
å ±ãä¿åããã¦ããã»ãã¥ãªãã£æ
å ±ã¨ä¸è´ãã¦ããªãå¯è½æ§ãããæéã«ãªãã¾ãã ã»ãã¥ãªãã£è¨¼æã®ãã£ãã·ã¥ãç¡å¹ã«ãããå ´åã¯ã ããã 0 ã«è¨å®ãã¦æ¯åã èªè¨¼ãå¼·å¶çã«å®æ½ãããããã«ãã¾ãã <literal>AuthenticationCacheJndiName</literal> ããã®ããã©ã«ãå¤ããå¤æ´ããã¦ããå ´åã¯å¹æãããã¾ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:646
@@ -2238,7 +2689,7 @@
"meaningful. The default resolution is 60 seconds(1 minute). This has no "
"affect if the <literal>AuthenticationCacheJndiName</literal> has been "
"changed from the default value."
-msgstr ""
+msgstr "<emphasis role=\"bold\">DefaultCacheResolution</emphasis>: ç§åä½ã§æéå¶éãè¨ããããããã©ã«ãã®ãã£ãã·ã¥ããªã·ã¼ãªã¾ãªã¥ã¼ã·ã§ã³ã§ãã ãã£ãã·ã¥ã®ç¾å¨ã®ã¿ã¤ã ã¹ã¿ã³ããæ´æ°ãããééãå¶å¾¡ãã ã¿ã¤ã ã¢ã¦ããæ義ããªããã <literal>DefaultCacheTimeout</literal> æªæºã§ãªããã°ãªãã¾ããã ããã©ã«ãã®ãªã¾ãªã¥ã¼ã·ã§ã³ã¯ 60 ç§ (1 å) ã§ãã <literal>AuthenticationCacheJndiName</literal> ããã®ããã©ã«ãå¤ããå¤æ´ããã¦ããå ´åã¯å¹æãããã¾ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:651
@@ -2248,7 +2699,7 @@
"Specifies the principal to use for unauthenticated users. This setting makes "
"it possible to set default permissions for users who have not been "
"authenticated."
-msgstr ""
+msgstr "<emphasis role=\"bold\">DefaultUnauthenticatedPrincipal</emphasis>: èªè¨¼ããã¦ããªãã¦ã¼ã¶ã¼ã«å¯¾ãã¦ä½¿ç¨ãã principal ãæå®ãã¾ãã ãã®è¨å®ã«ããã èªè¨¼ããã¦ããªãã¦ã¼ã¶ã¼ã«å¯¾ãã¦ããã©ã«ãã®ãã¼ããã·ã§ã³ãè¨å®ãããã¨ãå¯è½ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:656
@@ -2258,7 +2709,7 @@
"useful operations. These include flushing any security domain authentication "
"cache at runtime, getting the list of active users in a security domain "
"authentication cache, and any of the security manager interface methods."
-msgstr ""
+msgstr "<literal>JaasSecurityManagerService</literal> ã¯ã èµ·åæã«ã»ãã¥ãªãã£ãã¡ã¤ã³èªè¨¼ãã£ãã·ã¥ããã©ãã·ã¥ããæ©è½ã ã»ãã¥ãªãã£ãã¡ã¤ã³èªè¨¼ãã£ãã·ã¥å
ã®ã¢ã¯ãã£ããªã¦ã¼ã¶ã¼ã®ä¸è¦§ãåå¾ããæ©è½ã ããããã»ãã¥ãªãã£ç®¡çã¤ã³ã¿ã¼ãã§ã¼ã¹ã®ã¡ã½ãããªã©å½¹ã«ç«ã¤æ©è½ããµãã¼ããã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:659
@@ -2270,12 +2721,14 @@
"<literal>public void flushAuthenticationCache(String securityDomain)</"
"literal>."
msgstr ""
+"ã»ãã¥ãªãã£ãã¡ã¤ã³èªè¨¼ãã£ãã·ã¥ã®ãã©ãã·ã¥æ©è½ã使ç¨ããã¨ã åºç¤ã¨ãªãã¹ãã¢ãæ´æ°ããã¦ãã¦ç´ã¡ã«ãã®ã¹ãã¢ã®ç¶æ
ã使ç¨ãããå ´åã«ãã£ãã·ã¥ããã¦ãã証ææ¸ããã¹ã¦ãããããããã¨ãã§ãã¾ãã MBean æ¼ç®ã®ç½²å㯠<literal>public void flushAuthenticationCache(String securityDomain)</"
+"literal> ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:662 J2EE_Security_On_JBOSS.xml:669
#, no-c-format
msgid "This can be invoked programmatically using the following code snippet:"
-msgstr ""
+msgstr "次ã®ã³ã¼ãã®é¨åã使ç¨ãã¦ããã°ã©ã çã«å¼ã³åºããã¨ãå¯è½ã§ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:665
@@ -2288,6 +2741,12 @@
"String[] signature = {\"java.lang.String\"};\n"
"server.invoke(jaasMgr, \"flushAuthenticationCache\", params, signature);"
msgstr ""
+"MBeanServer server = ...;\n"
+"String jaasMgrName = \"jboss.security:service=JaasSecurityManager\";\n"
+"ObjectName jaasMgr = new ObjectName(jaasMgrName);\n"
+"Object[] params = {domainName};\n"
+"String[] signature = {\"java.lang.String\"};\n"
+"server.invoke(jaasMgr, \"flushAuthenticationCache\", params, signature);"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:666
@@ -2298,6 +2757,8 @@
"that are not expired. The MBean operation signature is: <literal>public List "
"getAuthenticationCachePrincipals(String securityDomain)</literal>."
msgstr ""
+"ã¢ã¯ãã£ãã¦ã¼ã¶ã¼ã®ä¸è¦§ãåå¾ããã¨ã 失å¹ãã¦ããªãã»ãã¥ãªãã£ãã¡ã¤ã³èªè¨¼ãã£ãã·ã¥å
ã® <literal>Principals</literal> ãã¼ã®ã¹ãããã·ã§ãããå¾ããã¨ãã§ãã¾ãã MBean æ¼ç®ã®ç½²å㯠<literal>public List "
+"getAuthenticationCachePrincipals(String securityDomain)</literal> ã«ãªãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:672
@@ -2312,12 +2773,20 @@
"\", \n"
" params, signature);"
msgstr ""
+"MBeanServer server = ...;\n"
+"String jaasMgrName = \"jboss.security:service=JaasSecurityManager\";\n"
+"ObjectName jaasMgr = new ObjectName(jaasMgrName);\n"
+"Object[] params = {domainName};\n"
+"String[] signature = {\"java.lang.String\"};\n"
+"List users = (List) server.invoke(jaasMgr, \"getAuthenticationCachePrincipals"
+"\", \n"
+" params, signature);"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:673
#, no-c-format
msgid "The security manager has a few additional access methods."
-msgstr ""
+msgstr "ã»ãã¥ãªãã£ç®¡çã«ã¯è¿½å ã§ããã¤ãã®ã¢ã¯ã»ã¹ã¡ã½ãããããã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:676
@@ -2332,6 +2801,14 @@
"public Set getUserRoles(String securityDomain, Principal principal, Object "
"credential);"
msgstr ""
+"public boolean isValid(String securityDomain, Principal principal, Object "
+"credential);\n"
+"public Principal getPrincipal(String securityDomain, Principal principal);\n"
+"public boolean doesUserHaveRole(String securityDomain, Principal "
+"principal, \n"
+" Object credential, Set roles);\n"
+"public Set getUserRoles(String securityDomain, Principal principal, Object "
+"credential);"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:677
@@ -2341,13 +2818,13 @@
"literal> and <literal>RealmMapping</literal> interface method of the "
"associated security domain named by the <literal>securityDomain</literal> "
"argument."
-msgstr ""
+msgstr "<literal>securityDomain</literal> å¼æ°ã«ããååãä¸ããããé¢é£ã»ãã¥ãªãã£ãã¡ã¤ã³ã® <literal>AuthenticationManager</literal> ããã³ <literal>RealmMapping</literal> ã®è©²å½ã¤ã³ã¿ã¼ãã§ã¼ã¹ã¡ã½ããã¸ã®ã¢ã¯ã»ã¹ãæä¾ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:683
#, no-c-format
msgid "The JaasSecurityDomain MBean"
-msgstr ""
+msgstr "JaasSecurityDomain MBean"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:684
@@ -2359,7 +2836,7 @@
"and a <literal>TrustManagerFactory</literal> for supporting SSL and other "
"cryptographic use cases. The additional configurable attributes of the "
"<literal>JaasSecurityDomain</literal> include:"
-msgstr ""
+msgstr "<literal>org.jboss.security.plugins.JaasSecurityDomain</literal> 㯠<literal>JaasSecurityManager</literal> ã®æ¡å¼µã§ã SSL ãä»ã®æå·ã®ä½¿ç¨ã«å¯¾å¿ãããã <literal>KeyStore</literal>ã JSSE <literal>KeyManagerFactory</literal>ã <literal>TrustManagerFactory</literal> ã®æ¦å¿µã追å ãã¾ãã <literal>JaasSecurityDomain</literal> ã®è¨å®å¯è½ãªå±æ§ã«ã¯æ¬¡ã®ãããªãã®ãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:689
@@ -2369,7 +2846,7 @@
"<literal>KeyStore</literal> implementation. This is the type argument passed "
"to the <literal>java.security.KeyStore.getInstance(String type)</literal> "
"factory method. The default is <literal>JKS</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">KeyStoreType</emphasis>: <literal>KeyStore</literal> å®è£
ã®ã¿ã¤ãã§ãã <literal>java.security.KeyStore.getInstance(String type)</literal> ãã¡ã¯ããªã¡ã½ããã«æ¸¡ãããã¿ã¤ãå¼æ°ã«ãªãã¾ãã ããã©ã«ã㯠<literal>JKS</literal> ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:694
@@ -2380,6 +2857,8 @@
"<literal>InputStream</literal> to initialize the <literal>KeyStore</"
"literal>. If the string is not a value URL, it is treated as a file."
msgstr ""
+"<emphasis role=\"bold\">KeyStoreURL</emphasis>: <literal>KeyStore</literal> ãã¼ã¿ãã¼ã¹ã®å ´æã¸ã® URL ã§ãã <literal>InputStream</literal> ãåå¾ã㦠<literal>KeyStore</"
+"literal> ãåæåããããã«ä½¿ç¨ããã¾ãã æååã URL å¤ã§ã¯ãªãå ´åã ãã¡ã¤ã«ã¨ãã¦æ±ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:699
@@ -2392,16 +2871,17 @@
"create a PBE secret key used with the encode/decode operations. The "
"<literal>KeyStorePass</literal> attribute value format is one of the "
"following:"
-msgstr ""
+msgstr "<emphasis role=\"bold\">KeyStorePass</emphasis>: <literal>KeyStore</literal> ãã¼ã¿ãã¼ã¹ã®å
容ã«é¢é£ä»ãããããã¹ã¯ã¼ãã§ãã ã¾ãã <literal>KeyStorePass</literal> ã¯ã æå·åã»å¾©å·åã®æ¼ç®ã§ä½¿ç¨ããã PBE ç§å¯éµãä½æãã <literal>Salt</literal> ããã³ <literal>IterationCount</literal> ã®å±æ§ã¨çµã¿åããã¦ã使ç¨ããã¾ãã <literal>KeyStorePass</literal> å±æ§å¤ã®å½¢å¼ã¯ä»¥ä¸ã®ããããã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:704
#, no-c-format
+#, fuzzy
msgid ""
"The plaintext password for the <literal>KeyStore</literal> The "
"<literal>toCharArray()</literal> value of the string is used without any "
"manipulation."
-msgstr ""
+msgstr "<literal>KeyStore</literal> ã®ãã¬ã¼ããã¹ããã¹ã¯ã¼ãã æååã® <literal>toCharArray()</literal> ã¯æä½ç¡ãã«ä½¿ç¨ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:709
@@ -2412,7 +2892,7 @@
"command line that will be passed to the <literal>Runtime.exec(String)</"
"literal> method to execute a platform-specific command. The first line of "
"the command output is used as the password."
-msgstr ""
+msgstr "ãã¬ã¼ã³ããã¹ãã®ãã¹ã¯ã¼ããåå¾ããããå®è¡ããã³ãã³ãã <literal>{EXT}...</literal> ã®å½¢å¼ã«ãªãã¾ãã <literal>...</literal> ã¯ãã©ãããã©ã¼ã åºæã®ã³ãã³ããå®è¡ããããã« <literal>Runtime.exec(String)</literal> ã¡ã½ããã«æ¸¡ãããæ£ç¢ºãªã³ãã³ãã©ã¤ã³ã«ãªãã¾ãã ã³ãã³ãåºåã® 1 è¡ç®ããã¹ã¯ã¼ãã¨ãã¦ä½¿ç¨ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:714
@@ -2425,6 +2905,8 @@
"from classname by invoking a <literal>toCharArray()</literal> method if "
"found, otherwise, the <literal>toString()</literal> method is used."
msgstr ""
+"ãã¬ã¼ã³ããã¹ãã®ãã¹ã¯ã¼ããåå¾ããããã«ä½æããã¯ã©ã¹ã§ãã <literal>"
+"{CLASS}classname[:ctorarg]</literal> ã®å½¢å¼ã«ãªãã <literal>[:ctorarg]</literal> 㯠<literal>classname</literal> ã®ã¤ã³ã¹ã¿ã³ã¹ãä½æããã¨ãã«ã³ã³ã¹ãã©ã¯ã¿ã«æ¸¡ããããªãã·ã§ã³ã®æååã«ãªãã¾ãã ãã¹ã¯ã¼ãã¯ã <literal>toCharArray()</literal> ã¡ã½ãããè¦ã¤ããã°ãããå¼ã³åºãã¦ã¯ã©ã¹åããåå¾ããã¾ãã ãã以å¤ã¯ <literal>toString()</literal> ã¡ã½ããã使ç¨ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:721
@@ -2433,6 +2915,8 @@
"<emphasis role=\"bold\">Salt</emphasis>: The <literal>PBEParameterSpec</"
"literal> salt value."
msgstr ""
+"<emphasis role=\"bold\">Salt</emphasis>: <literal>PBEParameterSpec</"
+"literal> salt ã®å¤ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:726
@@ -2440,7 +2924,7 @@
msgid ""
"<emphasis role=\"bold\">IterationCount</emphasis>: The "
"<literal>PBEParameterSpec</literal> iteration count value."
-msgstr ""
+msgstr "<emphasis role=\"bold\">IterationCount</emphasis>: <literal>PBEParameterSpec</literal> ã®å復ã«ã¦ã³ãå¤ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:731
@@ -2450,7 +2934,7 @@
"<literal>TrustStore</literal> implementation. This is the type argument "
"passed to the <literal>java.security.KeyStore.getInstance(String type)</"
"literal> factory method. The default is <literal>JKS</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">TrustStoreType</emphasis>: <literal>TrustStore</literal> å®è£
ã®ã¿ã¤ãã§ãã <literal>java.security.KeyStore.getInstance(String type)</literal> ãã¡ã¯ããªã¡ã½ããã«æ¸¡ãããã¿ã¤ãå¼æ°ã«ãªãã¾ãã ããã©ã«ã㯠<literal>JKS</literal> ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:736
@@ -2461,16 +2945,19 @@
"<literal>InputStream</literal> to initialize the <literal>KeyStore</"
"literal>. If the string is not a value URL, it is treated as a file."
msgstr ""
+"<emphasis role=\"bold\">TrustStoreURL</emphasis>: <literal>TrustStore</literal> ãã¼ã¿ãã¼ã¹ã®å ´æã¸ã® URL ã§ãã ããã使ç¨ã㦠<literal>InputStream</literal> ãåå¾ã <literal>KeyStore</"
+"literal> ãåæåãã¾ãã æååã URL å¤ã§ã¯ãªãå ´åã ãã¡ã¤ã«ã¨ãã¦æ±ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:741
#, no-c-format
+#, fuzzy
msgid ""
"<emphasis role=\"bold\">TrustStorePass</emphasis>: The password associated "
"with the trust store database contents. The <literal>TrustStorePass</"
"literal> is a simple password and doesn't have the same configuration "
"options as the <literal>KeyStorePass</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">TrustStorePass</emphasis>: trust store (??) ãã¼ã¿ãã¼ã¹ã®å
容ã«é¢é£ä»ãããããã¹ã¯ã¼ãã§ãã <literal>TrustStorePass</literal> ã¯ã·ã³ãã«ãªãã¹ã¯ã¼ãã§ã <literal>KeyStorePass</literal> ã¨åããããªè¨å®ãªãã·ã§ã³ã¯ããã¾ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:746
@@ -2483,13 +2970,13 @@
"<literal><domain></literal> is the name passed to the MBean "
"constructor. The name defaults to <literal>jboss.security:"
"service=JaasSecurityManager</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">ManagerServiceName</emphasis>: ã»ãã¥ãªãã£ç®¡çãµã¼ãã¹ MBean ã® JMX ãªãã¸ã§ã¯ãåæååãè¨å®ãã¾ãã <literal>java:/jaas/<domain></literal> é
ä¸ã®ã»ãã¥ãªãã£ç®¡çã¨ãã¦ã® <literal>JaasSecurityDomain</literal> ç»é²ã«ããã©ã«ããç»é²ããããã«ä½¿ç¨ãã¾ãã <literal><domain></literal> 㯠MBean ã³ã³ã¹ãã©ã¯ã¿ã«æ¸¡ãããååã§ãã ãã®ååã¯ããã©ã«ãã§ã¯ <literal>jboss.security:service=JaasSecurityManager</literal> ã«è¨å®ããã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:756
#, no-c-format
msgid "Defining Security Domains"
-msgstr ""
+msgstr "ã»ãã¥ãªãã£ãã¡ã¤ã³ãå®ç¾©ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:757
@@ -2500,7 +2987,7 @@
"configuration policy defines a set of named security domains that each "
"define a stack of login modules that will be called upon to authenticate and "
"authorize users."
-msgstr ""
+msgstr "JBoss ã«ãããèªè¨¼ããã³æ¿èªç¨ã®ã»ãã¥ãªãã£ãã¡ã¤ã³ç¾¤ãè¨å®ããæ¨æºçãªæ¹æ³ã¯ã XML ãã°ã¤ã³è¨å®ãã¡ã¤ã«ã使ç¨ããæ¹æ³ã§ãã ãã°ã¤ã³è¨å®ããªã·ã¼ã¯ã ã¦ã¼ã¶ã¼ãèªè¨¼ããã³æ¿èªããããå¼ã³åºããããã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®ã¹ã¿ãã¯ãå®ç¾©ãã named ã»ãã¥ãªãã£ãã¡ã¤ã³ç¾¤ã®ã»ãããå®ç¾©ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:760
@@ -2510,23 +2997,26 @@
"\"Defining_Security_Domains-The_XMLLoginConfig_DTD\"/>. This DTD can be "
"found in <literal>docs/dtd/security_config.dtd</literal>."
msgstr ""
+"XML è¨å®ãã¡ã¤ã«ã¯ <xref linkend="
+"\"Defining_Security_Domains-The_XMLLoginConfig_DTD\"/> ã§ç¤ºãããã« DTD ã«å¾ãã¾ãã ãã® DTD 㯠<literal>docs/dtd/security_config.dtd</literal> ã«ããã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:764
#, no-c-format
msgid "The XMLLoginConfig DTD"
-msgstr ""
+msgstr "XMLLoginConfig DTD"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:776
#, no-c-format
+#, fuzzy
msgid ""
"The following example shows a simple configuration named jmx-console that is "
"backed by a single login module. The login module is configured by a simple "
"set of name/value configuration pairs that have meaning to the login module "
"in question. We'll see what these options mean later, for now we'll "
"just be concerned with the structure of the configuration file."
-msgstr ""
+msgstr "次ã®ä¾ã§ã¯åä¸ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã«æ¯ãããã jmx-console ã¨å¼ã°ããã·ã³ãã«ãªè¨å®ã示ãã¦ãã¾ãã ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¯"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:779
@@ -2544,6 +3034,17 @@
" </authentication>\n"
"</application-policy>"
msgstr ""
+"<application-policy name=\"jmx-console\">\n"
+" <authentication>\n"
+" <login-module code=\"org.jboss.security.auth.spi."
+"UsersRolesLoginModule\" flag=\"required\">\n"
+" <module-option name=\"usersProperties\">props/jmx-console-"
+"users.properties</module-option>\n"
+" <module-option name=\"rolesProperties\">props/jmx-console-"
+"roles.properties</module-option>\n"
+" </login-module>\n"
+" </authentication>\n"
+"</application-policy>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:780
@@ -2556,7 +3057,7 @@
"in their deployment descriptors. (See the <literal>security-domain</literal> "
"elements in <literal>jboss.xml</literal>, <literal>jboss-web.xml</literal> "
"and <literal>jboss-service.xml</literal> files for examples)"
-msgstr ""
+msgstr "<literal>application-policy</literal> ã® <literal>name</literal> å±æ§ã¯ãã°ã¤ã³è¨å®åã§ãã ã¢ããªã±ã¼ã·ã§ã³ããªã·ã¼ã¨ã¬ã¡ã³ã㯠<literal>java:/jaas</literal> ã³ã³ããã¹ãé
ä¸ã« JNDI ã«ãããã®ååã§çµåããã¾ãã ã¢ããªã±ã¼ã·ã§ã³ã¯ãã®ãããã¤ã¡ã³ãè¨è¿°åã«ãããã® JNDI åã§ã»ãã¥ãªãã£ãã¡ã¤ã³ã«ãªã³ã¯ãã¾ãã (ä¾ã <literal>jboss.xml</literal>ã <literal>jboss-web.xml</literal>ã <literal>jboss-service.xml</literal> ã®åãã¡ã¤ã«ã«ãã <literal>security-domain</literal> ã¨ã¬ã¡ã³ããåç
§)"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:783
@@ -2566,7 +3067,7 @@
"element specifies the class name of the login module implementation. The "
"<literal>required</literal> flag attribute controls the overall behavior of "
"the authentication stack. The allowed values and meanings are:"
-msgstr ""
+msgstr "<literal>login-module</literal> ã¨ã¬ã¡ã³ãã® <literal>code</literal> å±æ§ã¯ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«å®è£
ã®ã¯ã©ã¹åãæå®ãã¾ãã <literal>required</literal> ãã©ã°å±æ§ã¯èªè¨¼ã¹ã¿ãã¯ã®å
¨ä½çãªåä½ãå¶å¾¡ãã¾ãã 許å¯ããã¦ããå¤ã¨æå³ã¯æ¬¡ã®éãã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:788
@@ -2576,7 +3077,7 @@
"succeed for the authentication to be successful. If any required module "
"fails, the authentication will fail. The remaining login modules in the "
"stack will be called regardless of the outcome of the authentication."
-msgstr ""
+msgstr "<emphasis role=\"bold\">required</emphasis>: èªè¨¼ãæåããã«ã¯ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãæåããå¿
è¦ãããã¾ãã å¿
è¦ã¨ãªãã¢ã¸ã¥ã¼ã«ã®ããããã失æããã¨ãã®èªè¨¼ã¯å¤±æãã¾ãã ã¹ã¿ãã¯å
ã®æ®ãã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¯èªè¨¼ã®çµæã«é¢ä¿ãªãã³ã¼ã«ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:793
@@ -2585,7 +3086,7 @@
"<emphasis role=\"bold\">requisite</emphasis>: The login module is required "
"to succeed. If it succeeds, authentication continues down the login stack. "
"If it fails, control immediately returns to the application."
-msgstr ""
+msgstr "<emphasis role=\"bold\">requisite</emphasis>: ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãæåããå¿
è¦ãããã¾ãã æåããã¨èªè¨¼ã¯ãã°ã¤ã³ã¹ã¿ãã¯ãç¶è¡ãã¾ãã 失æããã¨å¶å¾¡ã¯ç´ã¡ã«ã¢ããªã±ã¼ã·ã§ã³ã«æ»ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:798
@@ -2594,7 +3095,7 @@
"<emphasis role=\"bold\">sufficient</emphasis>: The login module is not "
"required to succeed. If it does succeed, control immediately returns to the "
"application. If it fails, authentication continues down the login stack."
-msgstr ""
+msgstr "<emphasis role=\"bold\">sufficient</emphasis>: ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãæåããå¿
è¦ã¯ããã¾ããã æåããã¨å¶å¾¡ã¯ç´ã¡ã«ã¢ããªã±ã¼ã·ã§ã³ã«æ»ãã¾ãã 失æããã¨èªè¨¼ã¯ãã°ã¤ã³ã¹ã¿ãã¯ãç¶è¡ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:803
@@ -2603,16 +3104,17 @@
"<emphasis role=\"bold\">optional</emphasis>: The login module is not "
"required to succeed. Authentication still continues to proceed down the "
"login stack regardless of whether the login module succeeds or fails."
-msgstr ""
+msgstr "<emphasis role=\"bold\">optional</emphasis>: ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãæåããå¿
è¦ã¯ããã¾ããã ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®æåã¾ãã¯å¤±æã«é¢ãããã èªè¨¼ã¯ãã°ã¤ã³ã¹ã¿ãã¯ãç¶è¡ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:808
#, no-c-format
+#, fuzzy
msgid ""
"The following example shows the definition of a security domain that uses "
"multiple login modules. Since both modules are marked as sufficient, only "
"one of them need to succeed for login to proceed."
-msgstr ""
+msgstr "次ã®ä¾ã§ã¯ã è¤æ°ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã使ç¨ããã»ãã¥ãªãã£ãã¡ã¤ã³ã®å®ç¾©ã示ãã¦ãã¾ãã ãããã®ã¢ã¸ã¥ã¼ã«ã sufficient ã¨ãã¼ã¯ãããããã ãã°ã¤ã³ãç¶è¡ããã«ã¯ãããã 1 ã¤ã ããæåããå¿
è¦ãããã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:811
@@ -2633,6 +3135,20 @@
" </authentication>\n"
"</application-policy>"
msgstr ""
+"<application-policy name=\"todo\">\n"
+" <authentication>\n"
+" <login-module code=\"org.jboss.security.auth.spi.LdapLoginModule"
+"\" \n"
+" flag=\"sufficient\">\n"
+" <!-- LDAP configuration -->\n"
+" </login-module>\n"
+" <login-module code=\"org.jboss.security.auth.spi."
+"DatabaseServerLoginModule\" \n"
+" flag=\"sufficient\">\n"
+" <!-- database configuration -->\n"
+" </login-module>\n"
+" </authentication>\n"
+"</application-policy>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:812
@@ -2642,13 +3158,13 @@
"name/value pairs using the <literal>module-option</literal> elements. We'"
"ll cover module options in more depth when we look at the individual login "
"modules available in JBoss AS."
-msgstr ""
+msgstr "åãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã«ã¯ç¬èªã®è¨å®ãªãã·ã§ã³ã»ãããããã¾ãã ããã㯠<literal>module-option</literal> ã¨ã¬ã¡ã³ãã使ç¨ããååã¨å¤ã®çµã¿åããã»ããã¨ãªãã¾ãã ã¢ã¸ã¥ã¼ã«ã®ãªãã·ã§ã³ã«ã¤ãã¦ã¯ã JBoss AS ã§ä½¿ç¨ã§ãããã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãåå¥ã«èª¬æãã¦ããéã«è§¦ãããã¨ã«ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:816
#, no-c-format
msgid "Loading Security Domains"
-msgstr ""
+msgstr "ã»ãã¥ãªãã£ãã¡ã¤ã³ããã¼ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:817
@@ -2659,7 +3175,7 @@
"literal> MBean is responsible for loading security configurations from this "
"configurations from a local configuration file. The MBean is defined as "
"shown below."
-msgstr ""
+msgstr "èªè¨¼ã»ãã¥ãªãã£ãã¡ã¤ã³ã¯ <literal>conf/login-config.xml</literal> ãã¡ã¤ã«ã§éçã«è¨å®ããã¾ãã <literal>XMLLoginConfig</literal> MBean ã¯ãã¼ã«ã«è¨å®ãã¡ã¤ã«ãããã®è¨å®ã«ããã»ãã¥ãªãã£è¨å®ããã¼ãããå½¹ç®ãæããã¾ãã MBean ã¯ä»¥ä¸ã«ç¤ºãããã«å®ç¾©ããã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:820
@@ -2671,12 +3187,17 @@
"attribute>\n"
"</mbean>"
msgstr ""
+"<mbean code=\"org.jboss.security.auth.login.XMLLoginConfig\"\n"
+" name=\"jboss.security:service=XMLLoginConfig\">\n"
+" <attribute name=\"ConfigResource\">login-config.xml</"
+"attribute>\n"
+"</mbean>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:821
#, no-c-format
msgid "The MBean supports the following attributes:"
-msgstr ""
+msgstr "MBean ã¯ä»¥ä¸ã®å±æ§ã«å¯¾å¿ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:826
@@ -2685,7 +3206,7 @@
"<emphasis role=\"bold\">ConfigURL</emphasis>: specifies the URL of the XML "
"login configuration file that should be loaded by this MBean on startup. "
"This must be a valid URL string representation."
-msgstr ""
+msgstr "<emphasis role=\"bold\">ConfigURL</emphasis>: èµ·åæã«ãã® MBean ã«ãããã¼ããããã¹ã XML çé£ããè¨å®ãã¡ã¤ã«ã® URL ãæå®ãã¾ãã æå¹ãª URL æåå表è¨ã§ãªããã°ãªãã¾ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:831
@@ -2695,7 +3216,7 @@
"name of the XML login configuration file that should be loaded by this MBean "
"on startup. The name is treated as a classpath resource for which a URL is "
"located using the thread context class loader."
-msgstr ""
+msgstr "<emphasis role=\"bold\">ConfigResource</emphasis>: èµ·åæã«ãã® MBean ã«ãã£ã¦ãã¼ããããã¹ã XML ãã°ã¤ã³è¨å®ãã¡ã¤ã«ã®ãªã½ã¼ã¹åãæå®ãã¾ãã ãã®ååã¯ã ã¹ã¬ããã³ã³ããã¹ãã¯ã©ã¹ãã¼ãã¼ã使ã£ã¦é
ç½®ããã URL ã®ã¯ã©ã¹ãã¹ãªã½ã¼ã¹ã¨ãã¦æ±ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:836
@@ -2703,7 +3224,7 @@
msgid ""
"<emphasis role=\"bold\">ValidateDTD</emphasis>: a flag indicating if the XML "
"configuration should be validated against its DTD. This defaults to true."
-msgstr ""
+msgstr "<emphasis role=\"bold\">ValidateDTD</emphasis>: XML è¨å®ããã® DTD ã«å¯¾ãã¦æ¤è¨¼ãããªããã°ãªããªãå ´åã«ãã©ã°ã示ããã¾ãã ããã©ã«ãã§ã¯ true ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:841
@@ -2718,6 +3239,9 @@
"be used to add/remove a deployment specific security configuration "
"dynamically."
msgstr ""
+"MBean ã¯èµ·åæã«ãã°ã¤ã³è¨å®ãåçã«æ¡å¼µã§ãã次ã®ãããªæ©è½ã«ã対å¿ãã¦ãã¾ãã ãã°ã¤ã³è¨å®ã®å¤æ´ã試è¡ããåä½ã¯ã»ãã¥ãªãã£ç®¡çã§å®è¡ããå ´åã«ã¯ãã¹ã¦ <literal>javax.security.auth.AuthPermission(\"refreshLoginConfiguration\")</"
+"literal> ãå¿
è¦ã¨ããã®ã§æ³¨æãã¦ãã ããã <literal>org.jboss.book."
+"security.service.SecurityConfig</literal> ãµã¼ãã¹ã¯ã ãããã¤ã¡ã³ãåºæã®ã»ãã¥ãªãã£è¨å®ãåçã«è¿½å ã¾ãã¯åé¤ããããã®ä½¿ç¨æ¹æ³ã示ãã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:846
@@ -2728,6 +3252,8 @@
"current configuration under the given <literal>appName</literal>. This "
"replaces any existing entry under that name."
msgstr ""
+"<literal>void addAppConfig(String appName, AppConfigurationEntry[] entries)</"
+"literal>: ç¹å®ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«è¨å®ã¹ã¿ãã¯ãç¹å®ã® <literal>appName</literal> é
ä¸ã«ããç¾å¨ã®è¨å®ã«è¿½å ãã¾ãã ããã¯ãã®ååã®é
ä¸ã«ããæ¢åã¨ã³ããªãç½®ãæãããã¨ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:851
@@ -2736,7 +3262,7 @@
"<literal>void removeAppConfig(String appName)</literal>: this removes the "
"login module configuration registered under the given <literal>appName</"
"literal>."
-msgstr ""
+msgstr "<literal>void removeAppConfig(String appName)</literal>: ç¹å®ã® <literal>appName</literal> é
ä¸ã«ç»é²ããã¦ãããã°ã¤ã³ã¢ã¸ã¥ã¼ã«è¨å®ãåé¤ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:856
@@ -2747,7 +3273,7 @@
"or legacy Sun login configuration file. Note that all login configurations "
"must be added or none will be added. It returns the names of the login "
"configurations that were added."
-msgstr ""
+msgstr "<literal>String[] loadConfig(URL configURL) throws Exception</literal>: XML ã¾ãã¯ã¬ã¬ã·ã¼ãª Sun ãã°ã¤ã³è¨å®ãã¡ã¤ã«ã®ãããã表ã URL ãã 1 ã¤ã¾ãã¯è¤æ°ã®ãã°ã¤ã³è¨å®ããã¼ããã¾ãã ãã¹ã¦ã®ãã°ã¤ã³è¨å®ã追å ãããªããã°ãªããªããã ãããã¯ä½ã追å ããã¾ããã 追å ããããã°ã¤ã³è¨å®åãè¿ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:861
@@ -2763,7 +3289,7 @@
msgid ""
"<literal>String displayAppConfig(String appName)</literal>: this operation "
"displays a simple string format of the named configuration if it exists."
-msgstr ""
+msgstr "<literal>String displayAppConfig(String appName)</literal>: ãã®æ¼ç®ã¯ã æå®ãããè¨å®ãåå¨ããã°ãã®ã·ã³ãã«ãªæååå½¢å¼ã表示ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:871
@@ -2773,7 +3299,7 @@
"<literal>javax.security.auth.login.Configuration</literal> to be used. The "
"default configuration simply references the <literal>XMLLoginConfig</"
"literal> MBean."
-msgstr ""
+msgstr "<literal>SecurityConfig</literal> MBean ã¯ä½¿ç¨ããã <literal>javax.security.auth.login.Configuration</literal> ãé¸æããå½¹ç®ãæããã¾ãã ããã©ã«ãã®è¨å®ã¯åç´ã« <literal>XMLLoginConfig</literal> MBean ãåç
§ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:874
@@ -2785,12 +3311,17 @@
"service=XMLLoginConfig</attribute>\n"
" </mbean>"
msgstr ""
+"<mbean code=\"org.jboss.security.plugins.SecurityConfig\" \n"
+" name=\"jboss.security:service=SecurityConfig\">\n"
+" <attribute name=\"LoginConfig\">jboss.security:"
+"service=XMLLoginConfig</attribute>\n"
+" </mbean>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:875
#, no-c-format
msgid "There is one configurable attribute:"
-msgstr ""
+msgstr "è¨å®å¯è½ãªå±æ§ã¯ 1 ã¤ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:880
@@ -2806,10 +3337,13 @@
"Sun <literal>Configuration</literal> implementation described in the "
"<literal>Configuration</literal> class JavaDocs is used."
msgstr ""
+"<emphasis role=\"bold\">LoginConfig</emphasis>: ããã©ã«ãã® JAAS ãã°ã¤ã³è¨å®ãæä¾ãã MBean ã® JMX <literal>ObjectName</literal> æååãæå®ãã¾ãã <literal>SecurityConfig</literal> ãèµ·åãããã¨ã ãã® <literal>getConfiguration"
+"(Configuration currentConfig)</literal> æ¼ç®ãã³ã¼ã«ãã¦ã ãã® MBean ã«ãã® <literal>javax.security.auth.login.Configuration</literal> ãåãåããããã¾ãã <literal>LoginConfig</literal> å±æ§ãæå®ããã¦ããªãå ´åã <literal>Configuration</literal> ã¯ã©ã¹ JavaDocs ã«è¨è¼ããã¦ããããã©ã«ãã® Sun <literal>Configuration</literal> å®è£
ã使ç¨ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:885
#, no-c-format
+#, fuzzy
msgid ""
"In addition to allowing for a custom JAAS login configuration "
"implementation, this service allows configurations to be chained together in "
@@ -2817,7 +3351,7 @@
"stack and latter pop it. This is a feature used by the security unit tests "
"to install custom login configurations into a default JBoss installation. "
"Pushing a new configuration is done using:"
-msgstr ""
+msgstr "ã«ã¹ã¿ã JAAS ãã°ã¤ã³è¨å®å®è£
ãå¯è½ã«ãªãä»ã ãã®ãµã¼ãã¹ã«ããè¤æ°ã®è¨å®ãèµ·åæã« 1 ã¹ã¿ãã¯å
ã«ãã§ã¼ã³åãããã¨ãã§ããããã«ãªãããã ãã°ã¤ã³è¨å®ããã®ã¹ã¿ãã¯ã«ããã·ã¥ãã¦ããå¾æ¥ã 使ç¨ãããã¨ãã§ããããã«ãªãã¾ã(??pop it)ã ããã¯ã«ã¹ã¿ã ãã°ã¤ã³ã®è¨å®ãããã©ã«ãã® JBoss ã¤ã³ã¹ãã¼ã«ã«ã¤ã³ã¹ãã¼ã«ããããã»ãã¥ãªãã£ã¦ããããã¹ãã§ä½¿ç¨ãããæ©è½ã«ãªãã¾ãã æ°ããè¨å®ãããã·ã¥ããã«ã¯æ¬¡ã使ç¨ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:888
@@ -2826,6 +3360,8 @@
"public void pushLoginConfig(String objectName) throws\n"
" JMException, MalformedObjectNameException;"
msgstr ""
+"public void pushLoginConfig(String objectName) throws\n"
+" JMException, MalformedObjectNameException;"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:889
@@ -2834,19 +3370,19 @@
"The <literal>objectName</literal> parameters specifies an MBean similar to "
"the <literal>LoginConfig</literal> attribute. The current login "
"configuration may be removed using:"
-msgstr ""
+msgstr "<literal>objectName</literal> ãã©ã¡ã¼ã¿ã¯ <literal>LoginConfig</literal> å±æ§ã«ä¼¼ã MBean ãæå®ãã¾ãã ç¾å¨ã®ãã°ã¤ã³è¨å®ã¯æ¬¡ã使ã£ã¦åé¤ãããã¨ãã§ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:892
#, no-c-format
msgid "public void popLoginConfig() throws JMException;"
-msgstr ""
+msgstr "public void popLoginConfig() throws JMException;"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:896
#, no-c-format
msgid "The DynamicLoginConfig service"
-msgstr ""
+msgstr "DynamicLoginConfig ãµã¼ãã¹"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:897
@@ -2860,13 +3396,13 @@
"configuration as part of a deployment (or just as a standalone service) "
"rather than having to edit the static <literal>login-config.xml</literal> "
"file."
-msgstr ""
+msgstr "<literal>login-config.xml</literal> ãã¡ã¤ã«å
ã§å®ç¾©ãããã»ãã¥ãªãã£ãã¡ã¤ã³ã¯åºæ¬çã«éçã§ãã JBoss ãèµ·åããã¨èªã¿è¾¼ã¾ãã¾ããã æ°è¦ã®ã»ãã¥ãªãã£ãã¡ã¤ã³ã®è¿½å ãæ¢åãã¡ã¤ã³ã®å®ç¾©ã®å¤æ´ã¯å®¹æã§ã¯ããã¾ããã <literal>DynamicLoginConfig</literal> ãµã¼ãã¹ã使ç¨ããã¨åçã«ã»ãã¥ãªãã£ãã¡ã¤ã³ã®å°å
¥ãè¡ããã¨ãã§ããããã«ãªãã¾ãã ããã«ããã éç㪠<literal>login-config.xml</literal> ãã¡ã¤ã«ãç·¨éããã®ã§ã¯ãªãã JAAS ãã°ã¤ã³è¨å®ãå°å
¥ã®ä¸é¨ã¨ã㦠(ã¾ãã¯ã¹ã¿ã³ãã¢ãã¼ã³ã®ãµã¼ãã¹ã¨ãã¦) æå®ãããã¨ãã§ãã¾ãã "
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:900
#, no-c-format
msgid "The service supports the following attributes:"
-msgstr ""
+msgstr "ãã®ãµã¼ãã¹ã¯æ¬¡ã®å±æ§ã«å¯¾å¿ãã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:905
@@ -2875,7 +3411,7 @@
"<emphasis role=\"bold\">AuthConfig</emphasis>: The resource path to the JAAS "
"login configuration file to use. This defaults to <literal>login-config.xml</"
"literal>"
-msgstr ""
+msgstr "<emphasis role=\"bold\">AuthConfig</emphasis>: 使ç¨ãã JAAS ãã°ã¤ã³è¨å®ãã¡ã¤ã«ã¸ã®ãªã½ã¼ã¹ãã¹ã§ãã ããã©ã«ãã§ã¯ <literal>login-config.xml</literal> ã«è¨å®ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:910
@@ -2885,11 +3421,12 @@
"<literal>XMLLoginConfig</literal> service name to use for loading. This "
"service must support a <literal>String loadConfig(URL)</literal> operation "
"to load the configurations."
-msgstr ""
+msgstr "<emphasis role=\"bold\">LoginConfigService</emphasis>: ãã¼ãã«ä½¿ç¨ãã <literal>XMLLoginConfig</literal> ãµã¼ãã¹åã§ãã ãã®ãµã¼ãã¹ã¯è¨å®ããã¼ããããã <literal>String loadConfig(URL)</literal> æ¼ç®ã«å¯¾å¿ããªããã°ãªãã¾ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:915
#, no-c-format
+#, fuzzy
msgid ""
"<emphasis role=\"bold\">SecurityManagerService</emphasis>: The "
"<literal>SecurityManagerService</literal> name used to flush the registered "
@@ -2897,7 +3434,7 @@
"<literal>flushAuthenticationCache(String)</literal> operation to flush the "
"case for the argument security domain. Setting this triggers the flush of "
"the authentication caches when the service is stopped."
-msgstr ""
+msgstr "<emphasis role=\"bold\">SecurityManagerService</emphasis>: ç»é²ã»ãã¥ãªãã£ãã¡ã¤ã³ã®ãã©ãã·ã¥ã«ä½¿ç¨ããã <literal>SecurityManagerService</literal> åã§ãã ãã®ãµã¼ãã¹ã¯å¼æ°(??argument)ã»ãã¥ãªãã£ãã¡ã¤ã³ã®ã±ã¼ã¹(case? typo of cashe?)ã®ãã©ãã·ã¥ããããã <literal>flushAuthenticationCache(String)</literal> æ¼ç®ã«å¯¾å¿ããªããã°ãªãã¾ããã ãããè¨å®ããã¨ãµã¼ãã¹ãåæ¢ãããå ´åã«èªè¨¼ãã£ãã·ã¥ã®ãã©ãã·ã¥ãå¼ãèµ·ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:920
@@ -2905,7 +3442,7 @@
msgid ""
"Here is an example MBean definition using the <literal>DynamicLoginConfig</"
"literal> service."
-msgstr ""
+msgstr "<literal>DynamicLoginConfig</literal> ãµã¼ãã¹ã使ã£ã MBean å®ç¾©ã®ä¾ã«ãªãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:923
@@ -2933,6 +3470,27 @@
" </mbean>\n"
"</server>"
msgstr ""
+"<server>\n"
+" <mbean code=\"org.jboss.security.auth.login.DynamicLoginConfig\" name="
+"\"...\">\n"
+" <attribute name=\"AuthConfig\">login-config.xml</"
+"attribute>\n"
+"\n"
+" <!-- The service which supports dynamic processing of login-"
+"config.xml\n"
+" configurations.\n"
+" -->\n"
+" <depends optional-attribute-name=\"LoginConfigService\">\n"
+" jboss.security:service=XMLLoginConfig </depends>\n"
+"\n"
+" <!-- Optionally specify the security mgr service to use when\n"
+" this service is stopped to flush the auth caches of the domains\n"
+" registered by this service.\n"
+" -->\n"
+" <depends optional-attribute-name=\"SecurityManagerService\">\n"
+" jboss.security:service=JaasSecurityManager </depends>\n"
+" </mbean>\n"
+"</server>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:924
@@ -2943,13 +3501,13 @@
"<literal>loadConfig</literal> with the appropriate resource URL. When the "
"service is stopped the configurations are removed. The resource specified "
"may be either an XML file, or a Sun JAAS login configuration."
-msgstr ""
+msgstr "ãã㯠<literal>loadConfig</literal> ãé©åãªãªã½ã¼ã¹ URL ã§å¼ã³åºããã¨ã«ããæå®ã® <literal>LoginConfigService</literal> MBean ã使ã£ãæå® <literal>AuthConfig</literal> ãªã½ã¼ã¹ããã¼ããã¾ãã ãµã¼ãã¹ãåæ¢ããã¨è¨å®ã¯åé¤ããã¾ãã æå®ããããªã½ã¼ã¹ã¯ XML ãã¡ã¤ã«ã¾ã㯠Sun JAAS ãã°ã¤ã³è¨å®ã®ãããã§ãæ§ãã¾ããã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:930
#, no-c-format
msgid "Using JBoss Login Modules"
-msgstr ""
+msgstr "JBoss ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã使ç¨ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:931
@@ -2962,13 +3520,13 @@
"information for very customized needs in JBoss. Before we explore the "
"individual login modules, let's take a look at a few login module "
"configuration options that are common to multiple modules."
-msgstr ""
+msgstr "JBoss ã«ã¯ã»ã¨ãã©ã®ã¦ã¼ã¶ã¼ç®¡çã®ãã¼ãºã«åããã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãè¤æ°å梱ããã¦ãã¾ãã JBoss ã¯ã¦ã¼ã¶ã¼æ
å ±ããªã¬ã¼ã·ã§ãã«ãã¼ã¿ãã¼ã¹ã LDAP ãµã¼ãã¼ã¾ãã¯ãã©ãããã¡ã¤ã«ç¾¤ããèªã¿åããã¨ãã§ãã¾ãã ã¾ãã ãããã®ã³ã¢ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã«å ãã JBoss 㯠JBoss ã«ããã¦é«åº¦ã«ã«ã¹ã¿ãã¤ãºããããã¼ãºã«å¯¾å¿ããã¦ã¼ã¶ã¼æ
å ±ãæä¾ã§ãããã®ä»ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãããã¤ãæä¾ãã¦ãã¾ãã ããããã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãåå¥ã«èª¬æãã¦ããåã«ã è¤æ°ã®ã¢ã¸ã¥ã¼ã«ã«å
±éã¨ãªããã°ã¤ã³ã¢ã¸ã¥ã¼ã«è¨å®ã®ãªãã·ã§ã³ãããã¤ãè¦ã¦ã¿ã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:935
#, no-c-format
msgid "Password Stacking"
-msgstr ""
+msgstr "Password Stacking"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:936
@@ -2983,7 +3541,7 @@
"managed in a central LDAP server but application-specific roles are stored "
"in the application's relational database. The password-stacking module "
"option captures this relationship."
-msgstr ""
+msgstr "åãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¯èªè¨¼ã¨æ¿èªã®ä¸¡ã³ã³ãã¼ãã³ããæä¾ããå½¢ã§è¤æ°ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã 1 ã¹ã¿ãã¯å
ã«ãã§ã¼ã³åãããã¨ãã§ãã¾ãã ããã¯å¤ãã®ä½¿ç¨ä¾ã«å½¹ç«ã¡ã¾ããã èªè¨¼ã¨æ¿èªãè¤æ°ã®ã¦ã¼ã¶ã¼ç®¡çã¹ãã¢ã«æ¸¡ãåè£ãã¦ãããã¨ãããã¾ãã åè¿°ã®ä¾ã§ã¯ã LDAP ã¨ãªã¬ã¼ã·ã§ãã«ãã¼ã¿ãã¼ã¹ãçµåãã¦ã¦ã¼ã¶ã¼ãããããã®ã·ã¹ãã ã§èªè¨¼ã§ããããã«ããæ¹æ³ã示ãã¾ããã ããã§ã¯ã ã¦ã¼ã¶ã¼ã¯ä¸å¤® LDAP ãµã¼ãã¼ã§ç®¡çããã¦ãããã¢ããªã±ã¼ã·ã§ã³åºæã®ãã¼ã«ã¯ã¢ããªã±ã¼ã·ã§ã³ã®ãªã¬ã¼ã·ã§ãã«ãã¼ã¿ãã¼ã¹ã«æ ¼ç´ããã¦ããå ´åãèãã¦ã¿ã¦ãã ããã password-stacking ã®ã¢ã¸ã¥ã¼ã«ãªãã·ã§ã³ããã®é¢ä¿ããã£ããã£ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:941
@@ -3000,10 +3558,14 @@
"login.name</literal> and <literal>javax.security.auth.login.password</"
"literal> respectively."
msgstr ""
+"<emphasis role=\"bold\">password-stacking</emphasis>: <literal>password-"
+"stacking</literal> ãªãã·ã§ã³ã <literal>useFirstPass</literal> ã«è¨å®ãããã¨ã ãã®ã¢ã¸ã¥ã¼ã«ã¯ã¾ããã°ã¤ã³ã¢ã¸ã¥ã¼ã«å
±æç¶æ
ãããã«ããããããã£å <literal>javax.security.auth.login.name</literal> 㨠<literal>javax.security.auth.login.password</literal> ã®é
ä¸ã§ããããå
±æã®ã¦ã¼ã¶ã¼åã¨ãã¹ã¯ã¼ããæ¢ãã¾ãã ããããè¦ã¤ãã㨠principal åã¨ãã¹ã¯ã¼ãã¨ãã¦ä½¿ç¨ããã¾ãã è¦ã¤ãããªãå ´åã¯ã principal åã¨ãã¹ã¯ã¼ãã¯ãã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã§è¨å®ããããããããããã£å <literal>javax.security.auth.login.name</literal> 㨠<literal>javax.security.auth.login.password</"
+"literal> ã®é
ä¸ã«æ ¼ç´ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:946
#, no-c-format
+#, fuzzy
msgid ""
"To use password stacking, each login module should set <literal>password-"
"stacking</literal> to <literal>useFirstPass</literal>. If a previous module "
@@ -3011,12 +3573,14 @@
"stacking modules will consider the user authenticated and only attempt to "
"provide a set of roles for the authorization step."
msgstr ""
+"ãã¹ã¯ã¼ãã¹ã¿ããã³ã°ã使ç¨ããã«ã¯ã åãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã <literal>password-"
+"stacking</literal> ã <literal>useFirstPass</literal> ã«è¨å®ããå¿
è¦ãããã¾ãã "
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:949
#, no-c-format
msgid "The following listing shows how password stacking could be used:"
-msgstr ""
+msgstr "以ä¸ã¯ãã¹ã¯ã¼ãã¹ã¿ããã³ã°ã®ä½¿ãæ¹ã«ã¤ãã¦è¡¨ç¤ºãã¦ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:952
@@ -3041,6 +3605,24 @@
" </authentication>\n"
"</application-policy>"
msgstr ""
+"<application-policy name=\"todo\">\n"
+" <authentication>\n"
+" <login-module code=\"org.jboss.security.auth.spi.LdapLoginModule"
+"\" \n"
+" flag=\"required\">\n"
+" <!-- LDAP configuration -->\n"
+" <module-option name=\"password-stacking\">useFirstPass</"
+"module-option>\n"
+" </login-module>\n"
+" <login-module code=\"org.jboss.security.auth.spi."
+"DatabaseServerLoginModule\" \n"
+" flag=\"required\">\n"
+" <!-- database configuration --> \n"
+" <module-option name=\"password-stacking\">useFirstPass</"
+"module-option>\n"
+" </login-module>\n"
+" </authentication>\n"
+"</application-policy>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:953
@@ -3049,13 +3631,14 @@
"When using password stacking, it is usually appropriate to set all modules "
"to be required to make sure that all modules are considered and have chance "
"to contribute roles to the authorization process."
-msgstr ""
+msgstr "ãã¹ã¯ã¼ãã¹ã¿ããã³ã°ã使ç¨ããå ´åã ä¸è¬çã«ã¯ãã¹ã¦ã®ã¢ã¸ã¥ã¼ã«ãæ¿èªããã»ã¹ã«å¯¾ãã¦ãã¼ã«ãæä¾ããã¨ã¿ãªãã ãããæä¾ããæ©ä¼ãä¸ããããããå
¨ã¢ã¸ã¥ã¼ã«ãå¿
è¦ã¨ãªãããã«è¨å®ããã®ãé©å½ã§ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:959
#, no-c-format
+#, fuzzy
msgid "Password Hashing"
-msgstr ""
+msgstr "ãã¹ã¯ã¼ãããã·ã¥"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:960
@@ -3066,7 +3649,7 @@
"with plain text passwords, but can also be configured to support hashed "
"passwords to prevent plain text passwords from being stored on the server "
"side."
-msgstr ""
+msgstr "ã»ã¨ãã©ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¯ã¯ã©ã¤ã¢ã³ãæä¾ã®ãã¹ã¯ã¼ããã¦ã¼ã¶ã¼ç®¡çã·ã¹ãã ã«ä¿åããã¦ãããã¹ã¯ã¼ãã¨æ¯è¼ããå¿
è¦ãããã¾ãã ãããã®ã¢ã¸ã¥ã¼ã«ã¯ä¸è¬çã«ãã¬ã¼ã³ããã¹ãã®ãã¹ã¯ã¼ãã§åä½ãã¾ããã ãµã¼ãã¼å´ã§ãã¬ã¼ã³ããã¹ãã®ãã¹ã¯ã¼ããä¿åãããªãããããã·ã¥åãããã¹ã¯ã¼ãã«å¯¾å¿ããããè¨å®ãããã¨ãã§ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:965
@@ -3077,7 +3660,7 @@
"password. There is no default so this option must be specified to enable "
"hashing. Typical values are <literal>MD5</literal> and <literal>SHA</"
"literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">hashAlgorithm</emphasis>: ãã¹ã¯ã¼ãã®ããã·ã¥åã«ä½¿ç¨ãã <literal>java.security.MessageDigest</literal> ã¢ã«ã´ãªãºã åã§ãã ããã©ã«ãã¯ãªãããã ããã·ã¥åãæå¹ã«ããã«ã¯ãã®ãªãã·ã§ã³ãæå®ããå¿
è¦ãããã¾ãã ä¸è¬çãªå¤ã¯ <literal>MD5</literal> ã <literal>SHA</literal> ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:970
@@ -3087,16 +3670,17 @@
"hashed pass and must be either <literal>base64</literal>, <literal>hex</"
"literal> or <literal>rfc2617</literal>. The default is <literal>base64</"
"literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">hashEncoding</emphasis>: ããã·ã¥åãã¹ã®æååå½¢å¼ã§ã <literal>base64</literal>ã <literal>hex</literal>ã <literal>rfc2617</literal> ã®ããããã«ãªããªããã°ãªãã¾ããã ããã©ã«ã㯠<literal>base64</literal> ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:975
#, no-c-format
+#, fuzzy
msgid ""
"<emphasis role=\"bold\">hashCharset</emphasis>: The encoding used to convert "
"the clear text password to a byte array. The platform default encoding is "
"the default."
-msgstr ""
+msgstr "<emphasis role=\"bold\">hashCharset</emphasis>: ã¯ãªã¢ããã¹ãã®ãã¹ã¯ã¼ãããã¤ãã¢ã¬ã¤ã«å¤æããããã«ä½¿ç¨ããã¨ã³ã³ã¼ãã£ã³ã°ã§ãã ãã©ãããã©ã¼ã ããã©ã«ãã¨ã³ã³ã¼ãã£ã³ã°ã¯ããã©ã«ãã§ãã (defalut??)"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:980
@@ -3106,11 +3690,12 @@
"hashing algorithm should be applied to the password the user submits. The "
"hashed user password will be compared against the value in the login module, "
"which is expected to be a hash of the password. The default is true."
-msgstr ""
+msgstr "<emphasis role=\"bold\">hashUserPassword</emphasis>: ã¦ã¼ã¶ã¼ããµãããããããã¹ã¯ã¼ãã«å¯¾ãã¦ããã·ã¥ã¢ã«ã´ãªãºã ãé©ç¨ãããªããã°ãªããªããã¨ã示ãã¾ãã ããã·ã¥åãããã¦ã¼ã¶ã¼ãã¹ã¯ã¼ãã¯ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«å
ã®å¤ã«å¯¾ãã¦æ¯è¼ããã ããã¯ãã¹ã¯ã¼ãã®ããã·ã¥ã§ãããã¨ãæå¾
ããã¦ãã¾ãã ããã©ã«ã㯠true ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:985
#, no-c-format
+#, fuzzy
msgid ""
"<emphasis role=\"bold\">hashStorePassword</emphasis>: This indicates that "
"the hashing algorithm should be applied to the password stored on the server "
@@ -3119,17 +3704,18 @@
"be comare. JBoss uses the hash algorithm (for digest, this would be "
"<literal>rfc2617</literal>) to compute a server-side hash that should match "
"the hashed value sent from the client."
-msgstr ""
+msgstr "<emphasis role=\"bold\">hashStorePassword</emphasis>: ãµã¼ãã¼å´ã«æ ¼ç´ããã¦ãããã¹ã¯ã¼ãã«å¯¾ãã¦ããã·ã¥ã¢ã«ã´ãªãºã ãé©ç¨ãããªããã°ãªããªããã¨ã示ãã¾ãã ããã¯ã ã¦ã¼ã¶ã¼ãã¦ã¼ã¶ã¼ãã¹ã¯ã¼ãã®ããã·ã¥ã¨å
±ã«æ¯è¼ç¨ã®ãµã¼ãã¼ããã®è¦æ±åºæãã¼ã¯ã³ããµãããããããã¤ã¸ã§ã¹ãèªè¨¼ã«ä½¿ç¨ããã¾ãã (comare?? => compared?) JBoss ã¯ããã·ã¥ã¢ã«ã´ãªãºã (ãã¤ã¸ã§ã¹ãã®å ´åã <literal>rfc2617</literal> ã«ãªã) ã使ç¨ãã¦ã¯ã©ã¤ã¢ã³ãããéä¿¡ãããããã·ã¥åãããå¤ã¨ä¸è´ãã¹ããµã¼ãã¼å´ã®ããã·ã¥ãè¨ç®ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:990
#, no-c-format
+#, fuzzy
msgid ""
"The following is an login module configuration that assigns unauthenticated "
"users the principal name <literal>nobody</literal> and contains based64-"
"encoded, MD5 hashes of the passwords in a <literal>usersb64.properties</"
"literal> file."
-msgstr ""
+msgstr "以ä¸ã¯ã æªèªè¨¼ã®ã¦ã¼ã¶ã¼ã« principal å <literal>nobody</literal> ãå²ãå½ã¦ã¦ã <literal>usersb64.properties</literal> ãã¡ã¤ã«å
ã®ãã¹ã¯ã¼ãã® based64 ã¨ã³ã³ã¼ãå MD5 ããã·ã¥ãå«ããã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®è¨å®ã«ãªãã¾ããassigns the principal name 'nobody' to unahtenticated users??"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:993
@@ -3150,6 +3736,20 @@
" </application-policy>\n"
"</policy>"
msgstr ""
+"<policy>\n"
+" <application-policy name=\"testUsersRoles\">\n"
+" <authentication>\n"
+" <login-module code=\"org.jboss.security.auth.spi."
+"UsersRolesLoginModule\"\n"
+" flag=\"required\">\n"
+" <module-option name=\"hashAlgorithm\">MD5</module-"
+"option>\n"
+" <module-option name=\"hashEncoding\">base64</module-"
+"option> \n"
+" </login-module>\n"
+" </authentication>\n"
+" </application-policy>\n"
+"</policy>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:994
@@ -3158,7 +3758,7 @@
"If you need to generate passwords in code, <literal>the org.jboss.security."
"Util</literal> class provides a static helper method that will hash a "
"password using a given encoding."
-msgstr ""
+msgstr "ã³ã¼ãã§ãã¹ã¯ã¼ããçæããå¿
è¦ãããå ´åã¯ã <literal>the org.jboss.security.Util</literal> ã¯ã©ã¹ãç¹å®ã®ã¨ã³ã³ã¼ãã£ã³ã°ã使ã£ã¦ãã¹ã¯ã¼ããããã·ã¥ããéçãªãã«ãã¼ã¡ã½ãããæä¾ãã¦ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:997
@@ -3170,19 +3770,23 @@
" null,\n"
" \"password\");"
msgstr ""
+"String hashedPassword = Util.createPasswordHash(\"MD5\",\n"
+" Util.BASE64_ENCODING,\n"
+" null,\n"
+" null,\n"
+" \"password\");"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:998
#, no-c-format
-msgid ""
-"OpenSSL provides an alternative way to quickly generate hashed passwords."
-msgstr ""
+msgid "OpenSSL provides an alternative way to quickly generate hashed passwords."
+msgstr "æçã«ããã·ã¥åããããã¹ã¯ã¼ããçæãã代æ¿æ¹æ³ã¯ OpenSSL ãæä¾ãã¦ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1001
#, no-c-format
msgid "echo -n password | openssl dgst -md5 -binary | openssl base64"
-msgstr ""
+msgstr "echo -n password | openssl dgst -md5 -binary | openssl base64"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1002
@@ -3190,13 +3794,13 @@
msgid ""
"In both cases, the text password should hash to \"X03MO1qnZdYdgyfeuILPmQ=="
"\". This is the value that would need to be stored in the user store."
-msgstr ""
+msgstr "ãããã®å ´åãã ããã¹ããã¹ã¯ã¼ã㯠\"X03MO1qnZdYdgyfeuILPmQ==\" ã«ããã·ã¥ããªããã°ãªãã¾ããã ã¦ã¼ã¶ã¼ã®ã¹ãã¢ã«æ ¼ç´ãããå¿
è¦ãããå¤ããã®å¤ã§ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1008
#, no-c-format
msgid "Unauthenticated Identity"
-msgstr ""
+msgstr "æªèªè¨¼ã® ID"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1009
@@ -3209,7 +3813,7 @@
"methods on EJBs that do not require a specific role. Such a principal has no "
"associated roles and so can only access either unsecured EJBs or EJB methods "
"that are associated with the unchecked permission constraint."
-msgstr ""
+msgstr "ãã¹ã¦ã®è¦æ±ãèªè¨¼æ¸ã¿ã§çä¿¡ããããã§ã¯ããã¾ããã æªèªè¨¼ ID ã¯ã é¢é£ä»ãããã¦ããèªè¨¼æ
å ±ãæããªãè¦æ±ã«ç¹å®ã® ID (guest ãªã©) ãå²ãå½ã¦ããã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®è¨å®ãªãã·ã§ã³ã«ãªãã¾ãã ããã使ç¨ããã¨ä¿è·ããã¦ããªããµã¼ãã¬ãããç¹å®ã®ãã¼ã«ãå¿
è¦ã¨ããªã EJB ã§ã¡ã½ãããå¼ã³åºããã¨ãã§ããããã«ãªãã¾ãã ãã®ãã㪠principal ã¯é¢é£ä»ãããããã¼ã«ããªãããã æªãã§ãã¯ã®ãã¼ããã·ã§ã³å¶éã«é¢é£ä»ãããã¦ããå®å
¨åããã¦ããªã EJB ã¾ã㯠EJB ã¡ã½ããã®ããããã«ããã¢ã¯ã»ã¹ã§ãã¾ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1014
@@ -3218,13 +3822,13 @@
"<emphasis role=\"bold\">unauthenticatedIdentity</emphasis>: This defines the "
"principal name that should be assigned to requests that contain no "
"authentication information."
-msgstr ""
+msgstr "<emphasis role=\"bold\">unauthenticatedIdentity</emphasis>: èªè¨¼æ
å ±ãæããªãè¦æ±ã«å²ãå½ã¦ãããã¹ã principal åãå®ç¾©ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1022
#, no-c-format
msgid "UsersRolesLoginModule"
-msgstr ""
+msgstr "UsersRolesLoginModule"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1023
@@ -3241,7 +3845,7 @@
"classpath. The primary purpose of this login module is to easily test the "
"security settings of multiple users and roles using properties files "
"deployed with the application."
-msgstr ""
+msgstr "<literal>UsersRolesLoginModule</literal> ã¯ã·ã³ãã«ãªãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã§ã Java ããããã£ãã¡ã¤ã«ç¾¤ãããã¼ããããè¤æ°ã®ã¦ã¼ã¶ã¼ããã³ã¦ã¼ã¶ã¼ãã¼ã«ã«å¯¾å¿ãã¾ãã ã¦ã¼ã¶ã¼åãããã¹ã¯ã¼ãã¸ã®ãããã³ã°ãã¡ã¤ã«ã¯ <literal>users.properties</literal> ã¨å¼ã°ãã ã¦ã¼ã¶ã¼åãããã¼ã«ã¸ã®ãããã³ã°ãã¡ã¤ã«ã¯ <literal>roles.properties</literal> ã¨å¼ã°ãã¾ãã ãã®ããããã£ãã¡ã¤ã«ã¯åæåä¸ã«åæåã¡ã½ããã¹ã¬ããã³ã³ããã¹ãã¯ã©ã¹ãã¼ãã¼ã使ã£ã¦ãã¼ãããã¾ãã ã¤ã¾ãã ãããã®ãã¡ã¤ã«ã¯ J2EE deployment JARã JBoss ã®è¨å®ãã£ã¬ã¯ããªã ã¾ã㯠JBoss ãµã¼ãã¼ãã·ã¹ãã ã¯ã©ã¹ãã¹ä¸ã®ãããã®ãã£ã¬ã¯ããªã«ãé
ç½®ãããã¨ãã§ããã¨ãããã¨ã«ãªãã¾ãã ã¢ããªã±ã¼ã·ã§ã³ã§é
åãããããããã£ãã¡ã¤ã«ã使ã£ã!
¦è¤æ°ã®ã¦ã¼ã¶ã¼ããã¼ã«ã®ã»ãã¥ãªãã£è¨å®ãç°¡åã«ãã¹ãã§ãããã¨ããã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®ä¸»ãªç®çã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1026
@@ -3250,7 +3854,7 @@
"The <literal>users.properties</literal> file uses a "
"<literal>username=password</literal> format with each user entry on a "
"separate line as show here:"
-msgstr ""
+msgstr "以ä¸ã«ç¤ºãããã«ã <literal>users.properties</literal> ãã¡ã¤ã«ã¯åã¦ã¼ã¶ã¼ã¨ã³ããªã«å¯¾ã㦠1 è¡ãã¨ã« <literal>username=password</literal> ã®å½¢å¼ã使ç¨ãã¦ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1029
@@ -3260,6 +3864,9 @@
"username2=password2\n"
"..."
msgstr ""
+"username1=password1\n"
+"username2=password2\n"
+"..."
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1030
@@ -3267,7 +3874,7 @@
msgid ""
"The <literal>roles.properties</literal> file uses as <literal>username=role1,"
"role2,...</literal> format with an optional group name value. For example:"
-msgstr ""
+msgstr "<literal>roles.properties</literal> ãã¡ã¤ã«ã¯ <literal>username=role1,role2,...</literal> ã®å½¢å¼ã使ç¨ãã ãã®å½¢å¼ã«ãªãã·ã§ã³ã§ã°ã«ã¼ãã®å¤ãã¨ãã¾ãã ãã¨ãã°ã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1033
@@ -3277,6 +3884,9 @@
"username1.RoleGroup1=role3,role4,...\n"
"username2=role1,role3,..."
msgstr ""
+"username1=role1,role2,...\n"
+"username1.RoleGroup1=role3,role4,...\n"
+"username2=role1,role3,..."
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1034
@@ -3289,7 +3899,7 @@
"<literal>username.Roles=...</literal>, where the <literal>Roles</literal> "
"group name is the standard name the <literal>JaasSecurityManager</literal> "
"expects to contain the roles which define the users permissions."
-msgstr ""
+msgstr "ããããã£åã® <literal>username.XXX</literal> å½¢å¼ã¯ã¦ã¼ã¶ã¼åãã¼ã«ãç¹å®ã®æå®ãã¼ã«ã°ã«ã¼ãã«å²ãå½ã¦ãããã«ä½¿ç¨ãã¾ãã ããããã£åã® <literal>XXX</literal> ã®é¨åã¯ã°ã«ã¼ãåã«ãªãã¾ãã <literal>username=...</literal> å½¢å¼ã¯ <literal>username.Roles=...</literal> ã®ç¥ã§ã <literal>Roles</literal> ã°ã«ã¼ãå㯠<literal>JaasSecurityManager</literal> ãã¦ã¼ã¶ã¼ãã¼ããã·ã§ã³ãå®ç¾©ãããã¼ã«ãå«ãããã«æå¾
ããæ¨æºåã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1037
@@ -3297,7 +3907,7 @@
msgid ""
"The following would be equivalent definitions for the <literal>jduke</"
"literal> username:"
-msgstr ""
+msgstr "次ã¯ããããã¦ã¼ã¶ã¼å <literal>jduke</literal> ã®å®ç¾©ã§åçã«ãªãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1040
@@ -3306,13 +3916,15 @@
"jduke=TheDuke,AnimatedCharacter\n"
"jduke.Roles=TheDuke,AnimatedCharacter"
msgstr ""
+"jduke=TheDuke,AnimatedCharacter\n"
+"jduke.Roles=TheDuke,AnimatedCharacter"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1041 J2EE_Security_On_JBOSS.xml:1101
#: J2EE_Security_On_JBOSS.xml:1210 J2EE_Security_On_JBOSS.xml:1338
#, no-c-format
msgid "The supported login module configuration options include the following:"
-msgstr ""
+msgstr "ãµãã¼ãããã¦ãããã°ã¤ã³ã¢ã¸ã¥ã¼ã«è¨å®ãªãã·ã§ã³ã«ã¯æ¬¡ã®ãããªãã®ãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1046
@@ -3321,7 +3933,7 @@
"<emphasis role=\"bold\">usersProperties</emphasis>: The name of the "
"properties resource containing the username to password mappings. This "
"defaults to <literal>users.properties</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">usersProperties</emphasis>: ã¦ã¼ã¶ã¼åãããã¹ã¯ã¼ãã¸ã®ãããã³ã°ãå«ãããããã£ãªã½ã¼ã¹åã§ãã ããã©ã«ãã§ã¯ <literal>users.properties</literal> ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1051
@@ -3330,7 +3942,7 @@
"<emphasis role=\"bold\">rolesProperties</emphasis>: The name of the "
"properties resource containing the username to roles mappings. This defaults "
"to <literal>roles.properties</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">rolesProperties</emphasis>: ã¦ã¼ã¶ã¼åãããã¼ã«ã¸ã®ãããã³ã°ãå«ãããããã£ãªã½ã¼ã¹åã§ãã ããã©ã«ãã§ã¯ <literal>roles.properties</literal> ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1056
@@ -3338,13 +3950,13 @@
msgid ""
"This login module supports password stacking, password hashing and "
"unauthenticated identity."
-msgstr ""
+msgstr "ãã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¯ãã¹ã¯ã¼ãã¹ã¿ããã³ã°ã ãã¹ã¯ã¼ãããã·ã¥ã æªèªè¨¼ ID ã«å¯¾å¿ãã¦ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1062
#, no-c-format
msgid "LdapLoginModule"
-msgstr ""
+msgstr "LdapLoginModule"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1063
@@ -3354,7 +3966,7 @@
"implementation that authenticates against an LDAP server. You would use the "
"<literal>LdapLoginModule</literal> if your username and credentials are "
"stored in an LDAP server that is accessible using a JNDI LDAP provider."
-msgstr ""
+msgstr "<literal>LdapLoginModule</literal> 㯠<literal>LoginModule</literal> å®è£
ã§ããã LDAP ãµã¼ãã¼ã«å¯¾ãã¦èªè¨¼ãè¡ãã¾ãã ã¦ã¼ã¶ã¼åããã³è¨¼ææ¸ã JNDI LDAP ãããã¤ãã使ã£ã¦ã¢ã¯ã»ã¹å¯è½ãª LDAP ãµã¼ãã¼ã«æ ¼ç´ããã¦ããå ´åã¯ã <literal>LdapLoginModule</literal> ã使ç¨ãããã¨ã«ãªãã§ãããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1066
@@ -3363,7 +3975,7 @@
"The LDAP connectivity information is provided as configuration options that "
"are passed through to the environment object used to create JNDI initial "
"context. The standard LDAP JNDI properties used include the following:"
-msgstr ""
+msgstr "LDAP ã®æ¥ç¶æ§æ
å ±ã¯ JNDI åæã³ã³ããã¹ãã®ä½æã«ä½¿ç¨ãããç°å¢ãªãã¸ã§ã¯ãã«æ¸¡ãããè¨å®ãªãã·ã§ã³ã¨ãã¦æä¾ããã¾ãã 使ç¨ãããæ¨æºç㪠LDAP JNDI ããããã£ã«ã¯æ¬¡ã®ãããªãã®ãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1071
@@ -3373,7 +3985,7 @@
"classname of the <literal>InitialContextFactory</literal> implementation. "
"This defaults to the Sun LDAP provider implementation <literal>com.sun.jndi."
"ldap.LdapCtxFactory</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">java.naming.factory.initial</emphasis>: <literal>InitialContextFactory</literal> å®è£
ã®ã¯ã©ã¹åã§ãã ããã©ã«ãã§ã¯ Sun LDAP ãããã¤ãå®è£
ã¨ãªã <literal>com.sun.jndi.ldap.LdapCtxFactory</literal> ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1076
@@ -3381,7 +3993,7 @@
msgid ""
"<emphasis role=\"bold\">java.naming.provider.url</emphasis>: The LDAP URL "
"for the LDAP server"
-msgstr ""
+msgstr "<emphasis role=\"bold\">java.naming.provider.url</emphasis>: LDAP ãµã¼ãã¼ã® LDAP URL ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1081
@@ -3389,7 +4001,7 @@
msgid ""
"<emphasis role=\"bold\">java.naming.security.authentication</emphasis>: The "
"security level to use. This defaults to <literal>simple</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">java.naming.security.authentication</emphasis>: 使ç¨ããã»ãã¥ãªãã£ã¬ãã«ã§ãã ããã©ã«ãã§ã¯ <literal>simple</literal> ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1086
@@ -3397,7 +4009,7 @@
msgid ""
"<emphasis role=\"bold\">java.naming.security.protocol</emphasis>: The "
"transport protocol to use for secure access, such as, SSL."
-msgstr ""
+msgstr "<emphasis role=\"bold\">java.naming.security.protocol</emphasis>: SSL ãªã©ã»ãã¥ã¢ãªã¢ã¯ã»ã¹ã«ä½¿ç¨ãã転éãããã³ã«ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1091
@@ -3406,7 +4018,7 @@
"<emphasis role=\"bold\">java.naming.security.principal</emphasis>: The "
"principal for authenticating the caller to the service. This is built from "
"other properties as described below."
-msgstr ""
+msgstr "<emphasis role=\"bold\">java.naming.security.principal</emphasis>: å¼ã³åºãå´ããµã¼ãã¹ã«å¯¾ãã¦èªè¨¼ããããã® principal ã§ãã 以ä¸ã«ç¤ºãããã«ä»ã®ããããã£ããæ§ç¯ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1096
@@ -3415,7 +4027,7 @@
"<emphasis role=\"bold\">java.naming.security.credentials</emphasis>: The "
"value of the property depends on the authentication scheme. For example, it "
"could be a hashed password, clear-text password, key, certificate, and so on."
-msgstr ""
+msgstr "<emphasis role=\"bold\">java.naming.security.credentials</emphasis>: èªè¨¼ã¹ãã¼ã ã«ä¾åããããããã£ã®å¤ã§ãã ãã¨ãã°ã ããã·ã¥åããããã¹ã¯ã¼ãã ã¯ãªã¢ããã¹ãã®ãã¹ã¯ã¼ãã ãã¼ã 証ææ¸ãªã©ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1106
@@ -3424,7 +4036,7 @@
"<emphasis role=\"bold\">principalDNPrefix</emphasis>: A prefix to add to the "
"username to form the user distinguished name. See "
"<literal>principalDNSuffix</literal> for more info."
-msgstr ""
+msgstr "<emphasis role=\"bold\">principalDNPrefix</emphasis>: ã¦ã¼ã¶ã¼ãè¦åããããã®ååãæ§æããããã«ã¦ã¼ã¶ã¼åã«è¿½å ãããã¬ãã£ãã¯ã¹ã§ãã 詳細ã«ã¤ãã¦ã¯ <literal>principalDNSuffix</literal> ãã覧ãã ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1111
@@ -3436,7 +4048,7 @@
"enter the fully distinguished name. Using this property and "
"<literal>principalDNSuffix</literal> the <literal>userDN</literal> will be "
"formed as <literal>principalDNPrefix + username + principalDNSuffix</literal>"
-msgstr ""
+msgstr "<emphasis role=\"bold\">principalDNSuffix</emphasis>: ã¦ã¼ã¶ã¼ãè¦åããããã®ååãæ§æããå ´åã«ã¦ã¼ã¶ã¼åã«è¿½å ãããµãã£ã¯ã¹ã§ãã ã¦ã¼ã¶ã¼ã«ã¦ã¼ã¶ã¼åã®å
¥åãæ±ããå ´åã«ä¾¿å©ã§ã ã¦ã¼ã¶ã¼ã¯å®å
¨ãªèå¥åãå
¥åããå¿
è¦ãããã¾ããã ãã®ããããã£ããã³ <literal>principalDNSuffix</literal> ã使ç¨ããã¨ã <literal>userDN</literal> 㯠<literal>principalDNPrefix + username + principalDNSuffix</literal> ã¨ããæ§æã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1116
@@ -3450,6 +4062,8 @@
"<literal>PasswordCallback</literal>. This allows for passing non-"
"<literal>char[]</literal> credential information to the LDAP server."
msgstr ""
+"<emphasis role=\"bold\">useObjectCredential</emphasis>: 証ææ¸ã JAAS "
+"<literal>PasswordCallback</literal> ã使ã£ã <literal>char[]</literal> ãã¹ã¯ã¼ãã¨ãã¦ã§ã¯ãªã <literal>org.jboss.security.auth.callback.ObjectCallback</literal> ã¿ã¤ãã® <literal>Callback</literal> ã使ã£ãããã¾ã㪠<literal>Object</literal> ã¨ãã¦åå¾ãããã¹ãã§ãããã¨ã示ã true ã false ã®å¤ã§ãã ããã«ãã <literal>char[]</literal> 以å¤ã®è¨¼ææ¸æ
å ±ã LDAP ãµã¼ãã¼ã«æ¸¡ããã¨ãã§ããããã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1121
@@ -3457,7 +4071,7 @@
msgid ""
"<emphasis role=\"bold\">rolesCtxDN</emphasis>: The fixed distinguished name "
"to the context to search for user roles."
-msgstr ""
+msgstr "<emphasis role=\"bold\">rolesCtxDN</emphasis>: ã¦ã¼ã¶ã¼ãã¼ã«ãæ¤ç´¢ããããã®ã³ã³ããã¹ãã«å¯¾ããåºå®ã®èå¥åã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1126
@@ -3468,7 +4082,7 @@
"context to search for user roles. This differs from <literal>rolesCtxDN</"
"literal> in that the context to search for a user's roles can be unique "
"for each user."
-msgstr ""
+msgstr "<emphasis role=\"bold\">userRolesCtxDNAttributeName</emphasis>: ã¦ã¼ã¶ã¼ãã¼ã«ãæ¤ç´¢ããããã®ã³ã³ããã¹ãã«å¯¾ããèå¥åãå«ãã¦ã¼ã¶ã¼ãªãã¸ã§ã¯ãå
ã®å±æ§åã§ãã ã¦ã¼ã¶ã¼ã®ãã¼ã«ãæ¤ç´¢ããããã®ã³ã³ããã¹ããåã¦ã¼ã¶ã¼ã«å¯¾ãã¦åºæã§ããã¨ããç¹ã§ <literal>rolesCtxDN</literal> ã¨ç°ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1131
@@ -3477,7 +4091,7 @@
"<emphasis role=\"bold\">roleAttributeID</emphasis>: The name of the "
"attribute that contains the user roles. If not specified this defaults to "
"<literal>roles</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">roleAttributeID</emphasis>: ã¦ã¼ã¶ã¼ãã¼ã«ãå«ãå±æ§åã§ãã æå®ããªãã¨ã ããã©ã«ãã§ã¯ <literal>roles</literal> ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1136
@@ -3493,7 +4107,7 @@
"directory schemas (e.g., MS ActiveDirectory), role attributes in the user "
"object are stored as DNs to role objects instead of as simple names, in "
"which case, this property should be set to true. The default is false."
-msgstr ""
+msgstr "<emphasis role=\"bold\">roleAttributeIsDN</emphasis>: <literal>roleAttributeID</literal> ããã¼ã«ãªãã¸ã§ã¯ãã®å®å
¨èå¥åãå«ãããã®ãã¼ã«åãå«ããã示ããã©ã°ã§ãã false ãªãã ãã¼ã«åã <literal>roleAttributeID</literal> ã®å¤ããåå¾ããã¾ãã true ãªãã ãã¼ã«å±æ§ã¯ãã¼ã«ãªãã¸ã§ã¯ãã®èå¥åã表ãã¾ãã ãã¼ã«åã¯èå¥åã§ãã®ã³ã³ããã¹ãåã® <literal>roleNameAttributeId</literal> å±æ§å¤ããåå¾ããã¾ãã ç¹å®ã®ãã£ã¬ã¯ããªã¹ãã¼ã ã§ã¯ (MS ActiveDirectory ãªã©)ã ã¦ã¼ã¶ã¼ãªãã¸ã§ã¯ãã«ãããã¼ã«å±æ§ãåç´ãªååã§ã¯ãªããã¼ã«ãªãã¸ã§ã¯ãã«å¯¾ãã DN ã¨ãã¦æ ¼ç´ãããã®ã§ã ããããå ´åã«ã¯ãã®ããããã£ã¯ true ã«è¨å®ãããªããã°ãªãã¾ããã ããã©ã«ã㯠false ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1141
@@ -3505,7 +4119,7 @@
"<literal>roleAttributeIsDN</literal> property is set to true, this property "
"is used to find the role object's name attribute. The default is "
"<literal>group</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">roleNameAttributeID</emphasis>: ãã¼ã«åãå«ã <literal>roleCtxDN</literal> èå¥åã®å¤ã«ãã£ã¦ãã¤ã³ããããã³ã³ããã¹ãã®å±æ§åã§ãã <literal>roleAttributeIsDN</literal> ããããã£ã true ã«è¨å®ãããã¨ã ãã®ããããã£ã¯ãã¼ã«ãªãã¸ã§ã¯ãã®ååå±æ§ã®æ¤ç´¢ã«ä½¿ç¨ããã¾ãã ããã©ã«ã㯠<literal>group</literal> ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1146
@@ -3515,7 +4129,7 @@
"in the object containing the user roles that corresponds to the userid. This "
"is used to locate the user roles. If not specified this defaults to "
"<literal>uid</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">uidAttributeID</emphasis>: userid ã«ç¸å½ããã¦ã¼ã¶ã¼ãã¼ã«ãå«ããªãã¸ã§ã¯ãå
ã®å±æ§åã§ãã ã¦ã¼ã¶ã¼ãã¼ã«ã®æ¤ç´¢ã«ä½¿ç¨ãã¾ãã æå®ããã¦ããªãã¨ã ããã©ã«ãã§ã¯ <literal>uid</literal> ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1151
@@ -3526,7 +4140,7 @@
"distinguished name. If false, just the username is used as the match value "
"against the <literal>uidAttributeName</literal> attribute. If true, the full "
"<literal>userDN</literal> is used as the match value."
-msgstr ""
+msgstr "<emphasis role=\"bold\">matchOnUserDN</emphasis>: ã¦ã¼ã¶ã¼ãã¼ã«ã®æ¤ç´¢ãã¦ã¼ã¶ã¼ã®å®å
¨èå¥åã§ä¸è´ãã¹ããã©ããã示ã true ã¾ã㯠false ã®ãã©ã°ã§ãã false ãªãã <literal>uidAttributeName</literal> å±æ§ã«å¯¾ãã¦ä¸è´ããå¤ã¨ãã¦ã¦ã¼ã¶ã¼åã ãã使ç¨ããã¾ãã true ãªãã ä¸è´ããå¤ã¨ãã¦å®å
¨ãª <literal>userDN</literal> ã使ç¨ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1156
@@ -3536,7 +4150,7 @@
"name that should be assigned to requests that contain no authentication "
"information. This behavior is inherited from the "
"<literal>UsernamePasswordLoginModule</literal> superclass."
-msgstr ""
+msgstr "<emphasis role=\"bold\">unauthenticatedIdentity</emphasis>: èªè¨¼æ
å ±ãæããªãè¦æ±ã«å²ãå½ã¦ãããã¹ã principal åã§ãã ãã®åä½ã¯ <literal>UsernamePasswordLoginModule</literal> ã¹ã¼ãã¼ã¯ã©ã¹ããå¼ãç¶ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1161
@@ -3548,7 +4162,7 @@
"not be a desirable feature. Set this to false to reject empty passwords or "
"true to have the LDAP server validate the empty password. The default is "
"true."
-msgstr ""
+msgstr "<emphasis role=\"bold\">allowEmptyPasswords</emphasis>: LDAP ãµã¼ãã¼ã«ç©ºã®ãã¹ã¯ã¼ã (é·ã 0) ã渡ãããã¹ãã示ããã©ã°ã§ãã 空ã®ãã¹ã¯ã¼ãã anonymous ãã°ã¤ã³ã¨ãã¦æ±ã LDAP ãµã¼ãã¼ãããã ãããæã¾ããæ©è½ã§ã¯ãªãå ´åãããã¾ãã ããã false ã«è¨å®ããã¨ç©ºã®ãã¹ã¯ã¼ããæå¦ãã¾ãã true ã«è¨å®ãã㨠LDAP ãµã¼ãã¼ã空ã®ãã¹ã¯ã¼ããæ¤è¨¼ãã¾ãã ããã©ã«ã㯠true ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1166
@@ -3566,10 +4180,13 @@
"<literal>String</literal> password or the <literal>Object</literal> "
"credential depending on the <literal>useObjectCredential</literal> option."
msgstr ""
+"ã¦ã¼ã¶ã¼ã®èªè¨¼ã¯ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«è¨å®ãªãã·ã§ã³ããã¼ã¹ã«ãã LDAP ãµã¼ãã¼ã«æ¥ç¶ãããã¨ã§è¡ããã¾ãã LDAP ãµã¼ãã¼ã¸ã®æ¥ç¶ã¯ã æ¬ã»ã¯ã·ã§ã³ã§åè¿°ãã LDAP JNDI ããããã£ããæ§æãããç°å¢ã§ <literal>InitialLdapContext</literal> ãä½æãã¦è¡ãã¾ãã <literal>principalDNPrefix</literal> ãªãã·ã§ã³å¤ã¨ <literal>principalDNSuffix</literal> ãªãã·ã§ã³å¤ã¨ã®çµã¿åããã§ã³ã¼ã«ããã¯ãã³ãã©ã«ããåå¾ãããã¦ã¼ã¶ã¼ã®èå¥åã« <literal>Context.SECURITY_PRINCIPAL</literal> ãè¨å®ããã <literal>useObjectCredential</literal> ãªãã·ã§ã³ã«å¿ã㦠<literal>String</literal> ãã¹ã¯ã¼ãã <literal>Object</literal> 証ææ¸ã®ããããã« <literal>Context."
+"SECURITY_CREDENTIALS</literal> ããããã£ãè¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1169
#, no-c-format
+#, fuzzy
msgid ""
"Once authentication has succeeded by virtue of being able to create an "
"<literal>InitialLdapContext</literal> instance, the user's roles are "
@@ -3578,13 +4195,13 @@
"<literal>uidAttributeName</literal> option values. The roles names are "
"obtaining by invoking the <literal>toString</literal> method on the role "
"attributes in the search result set."
-msgstr ""
+msgstr "<literal>InitialLdapContext</literal> ã¤ã³ã¹ã¿ã³ã¹ä½æã®å¹åã«ããèªè¨¼ãæåããã¨ã <literal>rolesCtxDN</literal> ã®å ´æ㧠<literal>roleAttributeName</literal> 㨠<literal>uidAttributeName</literal> ã®ãªãã·ã§ã³å¤ã«è¨å®ãããæ¤ç´¢å±æ§ã使ã£ãæ¤ç´¢ãå®è¡ããã¦ã¦ã¼ã¶ã¼ã®ãã¼ã«ãåãåããããã¾ãããã¼ã«åã¯æ¤ç´¢çµæã»ããå
ã®ãã¼ã«å±æ§ã§ <literal>toString</literal> ã¡ã½ãããå¼ã³åºããã¨ã§åå¾ããã¾ãã ?? obtaining => onbtained??"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1172
#, no-c-format
msgid "The following is a sample <literal>login-config.xml</literal> entry."
-msgstr ""
+msgstr "次ã«ãµã³ãã«ã® <literal>login-config.xml</literal> ã¨ã³ããªã示ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1175
@@ -3627,6 +4244,42 @@
" </authentication>\n"
" </application-policy>"
msgstr ""
+"<application-policy name=\"testLDAP\">\n"
+" <authentication>\n"
+" <login-module code=\"org.jboss.security.auth.spi."
+"LdapLoginModule\"\n"
+" flag=\"required\">\n"
+" <module-option name=\"java.naming.factory.initial\"> \n"
+" com.sun.jndi.ldap.LdapCtxFactory\n"
+" </module-option>\n"
+" <module-option name=\"java.naming.provider.url\">\n"
+" ldap://ldaphost.jboss.org:1389/\n"
+" </module-option>\n"
+" <module-option name=\"java.naming.security.authentication"
+"\">\n"
+" simple\n"
+" </module-option>\n"
+" <module-option name=\"principalDNPrefix\">uid=</"
+"module-option> \n"
+" <module-option name=\"principalDNSuffix\">\n"
+" ,ou=People,dc=jboss,dc=org\n"
+" </module-option>\n"
+"\n"
+" <module-option name=\"rolesCtxDN\">\n"
+" ou=Roles,dc=jboss,dc=org\n"
+" </module-option>\n"
+" <module-option name=\"uidAttributeID\">member</"
+"module-option>\n"
+" <module-option name=\"matchOnUserDN\">true</module-"
+"option>\n"
+"\n"
+" <module-option name=\"roleAttributeID\">cn</module-"
+"option>\n"
+" <module-option name=\"roleAttributeIsDN\">false </"
+"module-option>\n"
+" </login-module>\n"
+" </authentication>\n"
+" </application-policy>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1176
@@ -3634,7 +4287,7 @@
msgid ""
"An LDIF file representing the structure of the directory this data operates "
"against is shown below."
-msgstr ""
+msgstr "ãã®ãã¼ã¿ãåä½ãããã£ã¬ã¯ããªã®æ§é ã表ã LDIF ãã¡ã¤ã«ã以ä¸ã«ç¤ºãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1179
@@ -3673,6 +4326,38 @@
"member: uid=jduke,ou=People,dc=jboss,dc=org\n"
"description: the JBossAdmin group"
msgstr ""
+"dn: dc=jboss,dc=org\n"
+"objectclass: top\n"
+"objectclass: dcObject\n"
+"objectclass: organization\n"
+"dc: jboss\n"
+"o: JBoss\n"
+"\n"
+"dn: ou=People,dc=jboss,dc=org\n"
+"objectclass: top\n"
+"objectclass: organizationalUnit\n"
+"ou: People\n"
+"\n"
+"dn: uid=jduke,ou=People,dc=jboss,dc=org\n"
+"objectclass: top\n"
+"objectclass: uidObject\n"
+"objectclass: person\n"
+"uid: jduke\n"
+"cn: Java Duke\n"
+"sn: Duke\n"
+"userPassword: theduke\n"
+"\n"
+"dn: ou=Roles,dc=jboss,dc=org\n"
+"objectclass: top\n"
+"objectclass: organizationalUnit\n"
+"ou: Roles\n"
+"\n"
+"dn: cn=JBossAdmin,ou=Roles,dc=jboss,dc=org\n"
+"objectclass: top\n"
+"objectclass: groupOfNames\n"
+"cn: JBossAdmin\n"
+"member: uid=jduke,ou=People,dc=jboss,dc=org\n"
+"description: the JBossAdmin group"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1180
@@ -3685,7 +4370,7 @@
"server is located on host <literal>ldaphost.jboss.org</literal> on port "
"1389, and that the LDAP simple authentication method will be use to connect "
"to the LDAP server."
-msgstr ""
+msgstr "<literal>testLDAP</literal> ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®è¨å®ãè¦ç´ãã¦ã¿ãã¨ã <literal>java.naming.factory.initial</literal>ã <literal>java.naming.factory.url</literal>ã <literal>java.naming.security</literal> ã®åãªãã·ã§ã³ã¯ã Sun LDAP JNDI ãããã¤ãå®è£
ã使ç¨ããããã¨ã LDAP ãµã¼ãã¼ã¯ãã¹ã <literal>ldaphost.jboss.org</literal> ã®ãã¼ã 1389 ã«ãããã¨ã LDAP ã®ã·ã³ãã«ãªèªè¨¼ã¡ã½ããã LDAP ãµã¼ãã¼ã®æ¥ç¶ã«ä½¿ç¨ããããã¨ã示ãã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1183
@@ -3702,7 +4387,7 @@
"this example). This is the way most LDAP servers work, however, if your LDAP "
"server handles authentication differently you will need to set the "
"authentication credentials in a way that makes sense for your server."
-msgstr ""
+msgstr "ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¯èªè¨¼ã試ã¿ã¦ããã¦ã¼ã¶ã¼ã表ã DN ã使ã£ã¦ LDAP ãµã¼ãã¼ã«æ¥ç¶ã試è¡ãã¾ãã ãã® DN ã¯åè¿°ããããã«æ¸¡ããã <literal>principalDNPrefix</literal>ã ã¦ã¼ã¶ã¼ã®ã¦ã¼ã¶ã¼åã <literal>principalDNSuffix</literal> ããæ§æããã¾ãã ãã®ä¾ã§ã¯ã ã¦ã¼ã¶ã¼ <literal>jduke</literal> ã <literal>uid=jduke,ou=People,dc=jboss,dc=org</literal> ã«ãããã³ã°ãã¦ãã¾ãã LDAP ãµã¼ãã¼ã¯ã¦ã¼ã¶ã¼ã®ã¨ã³ããªã® <literal>userPassword</literal> å±æ§ (ãã®ä¾ã§ã¯ <literal>theduke</literal> ) ã使ã£ã¦ã¦ã¼ã¶ã¼ãèªè¨¼ããã¨ä»®å®ãã¦ãã¾ãã ã»ã¨ãã©ã® LDAP ãµã¼ãã¼ãåä½ããã®ã¯ãã®æ¹æ³ã«ãªãã¾ããã ã使ç¨ã® LDAP ãµã¼ãã¼ã®èªè¨¼å¦çãããã¨ç°ãªãå ´åã ãµã¼ãã¼ã®å¦çæ¹æ³ã«å¿ãã¦èªè¨¼è¨¼ææ¸ã®è¨å®ãè¡ãå¿
è¦ãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1186
@@ -3719,6 +4404,9 @@
"literal>. The search would locate <literal>cn=JBossAdmin</literal> under the "
"roles entry."
msgstr ""
+"èªè¨¼ãæåããã¨ã ã¦ã¼ã¶ã¼ã¨ä¸è´ãã <literal>uidAttributeID</literal> ãæã¤ã¨ã³ããªã® <literal>rolesCtxDN</literal> ãµãããªã¼æ¤ç´¢ãè¡ãæ¿èªããã¼ã¹ã¨ãããã¼ã«ãæ¤ç´¢ããã¾ãã <literal>matchOnUserDN</literal> ã true ã«ããã¨æ¤ç´¢ã¯ã¦ã¼ã¶ã¼ã®å®å
¨ DN ããã¼ã¹ã¨ãã¾ãã ãã以å¤ã æ¤ç´¢ã¯å
¥åãããå®éã®ã¦ã¼ã¶ã¼åããã¼ã¹ã¨ãã¾ãã ãã®ä¾ã§ã¯ã æ¤ç´¢ã¯ <literal>ou=Roles,"
+"dc=jboss,dc=org</literal> ã§ã <literal>uid=jduke,ou=People,dc=jboss,dc=org</"
+"literal> ã¨åçã¨ãªã <literal>member</literal> å±æ§ãæã¤ã¨ã³ããªãæ¤ç´¢ãã¾ãã ãã®æ¤ç´¢ã¯ãã¼ã«ã¨ã³ããªé
ä¸ã§ <literal>cn=JBossAdmin</literal> ãæ¤ç´¢ãããã¨ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1189
@@ -3728,7 +4416,7 @@
"literal> option. In this example, the attribute is <literal>cn</literal>. "
"The value returned would be <literal>JBossAdmin</literal>, so the jduke user "
"is assigned to the <literal>JBossAdmin</literal> role."
-msgstr ""
+msgstr "æ¤ç´¢ã¯ <literal>roleAttributeID</literal> ãªãã·ã§ã³ã«æå®ãããå±æ§ãè¿ãã¾ãã ãã®ä¾ã§ã¯ã å±æ§ã¯ <literal>cn</literal> ã«ãªãã¾ãã è¿ãããå¤ã¯ <literal>JBossAdmin</literal> ã«ãªãããã jduke ã¦ã¼ã¶ã¼ã <literal>JBossAdmin</literal> ãã¼ã«ã«å²ãå½ã¦ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1192
@@ -3742,7 +4430,7 @@
"authentication module is often paired with another login module, such as the "
"database login module, that can provide roles more suitable to the "
"application being developed."
-msgstr ""
+msgstr "ãã¼ã«ã«ã® LDAP ãµã¼ãã¼ã ID ãèªè¨¼ãµã¼ãã¹ãæä¾ãã¦ããã±ã¼ã¹ã¯é »ç¹ã«è¦ããã¾ããã æ¿èªãµã¼ãã¹ã¯ä½¿ç¨ã§ãã¾ããã ããã¯ã¢ããªã±ã¼ã·ã§ã³ãã¼ã«ã常㫠LDAP ã°ã«ã¼ãä¸ã§æ£ãããããã³ã°ãè¡ããªãã®ã§ã LDAP 管çè
ã¯å¤é¨ã¢ããªã±ã¼ã·ã§ã³åºæã®ãã¼ã¿ãä¸å¤® LDAP ãµã¼ãã¼å
ã«è¨±å¯ãããã¨ã«æµæãæãããã¨ãå¤ãããã§ãã ãã®çç±ããã LDAP èªè¨¼ã¢ã¸ã¥ã¼ã«ã¯éçºããã¦ããã¢ããªã±ã¼ã·ã§ã³ã«å¯¾ãã¦ããé©åãªãã¼ã«ãæä¾ãããã¨ãã§ãããã¼ã¿ãã¼ã¹ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãªã©å¥ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¨çµã¿åããã¦ä½¿ç¨ããããã¨ãå¤ããªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1195
@@ -3750,13 +4438,13 @@
msgid ""
"This login module also supports unauthenticated identity and password "
"stacking."
-msgstr ""
+msgstr "ãã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãæªèªè¨¼ ID ããã³ãã¹ã¯ã¼ãã¹ã¿ããã³ã°ã«å¯¾å¿ãã¦ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1201
#, no-c-format
msgid "DatabaseServerLoginModule"
-msgstr ""
+msgstr "DatabaseServerLoginModule"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1202
@@ -3767,7 +4455,7 @@
"login module if you have your username, password and role information "
"relational database. The <literal>DatabaseServerLoginModule</literal> is "
"based on two logical tables:"
-msgstr ""
+msgstr "<literal>DatabaseServerLoginModule</literal> ã¯èªè¨¼ããã³ãã¼ã«ã®ãããã³ã°ã«å¯¾å¿ãã JDBC ãã¼ã¹ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã§ãã ã¦ã¼ã¶ã¼åã ãã¹ã¯ã¼ãã ãã¼ã«æ
å ±ã®ãªã¬ã¼ã·ã§ãã«ãã¼ã¿ãã¼ã¹ãããå ´åã«ã¯ã ãã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã使ç¨ãããã¨ã«ãªãã¾ãã <literal>DatabaseServerLoginModule</literal> 㯠2 ã¤ã®è«ç表ã«åºã¥ãã¦ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1205
@@ -3776,10 +4464,13 @@
"Table Principals(PrincipalID text, Password text)\n"
"Table Roles(PrincipalID text, Role text, RoleGroup text)"
msgstr ""
+"Table Principals(PrincipalID text, Password text)\n"
+"Table Roles(PrincipalID text, Role text, RoleGroup text)"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1206
#, no-c-format
+#, fuzzy
msgid ""
"The <literal>Principals</literal> table associates the user "
"<literal>PrincipalID</literal> with the valid password and the "
@@ -3803,7 +4494,7 @@
"literal><literal>java</literal> with a role named <literal>caller_java</"
"literal> in the <literal>CallerPrincipal</literal><literal>RoleGroup</"
"literal> in the <literal>Roles</literal> table:"
-msgstr ""
+msgstr "<literal>Principals</literal> 表ã¯ã¦ã¼ã¶ã¼ <literal>PrincipalID</literal> ãæå¹ãªãã¹ã¯ã¼ãã«é¢é£ä»ãã <literal>Roles</literal> 表ã¯ã¦ã¼ã¶ã¼ <literal>PrincipalID</literal> ããã®ãã¼ã«ã»ããã«é¢é£ä»ãã¾ãã ã¦ã¼ã¶ã¼ãã¼ããã·ã§ã³ã«ä½¿ç¨ããããã¼ã«ã¯ <literal>Roles</literal> ã® <literal>RoleGroup</literal> ã³ã©ã å¤"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1209
@@ -3814,6 +4505,10 @@
"INSERT INTO Roles VALUES('java', 'caller_java', '"
"CallerPrincipal')"
msgstr ""
+"INSERT INTO Principals VALUES('java', 'echoman')\n"
+"INSERT INTO Roles VALUES('java', 'Echo', 'Roles')\n"
+"INSERT INTO Roles VALUES('java', 'caller_java', '"
+"CallerPrincipal')"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1215
@@ -3823,7 +4518,7 @@
"<literal>DataSource</literal> of the database containing the logical "
"<literal>Principals</literal> and <literal>Roles</literal> tables. If not "
"specified this defaults to <literal>java:/DefaultDS</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">dsJndiName</emphasis>: è«çç㪠<literal>Principals</literal> ããã³ <literal>Roles</literal> ã®å表ãå«ãã§ãããã¼ã¿ãã¼ã¹ã® <literal>DataSource</literal> ã«å¯¾ããJNDI åã§ãã æå®ããã¦ããªãã¨ã ããã©ã«ãã§ã¯ <literal>java:/DefaultDS</literal> ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1220
@@ -3833,7 +4528,7 @@
"query equivalent to: <literal>select Password from Principals where "
"PrincipalID=?</literal>. If not specified this is the exact prepared "
"statement that will be used."
-msgstr ""
+msgstr "<emphasis role=\"bold\">principalsQuery</emphasis>: æºåã¹ãã¼ãã¡ã³ãã¯ã¨ãªã¼ã§ã <literal>select Password from Principals where PrincipalID=?</literal> ã¨åçã«ãªãã¾ãã æå®ããã¦ããªãã¨ã ããã使ç¨ãããæ£ç¢ºãªæºåã¹ãã¼ãã¡ã³ãã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1225
@@ -3843,7 +4538,7 @@
"equivalent to: <literal>select Role, RoleGroup from Roles where PrincipalID=?"
"</literal>. If not specified this is the exact prepared statement that will "
"be used."
-msgstr ""
+msgstr "<emphasis role=\"bold\">rolesQuery</emphasis>: æºåã¹ãã¼ãã¡ã³ãã¯ã¨ãªã¼ã§ã <literal>select Role, RoleGroup from Roles where PrincipalID=?</literal> ã¨åçã«ãªãã¾ãã æå®ããã¦ããªãã¨ã ããã使ç¨ãããæ£ç¢ºãªæºåã¹ãã¼ãã¡ã³ãã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1230
@@ -3853,7 +4548,7 @@
"indicating if the password comparison should ignore case. This can be useful "
"for hashed password encoding where the case of the hashed password is not "
"significant."
-msgstr ""
+msgstr "<emphasis role=\"bold\">ignorePasswordCase</emphasis>: ãã¹ã¯ã¼ãæ¯è¼ã§å¤§æåã¨å°æåã®åºå¥ãç¡è¦ãã¹ããã©ããã示ããã¼ãªã¼ã³ãã©ã°ã§ãã ããã·ã¥åãã¹ã¯ã¼ãã®å¤§æåã¨å°æåã®åºå¥ãéè¦ã§ã¯ãªãå ´åã ããã·ã¥åãã¹ã¯ã¼ãã®ã¨ã³ã³ã¼ãã£ã³ã°ã«ä¾¿å©ãªå ´åãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1235
@@ -3862,7 +4557,7 @@
"<emphasis role=\"bold\">principalClass</emphasis>: An option that specifies "
"a <literal>Principal</literal> implementation class. This must support a "
"constructor taking a string argument for the principal name."
-msgstr ""
+msgstr "<emphasis role=\"bold\">principalClass</emphasis>: <literal>Principal</literal> å®è£
ã¯ã©ã¹ãæå®ãããªãã·ã§ã³ã§ãã principal åã®æååå¼æ°ãåãã³ã³ã¹ãã©ã¯ã¿ã«å¯¾å¿ããå¿
è¦ãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1240
@@ -3870,7 +4565,7 @@
msgid ""
"As an example <literal>DatabaseServerLoginModule</literal> configuration, "
"consider a custom table schema like the following:"
-msgstr ""
+msgstr "<literal>DatabaseServerLoginModule</literal> è¨å®ã®ä¾ã¨ãã¦ã 次ã®ãããªã«ã¹ã¿ã ã®è¡¨ã¹ãã¼ã ãè¦ã¦ã¿ã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1243
@@ -3879,12 +4574,14 @@
"CREATE TABLE Users(username VARCHAR(64) PRIMARY KEY, passwd VARCHAR(64))\n"
"CREATE TABLE UserRoles(username VARCHAR(64), userRoles VARCHAR(32))"
msgstr ""
+"CREATE TABLE Users(username VARCHAR(64) PRIMARY KEY, passwd VARCHAR(64))\n"
+"CREATE TABLE UserRoles(username VARCHAR(64), userRoles VARCHAR(32))"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1244
#, no-c-format
msgid "A corresponding <literal>login-config.xml</literal> entry would be:"
-msgstr ""
+msgstr "該å½ãã <literal>login-config.xml</literal> ã¨ã³ããªã¯æ¬¡ã®ããã«ãªãã§ãããã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1247
@@ -3909,6 +4606,24 @@
" </application-policy>\n"
"</policy>"
msgstr ""
+"<policy>\n"
+" <application-policy name=\"testDB\">\n"
+" <authentication>\n"
+" <login-module code=\"org.jboss.security.auth.spi."
+"DatabaseServerLoginModule\"\n"
+" flag=\"required\">\n"
+" <module-option name=\"dsJndiName\">java:/"
+"MyDatabaseDS</module-option>\n"
+" <module-option name=\"principalsQuery\">\n"
+" select passwd from Users username where username=?</"
+"module-option>\n"
+" <module-option name=\"rolesQuery\">\n"
+" select userRoles, 'Roles' from UserRoles where "
+"username=?</module-option>\n"
+" </login-module>\n"
+" </authentication>\n"
+" </application-policy>\n"
+"</policy>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1248
@@ -3916,13 +4631,13 @@
msgid ""
"This module supports password stacking, password hashing and unathenticated "
"identity."
-msgstr ""
+msgstr "ãã®ã¢ã¸ã¥ã¼ã«ã¯ãã¹ã¯ã¼ãã¹ã¿ããã³ã°ã ãã¹ã¯ã¼ãããã·ã¥ã æªèªè¨¼ ID ã«å¯¾å¿ãã¦ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1254
#, no-c-format
msgid "BaseCertLoginModule"
-msgstr ""
+msgstr "BaseCertLoginModule"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1255
@@ -3937,7 +4652,7 @@
"<literal>CertRolesLoginModule</literal> and "
"<literal>DatabaseCertLoginModule</literal> extend the behavior to obtain the "
"authorization roles from either a properties file or database."
-msgstr ""
+msgstr "X509 証ææ¸ããã¼ã¹ã¨ãã¦ã¦ã¼ã¶ã¼ãèªè¨¼ãããã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã§ãã ä¸è¬çãªä½¿ç¨ç¨éã¯ã¦ã§ã層ã§ã® <literal>CLIENT-CERT</literal> èªè¨¼ã«ãªãã¾ãã ãã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¯èªè¨¼ããè¡ãã¾ããã å®å
¨åãããã¦ã§ãã EJB ã³ã³ãã¼ãã³ãã¸ã®ã¢ã¯ã»ã¹ãå®å
¨ã«å®ç¾©ããã«ã¯æ¿èªãã¼ã«ãåå¾ããæ©è½ãæã¤å¥ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¨ä½µç¨ããå¿
è¦ãããã¾ãã ãã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã® 2 ã¤ã®ãµãã¯ã©ã¹ <literal>CertRolesLoginModule</literal> 㨠<literal>DatabaseCertLoginModule</literal> ã¯ãã®åä½ãæ¡å¼µãã¦ããããã£ãã¡ã¤ã«ã¾ãã¯ãã¼ã¿ãã¼ã¹ã®ããããããæ¿èªãã¼ã«ãåå¾ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1258
@@ -3950,6 +4665,8 @@
"<literal>org.jboss.security.plugins.JaasSecurityDomain</literal> MBean as "
"shown in this <literal>jboss-service.xml</literal> configuration fragment:"
msgstr ""
+"<literal>BaseCertLoginModule</literal> ã¯ã¦ã¼ã¶ã¼ã®æ¤è¨¼ãè¡ãããã« <literal>KeyStore</"
+"literal> ãå¿
è¦ã¨ãã¾ãã ãã㯠<literal>org.jboss.security.SecurityDomain</literal> å®è£
ã使ã£ã¦åå¾ãã¾ãã ãã® <literal>jboss-service.xml</literal> è¨å®ã®é¨åä¾ã§ç¤ºãããã«ã <literal>SecurityDomain</literal> å®è£
ã¯ä¸è¬çã«ã¯ <literal>org.jboss.security.plugins.JaasSecurityDomain</literal> MBean ã使ã£ã¦è¨å®ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1261
@@ -3966,6 +4683,16 @@
"attribute>\n"
"</mbean>"
msgstr ""
+"<mbean code=\"org.jboss.security.plugins.JaasSecurityDomain\"\n"
+" name=\"jboss.ch8:service=SecurityDomain\">\n"
+" <constructor>\n"
+" <arg type=\"java.lang.String\" value=\"jmx-console\"/>\n"
+" </constructor>\n"
+" <attribute name=\"KeyStoreURL\">resource:localhost.keystore</"
+"attribute>\n"
+" <attribute name=\"KeyStorePass\">unit-tests-server</"
+"attribute>\n"
+"</mbean>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1262
@@ -3979,7 +4706,7 @@
"authorization, one would first modify the <literal>web.xml</literal> to "
"declare the resources to be secured, along with the allowed roles and "
"security domain to be used for authentication and authorization."
-msgstr ""
+msgstr "ä¸è¨ã¯ã <literal>jmx-console</literal> ã¨ããååãæã¤ã»ãã¥ãªãã£ãã¡ã¤ã³ãä½æãã ãã® <literal>SecurityDomain</literal> å®è£
㯠<literal>java:/jaas/jmx-console</literal> ã« JBossSX ã»ãã¥ãªãã£ãã¡ã¤ã³ã®å½åãã¿ã¼ã³ãç¶ãååã®é
ä¸ JNDI çµç±ã§ä½¿ç¨å¯è½ã§ãã ã¯ã©ã¤ã¢ã³ã証ææ¸ã¨ãã¼ã«ãã¼ã¹ã®æ¿èªã使ç¨ã㦠<literal>jmx-console.war</literal>ãªã©ã®ã¦ã§ãã¢ããªã±ã¼ã·ã§ã³ã®å®å
¨åãå³ãã«ã¯ã ã¾ã <literal>web.xml</literal> ãç·¨éãã¦å®å
¨åãããªã½ã¼ã¹ã®ä»ã èªè¨¼ã¨æ¿èªã«ä½¿ç¨ãã許å¯ãã¼ã«ã¨ã»ãã¥ãªãã£ãã¡ã¤ã³ã宣è¨ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1265
@@ -4016,6 +4743,36 @@
" </security-role>\n"
"</web-app>"
msgstr ""
+"<?xml version=\"1.0\"?>\n"
+"<!DOCTYPE web-app PUBLIC\n"
+" \"-//Sun Microsystems, Inc.//DTD Web Application 2.3//EN"
+"\"\n"
+" \"http://java.sun.com/dtd/web-app_2_3.dtd\">\n"
+"<web-app> \n"
+" ... \n"
+" <security-constraint>\n"
+" <web-resource-collection>\n"
+" <web-resource-name>HtmlAdaptor</web-resource-name>\n"
+" <description>An example security config that only allows "
+"users with\n"
+" the role JBossAdmin to access the HTML JMX console web\n"
+" application </description>\n"
+" <url-pattern>/*</url-pattern>\n"
+" <http-method>GET</http-method>\n"
+" <http-method>POST</http-method>\n"
+" </web-resource-collection>\n"
+" <auth-constraint>\n"
+" <role-name>JBossAdmin</role-name>\n"
+" </auth-constraint>\n"
+" </security-constraint>\n"
+" <login-config>\n"
+" <auth-method>CLIENT-CERT</auth-method>\n"
+" <realm-name>JBoss JMX Console</realm-name>\n"
+" </login-config>\n"
+" <security-role>\n"
+" <role-name>JBossAdmin</role-name>\n"
+" </security-role>\n"
+"</web-app>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1266
@@ -4023,7 +4780,7 @@
msgid ""
"Next we, need to specify the JBoss security domain in <literal>jboss-web."
"xml</literal>:"
-msgstr ""
+msgstr "次ã«ã JBoss ã»ãã¥ãªãã£ãã¡ã¤ã³ã <literal>jboss-web.xml</literal> ã§æå®ããå¿
è¦ãããã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1269
@@ -4033,6 +4790,9 @@
" <security-domain>java:/jaas/jmx-console</security-domain>\n"
"</jboss-web>"
msgstr ""
+"<jboss-web>\n"
+" <security-domain>java:/jaas/jmx-console</security-domain>\n"
+"</jboss-web>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1270
@@ -4041,7 +4801,7 @@
"Finally, you need to define the login module configuration for the jmx-"
"console security domain you just specified. This is done in the "
"<literal>conf/login-config.xml</literal> file."
-msgstr ""
+msgstr "æå¾ã«ã ãã¾æå®ããã°ããã® jmx-console ã»ãã¥ãªãã£ãã¡ã¤ã³ç¨ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«è¨å®ãå®ç¾©ããå¿
è¦ãããã¾ãã <literal>conf/login-config.xml</literal> ãã¡ã¤ã«ã§è¡ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1273
@@ -4070,6 +4830,28 @@
" </authentication>\n"
"</application-policy>"
msgstr ""
+"<application-policy name=\"jmx-console\">\n"
+" <authentication>\n"
+" <login-module code=\"org.jboss.security.auth.spi."
+"BaseCertLoginModule\" \n"
+" flag=\"required\">\n"
+" <module-option name=\"password-stacking\">useFirstPass</"
+"module-option>\n"
+" <module-option name=\"securityDomain\">java:/jaas/jmx-"
+"console</module-option>\n"
+" </login-module>\n"
+" <login-module code=\"org.jboss.security.auth.spi."
+"UsersRolesLoginModule\" \n"
+" flag=\"required\">\n"
+" <module-option name=\"password-stacking\">useFirstPass</"
+"module-option>\n"
+" <module-option name=\"usersProperties\">jmx-console-users."
+"properties</module-option>\n"
+" <module-option name=\"rolesProperties\">jmx-console-roles."
+"properties</module-option>\n"
+" </login-module>\n"
+" </authentication>\n"
+"</application-policy>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1274
@@ -4084,6 +4866,9 @@
"created using the client certificate distinguished name. Consider the "
"following certificate:"
msgstr ""
+"ãã㧠<literal>BaseCertLoginModule</literal> ã¯ã¯ã©ã¤ã¢ã³ã証ææ¸ã®èªè¨¼ã«ä½¿ç¨ããã <literal>UsersRolesLoginModule</literal> 㯠<literal>password-stacking=useFirstPass</"
+"literal> ãªãã·ã§ã³ã®ããæ¿èªã«ã®ã¿ä½¿ç¨ããã¾ãã <literal>localhost.keystore</literal> ããã³"
+"<literal>jmx-console-roles.properties</literal> ã®ãããã«ãã¯ã©ã¤ã¢ã³ã証ææ¸ã«é¢é£ä»ãããã principal ã«ãããã³ã°ããã¨ã³ããªãå¿
è¦ã¨ãªãã¾ãã ããã©ã«ãã§ã¯ã principal ã¯ã¯ã©ã¤ã¢ã³ã証ææ¸èå¥åã使ã£ã¦ä½æããã¾ãã 次ã®è¨¼ææ¸ãè¦ã¦ã¿ã¾ãããã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1277
@@ -4103,6 +4888,19 @@
" MD5: 4A:9C:2B:CD:1B:50:AA:85:DD:89:F6:1D:F5:AF:9E:AB\n"
" SHA1: DE:DE:86:59:05:6C:00:E8:CC:C0:16:D3:C2:68:BF:95:B8:83:E9:58"
msgstr ""
+"[starksm at banshee9100 conf]$ keytool -printcert -file unit-tests-client."
+"export\n"
+"Owner: CN=unit-tests-client, OU=JBoss Inc., O=JBoss Inc., ST=Washington, "
+"C=US\n"
+"Issuer: CN=jboss.com, C=US, ST=Washington, L=Snoqualmie Pass, "
+"EMAILADDRESS=admin\n"
+"@jboss.com, OU=QA, O=JBoss Inc.\n"
+"Serial number: 100103\n"
+"Valid from: Wed May 26 07:34:34 PDT 2004 until: Thu May 26 07:34:34 PDT "
+"2005\n"
+"Certificate fingerprints:\n"
+" MD5: 4A:9C:2B:CD:1B:50:AA:85:DD:89:F6:1D:F5:AF:9E:AB\n"
+" SHA1: DE:DE:86:59:05:6C:00:E8:CC:C0:16:D3:C2:68:BF:95:B8:83:E9:58"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1278
@@ -4116,6 +4914,8 @@
"escape the problem characters using a backslash ('<literal>\\</"
"literal>') as shown here:"
msgstr ""
+"<literal>localhost.keystore</literal> 㯠<literal>CN=unit-tests-client, OU=JBoss Inc., O=JBoss Inc., "
+"ST=Washington, C=US</literal> ã®ã¨ã¤ãªã¢ã¹ã§æ ¼ç´ããããã®è¨¼ææ¸ãå¿
è¦ã¨ãã <literal>jmx-console-roles.properties</literal> ãåãã¨ã³ããªã®ã¨ã³ããªãå¿
è¦ã¨ãªãã¾ãã DN ã¯é常ã¯åºåãæåã¨ãã¦æ±ãããå¤ãã®æåãå«ãã§ããããã 以ä¸ã«ç¤ºãããã«ããã¯ã¹ã©ãã·ã¥ ('<literal>\\</literal>') ã使ã£ã¦è©²å½æåã«é¢ããåé¡ãåé¿ããå¿
è¦ãããã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1281
@@ -4126,16 +4926,21 @@
"\\=Washington,\\ C\\=US=JBossAdmin\n"
"admin=JBossAdmin"
msgstr ""
+"# A sample roles.properties file for use with the UsersRolesLoginModule\n"
+"CN\\=unit-tests-client,\\ OU\\=JBoss\\ Inc.,\\ O\\=JBoss\\ Inc.,\\ ST"
+"\\=Washington,\\ C\\=US=JBossAdmin\n"
+"admin=JBossAdmin"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1285
#, no-c-format
msgid "IdentityLoginModule"
-msgstr ""
+msgstr "IdentityLoginModule"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1286
#, no-c-format
+#, fuzzy
msgid ""
"The <literal>IdentityLoginModule</literal> is a simple login module that "
"associates a hard-coded user name a to any subject authenticated against the "
@@ -4145,12 +4950,18 @@
"development environments when you want to test the security associated with "
"a given principal and associated roles."
msgstr ""
+"<literal>IdentityLoginModule</literal> ã¯ã·ã³ãã«ãªãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã§ã ãã¼ãã³ã¼ãåãããã¦ã¼ã¶ã¼åãã¢ã¸ã¥ã¼ã«ã«å¯¾ãã¦èªè¨¼ããããµãã¸ã§ã¯ãã«é¢é£ä»ãã¾ãã <literal>principal</literal>ãªãã·ã§ã³ã§æå®ãããååã使ã£ã¦ <literal>SimplePrincipal</literal> ã¤ã³ã¹ã¿ã³ã¹ãä½æãã¾ãã åºå® ID ããµã¼ãã¹ã«ä¸ããå¿
è¦ãããå ´åã ç¹å®ã® principal ã¨é¢é£ãã¼ã«ã«é¢é£ã¥ããããã»ãã¥ãªãã£ããã¹ãããå ´åã®éçºç°å¢ã ãªã©ã§ãã®ã¢ã¸ã¥ã¼ã«ã¯å½¹ã«ç«ã¡ã¾ãã "
+"??"
+"This login module "
+"is useful when you need to provide a fixed identity to a service, and in "
+"development environments when you want to test the security associated with "
+"a given principal and associated roles."
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1289
#, no-c-format
msgid "The supported login module configuration options include:"
-msgstr ""
+msgstr "ãµãã¼ãããã¦ãããã°ã¤ã³ã¢ã¸ã¥ã¼ã«è¨å®ãªãã·ã§ã³ã«ã¯æ¬¡ã®ãããªãã®ãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1294
@@ -4168,7 +4979,7 @@
msgid ""
"<emphasis role=\"bold\">roles</emphasis>: This is a comma-delimited list of "
"roles that will be assigned to the user."
-msgstr ""
+msgstr "<emphasis role=\"bold\">roles</emphasis>: ã¦ã¼ã¶ã¼ã«å²ãå½ã¦ããããã¼ã«ãã³ã³ãã§åºåã£ãä¸è¦§ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1304
@@ -4177,7 +4988,7 @@
"A sample XMLLoginConfig configuration entry that would authenticate all "
"users as the principal named <literal>jduke</literal> and assign role names "
"of <literal>TheDuke</literal>, and <literal>AnimatedCharacter</literal> is:"
-msgstr ""
+msgstr "ãã¹ã¦ã®ã¦ã¼ã¶ã¼ã <literal>jduke</literal> ã¨ããååã® principal ã¨ãã¦èªè¨¼ããã¼ã«å <literal>TheDuke</literal>ã ããã³ <literal>AnimatedCharacter</literal> ãå²ãå½ã¦ããµã³ãã«ã® XMLLoginConfig è¨å®ã¨ã³ããªã示ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1307
@@ -4198,18 +5009,32 @@
" </application-policy>\n"
"</policy>"
msgstr ""
+"<policy>\n"
+" <application-policy name=\"testIdentity\">\n"
+" <authentication>\n"
+" <login-module code=\"org.jboss.security.auth.spi."
+"IdentityLoginModule\"\n"
+" flag=\"required\">\n"
+" <module-option name=\"principal\">jduke</module-"
+"option>\n"
+" <module-option name=\"roles\">TheDuke,"
+"AnimatedCharater</module-option>\n"
+" </login-module>\n"
+" </authentication>\n"
+" </application-policy>\n"
+"</policy>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1308
#, no-c-format
msgid "This module supports password stacking."
-msgstr ""
+msgstr "ãã®ã¢ã¸ã¥ã¼ã«ã¯ãã¹ã¯ã¼ãã¹ã¿ããã³ã°ã«å¯¾å¿ãã¦ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1314
#, no-c-format
msgid "RunAsLoginModule"
-msgstr ""
+msgstr "RunAsLoginModule"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1315
@@ -4229,7 +5054,7 @@
#: J2EE_Security_On_JBOSS.xml:1318
#, no-c-format
msgid "The only login module configuration option is:"
-msgstr ""
+msgstr "ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«è¨å®ãªãã·ã§ã³ã¯ 1 ã¤ã®ã¿ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1323
@@ -4244,11 +5069,12 @@
#: J2EE_Security_On_JBOSS.xml:1331
#, no-c-format
msgid "ClientLoginModule"
-msgstr ""
+msgstr "ClientLoginModule"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1332
#, no-c-format
+#, fuzzy
msgid ""
"The <literal>ClientLoginModule</literal> is an implementation of "
"<literal>LoginModule</literal> for use by JBoss clients for the "
@@ -4266,7 +5092,7 @@
"course, you could always set the <literal>org.jboss.security."
"SecurityAssociation</literal> information directly, but this is considered "
"an internal API that is subject to change without notice."
-msgstr ""
+msgstr "<literal>ClientLoginModule</literal> ã¯ã å¼ã³åºãå´ã® ID ã¨è¨¼ææ¸ã®ç¢ºç«ã« JBoss ã¯ã©ã¤ã¢ã³ãã«ãã£ã¦ä½¿ç¨ããã <literal>LoginModule</literal> ã®å®è£
ã«ãªãã¾ãã <literal>org.jboss.security.SecurityAssociation.principal</literal> ã <literal>callbackhandler</literal> ã«ãã£ã¦å
¥åããã <literal>NameCallback</literal> ã®å¤ã«è¨å®ãã <literal>org.jboss.security.SecurityAssociation.credential</literal> ã <literal>callbackhandler</literal> ã«ãã£ã¦å
¥åããã <literal>PasswordCallback</literal> ã®å¤ã«è¨å®ãã¾ãã ã¯ã©ã¤ã¢ã³ããç¾å¨ã®ã¹ã¬ããã®å¼ã³åºãå´ã確ç«ããããã®ã¡ã«ããºã ã¨ãã¦ã¯ãµãã¼ãããã¦ããå¯ä¸ã®ã¡ã«ããºã ã«ãªãã¾ãã ã¹ã¿ã³ãã¢ãã¼ã³ã®ã¯ã©ã¤ã¢ã³ãã¢ããªã±ã¼ã·ã§ã³ããã³ãµã¼ãã¼ç°å¢"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1335
@@ -4277,7 +5103,7 @@
"invocation layer for subsequent authentication on the server. If you need to "
"perform client-side authentication of users you would need to configure "
"another login module in addition to the <literal>ClientLoginModule</literal>."
-msgstr ""
+msgstr "ãã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¯èªè¨¼ã¯ä¸åè¡ããªãã®ã§æ³¨æãã¦ãã ããã åã«ä¸ãããããã°ã¤ã³æ
å ±ããµã¼ãã¼ä¸ã§å¾ç¶ããèªè¨¼ç¨ã« JBoss ãµã¼ãã¼ EJB å¼ã³åºã層ã«ã³ãã¼ããã ãã§ãã ã¦ã¼ã¶ã¼ã®ã¯ã©ã¤ã¢ã³ãå´èªè¨¼ãå®è¡ããå¿
è¦ãããå ´åã¯ã <literal>ClientLoginModule</literal> ã«å ãã¦å¥ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãè¨å®ããå¿
è¦ãããã§ãããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1343
@@ -4290,7 +5116,7 @@
"thread must perform its own login. When set to false the login identity and "
"credentials are global variables that apply to all threads in the VM. The "
"default for this option is false."
-msgstr ""
+msgstr "<emphasis role=\"bold\">multi-threaded</emphasis>: ãã«ãã¹ã¬ããåããããªãã·ã§ã³ã true ã«è¨å®ãããå ´åã¯ã åãã°ã¤ã³ã¹ã¬ããã¯ããç¬èªã® principal ã¨è¨¼ææ¸ã®ã¹ãã¬ã¼ã¸ãæã¤ãã¨ã«ãªãã¾ãã è¤æ°ã¦ã¼ã¶ã¼ã® ID ãç°ãªãã¹ã¬ããã§ã¢ã¯ãã£ãã«ãªã£ã¦ãããããªã¯ã©ã¤ã¢ã³ãç°å¢ã§å½¹ã«ç«ã¡ã¾ãã true ã®å ´åã ããããç°ãªãã¹ã¬ããã¯ç¬èªã®ãã°ã¤ã³ãè¡ãå¿
è¦ãããã¾ãã false ã«è¨å®ããã¨ã ãã°ã¤ã³ã® ID ããã³è¨¼ææ¸ã¯ã°ãã¼ãã«å¤æ°ã¨ãªã VM å
ã®ãã¹ã¦ã®ã¹ã¬ããã«é©ç¨ãã¾ãã ãã®ãªãã·ã§ã³ã®ããã©ã«ã㯠false ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1348
@@ -4306,6 +5132,8 @@
"you want to perform client-side authentication of clients using some other "
"login module such as the <literal>LdapLoginModule</literal>."
msgstr ""
+"<emphasis role=\"bold\">password-stacking</emphasis>: <literal>password-"
+"stacking</literal> ãªãã·ã§ã³ã <literal>useFirstPass</literal> ã«è¨å®ãããã¨ã ãã®ã¢ã¸ã¥ã¼ã«ã¯ã¾ãå
±æã¦ã¼ã¶ã¼åã¨ãã¹ã¯ã¼ãããããã <literal>javax.security.auth.login.name</literal> 㨠<literal>javax.security.auth.login.password</literal> ã使ã£ã¦ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«å
±æç¶æ
ãããå
ã§æ¤ç´¢ãã¾ãã ããã«ããã ããããåã«è¨å®ãããã¢ã¸ã¥ã¼ã«ã JBoss ã«æ¸¡ãããã¹ãæå¹ãªã¦ã¼ã¶ã¼åã¨ãã¹ã¯ã¼ãã確ç«ãããã¨ãã§ããããã«ãªãã¾ãã <literal>LdapLoginModule</literal> ãªã©ãã®ä»ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã使ã£ã¦ã¯ã©ã¤ã¢ã³ãã®ã¯ã©ã¤ã¢ã³ãå´èªè¨¼ãè¡ãããå ´åã¯ã ãã®ãªãã·ã§ã³ã使ç¨ãããã¨ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1353
@@ -4319,7 +5147,7 @@
"simply clear the <literal>SecurityAssociation</literal>. A <literal>restore-"
"login-identity</literal> of true is needed if one need to change identities "
"and then restore the original caller identity."
-msgstr ""
+msgstr "<emphasis role=\"bold\">restore-login-identity</emphasis>: <literal>restore-login-identity</literal> ã true ã®å ´åã <literal>login()</literal> ã¡ã½ããã«å¯¾ããã¨ã³ããªä¸ã«è¦ãã <literal>SecurityAssociation</literal> ã® principal ã¨è¨¼ææ¸ã¯åæ¢ã¾ãã¯ãã°ã¢ã¦ãã®ããããã§ä¿åã¾ãã¯å¾©å
ããã¾ãã false ã®å ´å (ããã©ã«ã)ã åæ¢ããã³ãã°ã¢ã¦ã㯠<literal>SecurityAssociation</literal> ãæ¶å»ããã ãã§ãã ID ãå¤æ´ãã¦ãããªãªã¸ãã«ã®å¼ã³åºãå´ ID ã復å
ããå¿
è¦ãããå ´å㯠<literal>restore-login-identity</literal> ã true ã«ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1358
@@ -4328,7 +5156,7 @@
"A sample login configuration for <literal>ClientLoginModule</literal> is the "
"default configuration entry found in the JBoss distribution <literal>client/"
"auth.conf</literal> file. The configuration is:"
-msgstr ""
+msgstr "ãµã³ãã«ã® <literal>ClientLoginModule</literal> ã®ãã°ã¤ã³è¨å®ã¯ JBoss ãã£ã¹ããªãã¥ã¼ã·ã§ã³ã® <literal>client/auth.conf</literal> ãã¡ã¤ã«ã«ããããã©ã«ãã®è¨å®ã¨ã³ããªã«ãªãã¾ãã è¨å®ã¯æ¬¡ã®éãã§ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1361
@@ -4343,16 +5171,25 @@
" // Put your login modules that need jBoss here\n"
"};"
msgstr ""
+"other {\n"
+" // Put your login modules that work without jBoss here\n"
+" \n"
+" // jBoss LoginModule\n"
+" org.jboss.security.ClientLoginModule required;\n"
+" \n"
+" // Put your login modules that need jBoss here\n"
+"};"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1367
#, no-c-format
msgid "Writing Custom Login Modules"
-msgstr ""
+msgstr "ã«ã¹ã¿ã ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãè¨è¿°ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1368
#, no-c-format
+#, fuzzy
msgid ""
"If the login modules bundled with the JBossSX framework do not work with "
"your security environment, you can write your own custom login module "
@@ -4365,7 +5202,7 @@
"<literal>JaasSecurityManager</literal>. This section examines this "
"requirement and introduces two abstract base <literal>LoginModule</literal> "
"implementations that can help you implement your own custom login modules."
-msgstr ""
+msgstr "JBossSX ãã¬ã¼ã ã¯ã¼ã¯ã«å梱ããã¦ãããã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã使ç¨ãã¦ããã»ãã¥ãªãã£ç°å¢ã¨ãã¾ãåä½ããªãå ´åã ç¬èªã®ã«ã¹ã¿ã ãã°ã¤ã³å®è£
ãè¨è¿°ãããã¨ãã§ãã¾ãã <literal>JaasSecurityManager</literal> ã <literal>Subject</literal> principal ã»ããã®ç¹å®ã®ä½¿ç¨ãã¿ã¼ã³ãæå¾
ãã¦ãã <literal>JaasSecurityManager</literal> ã¢ã¼ããã¯ãã£ã«é¢ããã»ã¯ã·ã§ã³ãæãåºãã¦ã¿ã¦ãã ããã JAAS Subject ã¯ã©ã¹ã®æ
å ±ã¹ãã¬ã¼ã¸æ©è½ããã³ <literal>JaasSecurityManager</literal> ã¨åä½ãããã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãè¨è¿°å¯è½ãªãããã®æ©è½ã«ã¤ãã¦æå¾
ã§ãã使ç¨æ¹æ³ãç解ãã¦ããå¿
è¦ãããã¾ãã æ¬ã»ã¯ã·ã§ã³ã§ã¯ãã®è¦ä»¶ã«ã¤ãã¦è¦ã¦ããã ã¾ãç¬èªã®ã«ã¹ã¿ã ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®å®è£
ã«å½¹ç«ã¤æ½è±¡ç㪠(??) <literal>LoginModule</literal> å®è£
ã 2 ã¤ç´¹ä!
»ãã¦ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1371
@@ -4373,7 +5210,7 @@
msgid ""
"You can obtain security information associated with a <literal>Subject</"
"literal> in six ways in JBoss using the following methods:"
-msgstr ""
+msgstr "JBoss ã§ã¯ <literal>Subject</literal> ã«é¢é£ä»ããããã»ãã¥ãªãã£æ
å ±ã¯ 6 éãã®æ¹æ³ã§åå¾ãããã¨ãã§ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1374
@@ -4386,6 +5223,12 @@
"java.util.Set getPublicCredentials()\n"
"java.util.Set getPublicCredentials(java.lang.Class c)"
msgstr ""
+"java.util.Set getPrincipals()\n"
+"java.util.Set getPrincipals(java.lang.Class c)\n"
+"java.util.Set getPrivateCredentials()\n"
+"java.util.Set getPrivateCredentials(java.lang.Class c)\n"
+"java.util.Set getPublicCredentials()\n"
+"java.util.Set getPublicCredentials(java.lang.Class c)"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1375
@@ -4395,11 +5238,12 @@
"the most natural choice: the principals sets obtained via "
"<literal>getPrincipals()</literal> and <literal>getPrincipals(java.lang."
"Class)</literal>. The usage pattern is as follows:"
-msgstr ""
+msgstr "<literal>Subject</literal> ID ããã³ãã¼ã«ã«ã¤ãã¦ã JBossSX ã¯ãã£ã¨ãèªç¶ãªé¸æãè¡ãã¾ãã principal ã»ãã㯠<literal>getPrincipals()</literal> ããã³ <literal>getPrincipals(java.lang.Class)</literal> çµç±ã§åå¾ããã¾ãã 使ç¨ãã¿ã¼ã³ã¯æ¬¡ã®éãã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1380
#, no-c-format
+#, fuzzy
msgid ""
"User identities (username, social security number, employee ID, and so on) "
"are stored as <literal>java.security.Principal</literal> objects in the "
@@ -4411,6 +5255,8 @@
"instances may be added to the <literal>Subject</literal><literal>Principals</"
"literal> set as needed."
msgstr ""
+"ã¦ã¼ã¶ã¼ ID (ã¦ã¼ã¶ã¼åã ã½ã¼ã·ã£ã«ã»ãã¥ãªãã£çªå·ã å¾æ¥å¡ ID ãªã©) 㯠<literal>Subject</literal><literal>Principals</literal> ã»ããå
ã« <literal>java.security.Principal</literal> ãªãã¸ã§ã¯ãã¨ãã¦æ ¼ç´ããã¾ãã ãã¼ãã¼ID ã表ã <literal>Principal</literal> å®è£
ã¯ãã® principal åã«åºã¥ãã¦æ¯è¼ããã³åçãè¡ãå¿
è¦ãããã¾ãã (?? equality) é©åãªå®è£
㯠<literal>org.jboss.security.SimplePrincipal</literal> ã¨ãã¦ä½¿ç¨å¯è½ã§ãã?? "
+"å¿
è¦ã«å¿ãã¦ãã®ä»ã® <literal>Principal</literal> ã¤ã³ã¹ã¿ã³ã¹ã <literal>Subject</literal><literal>Principals</literal> ã»ããã«è¿½å ãããã¨ãã§ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1385
@@ -4439,13 +5285,13 @@
"identity suitable for the application. If a <literal>Subject</literal> does "
"not have a <literal>CallerPrincipal</literal><literal>Group</literal>, the "
"application identity is the same as operational environment identity."
-msgstr ""
+msgstr "å²ãå½ã¦ãããã¦ã¼ã¶ã¼ãã¼ã«ã <literal>Principals</literal> ã«æ ¼ç´ããã¾ããã <literal>java.security.acl.Group</literal> ã¤ã³ã¹ã¿ã³ã¹ã使ã£ã¦æå®ãã¼ã«ã»ããã«ã°ã«ã¼ãåããã¾ãã <literal>Group</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ã¯ <literal>Principal</literal> 㨠<literal>Group</literal> ã®ä¸¡æ¹ã¾ãã¯ããããã²ã¨ã¤ã®éåãå®ç¾©ãã <literal>java.security.Principal</literal> ã®ãµãã¤ã³ã¿ã¼ãã§ã¼ã¹ã¨ãªãã¾ãã <literal>Subject</literal> ã«å²ãå½ã¦ããããã¼ã«ã»ããæ°ã«å¶éã¯ããã¾ããã ç¾å¨ã JBossSX ãã¬ã¼ã ã¯ã¼ã¯ã¯ããç¥ããããã¼ã«ã»ãã <literal>Roles</literal> 㨠<literal>CallerPrincipal</literal> ã® 2 ã¤ã使ç¨ãã¦ãã¾ãã <literal>Roles</literal> ã°ã«ã¼ã㯠<literal>Subject</literal> ãèªè¨¼ããã¦ããã¢ããªã±ã¼ã·ã§ã³ãã¡ã¤ã³å
ã§æ¢ç¥ã®æå®ãã¼ã«ã«å¯¾ãã <literal>Principal</l!
iteral> 群ã®éåã«ãªãã¾ãã ãã®ãã¼ã«ã»ãã㯠<literal>EJBContext.isCallerInRole(String)</literal> ã®ãããªã¡ã½ããã«ãã£ã¦ä½¿ç¨ããã¾ãã EJB ã¯ç¾å¨ã®å¼ã³åºãå´ãæå®ã¢ããªã±ã¼ã·ã§ã³ã®ãã¡ã¤ã³ãã¼ã«ã«å±ãã¦ãããã©ããã確èªããããã«ããã使ç¨ã§ãã¾ããã¡ã½ããã®ãã¼ããã·ã§ã³ãã§ãã¯ãè¡ãã»ãã¥ãªãã£ã¤ã³ã¿ã¼ã»ãã¿ãã¸ãã¯ããã®ãã¼ã«ã»ããã使ç¨ãã¾ãã <literal>CallerPrincipal</literal><literal>Group</literal> ã¯ã¢ããªã±ã¼ã·ã§ã³ãã¡ã¤ã³å
ã®ã¦ã¼ã¶ã¼ã«å²ãå½ã¦ãããåä¸ã® <literal>Principal</literal> ID ããæ§æããã¾ãã <literal>EJBContext.getCallerPrincipal() </literal> ã¡ã½ãã㯠<literal>CallerPrincipal</literal> ã使ã£ã¦ã¢ããªã±ã¼ã·ã§ã³ãã¡ã¤ã³ããã®åä½ç°å¢ ID ããã¢ããªã±ã¼ã·ã§ã³ã«é©ããã¦ã¼ã¶ã¼ ID ã¸ã®ãããã³ã°ãè¡ãããã!
ã«ãã¾ãã <literal>Subject</literal> ã« <literal>CallerPrinci
pal</literal><literal>Group</literal> ããªãå ´åã ã¢ããªã±ã¼ã·ã§ã³ ID ã¯åä½ç°å¢ ID ã¨åããã®ã«ãªãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1391
#, no-c-format
msgid "Support for the Subject Usage Pattern"
-msgstr ""
+msgstr "Subject ã®ä½¿ç¨ãã¿ã¼ã³ã®ãµãã¼ã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1392
@@ -4462,7 +5308,7 @@
"key tasks specific to an operation environment security infrastructure. The "
"key details of the class are highlighted in the following class fragment. "
"The JavaDoc comments detail the responsibilities of subclasses."
-msgstr ""
+msgstr "åè¿°ã®ã»ã¯ã·ã§ã³ã§èª¬æãã <literal>Subject</literal> ã®ä½¿ç¨ãã¿ã¼ã³ã®æ£ããå®è£
ãç°¡ç¥åããããã JBossSX ã«ã¯æ£ãã <literal>Subject</literal> ã®ä½¿ç¨ãå¼·å¶çã«å®è¡ãããã³ãã¬ã¼ããã¿ã¼ã³ãæã¤èªè¨¼ <literal>Subject</literal> ã®ç§»æ¤ãå¦çãã 2 ã¤ã®æ½è±¡ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãå«ã¾ãã¦ãã¾ãã ãã® 2 ã¤ã®ãã£ã¨ãæ±ç¨ãªã¯ã©ã¹ã¯ <literal>org.jboss.security.auth.spi.AbstractServerLoginModule</literal> ã¯ã©ã¹ã«ãªãã¾ãã <literal>javax.security.auth.spi.LoginModule</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ã®æ確ãªå®è£
ãæä¾ãã åä½ç°å¢ã»ãã¥ãªãã£ã¤ã³ãã©ã¹ãã©ã¯ãã£åºæã¨ãªãéè¦ãªä½æ¥ã®æ½è±¡ã¡ã½ãããæä¾ãã¦ãã¾ãã ãã®ã¯ã©ã¹ã®éè¦é¨åã«ã¤ãã¦ã¯æ¬¡ã®ä¾ã§å¼·èª¿ãã¾ãã JavaDoc ã¯ãµãã¯ã©ã¹ãæããå½¹å²ã«ã¤ãã¦è©³ããã³ã¡ã³ããã¦ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1395
@@ -4567,10 +5413,109 @@
" abstract protected Group[] getRoleSets() throws LoginException;\n"
"}"
msgstr ""
+"package org.jboss.security.auth.spi;\n"
+"/**\n"
+" * This class implements the common functionality required for a JAAS\n"
+" * server-side LoginModule and implements the JBossSX standard\n"
+" * Subject usage pattern of storing identities and roles. Subclass\n"
+" * this module to create your own custom LoginModule and override the\n"
+" * login(), getRoleSets(), and getIdentity() methods.\n"
+" */\n"
+"public abstract class AbstractServerLoginModule\n"
+" implements javax.security.auth.spi.LoginModule\n"
+"{\n"
+" protected Subject subject;\n"
+" protected CallbackHandler callbackHandler;\n"
+" protected Map sharedState;\n"
+" protected Map options;\n"
+" protected Logger log;\n"
+"\n"
+" /** Flag indicating if the shared credential should be used */\n"
+" protected boolean useFirstPass;\n"
+" /** \n"
+" * Flag indicating if the login phase succeeded. Subclasses that\n"
+" * override the login method must set this to true on successful\n"
+" * completion of login\n"
+" */\n"
+" protected boolean loginOk;\n"
+" \n"
+" // ...\n"
+" /**\n"
+" * Initialize the login module. This stores the subject,\n"
+" * callbackHandler and sharedState and options for the login\n"
+" * session. Subclasses should override if they need to process\n"
+" * their own options. A call to super.initialize(...) must be\n"
+" * made in the case of an override.\n"
+" *\n"
+" * <p>\n"
+" * The options are checked for the <em>password-stacking</"
+"em> parameter.\n"
+" * If this is set to \"useFirstPass\", the login identity will be taken "
+"from the\n"
+" * <code>javax.security.auth.login.name</code> value of the "
+"sharedState map,\n"
+" * and the proof of identity from the\n"
+" * <code>javax.security.auth.login.password</code> value of "
+"the sharedState map.\n"
+" *\n"
+" * @param subject the Subject to update after a successful login.\n"
+" * @param callbackHandler the CallbackHandler that will be used to "
+"obtain the\n"
+" * the user identity and credentials.\n"
+" * @param sharedState a Map shared between all configured login module "
+"instances\n"
+" * @param options the parameters passed to the login module.\n"
+" */\n"
+" public void initialize(Subject subject,\n"
+" CallbackHandler callbackHandler,\n"
+" Map sharedState,\n"
+" Map options)\n"
+" {\n"
+" // ...\n"
+" }\n"
+" \n"
+"\n"
+" /**\n"
+" * Looks for javax.security.auth.login.name and\n"
+" * javax.security.auth.login.password values in the sharedState\n"
+" * map if the useFirstPass option was true and returns true if\n"
+" * they exist. If they do not or are null this method returns\n"
+" * false. \n"
+" * Note that subclasses that override the login method\n"
+" * must set the loginOk var to true if the login succeeds in\n"
+" * order for the commit phase to populate the Subject. This\n"
+" * implementation sets loginOk to true if the login() method\n"
+" * returns true, otherwise, it sets loginOk to false.\n"
+" */\n"
+" public boolean login() \n"
+" throws LoginException\n"
+" {\n"
+" // ...\n"
+" }\n"
+" \n"
+" /**\n"
+" * Overridden by subclasses to return the Principal that\n"
+" * corresponds to the user primary identity.\n"
+" */\n"
+" abstract protected Principal getIdentity();\n"
+" \n"
+" /**\n"
+" * Overridden by subclasses to return the Groups that correspond\n"
+" * to the role sets assigned to the user. Subclasses should\n"
+" * create at least a Group named \"Roles\" that contains the roles\n"
+" * assigned to the user. A second common group is\n"
+" * \"CallerPrincipal,\" which provides the application identity of\n"
+" * the user rather than the security domain identity.\n"
+" * \n"
+" * @return Group[] containing the sets of roles\n"
+" */\n"
+" abstract protected Group[] getRoleSets() throws LoginException;\n"
+"}"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1396
#, no-c-format
+#, fuzzy
msgid ""
"You'll need to pay attention to the <literal>loginOk</literal> instance "
"variable. This must be set to true if the login succeeds, false otherwise by "
@@ -4581,6 +5526,9 @@
"together with control flags that do not require that the login module "
"succeed in order for the overall login to succeed."
msgstr ""
+"<literal>loginOk</literal> ã¤ã³ã¹ã¿ã³ã¹å¤æ°ã«ç¹ã«æ³¨ç®ãã¦ãã ããã ãã°ã¤ã³ãæåããå ´å㯠true ã«è¨å®ãããªããã°ãªãã¾ããã ãã以å¤ã ãã°ã¤ã³ã¡ã½ãããä¸æ¸ããããµãã¯ã©ã¹ã«ãã£ã¦ false ã«ãªãã¾ãã ãã®å¤æ°ã®è¨å®ã誤ãã¨ã ã³ãããã¡ã½ãããå¿
è¦ãªã¨ãã« subject ãæ´æ°ããªãã ã¾ãã¯æ´æ°ãã¹ãã§ã¯ãªãã¨ãã«æ´æ°ãã¦ãã¾ããã¨ã«ãªãã¾ãã å
¨ä½çãªãã°ã¤ã³ãæåããããã«ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãæåããå¿
è¦ããªãå¶å¾¡ãã©ã°ã§ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«å士ããã§ã¼ã³åãããã¨ãã§ãããããã°ã¤ã³ãã§ã¼ãºã®çµæã®è¿½è·¡ã追å ããã¾ããã "
+"??false otherwise by any subclasses that override the login method "
+"??to allow login modules to be chained together with control flags that do not require that the login module succeed in order for the overall login to succeed"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1399
@@ -4595,7 +5543,7 @@
"and password) to a principal with no roles. The key details of the class are "
"highlighted in the following class fragment. The JavaDoc comments detail the "
"responsibilities of subclasses."
-msgstr ""
+msgstr "<literal>org.jboss.security.auth.spi.UsernamePasswordLoginModule</literal> ã¯ã«ã¹ã¿ã ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã«é©ãã 2 çªç®ã®æ½è±¡ãã¼ã¹ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã«ãªãã¾ãã ãã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¯ããã«æååãã¼ã¹ã®ã¦ã¼ã¶ã¼åãã¦ã¼ã¶ã¼ IDã¨ãã¾ã <literal>char[]</literal> ãã¹ã¯ã¼ããèªè¨¼è¨¼ææ¸ã¨ãã¦å¼·å¶ãããã¨ã§ã«ã¹ã¿ã ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®å®è£
ãç°¡ç¥åãã¾ãã ã¾ãã ãã¼ã«ã®ãªã principal ã¸ã® anonymous ã¦ã¼ã¶ã¼ (null ã¦ã¼ã¶ã¼åã¨ãã¹ã¯ã¼ãã§ç¤ºããã) ã®ãããã³ã°ã«ã対å¿ãã¦ãã¾ãã ã¯ã©ã¹ã®éè¦é¨åã¯æ¬¡ã®ä¾ã§å¼·èª¿ãã¦ãã¾ãã JavaDoc ã¯ãµãã¯ã©ã¹ãæããå½¹å²ã«ã¤ãã¦è©³ããã³ã¡ã³ããã¦ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1402
@@ -4693,6 +5641,97 @@
" throws LoginException;\n"
"}"
msgstr ""
+"package org.jboss.security.auth.spi;\n"
+"\n"
+"/**\n"
+" * An abstract subclass of AbstractServerLoginModule that imposes a\n"
+" * an identity == String username, credentials == String password\n"
+" * view on the login process. Subclasses override the\n"
+" * getUsersPassword() and getUsersRoles() methods to return the\n"
+" * expected password and roles for the user.\n"
+" */\n"
+"public abstract class UsernamePasswordLoginModule\n"
+" extends AbstractServerLoginModule\n"
+"{\n"
+" /** The login identity */\n"
+" private Principal identity;\n"
+" /** The proof of login identity */\n"
+" private char[] credential;\n"
+" /** The principal to use when a null username and password are seen */\n"
+" private Principal unauthenticatedIdentity;\n"
+"\n"
+" /**\n"
+" * The message digest algorithm used to hash passwords. If null then\n"
+" * plain passwords will be used. */\n"
+" private String hashAlgorithm = null;\n"
+"\n"
+" /**\n"
+" * The name of the charset/encoding to use when converting the\n"
+" * password String to a byte array. Default is the platform's\n"
+" * default encoding.\n"
+" */\n"
+" private String hashCharset = null;\n"
+"\n"
+" /** The string encoding format to use. Defaults to base64. */\n"
+" private String hashEncoding = null;\n"
+" \n"
+" // ...\n"
+" \n"
+" /** \n"
+" * Override the superclass method to look for an\n"
+" * unauthenticatedIdentity property. This method first invokes\n"
+" * the super version.\n"
+" *\n"
+" * @param options,\n"
+" * @option unauthenticatedIdentity: the name of the principal to\n"
+" * assign and authenticate when a null username and password are\n"
+" * seen.\n"
+" */\n"
+" public void initialize(Subject subject,\n"
+" CallbackHandler callbackHandler,\n"
+" Map sharedState,\n"
+" Map options)\n"
+" {\n"
+" super.initialize(subject, callbackHandler, sharedState,\n"
+" options);\n"
+" // Check for unauthenticatedIdentity option.\n"
+" Object option = options.get(\"unauthenticatedIdentity\");\n"
+" String name = (String) option;\n"
+" if (name != null) {\n"
+" unauthenticatedIdentity = new SimplePrincipal(name);\n"
+" }\n"
+" }\n"
+" \n"
+" // ...\n"
+" \n"
+" /**\n"
+" * A hook that allows subclasses to change the validation of the\n"
+" * input password against the expected password. This version\n"
+" * checks that neither inputPassword or expectedPassword are null\n"
+" * and that inputPassword.equals(expectedPassword) is true;\n"
+" *\n"
+" * @return true if the inputPassword is valid, false otherwise.\n"
+" */\n"
+" protected boolean validatePassword(String inputPassword,\n"
+" String expectedPassword)\n"
+" {\n"
+" if (inputPassword == null || expectedPassword == null) {\n"
+" return false;\n"
+" }\n"
+" return inputPassword.equals(expectedPassword);\n"
+" }\n"
+" \n"
+" /**\n"
+" * Get the expected password for the current username available\n"
+" * via the getUsername() method. This is called from within the\n"
+" * login() method after the CallbackHandler has returned the\n"
+" * username and candidate password.\n"
+" *\n"
+" * @return the valid password String\n"
+" */\n"
+" abstract protected String getUsersPassword()\n"
+" throws LoginException;\n"
+"}"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1403
@@ -4705,7 +5744,7 @@
"string-based semantic is valid, then subclass "
"<literal>UsernamePasswordLoginModule</literal>, otherwise subclass "
"<literal>AbstractServerLoginModule</literal>."
-msgstr ""
+msgstr "<literal>AbstractServerLoginModule</literal> 対 <literal>UsernamePasswordLoginModule</literal>ã ã©ã¡ãã®ãµãã¯ã©ã¹ã«ããããé¸æããå ´åã åç´ã«æååãã¼ã¹ã®ã¦ã¼ã¶ã¼åã¨è¨¼ææ¸ãèªè¨¼ãè¡ãããã«è¨è¿°ãã¦ãããã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã«ä½¿ç¨ã§ãããã©ãããåºæ¬ã¨ãªãã¾ãã æååãã¼ã¹ã®ã»ãã³ãã£ãã¯ãæå¹ãªããµãã¯ã©ã¹ã¯ <literal>UsernamePasswordLoginModule</literal> ã«ãã ãã以å¤ã¯ <literal>AbstractServerLoginModule</literal> ã«ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1406
@@ -4719,7 +5758,7 @@
"<literal>UsernamePasswordLoginModule</literal> to ensure that your login "
"module provides the authenticated <literal>Principal</literal> information "
"in the form expected by the JBossSX security manager."
-msgstr ""
+msgstr "ã«ã¹ã¿ã ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãè¨è¿°ããéã«è¡ãå¿
è¦ãããã¹ããããé¸æãããã¼ã¹ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¯ã©ã¹ã«å¿ãã¦æ¬¡ã«ç¤ºãã¾ãã ã»ãã¥ãªãã£ã¤ã³ãã©ã¹ãã©ã¯ãã£ã¨çµ±åãããã«ã¹ã¿ã ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãè¨è¿°ããå ´åã¯ã <literal>AbstractServerLoginModule</literal> ã¾ã㯠<literal>UsernamePasswordLoginModule</literal> ã®ãµãã¯ã©ã¹åããéå§ãã¦ã ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ãèªè¨¼ããã <literal>Principal</literal> æ
å ±ã JBossSX ã»ãã¥ãªãã£ç®¡çãæå¾
ããå½¢å¼ã§æä¾ããããã«ãã¦ãã ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1409
@@ -4727,7 +5766,7 @@
msgid ""
"When subclassing the <literal>AbstractServerLoginModule</literal>, you need "
"to override the following:"
-msgstr ""
+msgstr "<literal>AbstractServerLoginModule</literal> ããµãã¯ã©ã¹åããå ´åã«ã¯æ¬¡ãä¸æ¸ãããå¿
è¦ãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1414 J2EE_Security_On_JBOSS.xml:1439
@@ -4735,16 +5774,17 @@
msgid ""
"<literal>void initialize(Subject, CallbackHandler, Map, Map)</literal>: if "
"you have custom options to parse."
-msgstr ""
+msgstr "<literal>void initialize(Subject, CallbackHandler, Map, Map)</literal>: 解æããã«ã¹ã¿ã ã®ãªãã·ã§ã³ãããå ´åã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1419
#, no-c-format
+#, fuzzy
msgid ""
"<literal>boolean login()</literal>: to perform the authentication activity. "
"Be sure to set the <literal>loginOk</literal> instance variable to true if "
"login succeeds, false if it fails."
-msgstr ""
+msgstr "<literal>boolean login()</literal>: èªè¨¼ã¢ã¯ãã£ããã£ãå®è¡ããããã ãã°ã¤ã³ãæåããå ´å <literal>loginOk</literal> ã¤ã³ã¹ã¿ã³ã¹å¤æ°ãå¿
ã true ã«è¨å®ãã¦ãã ããã 失æããå ´å㯠false ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1424
@@ -4753,7 +5793,7 @@
"<literal>Principal getIdentity()</literal>: to return the "
"<literal>Principal</literal> object for the user authenticated by the "
"<literal>log()</literal> step."
-msgstr ""
+msgstr "<literal>Principal getIdentity()</literal>: <literal>log()</literal> ã®ã¹ãããã§èªè¨¼ãããã¦ã¼ã¶ã¼ã® <literal>Principal</literal> ãªãã¸ã§ã¯ããè¿ãããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1429 J2EE_Security_On_JBOSS.xml:1444
@@ -4765,7 +5805,7 @@
"<literal>login()</literal>. A second common <literal>Group</literal> is "
"named <literal>CallerPrincipal</literal> and provides the user's "
"application identity rather than the security domain identity."
-msgstr ""
+msgstr "<literal>Group[] getRoleSets()</literal>: <literal>login()</literal> ã®éã«èªè¨¼ããã <literal>Principal</literal> ã«å²ãå½ã¦ããããã¼ã«ãå«ã <literal>Roles</literal> ã¨ããååã® <literal>Group</literal> ãå°ãªãã¨ã 1 ã¤è¿ãããã 2 çªç®ã«å
±éã® <literal>Group</literal> 㯠<literal>CallerPrincipal</literal> ã§ã ã»ãã¥ãªãã£ãã¡ã¤ã³ ID ã§ã¯ãªãã¦ã¼ã¶ã¼ã®ã¢ããªã±ã¼ã·ã§ã³ ID ãæä¾ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1434
@@ -4773,7 +5813,7 @@
msgid ""
"When subclassing the <literal>UsernamePasswordLoginModule</literal>, you "
"need to override the following:"
-msgstr ""
+msgstr "<literal>UsernamePasswordLoginModule</literal> ããµãã¯ã©ã¹åããå ´åã¯æ¬¡ãä¸æ¸ãããå¿
è¦ãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1449
@@ -4784,13 +5824,16 @@
"literal> method. The <literal>getUsersPassword()</literal> method is called "
"from within <literal>login()</literal> after the <literal>callbackhandler</"
"literal> returns the username and candidate password."
-msgstr ""
+msgstr "<literal>String getUsersPassword()</literal>: <literal>getUsername()</literal> ã¡ã½ããã§ç¾å¨ä½¿ç¨å¯è½ãªã¦ã¼ã¶ã¼åã«å¯¾ããæå¾
ãã¹ã¯ã¼ããè¿ãããã <literal>getUsersPassword()</literal> ã¡ã½ãã㯠<literal>callbackhandler</literal> ãã¦ã¼ã¶ã¼åã¨åè£ãã¹ã¯ã¼ããè¿ããå¾ã« <literal>login()</literal> å
ããå¼ã³åºããã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1457
#, no-c-format
+#, fuzzy
msgid "A Custom LoginModule Example"
msgstr ""
+"ã«ã¹ã¿ã ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®ä¾ "
+"?? LoginModule no space"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1458
@@ -4805,7 +5848,7 @@
"current user being authenticated. Similarly, a lookup of the form "
"<literal>roles/<username></literal> returns the requested user's "
"roles."
-msgstr ""
+msgstr "æ¬ã»ã¯ã·ã§ã³ã§ã¯ã«ã¹ã¿ã ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®ä¾ãè¦ã¦ããã¾ãã <literal>UsernamePasswordLoginModule</literal> ãæ¡å¼µãã¦ã¼ã¶ã¼ã®ãã¹ã¯ã¼ãã¨ãã¼ã«åã JNDI æ¤ç´¢ã§åå¾ãã¾ãã <literal>password/<username></literal> å½¢å¼ (<literal><username></literal> ã¯èªè¨¼ããã¦ããç¾å¨ã®ã¦ã¼ã¶ã¼) ã®ååã使ã£ã¦ã³ã³ããã¹ãã®æ¤ç´¢ãå®è¡ããã¨ã¦ã¼ã¶ã¼ã®ãã¹ã¯ã¼ããè¿ã JNDI ã³ã³ããã¹ããããã¨ããã®ãç®çã§ãã åç´ã« <literal>roles/<username></literal> å½¢å¼ãæ¤ç´¢ããã¨è¦æ±ããã¦ã¼ã¶ã¼ã®ãã¼ã«ãè¿ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1461
@@ -4821,12 +5864,14 @@
"and roles from the JNDI store. The <literal>JndiUserAndPass</literal> does "
"not concern itself with the JAAS <literal>LoginModule</literal> operations."
msgstr ""
+"ãã®ä¾ã®ã½ã¼ã¹ã³ã¼ãã¯ããã¯ãµã³ãã«ã® <literal>src/main/org/jboss/book/security/ex2</literal> ãã£ã¬ã¯ããªã«ããã¾ãã <xref linkend=\"A_Custom_LoginModule_Example-_A_JndiUserAndPass_custom_login_module\"/> ã§ã¯ <literal>JndiUserAndPass</literal> ã«ã¹ã¿ã ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®ã½ã¼ã¹ã³ã¼ãã示ãã¾ãã ãã㯠JBoss "
+"<literal>UsernamePasswordLoginModule</literal> ãæ¡å¼µããããã <literal>JndiUserAndPass</literal> ãè¡ãã®ã¯ã¦ã¼ã¶ã¼ã®ãã¹ã¯ã¼ãã¨ãã¼ã«ã JNDI ã¹ãã¢ããåå¾ãããã¨ã ãã§ãã <literal>JndiUserAndPass</literal> ã¯ç´æ¥ JAAS <literal>LoginModule</literal> ã®åä½ã«ã¯é¢ä¿ãã¾ããã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1464
#, no-c-format
msgid "A JndiUserAndPass custom login module"
-msgstr ""
+msgstr "JndiUserAndPass ã«ã¹ã¿ã ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1465
@@ -4925,6 +5970,98 @@
" } \n"
"}"
msgstr ""
+"package org.jboss.book.security.ex2;\n"
+" \n"
+"import java.security.acl.Group;\n"
+"import java.util.Map;\n"
+"import javax.naming.InitialContext;\n"
+"import javax.naming.NamingException;\n"
+"import javax.security.auth.Subject;\n"
+"import javax.security.auth.callback.CallbackHandler;\n"
+"import javax.security.auth.login.LoginException;\n"
+"\n"
+"import org.jboss.security.SimpleGroup;\n"
+"import org.jboss.security.SimplePrincipal;\n"
+"import org.jboss.security.auth.spi.UsernamePasswordLoginModule;\n"
+"\n"
+"/** \n"
+" * An example custom login module that obtains passwords and roles\n"
+" * for a user from a JNDI lookup.\n"
+" * \n"
+" * @author Scott.Stark at jboss.org\n"
+" * @version $Revision: 1.12 $\n"
+"*/\n"
+"public class JndiUserAndPass \n"
+" extends UsernamePasswordLoginModule\n"
+"{\n"
+" /** The JNDI name to the context that handles the password/username "
+"lookup */\n"
+" private String userPathPrefix;\n"
+" /** The JNDI name to the context that handles the roles/ username lookup "
+"*/\n"
+" private String rolesPathPrefix;\n"
+" \n"
+" /**\n"
+" * Override to obtain the userPathPrefix and rolesPathPrefix options.\n"
+" */\n"
+" public void initialize(Subject subject, CallbackHandler "
+"callbackHandler,\n"
+" Map sharedState, Map options)\n"
+" {\n"
+" super.initialize(subject, callbackHandler, sharedState, options);\n"
+" userPathPrefix = (String) options.get(\"userPathPrefix\");\n"
+" rolesPathPrefix = (String) options.get(\"rolesPathPrefix\");\n"
+" }\n"
+" \n"
+" /**\n"
+" * Get the roles the current user belongs to by querying the\n"
+" * rolesPathPrefix + '/' + super.getUsername() JNDI location.\n"
+" */\n"
+" protected Group[] getRoleSets() throws LoginException\n"
+" {\n"
+" try {\n"
+" InitialContext ctx = new InitialContext();\n"
+" String rolesPath = rolesPathPrefix + '/' + super."
+"getUsername();\n"
+"\n"
+" String[] roles = (String[]) ctx.lookup(rolesPath);\n"
+" Group[] groups = {new SimpleGroup(\"Roles\")};\n"
+" log.info(\"Getting roles for user=\"+super.getUsername());\n"
+" for(int r = 0; r < roles.length; r ++) {\n"
+" SimplePrincipal role = new SimplePrincipal(roles[r]);\n"
+" log.info(\"Found role=\"+roles[r]);\n"
+" groups[0].addMember(role);\n"
+" }\n"
+" return groups;\n"
+" } catch(NamingException e) {\n"
+" log.error(\"Failed to obtain groups for\n"
+" user=\"+super.getUsername(), e);\n"
+" throw new LoginException(e.toString(true));\n"
+" }\n"
+" }\n"
+" \n"
+" /** \n"
+" * Get the password of the current user by querying the\n"
+" * userPathPrefix + '/' + super.getUsername() JNDI location.\n"
+" */\n"
+" protected String getUsersPassword() \n"
+" throws LoginException\n"
+" {\n"
+" try {\n"
+" InitialContext ctx = new InitialContext();\n"
+" String userPath = userPathPrefix + '/' + super."
+"getUsername();\n"
+" log.info(\"Getting password for user=\"+super.getUsername());\n"
+" String passwd = (String) ctx.lookup(userPath);\n"
+" log.info(\"Found password=\"+passwd);\n"
+" return passwd;\n"
+" } catch(NamingException e) {\n"
+" log.error(\"Failed to obtain password for\n"
+" user=\"+super.getUsername(), e);\n"
+" throw new LoginException(e.toString(true));\n"
+" }\n"
+" } \n"
+"}"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1466
@@ -4942,7 +6079,7 @@
"password of <literal>theduke</literal> and an array of roles names equal to "
"<literal>{\"TheDuke\", \"Echo\"}</literal> regardless of what the username "
"is. You can experiment with other implementations as you wish."
-msgstr ""
+msgstr "JNDI ã¹ãã¢ã®è©³ç´°ã«ã¤ãã¦ã¯ <literal>org.jboss.book.security.ex2.service.JndiStore</literal> MBean ãã覧ãã ããã ãã®ãµã¼ãã¹ã¯ <literal>javax.naming.Context</literal> ãããã·ãè¿ã <literal>ObjectFactory</literal> ã JNDI ã«çµåãã¾ãã ãããã·ã¯ <literal>password</literal> ããã³ <literal>roles</literal> ã«å¯¾ããæ¤ç´¢åã®ãã¬ãã£ãã¯ã¹ããã§ãã¯ãããã¨ã§ããã«å¯¾ãã¦è¡ãããæ¤ç´¢åä½ãå¦çãã¾ãã ååã <literal>password</literal> ã§å§ã¾ãå ´åã¯ã ã¦ã¼ã¶ã¼ã®ãã¹ã¯ã¼ããè¦æ±ããã¦ãã¾ãã ååã <literal>roles</literal> ã§å§ã¾ãå ´åã¯ã ã¦ã¼ã¶ã¼ã®ãã¼ã«ãè¦æ±ããã¦ãã¾ãã ãµã³ãã«ã®å®è£
ã¯ã¦ã¼ã¶ã¼åã«é¢ä¿ãªã常㫠<literal>theduke</literal> ã®ãã¹ã¯ã¼ã㨠<literal>{\"TheDuke\", \"Echo\"}</literal> ã«çãããã¼ã«åã®é
åãè¿ãã¾ãã ç¶æ³ã«å¿ãã¦å¥ã®å®è£
ã§ã!
ã¹ããããã¨ãã§ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1469
@@ -4951,7 +6088,7 @@
"The example code includes a simple session bean for testing the custom login "
"module. To build, deploy and run the example, execute the following command "
"in the examples directory."
-msgstr ""
+msgstr "ãµã³ãã«ã³ã¼ãã«ã¯ã«ã¹ã¿ã ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ããã¹ãããç®çã§ã·ã³ãã«ãªã»ãã·ã§ã³ bean ãå«ã¾ãã¦ãã¾ãã ãã®ãµã³ãã«ãæ§ç¯ã å°å
¥ã ããã¦ç¨¼åãããã«ã¯ã ãµã³ãã«ã®ãã£ã¬ã¯ããªã§æ¬¡ã®ã³ãã³ããå®è¡ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1472
@@ -4966,16 +6103,27 @@
" [java] [INFO,ExClient] Created Echo\n"
" [java] [INFO,ExClient] Echo.echo('Hello') = Hello"
msgstr ""
+"[examples]$ ant -Dchap=security -Dex=2 run-example\n"
+"...\n"
+"run-example2:\n"
+" [echo] Waiting for 5 seconds for deploy...\n"
+" [java] [INFO,ExClient] Login with username=jduke, password=theduke\n"
+" [java] [INFO,ExClient] Looking up EchoBean2\n"
+" [java] [INFO,ExClient] Created Echo\n"
+" [java] [INFO,ExClient] Echo.echo('Hello') = Hello"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1473
#, no-c-format
+#, fuzzy
msgid ""
"The choice of using the <literal>JndiUserAndPass</literal> custom login "
"module for the server side authentication of the user is determined by the "
"login configuration for the example security domain. The EJB JAR "
"<literal>META-INF/jboss.xml</literal> descriptor sets the security domain"
msgstr ""
+"ãµã¼ãã¼å´ã®ã¦ã¼ã¶ã¼èªè¨¼ã«å¯¾ã㦠<literal>JndiUserAndPass</literal> ã«ã¹ã¿ã ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã使ç¨ããé¸æã¯ãµã³ãã«ã®ã»ãã¥ãªãã£ãã¡ã¤ã³ã®ãã°ã¤ã³è¨å®ã«ãã£ã¦ç¢ºå®ããã¾ãã EJB JAR <literal>META-INF/jboss.xml</literal> è¨è¿°åã¯ãã®ã»ãã¥ãªãã£ãã¡ã¤ã³ãè¨å®ãã¾ãã "
+"?? end period ??"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1476
@@ -4986,6 +6134,10 @@
" <security-domain>java:/jaas/security-ex2</security-domain>\n"
"</jboss>"
msgstr ""
+"<?xml version=\"1.0\"?>\n"
+"<jboss>\n"
+" <security-domain>java:/jaas/security-ex2</security-domain>\n"
+"</jboss>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1477
@@ -4993,7 +6145,7 @@
msgid ""
"The SAR <literal>META-INF/login-config.xml</literal> descriptor defines the "
"login module configuration."
-msgstr ""
+msgstr "SAR <literal>META-INF/login-config.xml</literal> è¨è¿°åã¯ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®è¨å®ãå®ç¾©ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1480
@@ -5012,12 +6164,24 @@
" </authentication>\n"
"</application-policy>"
msgstr ""
+"<application-policy name = \"security-ex2\">\n"
+" <authentication>\n"
+" <login-module code=\"org.jboss.book.security.ex2.JndiUserAndPass"
+"\"\n"
+" flag=\"required\">\n"
+" <module-option name = \"userPathPrefix\">/security/store/"
+"password</module-option>\n"
+" <module-option name = \"rolesPathPrefix\">/security/store/"
+"roles</module-option>\n"
+" </login-module>\n"
+" </authentication>\n"
+"</application-policy>"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1488
#, no-c-format
msgid "The Secure Remote Password (SRP) Protocol"
-msgstr ""
+msgstr "Secure Remote Password (SRP) ãããã³ã«"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1489
@@ -5026,7 +6190,7 @@
"The SRP protocol is an implementation of a public key exchange handshake "
"described in the Internet standards working group request for comments 2945"
"(RFC2945). The RFC2945 abstract states:"
-msgstr ""
+msgstr "ã¤ã³ã¿ã¼ãããæ¨æºã¯ã¼ã¯ã°ã«ã¼ãã«ãã RFC2945 ã«è¨è¼ããã¦ããããã«ã SRP ãããã³ã«ã¯ãããªãã¯ãã¼äº¤æãã³ãã·ã§ã¤ã¯ã®å®è£
ã«ãªãã¾ãã RFC2945 ã®è¦ç´ã¯æ¬¡ã®ããã«è¨ããã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1492
@@ -5043,7 +6207,7 @@
"required to store or manage any long-term keys. SRP offers both security and "
"deployment advantages over existing challenge-response techniques, making it "
"an ideal drop-in replacement where secure password authentication is needed."
-msgstr ""
+msgstr "ãã®ããã¥ã¡ã³ãã«ã¯æå·åæ¹å¼ãæ¡ç¨ãã¦ããå¼·åºãªãããã¯ã¼ã¯èªè¨¼ã¡ã«ããºã ã¨ãã¦ç¥ããã SRP (Secure Remote Password) ãããã³ã«ã«ã¤ãã¦è¨è¼ããã¦ãã¾ãã ãã®ã¡ã«ããºã ã¯å¾æ¥ã®å使ç¨å¯è½ãªãã¹ã¯ã¼ãã«é¢é£ããå®å
¨ä¸ã®åé¡ãæé¤ããªããã ã¦ã¼ã¶ã¼ãå
¥åãããã¹ã¯ã¼ãã使ã£ã¦å®å
¨ãªæ¥ç¶äº¤æ¸ã«é©ãã¦ãã¾ãã ãã®ã·ã¹ãã ã¯èªè¨¼ã®ããã»ã¹ã§å®å
¨ãªãã¼ã®äº¤æãè¡ãã»ãã·ã§ã³ä¸ã«ã»ãã¥ãªãã£å±¤ãæå¹ã«ãããã¨ãã§ãã¾ã (ãã©ã¤ãã·ã¼ã¨æ´åæ§ã®ä¿è·)ã ä¿¡é ¼ã§ãããã¼ãµã¼ãã¼ã証ææ¸ã®ã¤ã³ãã©ã¹ãã©ã¯ãã£ãå¿
è¦ã¨ããã ã¯ã©ã¤ã¢ã³ãã¯é·ããã¼ãä¿ç®¡ããã管çããå¿
è¦ãããã¾ããã æ¢åã®ãã£ã¬ã³ã¸ã¬ã¹ãã³ã¹æè¡ã«å¯¾ã㦠SRP ã¯ã»ãã¥ãªãã£ã¨å°å
¥ã®ä¸¡é¢ã«ãããå©ç¹ãæä¾ãããã!
ã å®å
¨ãªãã¹ã¯ã¼ãèªè¨¼ãå¿
è¦ã¨ãããå ´é¢ã§ç½®ãæãã容æãªçæ³ã®ã¡ã«ããºã ã¨ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1495
@@ -5054,6 +6218,8 @@
"the SRP algorithm and its history can be found at <ulink url=\"http://www-cs-"
"students.stanford.edu/~tjw/srp/\"></ulink>."
msgstr ""
+"注è¨: RFC2945 ã®å®å
¨ãªè©³ç´°ã¯ <ulink url=\"http://www.rfc-editor.org/rfc.html\"></ulink> ãã覧ãã ããã SRP ã¢ã«ã´ãªãºã ããã³ãã®å±¥æ´ã«é¢ãã詳細㯠<ulink url=\"http://www-cs-"
+"students.stanford.edu/~tjw/srp/\"></ulink> ãã覧ãã ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1498
@@ -5065,7 +6231,7 @@
"the server. This is in contrast to other public key-based algorithms that "
"require client certificates and the corresponding certificate management "
"infrastructure."
-msgstr ""
+msgstr "SRP ã¯ã³ã³ã»ãããã»ãã¥ãªãã£ã®ç¹ã«ããã¦ã¯ Diffie-Hellman ããã³ RSAãªã©ã®ä»ã®ãããªãã¯ãã¼äº¤æã¢ã«ã´ãªãºã ã¨åæ§ã§ãã SRP ã¯ãµã¼ãã¼å´ã«ã¯ãªã¢ããã¹ãã®ãã¹ã¯ã¼ããåå¨ããå¿
è¦ã®ãªãæ¹æ³ã§ã·ã³ãã«ãªæååãã¹ã¯ã¼ãããã¼ã¹ã¨ãã¦ãã¾ãã ãã®ç¹ãã¯ã©ã¤ã¢ã³ã証ææ¸ã該å½ãã証ææ¸ã®ç®¡çã¤ã³ãã©ã¹ãã©ã¯ãã£ãå¿
è¦ã¨ããä»ã®ãããªãã¯ãã¼ãã¼ã¹ã®ã¢ã«ã´ãªãºã ã¨å¯¾ç
§çã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1501
@@ -5080,7 +6246,7 @@
"traditional shared password based encryption schemes that require the sender "
"and receiver to know the shared password. Public key algorithms eliminate "
"the need to share passwords."
-msgstr ""
+msgstr " Diffie-Hellman ããã³ RSA ã®ãããªã¢ã«ã´ãªãºã ã¯ãããªãã¯ãã¼äº¤æã¢ã«ã´ãªãºã ã¨ãã¦ç¥ããã¦ãã¾ãã ãããªãã¯ãã¼ã¢ã«ã´ãªãºã ã®æ¦å¿µã¨ã¯ã 誰ã§ãè¦ããã¨ãã§ãããããªãã¯ãã¼ã¨èªåããç¥ããªããã©ã¤ãã¼ããã¼ã® 2 ã¤ã®ãã¼ãæã¤ã¨ãããã¨ã«ãªãã¾ãã 誰ããããªãã«æå·åãããæ
å ±ãéä¿¡ãããå ´åã ããªãã®ãããªãã¯ãã¼ã使ã£ã¦ãã®æ
å ±ãæå·åãã¾ãã ãã®æ
å ±ã¯ããªãã®ãã©ã¤ãã¼ããã¼ã使ããã¨ãã§ããããªãã®ã¿è§£èªãããã¨ãã§ãã¾ãã ãããéä¿¡è
ã¨åä¿¡è
ãå
±æãã¹ã¯ã¼ããç¥ã£ã¦ããå¿
è¦ãããå¾æ¥ã®å
±æãã¹ã¯ã¼ããã¼ã¹ã®æå·ã¹ãã¼ã ã¨æ¯ã¹ã¦ã¿ãã¨ã ãããªãã¯ãã¼ã¢ã«ã´ãªãºã ã¯ãã¹ã¯ã¼ããå
±æããã¨ããå¿
è¦æ§ã解æ¶ãã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1504
@@ -5088,7 +6254,7 @@
msgid ""
"The JBossSX framework includes an implementation of SRP that consists of the "
"following elements:"
-msgstr ""
+msgstr "JBossSX ãã¬ã¼ã ã¯ã¼ã¯ã«ã¯æ¬¡ã®è¦ç´ ããæ§æããã SRP ã®å®è£
ãå«ã¾ãã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1509
@@ -5096,7 +6262,7 @@
msgid ""
"An implementation of the SRP handshake protocol that is independent of any "
"particular client/server protocol"
-msgstr ""
+msgstr "ãããã®ã¯ã©ã¤ã¢ã³ãï¼ãµã¼ãã¼ãããã³ã«ã«ãä¾åããªã SRP ãã³ãã·ã§ã¤ã¯ãããã³ã«ã®å®è£
"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1514
@@ -5104,7 +6270,7 @@
msgid ""
"An RMI implementation of the handshake protocol as the default client/server "
"SRP implementation"
-msgstr ""
+msgstr "ããã©ã«ãã®ã¯ã©ã¤ã¢ã³ãï¼ãµã¼ãã¼ SRP å®è£
ã¨ãã¦ã®ãã³ãã·ã§ã¤ã¯ãããã³ã«ã® RMI å®è£
"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1519
@@ -5112,7 +6278,7 @@
msgid ""
"A client side JAAS <literal>LoginModule</literal> implementation that uses "
"the RMI implementation for use in authenticating clients in a secure fashion"
-msgstr ""
+msgstr "å®å
¨ãªæ¹æ³ã«ããã¯ã©ã¤ã¢ã³ãèªè¨¼ãç®çã¨ãã RMI å®è£
ã使ç¨ããã¯ã©ã¤ã¢ã³ãå´ JAAS <literal>LoginModule</literal> å®è£
"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1524
@@ -5123,7 +6289,7 @@
"externalizes the configuration of the verification information store. It "
"also establishes an authentication cache that is bound into the JBoss server "
"JNDI namespace."
-msgstr ""
+msgstr "RMI ãµã¼ãã¼å®è£
ã管çãã JMX MBeanã ãã® MBean ã«ãã RMI ãµã¼ãã¼å®è£
ã JMX ãã¬ã¼ã ã¯ã¼ã¯ã«ãã©ã°ã¤ã³å¯è½ã¨ãªãã æ¤è¨¼æ
å ±ã®ã¹ãã¢ã®è¨å®ãå¤é¨åã§ããããã«ãªãã¾ãã ã¾ãã JBoss ãµã¼ãã¼ JNDI åå空éã«çµåãããèªè¨¼ãã£ãã·ã¥ã確ç«ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1529
@@ -5131,7 +6297,7 @@
msgid ""
"A server side JAAS <literal>LoginModule</literal> implementation that uses "
"the authentication cache managed by the SRP JMX MBean."
-msgstr ""
+msgstr "SRP JMX MBean ã«ãã£ã¦ç®¡çãããèªè¨¼ãã£ãã·ã¥ã使ç¨ãããµã¼ãã¼å´ JAAS <literal>LoginModule</literal> å®è£
"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1534
@@ -5139,13 +6305,13 @@
msgid ""
"gives a diagram of the key components involved in the JBossSX implementation "
"of the SRP client/server framework."
-msgstr ""
+msgstr "SRP ã¯ã©ã¤ã¢ã³ãï¼ãµã¼ãã¼ãã¬ã¼ã ã¯ã¼ã¯ã® JBossSX å®è£
ãå¿
è¦ã¨ããéè¦ãªã³ã³ãã¼ãã³ãã«é¢ããå³ã示ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1538
#, no-c-format
msgid "The JBossSX components of the SRP client-server framework."
-msgstr ""
+msgstr "SRP ã¯ã©ã¤ã¢ã³ããµã¼ãã¼ãã¬ã¼ã ã¯ã¼ã¯ã® JBossSX ã³ã³ãã¼ãã³ã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1545
@@ -5158,7 +6324,7 @@
"configuration entry that includes the <literal>org.jboss.security.srp.jaas."
"SRPLoginModule</literal>. This module supports the following configuration "
"options:"
-msgstr ""
+msgstr "ã¯ã©ã¤ã¢ã³ãå´ã§ã¯ã SRP 㯠<literal>org.jboss.security.srp.SRPServerInterface</literal> ãããã·çµç±ã§èªè¨¼ãµã¼ãã¼ã«éä¿¡ããã«ã¹ã¿ã ã® JAAS <literal>LoginModule</literal> å®è£
ã¨ãã¦è¡¨ç¤ºããã¾ãã ã¯ã©ã¤ã¢ã³ã㯠<literal>org.jboss.security.srp.jaas.SRPLoginModule</literal> ãå«ããã°ã¤ã³è¨å®ã¨ã³ããªãä½æãããã¨ã§ SRP ã使ã£ãèªè¨¼ãæå¹ã«ãã¾ãã ãã®ã¢ã¸ã¥ã¼ã«ã¯æ¬¡ã®è¨å®ãªãã·ã§ã³ã«å¯¾å¿ãã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1550
@@ -5167,7 +6333,7 @@
"<emphasis role=\"bold\">principalClassName</emphasis>: This option is no "
"longer supported. The principal class is now always <literal>org.jboss."
"security.srp.jaas.SRPPrincipal</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">principalClassName</emphasis>: ãã®ãªãã·ã§ã³ã¯ãµãã¼ããããªããªãã¾ããã principal ã¯ã©ã¹ã¯å¸¸ã« <literal>org.jboss.security.srp.jaas.SRPPrincipal</literal> ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1555
@@ -5179,7 +6345,7 @@
"and <literal>srpServerRmiUrl</literal> options are specified, the "
"<literal>srpServerJndiName</literal> is tried before "
"<literal>srpServerRmiUrl</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">srpServerJndiName</emphasis>: SRP èªè¨¼ãµã¼ãã¼ã¨ã®éä¿¡ã«ä½¿ç¨ãã <literal>SRPServerInterface</literal> ãªãã¸ã§ã¯ãã® JNDI åã§ãã <literal>srpServerJndiName</literal> ããã³ <literal>srpServerRmiUrl</literal> ã®ä¸¡ãªãã·ã§ã³ã¨ãã«æå®ããã¦ããå ´åã¯ã <literal>srpServerRmiUrl</literal> ããå
ã« <literal>srpServerJndiName</literal> ã試è¡ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1560
@@ -5188,17 +6354,18 @@
"<emphasis role=\"bold\">srpServerRmiUrl</emphasis>: The RMI protocol URL "
"string for the location of the <literal>SRPServerInterface</literal> proxy "
"to use for communicating with the SRP authentication server."
-msgstr ""
+msgstr "<emphasis role=\"bold\">srpServerRmiUrl</emphasis>: SRP èªè¨¼ãµã¼ãã¼ã¨ã®éä¿¡ã«ä½¿ç¨ãã <literal>SRPServerInterface</literal> ãããã·ã®å ´æã® RMI ãããã³ã« URL æååã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1565
#, no-c-format
+#, fuzzy
msgid ""
"<emphasis role=\"bold\">externalRandomA</emphasis>: A true/false flag "
"indicating if the random component of the client public key A should come "
"from the user callback. This can be used to input a strong cryptographic "
"random number coming from a hardware token for example."
-msgstr ""
+msgstr "<emphasis role=\"bold\">externalRandomA</emphasis>: ã¯ã©ã¤ã¢ã³ããããªãã¯ãã¼ã®ã©ã³ãã ã³ã³ãã¼ãã³ããã¦ã¼ã¶ã¼ã®ã³ã¼ã«ããã¯ããæ¥ãã¹ããã©ããã示ã true ã¾ã㯠false ã®ãã©ã°ã«ãªãã¾ãã ãã¨ãã°ã ããã使ç¨ãã¦ãã¼ãã¦ã§ã¢ãã¼ã¯ã³ããã®å¼·åºãªæå·å¼ã«ããã©ã³ãã ãªçªå·ãå
¥åãããã¨ãã§ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1570
@@ -5211,6 +6378,8 @@
"private key and the challenge object sent as a <literal>javax.crypto."
"SealedObject</literal>."
msgstr ""
+"<emphasis role=\"bold\">hasAuxChallenge</emphasis>: ãµã¼ãã¼ãæ¤è¨¼ãè¡ãããã®è¿½å ãã£ã¬ã³ã¸ã¨ãã¦ãµã¼ãã¼ã«éä¿¡ãããæååã示ã true ã¾ã㯠false ã®ãã©ã°ã«ãªãã¾ãã ã¯ã©ã¤ã¢ã³ãã»ãã·ã§ã³ãæå·æã«å¯¾å¿ããå ´åã«ã¯ã ã»ãã·ã§ã³ã®ãã©ã¤ãã¼ããã¼ããã³ <literal>javax.crypto."
+"SealedObject</literal> ã¨ãã¦éä¿¡ããããã£ã¬ã³ã¸ãªãã¸ã§ã¯ãã使ã£ã¦ä¸æçãªæå·æãä½æããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1575
@@ -5219,7 +6388,7 @@
"<emphasis role=\"bold\">multipleSessions</emphasis>: a true/false flag "
"indicating if a given client may have multiple SRP login sessions active "
"simultaneously."
-msgstr ""
+msgstr "<emphasis role=\"bold\">multipleSessions</emphasis>: ç¹å®ã®ã¯ã©ã¤ã¢ã³ããåæã«è¤æ°ã® SRP ãã°ã¤ã³ã»ãã·ã§ã³ãã¢ã¯ãã£ãã«ã§ãããã©ããã示ã true ã¾ã㯠false ã®ãã©ã°ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1580
@@ -5241,7 +6410,7 @@
"authentication credentials to be used for validation of access to security "
"J2EE components. An example login configuration entry that demonstrates such "
"a setup is:"
-msgstr ""
+msgstr "<literal>SRPLoginModule</literal> ã¯ã ã»ãã¥ãªã㣠J2EE ã³ã³ãã¼ãã³ã群ã¸ã®ã¢ã¯ã»ã¹ã®æ¤è¨¼ã« SRP èªè¨¼è¨¼ææ¸ã使ç¨ãããããæ¨æºã® <literal>ClientLoginModule</literal> ã¨å
±ã«è¨å®ããå¿
è¦ãããã¾ãã ãã®ãããªè¨å®ã示ããµã³ãã«ã®ãã°ã¤ã³è¨å®ã¨ã³ããªã次ã«ç¤ºãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1586
@@ -5257,6 +6426,15 @@
" ;\n"
"};"
msgstr ""
+"srp {\n"
+" org.jboss.security.srp.jaas.SRPLoginModule required\n"
+" srpServerJndiName=\"SRPServerInterface\"\n"
+" ;\n"
+" \n"
+" org.jboss.security.ClientLoginModule required\n"
+" password-stacking=\"useFirstPass\"\n"
+" ;\n"
+"};"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1587
@@ -5268,7 +6446,7 @@
"exposing an RMI accessible version of the SRPServerInterface as well as "
"updating the SRP authentication session cache. The configurable SRPService "
"MBean attributes include the following:"
-msgstr ""
+msgstr "JBoss ãµã¼ãã¼å´ã«ã¯éåçã« SRP ãµã¼ãã¼ãæ§æãããªãã¸ã§ã¯ã群ã®ç®¡çãè¡ã MBean ã 2 ã¤ããã¾ãã ãã©ã¤ããªãµã¼ãã¹ã¯ <literal>org.jboss.security.srp.SRPService</literal> MBean ã§ã SRPServerInterface ã® RMI ã¢ã¯ã»ã¹ãå¯è½ãªãã¼ã¸ã§ã³ãå
¬éããã ã¾ã SRP èªè¨¼ã»ãã·ã§ã³ãã£ãã·ã¥ãæ´æ°ãããã¨ããã®å½¹ç®ã¨ãªãã¾ãã è¨å®å¯è½ãª SRPService MBean å±æ§ã«ã¯æ¬¡ã®ãããªãã®ãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1592
@@ -5279,7 +6457,7 @@
"<literal>SRPService</literal> binds the serializable dynamic proxy to the "
"<literal>SRPServerInterface</literal>. If not specified it defaults to "
"<literal>srp/SRPServerInterface</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">JndiName</emphasis>: SRPServerInterface ãããã·ã使ç¨å¯è½ã§ããã¹ãå ´æã® JNDI åã§ãã <literal>SRPService</literal> ãé£ç¶åå¯è½ãªåçãããã·ã <literal>SRPServerInterface</literal> ã«çµåããå ´æãããã«ãªãã¾ãã æå®ããã¦ããªãã¨ã ããã©ã«ãã§ã¯ <literal>srp/SRPServerInterface</literal> ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1597
@@ -5289,7 +6467,7 @@
"the <literal>SRPVerifierSource</literal> implementation that should be used "
"by the <literal>SRPService</literal>. If not set it defaults to <literal>srp/"
"DefaultVerifierSource</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">VerifierSourceJndiName</emphasis>: <literal>SRPService</literal> ã«ãã£ã¦ä½¿ç¨ãããã¹ã <literal>SRPVerifierSource</literal> å®è£
ã® JNDI åã§ãã è¨å®ããã¦ããªãã¨ã ããã©ã«ãã§ã¯ <literal>srp/DefaultVerifierSource</literal> ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1602
@@ -5300,7 +6478,7 @@
"literal> implementation to be used for caching authentication information is "
"bound. The SRP session cache is made available for use through this binding. "
"If not specified it defaults to <literal>srp/AuthenticationCache</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">AuthenticationCacheJndiName</emphasis>: ãã® JNDI åã®é
ä¸ã«èªè¨¼æ
å ±ããã£ãã·ã¥ããããã«ä½¿ç¨ããèªè¨¼ <literal>org.jboss.util.CachePolicy</literal> å®è£
ãçµåããã¾ãã SRP ã»ãã·ã§ã³ãã£ãã·ã¥ã¯ãã®ãã¤ã³ãã£ã³ã°ãéãã¦ä½¿ç¨å¯è½ã«ãªãã¾ãã æå®ããã¦ããªãã¨ã ããã©ã«ãã§ã¯ <literal>srp/AuthenticationCache</literal> ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1607
@@ -5309,7 +6487,7 @@
"<emphasis role=\"bold\">ServerPort</emphasis>: RMI port for the "
"<literal>SRPRemoteServerInterface</literal>. If not specified it defaults to "
"10099."
-msgstr ""
+msgstr "<emphasis role=\"bold\">ServerPort</emphasis>: <literal>SRPRemoteServerInterface</literal> ã® RMI ãã¼ãã§ãã æå®ããã¦ããªãã¨ã ããã©ã«ãã§ã¯ 10099 ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1612
@@ -5320,7 +6498,7 @@
"class name used during the export of the <literal>SRPServerInterface</"
"literal>. If not specified the default <literal>RMIClientSocketFactory</"
"literal> is used."
-msgstr ""
+msgstr "<emphasis role=\"bold\">ClientSocketFactory</emphasis>: <literal>SRPServerInterface</literal> ã®ã¨ã¯ã¹ãã¼ãä¸ã«ä½¿ç¨ããããªãã·ã§ã³ã®ã«ã¹ã¿ã <literal>java.rmi.server.RMIClientSocketFactory</literal> å®è£
ã¯ã©ã¹åã§ãã æå®ããã¦ããªãã¨ã ããã©ã«ãã® <literal>RMIClientSocketFactory</literal> ã使ç¨ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1617
@@ -5332,6 +6510,8 @@
"literal>. If not specified the default <literal>RMIServerSocketFactory</"
"literal> is used."
msgstr ""
+"<emphasis role=\"bold\">ServerSocketFactory</emphasis>: <literal>SRPServerInterface</"
+"literal> ã®ã¨ã¯ã¹ãã¼ãä¸ã«ä½¿ç¨ããããªãã·ã§ã³ã®ã«ã¹ã¿ã <literal>java.rmi.server.RMIServerSocketFactory</literal> å®è£
ã¯ã©ã¹åã§ãã æå®ããã¦ããªãã¨ã ããã©ã«ãã§ã¯ <literal>RMIServerSocketFactory</literal> ã使ç¨ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1622
@@ -5340,7 +6520,7 @@
"<emphasis role=\"bold\">AuthenticationCacheTimeout</emphasis>: Specifies the "
"timed cache policy timeout in seconds. If not specified this defaults to "
"1800 seconds(30 minutes)."
-msgstr ""
+msgstr "<emphasis role=\"bold\">AuthenticationCacheTimeout</emphasis>: æéæå®ããããã£ãã·ã¥ããªã·ã¼ã®ã¿ã¤ã ã¢ã¦ããç§åä½ã§æå®ãã¾ãã æå®ããã¦ããªãã¨ã ããã©ã«ãã§ã¯ 1800 ç§ (30 å) ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1627
@@ -5350,18 +6530,19 @@
"the timed cache policy resolution in seconds. This controls the interval "
"between checks for timeouts. If not specified this defaults to 60 seconds(1 "
"minute)."
-msgstr ""
+msgstr "<emphasis role=\"bold\">AuthenticationCacheResolution</emphasis>: æéæå®ããããã£ãã·ã¥ããªã·ã¼ã®ãªã¾ã«ã¼ã·ã§ã³ãç§åä½ã§æå®ãã¾ãã ã¿ã¤ã ã¢ã¦ãã®ãã§ãã¯ééãå¶å¾¡ãã¾ãã æå®ããã¦ããªãã¨ã ããã©ã«ãã§ã¯ 60ç§ (1 å) ã«è¨å®ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1632
#, no-c-format
+#, fuzzy
msgid ""
"<emphasis role=\"bold\">RequireAuxChallenge</emphasis>: Set if the client "
"must supply an auxiliary challenge as part of the verify phase. This gives "
"control over whether the <literal>SRPLoginModule</literal> configuration "
"used by the client must have the <literal>useAuxChallenge</literal> option "
"enabled."
-msgstr ""
+msgstr "<emphasis role=\"bold\">RequireAuxChallenge</emphasis>: ã¯ã©ã¤ã¢ã³ããæ¤è¨¼ãã§ã¼ãºã®ä¸é¨ã¨ãã¦è£å©ãã£ã¬ã³ã¸ãä¾çµ¦ããªããã°ãªããªããã©ãããè¨å®ãã¾ãã "
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1637
@@ -5374,11 +6555,12 @@
"false meaning that the second attempt by a user to authentication will "
"succeed, but the resulting SRP session will not overwrite the previous SRP "
"session state."
-msgstr ""
+msgstr "<emphasis role=\"bold\">OverwriteSessions</emphasis>: æ¢åã»ãã·ã§ã³ã«å¯¾ããã¦ã¼ã¶ã¼èªè¨¼ãæåãããç¾å¨ã®ã»ãã·ã§ã³ãä¸æ¸ãããªããã°ãªããªããã©ããã示ããã©ã°ã§ãã ã¯ã©ã¤ã¢ã³ããã¦ã¼ã¶ã¼ã¢ã¼ããã¨ã«è¤æ°ã®ã»ãã·ã§ã³ãæå¹ã«ãã¦ããªãã£ãå ´åã«ãµã¼ãã¼ SRP ã»ãã·ã§ã³ãã£ãã·ã¥ã®åä½ãå¶å¾¡ãã¾ãã ããã©ã«ã㯠false ã§ã èªè¨¼ããã¦ã¼ã¶ã¼ã«ãã 2 åç®ã®è©¦è¡ã¯æåããã¨ããæå³ã«ãªãã¾ããã çµæã¨ãªã SRP ã»ãã·ã§ã³ã¯åã® SRP ã»ãã·ã§ã³ã®ç¶æ
ãä¸æ¸ããã¾ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1642
#, no-c-format
+#, fuzzy
msgid ""
"The one input setting is the <literal>VerifierSourceJndiName</literal> "
"attribute. This is the location of the SRP password information store "
@@ -5391,7 +6573,7 @@
"example of the requirements for an <literal>SRPVerifierStore</literal> "
"service. The configurable <literal>SRPVerifierStoreService</literal> MBean "
"attributes include the following:"
-msgstr ""
+msgstr "ããã²ã¨ã¤ã®è¨å®ã¯ <literal>VerifierSourceJndiName</literal> å±æ§ã«ãªãã¾ãã ãã㯠JNDI ãéãã¦å©ç¨å¯è½ã¨ãªãããæä¾ãããªããã°ãªããªã SRP ãã¹ã¯ã¼ãæ
å ±ã¹ãã¢ã®å®è£
ã®å ´æã«ãªãã¾ãã <literal>org.jboss.security.srp SRPVerifierStoreService</literal> ã¯æ°¸ç¶çãªæ ¼ç´ã¨ãã¦é£ç¶åããããªãã¸ã§ã¯ãã®ãã¡ã¤ã«ã使ç¨ãã <literal>SRPVerifierStore</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ã®å®è£
ã«çµåãããµã³ãã«ã® MBean ãµã¼ãã¹ã«ãªãã¾ãã稼åç°å¢ç¨ã¨ãã¦ã¯ç¾å®çã§ã¯ããã¾ãããã SRP ãããã³ã«ã®ãã¹ããå¯è½ã§ <literal>SRPVerifierStore</literal> ã«å¿
è¦ã¨ãªãè¦ä»¶ã®ä¾ã確èªã§ãã¾ãã è¨å®å¯è½ãª <literal>SRPVerifierStoreService</literal> MBean å±æ§ã¯æ¬¡ã®éãã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1647
@@ -5419,7 +6601,7 @@
"The <literal>SRPVerifierStoreService</literal> MBean also supports "
"<literal>addUser</literal> and <literal>delUser</literal> operations for "
"addition and deletion of users. The signatures are:"
-msgstr ""
+msgstr "<literal>SRPVerifierStoreService</literal> MBean ã¯ã¦ã¼ã¶ã¼ã®è¿½å ããã³åé¤ãè¡ã <literal>addUser</literal> 㨠<literal>delUser</literal> ã®æ¼ç®ã«ã対å¿ãã¦ãã¾ãã ç½²åã¯æ¬¡ã®éãã§ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1660
@@ -5428,6 +6610,8 @@
"public void addUser(String username, String password) throws IOException;\n"
"public void delUser(String username) throws IOException;"
msgstr ""
+"public void addUser(String username, String password) throws IOException;\n"
+"public void delUser(String username) throws IOException;"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1661
@@ -5436,12 +6620,14 @@
"An example configuration of these services is presented in <xref linkend="
"\"Providing_Password_Information_for_SRP-The_SRPVerifierStore_interface\"/>."
msgstr ""
+"ãããã®ãµã¼ãã¹ã®è¨å®ä¾ã¯ <xref linkend="
+"\"Providing_Password_Information_for_SRP-The_SRPVerifierStore_interface\"/> ã«ç¤ºãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1665
#, no-c-format
msgid "Providing Password Information for SRP"
-msgstr ""
+msgstr "SRP ã®ãã¹ã¯ã¼ãæ
å ±ãæä¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1666
@@ -5454,13 +6640,13 @@
"provides an implementation of the <literal>SRPVerifierStore</literal> "
"interface that integrates with your existing security information stores. "
"The <literal>SRPVerifierStore</literal> interface is shown in."
-msgstr ""
+msgstr "<literal>SRPVerifierStore</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ã®ããã©ã«ãå®è£
ã¯ã é£ç¶åãããªãã¸ã§ã¯ãã®ãã¡ã¤ã«ã¨ãã¦ãã¹ã¦ã®ãã¹ã¯ã¼ãã®ããã·ã¥æ
å ±ã使ç¨å¯è½ã§ããå¿
è¦ãããããå®ç¨¼åã»ãã¥ãªãã£ç°å¢ã«ã¯é©ããªãå¯è½æ§ãããã¾ãã æ¢åã®ã»ãã¥ãªãã£æ
å ±ã®ã¹ãã¢ã«çµ±åãã <literal>SRPVerifierStore</literal> ã¤ã³ã¿ã¼ã£ãã§ã¼ã¹ã®å®è£
ãæä¾ãã MBean ãµã¼ãã¹ãæä¾ããå¿
è¦ãããã¾ãã<literal>SRPVerifierStore</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ã以ä¸ã«ç¤ºãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1669
#, no-c-format
msgid "The SRPVerifierStore interface"
-msgstr ""
+msgstr "SRPVerifierStore ã¤ã³ã¿ã¼ãã§ã¼ã¹"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1670
@@ -5518,6 +6704,57 @@
" throws SecurityException;\n"
"}"
msgstr ""
+"package org.jboss.security.srp;\n"
+"\n"
+"import java.io.IOException;\n"
+"import java.io.Serializable;\n"
+"import java.security.KeyException;\n"
+"\n"
+"public interface SRPVerifierStore\n"
+"{\n"
+" public static class VerifierInfo implements Serializable\n"
+" {\n"
+" /**\n"
+" * The username the information applies to. Perhaps redundant\n"
+" * but it makes the object self contained.\n"
+" */\n"
+" public String username;\n"
+"\n"
+" /** The SRP password verifier hash */\n"
+" public byte[] verifier;\n"
+" /** The random password salt originally used to verify the password "
+"*/\n"
+" public byte[] salt;\n"
+" /** The SRP algorithm primitive generator */\n"
+" public byte[] g;\n"
+" /** The algorithm safe-prime modulus */\n"
+" public byte[] N;\n"
+" }\n"
+" \n"
+" /**\n"
+" * Get the indicated user's password verifier information.\n"
+" */\n"
+" public VerifierInfo getUserVerifier(String username)\n"
+" throws KeyException, IOException;\n"
+" /** \n"
+" * Set the indicated users' password verifier information. This\n"
+" * is equivalent to changing a user's password and should\n"
+" * generally invalidate any existing SRP sessions and caches.\n"
+" */\n"
+" public void setUserVerifier(String username, VerifierInfo info)\n"
+" throws IOException;\n"
+"\n"
+" /** \n"
+" * Verify an optional auxiliary challenge sent from the client to\n"
+" * the server. The auxChallenge object will have been decrypted\n"
+" * if it was sent encrypted from the client. An example of a\n"
+" * auxiliary challenge would be the validation of a hardware token\n"
+" * (SafeWord, SecureID, iButton) that the server validates to\n"
+" * further strengthen the SRP password exchange.\n"
+" */\n"
+" public void verifyUserChallenge(String username, Object auxChallenge)\n"
+" throws SecurityException;\n"
+"}"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1671
@@ -5529,7 +6766,7 @@
"method is called by the <literal>SRPService</literal> at that start of a "
"user SRP session to obtain the parameters needed by the SRP algorithm. The "
"elements of the <literal>VerifierInfo</literal> objects are:"
-msgstr ""
+msgstr "<literal>SRPVerifierStore</literal> å®è£
ã®ä¸»ãªæ©è½ã¯ç¹å®ã®ã¦ã¼ã¶ã¼åã«å¯¾ã㦠<literal>SRPVerifierStore.VerifierInfo</literal> ã¸ã®ã¢ã¯ã»ã¹ãæä¾ãããã¨ã§ãã SRP ã¢ã«ã´ãªãºã ã§å¿
è¦ãªãã©ã¡ã¼ã¿ãã¦ã¼ã¶ã¼ SRP ã»ãã·ã§ã³ãåå¾éå§ããæç¹ã§ <literal>getUserVerifier(String)</literal> ã¡ã½ããã <literal>SRPService</literal> ã«ãã£ã¦å¼ã³åºããã¾ãã <literal>VerifierInfo</literal> ãªãã¸ã§ã¯ãã®ã¨ã¬ã¡ã³ãã¯æ¬¡ã®éãã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1676
@@ -5537,11 +6774,12 @@
msgid ""
"<emphasis role=\"bold\">username</emphasis>: The user's name or id used "
"to login."
-msgstr ""
+msgstr "<emphasis role=\"bold\">username</emphasis>: ãã°ã¤ã³ã«ä½¿ç¨ãããã¦ã¼ã¶ã¼åã¾ã㯠ID ã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1681
#, no-c-format
+#, fuzzy
msgid ""
"<emphasis role=\"bold\">verifier</emphasis>: This is the one-way hash of the "
"password or PIN the user enters as proof of their identity. The <literal>org."
@@ -5552,6 +6790,8 @@
"function. The username is converted from a string to a <literal>byte[]</"
"literal> using the UTF-8 encoding."
msgstr ""
+"<emphasis role=\"bold\">verifier</emphasis>: ã¦ã¼ã¶ã¼ã ID ã®è¨¼æã¨ãã¦å
¥åãããã¹ã¯ã¼ãã¾ã㯠PIN ã®ä¸æ¹åããã·ã¥ã§ãã <literal>org.jboss.security.Util</literal> ã¯ã©ã¹ã«ã¯ãã¹ã¯ã¼ãããã·ã³ã°ã¢ã«ã´ãªãºã ãå®è¡ãã <literal>calculateVerifier</literal> ã¡ã½ãããããã¾ãã <literal>H(salt | H(username | ':' | password))</literal> 㯠RFC2945 ã§å®ç¾©ããã¾ãã ãã® <literal>H</literal> 㯠SHA ã»ãã¥ã¢ããã·ã¥ã®æ©è½ã«ãªãã¾ãã ã¦ã¼ã¶ã¼å㯠UTF-8 ã¨ã³ã³ã¼ãã£ã³ã°ã使ã£ã¦æååãã <literal>byte[]</literal> ã«å¤æããã¾ãã "
+"?? as defined by RFC2945, => is defined"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1686
@@ -5562,7 +6802,7 @@
"password database in the event that the database is compromised. It is a "
"value that should be generated from a cryptographically strong random number "
"algorithm when the user's existing clear-text password is hashed."
-msgstr ""
+msgstr "<emphasis role=\"bold\">salt</emphasis>: ãã¹ã¯ã¼ããã¼ã¿ãã¼ã¹ã«ä¸æ£ä¾µå
¥ãçºçããå ´åã«ã ãã®èªè¨¼æ©è½ã«å¯¾ãã¦ã® brute force dictionary attack ãå°é£ã«ãããã©ã³ãã æ°ã«ãªãã¾ãã ã¦ã¼ã¶ã¼ã®æ¢åã®ã¯ãªã¢ããã¹ããã¹ã¯ã¼ããããã·ã¥åãããå ´åã æå·æ¹å¼ã®å¼·åºãªã©ã³ãã æ°ã¢ã«ã´ãªãºã ã§çæãããã®ãéè¦ã¨ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1691
@@ -5573,7 +6813,7 @@
"setting. The <literal>org.jboss.security.srp.SRPConf</literal> utility class "
"provides several settings for g including a good default which can obtained "
"via <literal>SRPConf.getDefaultParams().g()</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">g</emphasis>: SRP ã¢ã«ã´ãªãºã åºæ¬ã®ã¸ã§ãã¬ã¼ã¿ã¼ã«ãªãã¾ãã ä¸è¬çã«ã¯ã ã¦ã¼ã¶ã¼ãã¨ã®è¨å®ãããããç¥ãããåºå®ãã©ã¡ã¼ã¿ã¨ãªãã¾ãã <literal>org.jboss.security.srp.SRPConf</literal> ã¦ã¼ãã£ãªãã£ã¯ã©ã¹ã¯ <literal>SRPConf.getDefaultParams().g()</literal> ããåå¾å¯è½ãªä¾¿å©ãªããã©ã«ããå«ã g ç¨ã®è¨å®ãè¤æ°æä¾ãã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1696
@@ -5584,7 +6824,7 @@
"setting. The <literal>org.jboss.security.srp.SRPConf</literal> utility class "
"provides several settings for <literal>N</literal> including a good default "
"which can obtained via <literal>SRPConf.getDefaultParams().N()</literal>."
-msgstr ""
+msgstr "<emphasis role=\"bold\">N</emphasis>: SRP ã¢ã«ã´ãªãºã safe-prime ã¢ã¸ã¥ã¼ã«ã«ãªãã¾ãã ä¸è¬çã«ã¯ã¦ã¼ã¶ã¼ãã¨ã®è¨å®ãããããç¥ãããåºå®ãã©ã¡ã¼ã¿ã«ãªãã¾ãã <literal>org.jboss.security.srp.SRPConf</literal> ã¦ã¼ãã£ãªãã£ã¯ã©ã¹ã¯ <literal>SRPConf.getDefaultParams().N()</literal> ããåå¾å¯è½ãªä¾¿å©ãªããã©ã«ããå«ã <literal>N</literal> ç¨ã®è¨å®ãè¤æ°æä¾ãã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1701
@@ -5597,7 +6837,7 @@
"<literal>setUserVerifier(String, VerifierInfo)</literal> method is not used "
"by the current SRPSerivce and may be implemented as no-op method, or even "
"one that throws an exception stating that the store is read-only."
-msgstr ""
+msgstr "ãã®ããã æ¢åã®ãã¹ã¯ã¼ãã¹ãã¢ãçµ±åããããã®æåã®ã¹ãããã¨ãªãã¹ããã 1 ã¯ãã¹ã¯ã¼ãæ
å ±ã®ããã·ã¥åãã¼ã¸ã§ã³ãä½æãããã¨ã«ãªãã¾ãã ãã¹ã¯ã¼ãããã§ã«ä¸å¯éã®ããã·ã¥åå½¢å¼ã§æ ¼ç´ããã¦ããå ´åã¯ã ãã¨ãã°ã¢ããã°ã¬ã¼ãæé ã®ä¸é¨ã¨ãã¦ã¦ã¼ã¶ã¼ãã¨ã«è¡ãããããã¾ããã <literal>setUserVerifier(String, VerifierInfo)</literal> ã¡ã½ããã¯ç¾å¨ã® SRPSerivce ã§ã¯ä½¿ç¨ãããªãããã ãªãã·ã§ã³ç¡ãã®ã¡ã½ããã¨ãã¦ãããã¯ã¹ãã¢ã¯èªã¿åãå°ç¨ã§ãããã¨ã示ãä¾å¤ãæããã¡ã½ããã¨ãã¦å®è£
ãããã¨ãã§ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1704
@@ -5611,7 +6851,7 @@
"configuration specifies the <literal>hasAuxChallenge</literal> option. This "
"can be used to integrate existing hardware token based schemes like SafeWord "
"or Radius into the SRP algorithm."
-msgstr ""
+msgstr "ã¹ããã 2 ã¯ã ã¹ããã 1 ã§ä½æããã¹ãã¢ãã <literal>VerifierInfo</literal> ãåå¾ããæ¹æ³ãèªèã§ããã«ã¹ã¿ã ã® <literal>SRPVerifierStore</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹å®è£
ãä½æãããã¨ã§ãã ã¤ã³ã¿ãã§ã¼ã¹ã® <literal>verifyUserChallenge(String, Object)</literal> ã¡ã½ããã¯ã¯ã©ã¤ã¢ã³ã <literal>SRPLoginModule</literal> è¨å®ã <literal>hasAuxChallenge</literal> ãªãã·ã§ã³ãæå®ããå ´åã«ã®ã¿å¼ã³åºããã¾ãã ããã使ç¨ã㦠SafeWord ã Radius ã®ãããªã¹ãã¼ã ããã¼ã¹ã¨ããæ¢åã®ãã¼ãã¦ã§ã¢ãã¼ã¯ã³ã SRP ã¢ã«ã´ãªãºã ã«çµ±åãããã¨ãã§ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1707
@@ -5624,17 +6864,18 @@
"the SRP example presented later in this chapter provides a Java properties "
"file based <literal>SRPVerifierStore</literal> implementation. Between the "
"two examples you should have enough to integrate your security store."
-msgstr ""
+msgstr "ã¹ããã 3 ã¯ã ã¹ããã 2 ã® <literal>SRPVerifierStore</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹å®è£
ã JNDI çµç±ã§ä½¿ç¨ã§ããããã«ãã¦ããå¿
è¦ãªè¨å®å¯è½ãã©ã¡ã¼ã¿ããã¹ã¦å
¬è¡¨ãã MBean ãä½æãããã¨ã§ãã ããã©ã«ãã® <literal>org.jboss.security.srp.SRPVerifierStoreService</literal> ä¾ã«å ãã¦ã æ¬ç« ã®å¾åã«è¨è¼ãã SRP ã®ä¾ã§ã¯ Java ããããã£ãã¡ã¤ã«ãã¼ã¹ã® <literal>SRPVerifierStore</literal> å®è£
ã示ãã¾ãã ã»ãã¥ãªãã£ã¹ãã¢ã®çµ±åãè¡ãã«ã¯ãã® 2 ã¤ã®ä¾ã§ååã§ãããã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1714
#, no-c-format
msgid "Inside of the SRP algorithm"
-msgstr ""
+msgstr "SRP ã¢ã«ã´ãªãºã ã®å
å´"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1715
#, no-c-format
+#, fuzzy
msgid ""
"The appeal of the SRP algorithm is that is allows for mutual authentication "
"of client and server using simple text passwords without a secure "
@@ -5643,6 +6884,8 @@
"references mentioned in a note earlier. There are six steps that are "
"performed to complete authentication:"
msgstr ""
+"SRP ã¢ã«ã´ãªãºã ã®è¦è«ã¯ã å®å
¨ãªéä¿¡ãã£ã³ãã«ãªãã§ã·ã³ãã«ãªããã¹ããã¹ã¯ã¼ãã使ã£ãã¯ã©ã¤ã¢ã³ãã¨ãµã¼ãã¼ã®ç¸äºèªè¨¼ã許å¯ãããã¨ã§ãã ãã£ããã©ã®ããã«ãã¦ãããè¡ãã®ãä¸æè°ã«æããããã¨ã§ãããã ã¢ã«ã´ãªãºã ã®èæ¯ã«ãã詳細ããã³çè«ã«ã¤ãã¦ã¯åè¿°ã®æ³¨è¨ã«è¨è¼ããã¦ãã SRP åç
§ãã覧ãã ããã èªè¨¼ãå®äºããã«ã¯ 6 ã¤ã®ã¹ããããå®è¡ãã¾ãã "
+"?? refer to the SRP refereces,, where??"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1720
@@ -5651,7 +6894,7 @@
"The client side <literal>SRPLoginModule</literal> retrieves the "
"SRPServerInterface instance for the remote authentication server from the "
"naming service."
-msgstr ""
+msgstr "ã¯ã©ã¤ã¢ã³ãå´ <literal>SRPLoginModule</literal> ã¯ãã¼ãã³ã°ãµã¼ãã¹ãããªã¢ã¼ãèªè¨¼ãµã¼ãã¼ã® SRPServerInterface ã¤ã³ã¹ã¿ã³ã¹ãæ¤ç´¢ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1725
@@ -5666,7 +6909,7 @@
"retrieve this information as part of the exchange protocol. The "
"<literal>getSRPParameters(username)</literal> call retrieves the SRP "
"parameters for the given username."
-msgstr ""
+msgstr "ã¯ã©ã¤ã¢ã³ãå´ <literal>SRPLoginModule</literal> ã¯æ¬¡ã«ãã°ã¤ã³ã試è¡ãã¦ããã¦ã¼ã¶ã¼åã«é¢é£ä»ãããã SRP ãã©ã¡ã¼ã¿ãè¦æ±ãã¾ãã ã¦ã¼ã¶ã¼ãã¹ã¯ã¼ãã SRP ã¢ã«ã´ãªãºã ã«ãã£ã¦ä½¿ç¨ãããæ¤è¨¼æ©è½ã®å½¢å¼ã«æåã«å¤æãããã¨ãã«é¸æãããªããã°ãªããªã SRP ã¢ã«ã´ãªãºã ã«å¿
è¦ã¨ãªããã©ã¡ã¼ã¿ãããã¤ãããã¾ãã ãã©ã¡ã¼ã¿ããã¼ãã³ã¼ãåããã®ã§ã¯ãªã (å±éºæ§ãæå°éã«æãã¦å®è¡ãå¯è½)ã JBossSX å®è£
ã«ããã¦ã¼ã¶ã¼ããã®æ
å ±ã交æãããã³ã«ã®ä¸é¨ã¨ãã¦æ¤åºãããã¨ãã§ããããã«ãªãã¾ãã <literal>getSRPParameters(username)</literal> ã³ã¼ã«ã¯ç¹å®ã®ã¦ã¼ã¶ã¼åã® SRP ãã©ã¡ã¼ã¿ãæ¤ç´¢ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1730
@@ -5681,11 +6924,12 @@
"and passes in the username and client generated random number <literal>A</"
"literal>. The server returns its own random number <literal>B</literal>. "
"This step corresponds to the exchange of public keys."
-msgstr ""
+msgstr "ã¯ã©ã¤ã¢ã³ãå´ <literal>SRPLoginModule</literal> ã¯ã¹ããã 2 ã§åå¾ããã¦ã¼ã¶ã¼åã ã¯ãªã¢ããã¹ãã®ãã¹ã¯ã¼ãã SRP ãã©ã¡ã¼ã¿ã使ã£ã¦ <literal>SRPClientSession</literal> ãªãã¸ã§ã¯ããä½æãããã¨ã§ SRP ã»ãã·ã§ã³ãéå§ãã¾ãã 次ã«ã¯ã©ã¤ã¢ã³ãã¯ãã©ã¤ãã¼ã SRP ã»ãã·ã§ã³ãã¼ã®ãã«ãã«ä½¿ç¨ãããã©ã³ãã æ° A ãä½æãã¾ãã ããã¦ã¯ã©ã¤ã¢ã³ã㯠<literal>SRPServerInterface.init</literal> ã¡ã½ãããå¼ã³åºãã¦ãµã¼ãã¼å´ SRP ã»ãã·ã§ã³ãåæåãã ã¦ã¼ã¶ã¼åã¨ã¯ã©ã¤ã¢ã³ãã§çæãããã©ã³ãã æ° <literal>A</literal> ã渡ãã¾ãã ãµã¼ãã¼ã¯ãµã¼ãã¼ç¬èªã®ã©ã³ãã æ° <literal>B</literal> ãè¿ãã¦ãã¾ãã ãã®ã¹ãããã¯ãããªãã¯ãã¼ã®äº¤æã«ç¸å½ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1735
#, no-c-format
+#, fuzzy
msgid ""
"The client side <literal>SRPLoginModule</literal> obtains the private SRP "
"session key that has been generated as a result of the previous messages "
@@ -5702,11 +6946,12 @@
"response is saved as <literal>M2</literal>. This step corresponds to an "
"exchange of challenges. At this point the server has verified that the user "
"is who they say they are."
-msgstr ""
+msgstr "ã¯ã©ã¤ã¢ã³ãå´ <literal>SRPLoginModule</literal> ã¯åã®ã¡ãã»ã¼ã¸äº¤æã®çµæã¨ãã¦çæããã¦ãããã©ã¤ãã¼ã SRP ã»ãã·ã§ã³ãã¼ãåå¾ãã¾ãã ããã¯ãã©ã¤ãã¼ã証ææ¸ã¨ãã¦ãã°ã¤ã³ <literal>Subject</literal> ã«ä¿åããã¾ãã ã¹ããã 4 ã§ã®ãµã¼ãã¼ã®ãã£ã¬ã³ã¸ã¬ã¹ãã³ã¹ <literal>M2</literal> ã <literal>SRPClientSession.verify</literal> ã¡ã½ãããå¼ã³åºããã¨ã«ããæ¤è¨¼ããã¾ãã ãããæåããã¨ã ã¯ã©ã¤ã¢ã³ããããµã¼ãã¼ããã³ãµã¼ãã¼ããã¯ã©ã¤ã¢ã³ãã¸ã®ç¸äºèªè¨¼ãå®äºããã¾ãã ã¯ã©ã¤ã¢ã³ãå´ <literal>SRPLoginModule</literal> ã¯æ¬¡ã«å¼æ°ã¨ãã¦ãµã¼ãã¼ã©ã³ãã æ° <literal>B</literal> ã渡ãã¦ãã <literal>SRPClientSession.response</literal> ã¡ã½ãããå¼ã³åºããã¨ã§ãµã¼ãã¼ã«å¯¾ãã¦ãã£ã¬ã³ã¸ <literal>M1</literal> ãä½æãã¾ãã ãã®ãã£ã!
¬ã³ã¸ã¯ <literal>SRPServerInterface.verify</literal> ã¡ã½ããçµç±ã§ãµã¼ãã¼ã«éä¿¡ããã ãµã¼ãã¼ã®ã¬ã¹ãã³ã¹ã¯ <literal>M2</literal> ã¨ãã¦ä¿åããã¾ãã ãã®ã¹ãããã¯ãã£ã¬ã³ã¸ã®äº¤æã«ç¸å½ãã¾ãã ãã®æç¹ã§ã ãµã¼ãã¼ã¯?? who they say they are"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1740
#, no-c-format
+#, fuzzy
msgid ""
"The client side <literal>SRPLoginModule</literal> saves the login username "
"and <literal>M1</literal> challenge into the <literal>LoginModule</literal> "
@@ -5718,6 +6963,10 @@
"session. Its interception via a third partly cannot be used to obtain the "
"user's password."
msgstr ""
+"ã¯ã©ã¤ã¢ã³ãå´ <literal>SRPLoginModule</literal> ã¯ãã°ã¤ã³ã¦ã¼ã¶ã¼å㨠<literal>M1</literal> ãã£ã¬ã³ã¸ã <literal>LoginModule</literal> sharedState?? å
±æç¶æ
ãããã«ä¿åãã¾ãã ããã Principal ã®ååã¨è¨¼ææ¸ã¨ãã¦æ¨æº JBoss <literal>ClientLoginModule</literal> ã§ä½¿ç¨ããã¾ãã <literal>M1</"
+"literal> ãã£ã¬ã³ã¸ã¯ J2EE ã³ã³ãã¼ãã³ãä¸ã®ãã¹ã¦ã®ã¡ã½ããå¼ã³åºã㧠ID ã®è¨¼æã¨ãã¦ãã¹ã¯ã¼ãã®ä»£ããã«ä½¿ç¨ããã¾ãã <literal>M1</literal> ãã£ã¬ã³ã¸ã¯ SRP ã»ãã·ã§ã³ã«é¢é£ä»ããããæå·æ¹å¼ã®å¼·åºãªããã·ã¥ã«ãªãã¾ãã 第 3 è
ã«ããã¤ã³ã¿ã¼ã»ãã·ã§ã³ã¯ã¦ã¼ã¶ã¼ã®ãã¹ã¯ã¼ãåå¾ã«ã¯ä½¿ç¨ã§ãã¾ããã "
+"?? interception = eavesdropping or else? "
+"Eavesdropping by a third party can not obtain the user's password?"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1745
@@ -5726,7 +6975,7 @@
"At the end of this authentication protocol, the SRPServerSession has been "
"placed into the SRPService authentication cache for subsequent use by the "
"<literal>SRPCacheLoginModule</literal>."
-msgstr ""
+msgstr "ãã®èªè¨¼ãããã³ã«ã®æå¾ã§ã SRPServerSession 㯠<literal>SRPCacheLoginModule</literal> ã«ãã£ã¦ç¶ãã¦ä½¿ç¨ã§ãããã SRPService èªè¨¼ãã£ãã·ã¥ã«é
ç½®ããã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1750
@@ -5735,7 +6984,7 @@
"Although SRP has many interesting properties, it is still an evolving "
"component in the JBossSX framework and has some limitations of which you "
"should be aware. Issues of note include the following:"
-msgstr ""
+msgstr "SRP ã«ã¯å¤ãã®ä¾¿å©ãªããããã£ãããã¾ããã ãã¾ã JBossSX ãã¬ã¼ã ã¼ã¯ã¼ã¯å
ã®é²åä¸ã®ã³ã³ãã¼ãã³ãã§ããã èªèãã¦ããã¹ãå¶ç´ãããã¤ãããã¾ãã 注æãã¹ãç¹ã«ã¯æ¬¡ã®ãããªãã®ãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1755
@@ -5747,7 +6996,7 @@
"challenge to make requests as the associated username. Custom interceptors "
"that encrypt the challenge using the SRP session key can be used to prevent "
"this issue."
-msgstr ""
+msgstr "JBoss ãã¡ã½ãã転éãããã³ã«ãèªè¨¼ãå®è¡ãããã³ã³ãã¼ãã³ãã³ã³ããããåé¢ããæ¹æ³ãå©ç¨ãã¦ã èªè¨¼ããã¦ããªãã¦ã¼ã¶ã¼ã SRP <literal>M1</literal> ãã®ããè¦ã¦å¹æçã«ãã®ãã£ã¬ã³ã¸ã使ãé¢é£ä»ããããã¦ã¼ã¶ã¼åã¨ãã¦è¦æ±ãè¡ããã¨ãå¯è½ã§ãã SRP ã»ãã·ã§ã³ãã¼ã使ã£ã¦ãã£ã¬ã³ã¸ãæå·åããã«ã¹ã¿ã ã®ã¤ã³ã¿ã¼ã»ãã¿ã使ç¨ããã¨ãã®åé¡ãé²æ¢ãããã¨ãã§ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1760
@@ -5759,7 +7008,7 @@
"renegotiating the SRP authentication credentials. You must either set the "
"authentication cache timeout very long (up to 2,147,483,647 seconds, or "
"approximately 68 years), or handle re-authentication in your code on failure."
-msgstr ""
+msgstr "SRPService ã¯è¨å®å¯è½ãªæéãéããã¨ã¿ã¤ã ã¢ã¦ããã SRP ã»ãã·ã§ã³ã®ãã£ãã·ã¥ã管çãã¦ãã¾ãã ãã£ãã·ã¥ãã¿ã¤ã ã¢ã¦ãããã¨ã SRP èªè¨¼è¨¼ææ¸ãééçã«å交æ¸ããã¡ã«ããºã ãç¾å¨ãªãããã ç¶ã J2EE ã³ã³ãã¼ãã³ãã¢ã¯ã»ã¹ã¯ãã¹ã¦å¤±æãã¾ãã èªè¨¼ãã£ãã·ã¥ã®ã¿ã¤ã ã¢ã¦ããããªãé·ãã«è¨å®ããã (æ大 2,147,483,647 ç§ã ã¾ãã¯ç´ 68 å¹´é)ã 失æãããç¬èªã®ã³ã¼ãã§åèªè¨¼ãå¦çããå¿
è¦ãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1765
@@ -5771,7 +7020,7 @@
"effectively a stateful one. JBoss supports for multiple SRP sessions per "
"user, but you cannot encrypt data with one session key and then decrypt it "
"with another."
-msgstr ""
+msgstr "ããã©ã«ãã§ã¯ã ç¹å®ã¦ã¼ã¶ã¼åã® SRP ã»ãã·ã§ã³ã¯ 1 ã¤ã®ã¿ã§ãã 交æ¸ããã SRP ã»ãã·ã§ã³ã¯ã¯ã©ã¤ã¢ã³ãã¨ãµã¼ãã¼éã§ã®æå·åã»å¾©å·åã«ä½¿ç¨ããããã©ã¤ãã¼ãã»ãã·ã§ã³ãã¼ãçæãã ãã®ã»ãã·ã§ã³ã¯å¹ççã«ã¹ãã¼ããã«ã¨ãªãã¾ãã JBoss 㯠1 ã¦ã¼ã¶ã¼ãã¨ã«è¤æ°ã® SRP ã»ãã·ã§ã³ããµãã¼ããã¦ãã¾ããã ããã»ãã·ã§ã³ãã¼ã§æå·åãããã¼ã¿ãå¥ã®ã»ãã·ã§ã³ãã¼ã§å¾©å·åãããã¨ã¯ã§ãã¾ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1770
@@ -5793,6 +7042,9 @@
"\"/> illustrates the operation of the SRPCacheLoginModule.login method "
"implementation."
msgstr ""
+"ã¨ã³ããã¼ã¨ã³ãã® SRP èªè¨¼ã J2EE ã³ã³ãã¼ãã³ãã³ã¼ã«ã«ä½¿ç¨ããã«ã¯ã ã³ã³ãã¼ãã³ãã <literal>org.jboss.security.srp.jaas.SRPCacheLoginModule</literal> ã使ç¨ããããå®å
¨åããã¦ããã»ãã¥ãªãã£ãã¡ã¤ã³ãè¨å®ããå¿
è¦ãããã¾ãã <literal>SRPCacheLoginModule</literal> ã«ã¯ <literal>cacheJndiName</literal> ã¨ããååã®åä¸è¨å®ãªãã·ã§ã³ãããã SRP èªè¨¼ <literal>CachePolicy</literal> ã¤ã³ã¹ã¿ã³ã¹ã® JNDI ã®å ´æãè¨å®ãã¾ãã ãã㯠<literal>SRPService</literal> MBean ã® <literal>AuthenticationCacheJndiName</literal> å±æ§å¤ã«å¯¾å¿ãã¦ããªããã°ãªãã¾ããã <literal>SRPCacheLoginModule</literal> ã¯èªè¨¼ãã£ãã·ã¥ã«ãã <literal>SRPServerSession</literal> ãªãã¸ã§ã¯ãããã¯ã©ã¤ã¢ã³ããã£ã¬ã³ã¸ãåå¾ãã¦ãããã¦ã¼ã¶ã¼è¨¼ææ¸ã¨ãã¦æ¸¡ããããã£ã¬ã³ã¸ã¨æ¯è¼ãããã¨ã§ã¦ã¼ã¶ã¼ã®!
証ææ¸ãèªè¨¼ãã¾ãã <xref linkend=\"Inside_of_the_SRP_algorithm-"
+"A_sequence_diagram_illustrating_the_interaction_of_the_SRPCacheLoginModule_with_the_SRP_session_cache."
+"\"/> ã§ã¯ SRPCacheLoginModule.login ã¡ã½ããå®è£
ã®åä½ã説æãã¦ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1774
@@ -5800,13 +7052,13 @@
msgid ""
"A sequence diagram illustrating the interaction of the SRPCacheLoginModule "
"with the SRP session cache."
-msgstr ""
+msgstr "SRPCacheLoginModule ã SRP ã»ãã·ã§ã³ãã£ãã·ã¥ã¨äº¤ä¿¡ããé åºã示ãå³"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1782
#, no-c-format
msgid "An SRP example"
-msgstr ""
+msgstr "SRP ã®ä¾"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1783
@@ -5827,7 +7079,7 @@
"service is <literal>org.jboss.book.security.ex3.service."
"PropertiesVerifierStore</literal>. The following shows the contents of the "
"JAR that contains the example EJB and SRP services."
-msgstr ""
+msgstr "ããã¾ã§ã¯ SRP ã«é¢ãã¦ã¯ãã¾ã触ãã¦ããªãã£ãã®ã§ã ããããã¯ä¾ããããªããå®è·µç㪠SRP ã«ã¤ãã¦èª¬æãã¦ããã¾ãã ãã®ä¾ã¯ SRP çµç±ã§ã¦ã¼ã¶ã¼ã®ã¯ã©ã¤ã¢ã³ãå´èªè¨¼ã説æãã¦ããä»ã ããã«ç¶ãã¦ã¦ã¼ã¶ã¼è¨¼ææ¸ã¨ã㦠SRP ã»ãã·ã§ã³ãã£ã¬ã³ã¸ã使ã£ãã·ã³ãã«ãª EJB ã¸ã®å®å
¨åãããã¢ã¯ã»ã¹ã説æãã¦ãã¾ãã ãã®ãã¹ãã³ã¼ãã¯ãµã¼ãã¼å´ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«è¨å®ããã³ SRP ãµã¼ãã¹ç¾¤ã®æ§æç¨ SAR ãå«ã EJB JAR ãå°å
¥ãã¦ãã¾ãã åè¿°ã®ä¾ã§ã¯ã<literal>SecurityConfig</literal> MBean ã使ã£ã¦åçã«ãµã¼ãã¼å´ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«è¨å®ãã¤ã³ã¹ãã¼ã«ãã¾ãã ãã®ä¾ã§ã¯ã <literal>SRPVerifierStore</literal> ã¤ã³ã¿ã¼ãã§ã¼ã¹ã®ã«ã¹ã¿ã å®è£
ã使ç¨ãã¦ãã¾ãã ãã㯠<literal>SRPVerifierStoreService</literal> ã«ãã£ã¦ä½¿ç¨ã!
ããé£ç¶åãªãã¸ã§ã¯ãã¹ãã¢ã¨ãã¦ã§ã¯ãªãã Java ããããã£ãã¡ã¤ã«ããã·ã¼ãåãããã¤ã³ã¡ã¢ãªã®ã¹ãã¢ã使ç¨ãã¾ãã ãã®ã«ã¹ã¿ã ãµã¼ãã¹ã¯ <literal>org.jboss.book.security.ex3.service.PropertiesVerifierStore</literal> ã«ãªãã¾ãã 次ã«ãµã³ãã«ã® EJB 㨠SRP ãµã¼ãã¹ãå«ã JAR ã®å
容ã示ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1786
@@ -5844,6 +7096,16 @@
"users.properties\n"
"security-ex3.sar"
msgstr ""
+"[examples]$ jar tf output/security/security-ex3.jar \n"
+"META-INF/MANIFEST.MF\n"
+"META-INF/ejb-jar.xml\n"
+"META-INF/jboss.xml\n"
+"org/jboss/book/security/ex3/Echo.class\n"
+"org/jboss/book/security/ex3/EchoBean.class\n"
+"org/jboss/book/security/ex3/EchoHome.class\n"
+"roles.properties\n"
+"users.properties\n"
+"security-ex3.sar"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1787
@@ -5859,12 +7121,17 @@
"\"/> give the example client side and server side login module "
"configurations."
msgstr ""
+"ãã®ä¾ã®ãã¼ SRP é¢é£ã®ã¢ã¤ãã 㯠SRP MBean ãµã¼ãã¹ç¾¤ã®æ§æ㨠SRP ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã®æ§æã«ãªãã¾ãã <literal>security-ex3.sar</literal> ã® <literal>jboss-service.xml</literal> è¨è¿°åã <xref linkend=\"An_SRP_example-The_security_ex3."
+"sar_jboss_service.xml_descriptor_for_the_SRP_services\"/> ã«ç¤ºãã¾ãã <xref "
+"linkend=\"An_SRP_example-The_client_side_standard_JAAS_configuration\"/> ããã³ "
+"<xref linkend=\"An_SRP_example-The_server_side_XMLLoginConfig_configuration"
+"\"/> ã§ã¯ã¯ã©ã¤ã¢ã³ãå´ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«æ§æã¨ãµã¼ãã¼å´ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«æ§æã®ä¾ã示ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1790
#, no-c-format
msgid "The security-ex3.sar jboss-service.xml descriptor for the SRP services"
-msgstr ""
+msgstr "SRP ãµã¼ãã¹ã® security-ex3.sar jboss-service.xml è¨è¿°å"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1791
@@ -5910,12 +7177,51 @@
" </mbean>\n"
"</server>"
msgstr ""
+"<server>\n"
+" <!-- The custom JAAS login configuration that installs\n"
+" a Configuration capable of dynamically updating the\n"
+" config settings -->\n"
+"\n"
+" <mbean code=\"org.jboss.book.security.service.SecurityConfig\" \n"
+" name=\"jboss.docs.security:service=LoginConfig-EX3\">\n"
+" <attribute name=\"AuthConfig\">META-INF/login-config.xml</"
+"attribute>\n"
+" <attribute name=\"SecurityConfigName\">jboss.security:"
+"name=SecurityConfig</attribute>\n"
+" </mbean>\n"
+"\n"
+" <!-- The SRP service that provides the SRP RMI server and server "
+"side\n"
+" authentication cache -->\n"
+" <mbean code=\"org.jboss.security.srp.SRPService\" \n"
+" name=\"jboss.docs.security:service=SRPService\">\n"
+" <attribute name=\"VerifierSourceJndiName\">srp-test/security-"
+"ex3</attribute>\n"
+" <attribute name=\"JndiName\">srp-test/SRPServerInterface</"
+"attribute>\n"
+" <attribute name=\"AuthenticationCacheJndiName\">srp-test/"
+"AuthenticationCache</attribute>\n"
+" <attribute name=\"ServerPort\">0</attribute>\n"
+" <depends>jboss.docs.security:"
+"service=PropertiesVerifierStore</depends>\n"
+" </mbean>\n"
+"\n"
+" <!-- The SRP store handler service that provides the user password "
+"verifier\n"
+" information -->\n"
+" <mbean code=\"org.jboss.security.ex3.service.PropertiesVerifierStore"
+"\"\n"
+" name=\"jboss.docs.security:service=PropertiesVerifierStore\">\n"
+" <attribute name=\"JndiName\">srp-test/security-ex3</"
+"attribute>\n"
+" </mbean>\n"
+"</server>"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1792
#, no-c-format
msgid "The client side standard JAAS configuration"
-msgstr ""
+msgstr "ã¯ã©ã¤ã¢ã³ãå´ã®æ¨æº JAAS æ§æ"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1793
@@ -5931,12 +7237,21 @@
" ;\n"
"};"
msgstr ""
+"srp {\n"
+" org.jboss.security.srp.jaas.SRPLoginModule required\n"
+" srpServerJndiName=\"srp-test/SRPServerInterface\"\n"
+" ;\n"
+" \n"
+" org.jboss.security.ClientLoginModule required\n"
+" password-stacking=\"useFirstPass\"\n"
+" ;\n"
+"};"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1794
#, no-c-format
msgid "The server side XMLLoginConfig configuration"
-msgstr ""
+msgstr "ãµã¼ãã¼å´ã® XMLLoginConfig æ§æ"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1795
@@ -5959,6 +7274,22 @@
" </authentication>\n"
"</application-policy>"
msgstr ""
+"<application-policy name=\"security-ex3\">\n"
+" <authentication>\n"
+" <login-module code=\"org.jboss.security.srp.jaas."
+"SRPCacheLoginModule\"\n"
+" flag = \"required\">\n"
+" <module-option name=\"cacheJndiName\">srp-test/"
+"AuthenticationCache</module-option>\n"
+" </login-module>\n"
+" <login-module code=\"org.jboss.security.auth.spi."
+"UsersRolesLoginModule\"\n"
+" flag = \"required\">\n"
+" <module-option name=\"password-stacking\">useFirstPass</"
+"module-option>\n"
+" </login-module>\n"
+" </authentication>\n"
+"</application-policy>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1796
@@ -5974,7 +7305,7 @@
"because the <literal>SRPService</literal> needs an implementation of the "
"<literal>SRPVerifierStore</literal> interface for accessing user password "
"verification information."
-msgstr ""
+msgstr "ãµã³ãã«ã®ãµã¼ãã¹ç¾¤ã¯ <literal>ServiceConfig</literal>ã <literal>PropertiesVerifierStore</literal> <literal>SRPService</literal> MBean ã«ãªãã¾ãã <literal>PropertiesVerifierStore</literal> ã® <literal>JndiName</literal> å±æ§ã¯ <literal>SRPService</literal> ã® <literal>VerifierSourceJndiName</literal> å±æ§ã¨åçã§ãããã¨ã <literal>SRPService</literal> 㯠<literal>PropertiesVerifierStore</literal> ã«ä¾åãããã¨ã«æ³¨æãã¦ãã ããã <literal>SRPService</literal> ã¯ã¦ã¼ã¶ã¼ãã¹ã¯ã¼ãæ¤è¨¼æ
å ±ã¸ã®ã¢ã¯ã»ã¹ã« <literal>SRPVerifierStore</literal> ã®å®è£
ãå¿
è¦ã¨ãããããããå¿
è¦ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1799
@@ -5989,11 +7320,12 @@
"stacking=\"useFirstPass\"</literal> value to propagate the user "
"authentication credentials generated by the <literal>SRPLoginModule</"
"literal> to the EJB invocation layer."
-msgstr ""
+msgstr "ã¯ã©ã¤ã¢ã³ãå´ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«æ§æ㯠JBoss ãµã¼ãã¼ã³ã³ãã¼ãã³ãã® <literal>SRPService</literal> JndiName å±æ§å¤ (<literal>srp-test/SRPServerInterface</literal>) ã«ç¸å½ãã <literal>srpServerJndiName</literal> ãªãã·ã§ã³å¤ãä»ãã <literal>SRPLoginModule</literal> ãå©ç¨ãã¾ãã <literal>SRPLoginModule</literal> ã§çæãããã¦ã¼ã¶ã¼èªè¨¼ã®è¨¼ææ¸ã EJB å¼ã³åºã層ã«ä¼æãããã <literal>password-stacking=\"useFirstPass\"</literal> å¤ã§è¨å®ããã <literal>ClientLoginModule</literal> ãå¿
è¦ã¨ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1802
#, no-c-format
+#, fuzzy
msgid ""
"There are two issues to note about the server side login module "
"configuration. First, note the <literal>cacheJndiName=srp-test/"
@@ -6015,6 +7347,12 @@
"user's roles are coming the <literal>roles.properties</literal> file "
"included in the EJB JAR."
msgstr ""
+"ãµã¼ãã¼å´ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«æ§æã«ã¯æ³¨æãã¹ãç¹ã 2 ã¤ããã¾ãã ã¾ãã <literal>cacheJndiName=srp-test/AuthenticationCache</literal> è¨å®ãªãã·ã§ã³ã¯ <literal>SRPCacheLoginModule</literal> ã« <literal>SRPService</literal> ã«å¯¾ãã¦èªè¨¼ããã¦ã¼ã¶ã¼ã® <literal>SRPServerSession</literal> ãå«ã <literal>CachePolicy</literal> ã®å ´æãæ示ãã¾ãã ãã®å¤ã¯ <literal>SRPService</"
+"literal><literal>AuthenticationCacheJndiName</literal> å±æ§å¤ã«ç¸å½ãã¾ãã 次ã«ã ãã®æ§æã«ã¯ <literal>password-stacking=useFirstPass</literal> è¨å®ãªãã·ã§ã³ä»ãã® <literal>UsersRolesLoginModule</"
+"literal> ãå«ã¾ãã¾ãã SRP ã¯èªè¨¼æè¡ã§ãããªãããã <literal>SRPCacheLoginModule</literal> ä»ãã® 2 çªç®ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã使ç¨ããå¿
è¦ãããã¾ãã principal ã®ãã¼ããã·ã§ã³ã確å®ãã principal ã®ãã¼ã«ãè¨å®ããããã 2 çªç®ã®ãã°ã¤ã³ã¢ã¸ã¥ã¼ã«ã¯ <literal>SRPCacheLoginModule</"
+"literal> ã«ãã£ã¦ç¢ºèªãããèªè¨¼è¨¼ææ¸ãåãä»ããããè¨å®ããå¿
è¦ãããã¾ãã <literal>UsersRolesLoginModule</literal> ã¯æ¿èªããã¼ã¹ã¨ããããããã£ãã¡ã¤ã«ã§ SRP èªè¨¼ãè£å¼·ãã¦ãã¾ãã ã¦ã¼ã¶ã¼ã®ãã¼ã«ã¯ EJB JAR ã«å«ã¾ãã <literal>roles.properties</literal> ãã¡ã¤ã«ããæ¥ã¾ãã "
+"?? coming the ... file => coming from the ... file? "
+"?? users who have auathenticated against ... => users who have been authenticated against...?"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1805
@@ -6022,7 +7360,7 @@
msgid ""
"Now, run the example 3 client by executing the following command from the "
"book examples directory:"
-msgstr ""
+msgstr "ããã§ã ããã¯ãµã³ãã«ã®ãã£ã¬ã¯ããªãã次ã®ã³ãã³ããå®è¡ãã¦ãµã³ãã« 3 ã®ã¯ã©ã¤ã¢ã³ãã稼åãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1808
@@ -6037,6 +7375,14 @@
" [java] Echo.echo()#1 = This is call 1\n"
" [java] Echo.echo()#2 = This is call 2"
msgstr ""
+"[examples]$ ant -Dchap=security -Dex=3 run-example\n"
+"...\n"
+"run-example3:\n"
+" [echo] Waiting for 5 seconds for deploy...\n"
+" [java] Logging in using the 'srp' configuration\n"
+" [java] Created Echo\n"
+" [java] Echo.echo()#1 = This is call 1\n"
+" [java] Echo.echo()#2 = This is call 2"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1809
@@ -6046,7 +7392,7 @@
"called <literal>ex3-trace.log</literal>. This is a detailed trace of the "
"client side of the SRP algorithm. The traces show step-by-step the "
"construction of the public keys, challenges, session key and verification."
-msgstr ""
+msgstr "<literal>examples/logs</literal> ãã£ã¬ã¯ããªã« <literal>ex3-trace.log</literal> ã¨ããååã®ãã¡ã¤ã«ãããã¾ãã ãã㯠SRP ã¢ã«ã´ãªãºã ã®ã¯ã©ã¤ã¢ã³ãå´ã®è©³ç´°ãã¬ã¼ã¹ã«ãªãã¾ãã ãã¬ã¼ã¹ã¯ã ãããªãã¯ãã¼ã ãã£ã¬ã³ã¸ã ã»ãã·ã§ã³ãã¼ã æ¤è¨¼ã®æ§æãé ã追ã£ã¦ç¤ºãã¦ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1812
@@ -6070,7 +7416,7 @@
#: J2EE_Security_On_JBOSS.xml:1822
#, no-c-format
msgid "Running JBoss with a Java 2 security manager"
-msgstr ""
+msgstr "Java 2 ã»ãã¥ãªãã£ç®¡ç㧠JBoss ãå®è¡ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1823
@@ -6082,7 +7428,7 @@
"by configuring the Java VM options in the <literal>run.bat</literal> or "
"<literal>run.sh</literal> scripts in the JBoss server distribution bin "
"directory. The two required VM options are as follows:"
-msgstr ""
+msgstr "ããã©ã«ãã§ã¯ JBoss ãµã¼ãã¼ã¯ Java 2 ã»ãã¥ãªãã£ç®¡çã§ã¯èµ·åãã¾ããã Java 2 ãã¼ããã·ã§ã³ã使ã£ã¦ã³ã¼ãã®ç¹æ¨©ãå¶éãããå ´åã¯ã JBoss ãµã¼ãã¼ãã»ãã¥ãªãã£ç®¡çã®ä¸ã§å®è¡ããããè¨å®ããå¿
è¦ãããã¾ãã ãã㯠JBoss ãµã¼ãã¼ãã£ã¹ããªãã¥ã¼ã·ã§ã³ã® bin ãã£ã¬ã¯ããªå
ã® <literal>run.bat</literal> ã¾ã㯠<literal>run.sh</literal> ã¹ã¯ãªããã« Java VM ãªãã·ã§ã³ãè¨å®ãããã¨ã§è¡ããã¨ãã§ãã¾ãã å¿
è¦ã¨ããã 2 ã¤ã® VM ãªãã·ã§ã³ã¯æ¬¡ã®éãã§ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1828
@@ -6096,7 +7442,7 @@
"name of a subclass of <literal>java.lang.SecurityManager</literal>. This "
"form specifies that the policy file should augment the default security "
"policy as configured by the VM installation."
-msgstr ""
+msgstr "<emphasis role=\"bold\">java.security.manager</emphasis>: ããã©ã«ãã®ã»ãã¥ãªãã£ç®¡çã使ç¨ããããã¨ãæå®ããããã«ã¯ä½ã®å¤ãä»ããªãã§ä½¿ç¨ãã¾ãã ãããåªå
ãããã»ãã¥ãªãã£ç®¡çã¨ãªãã¾ãã ã¾ãã <literal>java.security.manager</literal> ãªãã·ã§ã³ã«å¤ã渡ãã¦ã«ã¹ã¿ã ã®ã»ãã¥ãªãã£ç®¡çå®è£
ãæå®ãããã¨ãã§ãã¾ãã ãã®å¤ã¯ <literal>java.lang.SecurityManager</literal> ã®ãµãã¯ã©ã¹ã®å®å
¨ä¿®é£¾ã¯ã©ã¹åã«ãªããªããã°ãªãã¾ããã ãã®å½¢å¼ã¯ã VM ã¤ã³ã¹ãã¼ã«ã«ãã£ã¦è¨å®ãããããã«ããªã·ã¼ãã¡ã¤ã«ãããã©ã«ãã»ãã¥ãªãã£ããªã·ã¼ãè£å¼·ããªããã°ãªããªããã¨ãæå®ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1833
@@ -6112,6 +7458,8 @@
"should be used. The <literal>policyFileURL</literal> value can be any URL "
"for which a protocol handler exists, or a file path specification."
msgstr ""
+"<emphasis role=\"bold\">java.security.policy</emphasis>: VM ã®ããã©ã«ãã»ãã¥ãªãã£ããªã·ã¼æ
å ±ãè£å¼·ããããªã·ã¼ãã¡ã¤ã«ã®æå®ã«ä½¿ç¨ãã¾ãã ãã®ãªãã·ã§ã³ã¯ã <literal>java.security."
+"policy=policyFileURL</literal> 㨠<literal>java.security.policy==policyFileURL</literal> ã® 2 ã¤ã®å½¢å¼ãã¨ãã¾ãã 1 çªç®ã®å½¢å¼ã¯ VM ã¤ã³ã¹ãã¼ã«ã§è¨å®ããã¦ããããã«ããªã·ã¼ãã¡ã¤ã«ãããã©ã«ãã®ã»ãã¥ãªãã£ããªã·ã¼ãè£å¼·ãããã¨ãæå®ãã¾ãã 2 çªç®ã®å½¢å¼ã¯ç¤ºããã¦ããããªã·ã¼ãã¡ã¤ã«ã®ã¿ã使ç¨ããããæå®ãã¾ãã <literal>policyFileURL</literal> å¤ã¯ãããã³ã«ãã³ãã©ãåå¨ãã URL ã¾ãã¯ãã¡ã¤ã«ãã¹æå®ã«ãªãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1838
@@ -6120,7 +7468,7 @@
"Both the <literal>run.bat</literal> and <literal>run.sh</literal> start "
"scripts reference an JAVA_OPTS variable which you can use to set the "
"security manager properties."
-msgstr ""
+msgstr "<literal>run.bat</literal> 㨠<literal>run.sh</literal> ã¯ããããã»ãã¥ãªãã£ç®¡çããããã£ã®è¨å®ã«ä½¿ç¨ã§ãã JAVA_OPTS å¤æ°ãåç
§ããã¹ã¯ãªãããèµ·åãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1841
@@ -6131,7 +7479,7 @@
"<literal>server.policy</literal> file that is contained in the default "
"configuration file set, you'll see that it contains the following "
"permission grant statement:"
-msgstr ""
+msgstr "Java 2 ã»ãã¥ãªãã£ã®æå¹åã¯ç°¡åã§ãã Java 2 ã§ã¯è¨±å¯ãã¼ããã·ã§ã³ã®ç¢ºç«ãè¡ãé¨åãè¤éã«ãªãã¾ãã ããã©ã«ãã®è¨å®ãã¡ã¤ã«ã»ããã«å«ã¾ãã¦ãã <literal>server.policy</literal> ãã¡ã¤ã«ãè¦ãã¨ã 次ã®ãã¼ããã·ã§ã³è¨±å¯ã¹ãã¼ãã¡ã³ããå«ã¾ãã¦ããã®ããããã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1844
@@ -6142,6 +7490,10 @@
" permission java.security.AllPermission;\n"
"};"
msgstr ""
+"grant {\n"
+" // Allow everything for now\n"
+" permission java.security.AllPermission;\n"
+"};"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1845
@@ -6150,7 +7502,7 @@
"This effectively disables security permission checking for all code as it "
"says any code can do anything, which is not a reasonable default. What is a "
"reasonable set of permissions is entirely up to you."
-msgstr ""
+msgstr "ä¸è¨ã¯ã è¨è¿°ããã¦ããããã«ããããã³ã¼ãããããããã¨ãè¡ããããã»ãã¥ãªãã£ãã¼ããã·ã§ã³ã®ãã§ãã¯ããã¹ã¦ã®ã³ã¼ãã«å¯¾ãã¦å¹æçã«ç¡å¹ã«ãã¦ãã¾ãã ããã¯é©åãªããã©ã«ãã§ã¯ããã¾ããã é©åãªãã¼ããã·ã§ã³ã»ããã¨ã¯ç¶æ³ã«å¿ãã¦å¤åãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1848
@@ -6159,30 +7511,32 @@
"The current set of JBoss specific <literal>java.lang.RuntimePermissions</"
"literal> that are required include:"
msgstr ""
+"ç¾å¨ã å¿
è¦ã¨ããã JBoss åºæã® <literal>java.lang.RuntimePermissions</"
+"literal> ã»ããã«ã¯æ¬¡ã®ãããªãã®ãããã¾ãã"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1854
#, no-c-format
msgid "TargetName"
-msgstr ""
+msgstr "ã¿ã¼ã²ããå"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1857
#, no-c-format
msgid "What the permission allows"
-msgstr ""
+msgstr "ãã¼ããã·ã§ã³ã許å¯ãã対象"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1860
#, no-c-format
msgid "Risks"
-msgstr ""
+msgstr "å±éºæ§"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1867
#, no-c-format
msgid "org.jboss.security.SecurityAssociation.getPrincipalInfo"
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation.getPrincipalInfo"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1870
@@ -6190,19 +7544,19 @@
msgid ""
"Access to the org.jboss.security.SecurityAssociation getPrincipal() and "
"getCredentials() methods."
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation getPrincipal() ããã³ getCredentials() ã®ã¡ã½ããã¸ã®ã¢ã¯ã»ã¹"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1873
#, no-c-format
msgid "The ability to see the current thread caller and credentials."
-msgstr ""
+msgstr "ç¾å¨ã®ã¹ã¬ããå¼ã³åºãå´ã¨è¨¼ææ¸ã表示ããã¦ãã¾ã"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1878
#, no-c-format
msgid "org.jboss.security.SecurityAssociation.setPrincipalInfo"
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation.setPrincipalInfo"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1881
@@ -6210,25 +7564,25 @@
msgid ""
"Access to the org.jboss.security.SecurityAssociation setPrincipal() and "
"setCredentials() methods."
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation setPrincipal() ããã³ setCredentials() ã®ã¡ã½ããã¸ã®ã¢ã¯ã»ã¹"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1884
#, no-c-format
msgid "The ability to set the current thread caller and credentials."
-msgstr ""
+msgstr "ç¾å¨ã®ã¹ã¬ããå¼ã³åºãå´ã¨è¨¼ææ¸ãè¨å®å¯è½ã¨ãªã"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1889
#, no-c-format
msgid "org.jboss.security.SecurityAssociation.setServer"
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation.setServer"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1892
#, no-c-format
msgid "Access to the org.jboss.security.SecurityAssociation setServer method."
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation setServer ã¡ã½ããã¸ã®ã¢ã¯ã»ã¹"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1895
@@ -6236,13 +7590,13 @@
msgid ""
"The ability to enable or disable multithread storage of the caller principal "
"and credential."
-msgstr ""
+msgstr "å¼ã³åºãå´ principal ã¨è¨¼ææ¸ã®ãã«ãã¹ã¬ããã¹ãã¬ã¼ã¸ãæå¹ã¾ãã¯ç¡å¹ã«ã§ãã¦ãã¾ã"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1900
#, no-c-format
msgid "org.jboss.security.SecurityAssociation.setRunAsRole"
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation.setRunAsRole"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1903
@@ -6250,13 +7604,13 @@
msgid ""
"Access to the org.jboss.security.SecurityAssociation pushRunAsRole and "
"popRunAsRole methods."
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation pushRunAsRole ããã³ popRunAsRole ã®ã¡ã½ããã¸ã®ã¢ã¯ã»ã¹"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1906
#, no-c-format
msgid "The ability to change the current caller run-as role principal."
-msgstr ""
+msgstr "ç¾å¨ã®å¼ã³åºãå´ run-as ã®ãã¼ã« principal ãå¤æ´ã§ãã¦ãã¾ã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1912
@@ -6267,7 +7621,7 @@
"to determine how the security manager is using your security policy file as "
"well as what policy files are contributing permissions. Running the VM as "
"follows shows the possible debugging flag settings:"
-msgstr ""
+msgstr "æå¾ã«ã ã»ãã¥ãªãã£ããªã·ã¼è¨å®ã®ãããã°ã§ãã¾ãç¥ããã¦ããªãé¨åã«ã¤ãã¦è§¦ãã¦ããã¾ãã ã»ãã¥ãªãã£ç®¡çãã»ãã¥ãªãã£ããªã·ã¼ãã¡ã¤ã«ãã©ã®ããã«æ±ããã ã©ã®ããªã·ã¼ãã¡ã¤ã«ããã¼ããã·ã§ã³ãå¦çããããªã©ã確å®ããããã«è¨å®ã§ããå種ã®ãããã°ç¨ãã©ã°ãããã¾ãã 以ä¸ã®ããã« VM ãå®è¡ããã¨è¨å®ã§ãããããã°ç¨ãã©ã°ã表示ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1915
@@ -6293,6 +7647,25 @@
"\n"
"Note: Separate multiple options with a comma"
msgstr ""
+"[bin]$ java -Djava.security.debug=help\n"
+" \n"
+"all turn on all debugging\n"
+"access print all checkPermission results\n"
+"combiner SubjectDomainCombiner debugging\n"
+"jar jar verification\n"
+"logincontext login context results\n"
+"policy loading and granting\n"
+"provider security provider debugging\n"
+"scl permissions SecureClassLoader assigns\n"
+"\n"
+"The following can be used with access:\n"
+"\n"
+"stack include stack trace\n"
+"domain dumps all domains in context\n"
+"failure before throwing exception, dump stack\n"
+" and domain that didn't have permission\n"
+"\n"
+"Note: Separate multiple options with a comma"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1916
@@ -6306,12 +7679,14 @@
"verbose, but not nearly as bad as the all mode as the security domain "
"information is only displayed on access failures."
msgstr ""
+"<literal>-Djava.security.debug=all</literal> ã§å®è¡ããã¨ã ã»ã¨ãã©ã®åºåã表示ãã¾ããããªãã®éã«ãªãã¾ãã ç¹å®ã®ã»ãã¥ãªãã£é害ã«ã¤ãã¦ã¾ã£ããç解ã§ããªãå ´åã«ã¯ããããå§ããã¨ããããããã¾ããã ãã¼ããã·ã§ã³é害ã®ãããã°ã«å½¹ç«ã¤ãåé·æ§ãå°ãªããªãè¨å®ã¯ <literal>-"
+"Djava.security.debug=access,failure</literal> ã§ãã ããã§ãããªãåé·ã«ã¯ãªãã¾ããã ã¢ã¯ã»ã¹é害ã«é¢ããã»ãã¥ãªãã£ãã¡ã¤ã³æ
å ±ã®ã¿ã表示ãããã®ã§ all ã¢ã¼ãã»ã©å¤§éã«ã¯ãªãã¾ããã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1922
#, no-c-format
msgid "Using SSL with JBoss using JSSE"
-msgstr ""
+msgstr "JSSE ã使ã£ã JBoss 㧠SSL ã使ç¨ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1923
@@ -6324,7 +7699,7 @@
"certificate using the JDK keytool and included the resulting keystore file, "
"<literal>example.keystore</literal>. It was created using the following "
"command and input:"
-msgstr ""
+msgstr "JBoss 㯠SSL ã« Java Secure Socket Extension (JSSE) ã使ç¨ãã¾ãã JSSE 㯠JDK 1.4 ã«å梱ããã¦ãã¾ãã JSSE ã®ä½¿ç¨ãéå§ããã«ã¯ã SSL ãµã¼ãã¼ã½ã±ããã§ä½¿ç¨ã§ãããã X509 証ææ¸ã®å½¢å¼ã§ãããªãã¯ãã¼ã¨ãã©ã¤ãã¼ããã¼ã®çµã¿åãããå¿
è¦ã¨ãªãã¾ãã ãã®ä¾ã示ãããã JDK ãã¼ãã¼ã«ã使ã£ã¦èªå·±ç½²åã®è¨¼ææ¸ãä½æããã®çµæã¨ãªããã¼ã¹ãã¢ãã¡ã¤ã« <literal>example.keystore</literal> ãå«ã¾ãã¦ãã¾ãã 次ã®ã³ãã³ãããã³å
¥åã§ä½æãã¾ããã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1926
@@ -6334,6 +7709,9 @@
"+ssl -keyalg RSA -alias example -validity 3650 -dname \"cn=example,ou=admin "
"book,dc=jboss,dc=org\""
msgstr ""
+"keytool -genkey -keystore example.keystore -storepass rmi+ssl -keypass rmi"
+"+ssl -keyalg RSA -alias example -validity 3650 -dname \"cn=example,ou=admin "
+"book,dc=jboss,dc=org\""
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1927
@@ -6342,7 +7720,7 @@
"This produces a keystore file called <literal>example.keystore</literal>. A "
"keystore is a database of security keys. There are two different types of "
"entries in a keystore:"
-msgstr ""
+msgstr "ããã«ããã <literal>example.keystore</literal> ã¨ããååã®ãã¼ã¹ãã¢ãã¡ã¤ã«ãçæããã¾ãã ãã¼ã¹ãã¢ã¨ã¯ã»ãã¥ãªãã£ãã¼ã®ãã¼ã¿ãã¼ã¹ã§ãã ãã¼ã¹ãã¢ã«ã¯ 2 種é¡ã®ã¨ã³ããªãããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1932
@@ -6355,7 +7733,7 @@
"chain for the corresponding public key. The <literal>keytool</literal> and "
"<literal>jarsigner</literal> tools only handle the later type of entry, that "
"is private keys and their associated certificate chains."
-msgstr ""
+msgstr "<emphasis role=\"bold\">key entries</emphasis>: åã¨ã³ããªã¯æ
éã«æ±ãã¹ãæå·ãã¼æ
å ±ãä¿æãã¦ããã ããã¯èªè¨¼ã®ãªãã¢ã¯ã»ã¹ãé²æ¢ããããä¿è·å½¢å¼ã§æ ¼ç´ããã¦ãã¾ãã ä¸è¬çã«ãã®ç¨®ã®ã¨ã³ããªã«æ ¼ç´ããããã¼ã¯æ©å¯ãã¼ã§ãããã 該å½ãããããªãã¯ãã¼ã®è¨¼ææ¸ãã§ã¼ã³ãæã¤ãã©ã¤ãã¼ããã¼ã«ãªãã¾ãã <literal>keytool</literal> ããã³ <literal>jarsigner</literal> ã®ãã¼ã«ã¯å¾è
ã®ã¿ã¤ãã®ã¨ã³ããªã ã¤ã¾ããã©ã¤ãã¼ããã¼ã¨é¢é£ä»ãããã証ææ¸ãã§ã¼ã³ããå¦çãã¾ããã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1937
@@ -6367,7 +7745,7 @@
"public key in the certificate indeed belongs to the identity identified by "
"the subject (owner) of the certificate. The issuer of the certificate "
"vouches for this, by signing the certificate."
-msgstr ""
+msgstr "<emphasis role=\"bold\">trusted certificate entries</emphasis>: åã¨ã³ããªã¯å¥ã®ãã¼ãã£ã«å±ããåä¸ã®ãããªãã¯ãã¼è¨¼ææ¸ãå«ãã§ãã¾ãã ãã¼ã¹ãã¢ã®ä¿æå´ããã®è¨¼ææ¸ã®ãããªãã¯ãã¼ã¯å®éã«è¨¼ææ¸ã®å¯¾è±¡ (ä¿æå´) ã«ãã£ã¦èå¥ããã ID ã«å±ãããã¨ãä¿¡é ¼ãã¦ããããã ä¿¡é ¼ã§ãã証ææ¸ã¨å¼ã°ãã¾ãã 証ææ¸ã®çºè¡å´ã¯è¨¼ææ¸ã«ç½²åãããã¨ã«ãããããä¿è¨¼ãã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1942
@@ -6376,7 +7754,7 @@
"Listing the <literal>src/main/org/jboss/book/security/example.keystore</"
"literal> examples file contents using the keytool shows one self-signed "
"certificate:"
-msgstr ""
+msgstr "<literal>src/main/org/jboss/book/security/example.keystore</literal> ã®ãµã³ãã«ãã¡ã¤ã«ã®å
容ã keytool ã使ã£ã¦ä¸è¦§è¡¨ç¤ºãããã¨èªå·±ç½²å証ææ¸ã 1 ã¤è¡¨ç¤ºããã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1945
@@ -6409,6 +7787,32 @@
"*******************************************\n"
"*******************************************"
msgstr ""
+"[examples]$ keytool -list -v -keystore src/main/org/jboss/book/security/"
+"example.keystore\n"
+"Enter keystore password: rmi+ssl\n"
+"\n"
+"Keystore type: jks\n"
+"Keystore provider: SUN\n"
+"\n"
+"Your keystore contains 1 entry\n"
+"\n"
+"Alias name: example\n"
+"Creation date: Oct 31, 2006\n"
+"Entry type: keyEntry\n"
+"Certificate chain length: 1\n"
+"Certificate[1]:\n"
+"Owner: CN=example, OU=admin book, DC=jboss, DC=org\n"
+"Issuer: CN=example, OU=admin book, DC=jboss, DC=org\n"
+"Serial number: 45481c1b\n"
+"Valid from: Tue Oct 31 22:01:31 CST 2006 until: Fri Oct 28 23:01:31 CDT "
+"2016\n"
+"Certificate fingerprints:\n"
+" MD5: C2:CA:CA:D3:00:71:3E:32:CB:B3:C8:A8:4E:68:9A:BB\n"
+" SHA1: A6:44:EF:66:2A:49:14:B0:A4:14:74:8B:64:61:E4:E6:AF:E3:70:41\n"
+"\n"
+"\n"
+"*******************************************\n"
+"*******************************************"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1946
@@ -6432,12 +7836,17 @@
"\"Using_SSL_with_JBoss_using_JSSE-"
"A_sample_JaasSecurityDomain_config_for_RMISSL\"/>."
msgstr ""
+"JSSE ã稼åãã¦ã㦠JBoss ãµã¼ãã¼ã«ä½¿ç¨ãã証ææ¸ãæã¤ãã¼ã¹ãã¢ãããã°ã JBoss ã EJB ã¢ã¯ã»ã¹ã« SSL ã使ç¨ããããè¨å®ããæºåãæ´ã£ããã¨ã«ãªãã¾ãã è¨å®ã¯ EJB å¼ã³åºãå´ RMI ã½ã±ãããã¡ã¯ããªãè¨å®ãããã¨ã§è¡ããã¨ãã§ãã¾ãã JBossSX ãã¬ã¼ã ã¯ã¼ã¯ã«ã¯ã SSP æå·åã½ã±ããå
¨ä½ã«æ¸¡ã RMI ã使ç¨ã§ããããã«ãã <literal>java.rmi.server."
+"RMIServerSocketFactory</literal> ããã³ <literal>java.rmi.server."
+"RMIClientSocketFactory</literal> ã®ã¤ã³ã¿ã¼ãã§ã¼ã¹ã®å®è£
ãå«ã¾ãã¾ãã å®è£
ã¯ã©ã¹ã¯ãããã <literal>org.jboss.security.ssl.RMISSLServerSocketFactory</literal> 㨠<literal>org.jboss."
+"security.ssl.RMISSLClientSocketFactory</literal> ã«ãªãã¾ãã EJB ã«å¯¾ãã RMI ã¢ã¯ã»ã¹ã« SSL ã®ä½¿ç¨ãæå¹ã«ããã«ã¯ 2 ã¤ã®ã¹ããããããã¾ãã æåã« SSL ãµã¼ãã¼è¨¼ææ¸ã®ãã¼ã¿ãã¼ã¹ã¨ãã¦ãã¼ã¹ãã¢ã®ä½¿ç¨ãæå¹ã«ãããã¨ã§ã <literal>org.jboss.security.plugins.JaasSecurityDomain</literal> MBean ãè¨å®ãããã¨ã§è¡ãã¾ãã <literal>book/security/ex4</literal> ãã£ã¬ã¯ããªå
ã® <literal>jboss-service.xml</literal> è¨è¿°åã¯ã <xref linkend=\"Using_SSL_with_JBoss_using_JSSE-"
+"A_sample_JaasSecurityDomain_config_for_RMISSL\"/> ã§ç¤ºãããã« <literal>JaasSecurityDomain</literal> å®ç¾©ãå«ãã§ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1949
#, no-c-format
msgid "A sample JaasSecurityDomain config for RMI/SSL"
-msgstr ""
+msgstr "RMI/SSL ç¨ã®ãµã³ãã« JaasSecurityDomainè¨å®"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1950
@@ -6455,6 +7864,17 @@
" <attribute name=\"KeyStorePass\">rmi+ssl</attribute>\n"
"</mbean>"
msgstr ""
+"<!-- The SSL domain setup -->\n"
+"<mbean code=\"org.jboss.security.plugins.JaasSecurityDomain\"\n"
+" name=\"jboss.security:service=JaasSecurityDomain,domain=RMI+SSL"
+"\">\n"
+" <constructor>\n"
+" <arg type=\"java.lang.String\" value=\"RMI+SSL\"/>\n"
+" </constructor>\n"
+" <attribute name=\"KeyStoreURL\">example.keystore</"
+"attribute>\n"
+" <attribute name=\"KeyStorePass\">rmi+ssl</attribute>\n"
+"</mbean>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1951
@@ -6468,6 +7888,8 @@
"require security keys. This configuration simply loads the example.keystore "
"from the example 4 MBean SAR using the indicated password."
msgstr ""
+"<literal>JaasSecurityDomain</literal> ã¯æ¨æºã® <literal>JaasSecurityManager</literal> ã¯ã©ã¹ã®ãµãã¯ã©ã¹ã«ãªãã ãã¼ã¹ãã¢ã®æ¦å¿µã追å ããä»ã JSSE <literal>KeyManagerFactory</literal> ããã³ "
+"<literal>TrustManagerFactory</literal> ã®ã¢ã¯ã»ã¹ã追å ãã¾ãã åºæ¬ã®ã»ãã¥ãªãã£ç®¡çãæ¡å¼µãã¦ã»ãã¥ãªãã£ãã¼ãå¿
è¦ã¨ãã SSL ãä»ã®æå·å¼æ¼ç®ããµãã¼ããããã¨ãã§ãã¾ãã ãã®è¨å®ã¯åç´ã«ç¤ºããããã¹ã¯ã¼ãã使ã£ã¦ãµã³ãã«ã® 4 MBean SAR ãã example.keystore ããã¼ããã¾ãã"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1954
@@ -6479,7 +7901,7 @@
"<xref linkend=\"EJBs_on_JBoss\"/> as well as an EJB setup that makes use of "
"this invoker. The top of the listing shows the <literal>jboss-service.xml</"
"literal> descriptor that defines the custom <literal>JRMPInovker</literal>"
-msgstr ""
+msgstr "次ã®ã¹ããã㯠SSL ã«å¯¾å¿ãã JBossSX RMI ã½ã±ãããã¡ã¯ããªã使ç¨ãã EJB å¼ã³åºãå´è¨å®ãå®ç¾©ãããã¨ã§ãã ãããè¡ãã«ã¯ã <xref linkend=\"EJBs_on_JBoss\"/> ã§è¦ã¦ãã <literal>JRMPInvoker</literal> ã®ã«ã¹ã¿ã è¨å®ãå®ç¾©ããä»ã ãã®å¼ã³åºãå´ã使ç¨ãã EJB è¨å®ãå®ç¾©ãããã¨ãå¿
è¦ã«ãªãã¾ãã ä¸è¦§è¡¨ç¤ºã®åé ã§ã¯ã«ã¹ã¿ã <literal>JRMPInovker</literal> ãå®ç¾©ãã <literal>jboss-service.xml</literal> è¨è¿°åã示ãã¦ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1957
@@ -6500,6 +7922,20 @@
"+SSL</depends>\n"
"</mbean>"
msgstr ""
+"<mbean code=\"org.jboss.invocation.jrmp.server.JRMPInvoker\"\n"
+" name=\"jboss:service=invoker,type=jrmp,socketType=SSL\">\n"
+" <attribute name=\"RMIObjectPort\">14445</attribute>\n"
+" <attribute name=\"RMIClientSocketFactory\"> \n"
+" org.jboss.security.ssl.RMISSLClientSocketFactory\n"
+" </attribute>\n"
+" <attribute name=\"RMIServerSocketFactory\">\n"
+" org.jboss.security.ssl.RMISSLServerSocketFactory\n"
+" </attribute>\n"
+" <attribute name=\"SecurityDomain\">java:/jaas/RMI+SSL</"
+"attribute>\n"
+" <depends>jboss.security:service=JaasSecurityDomain,domain=RMI"
+"+SSL</depends>\n"
+"</mbean>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1958
@@ -6509,7 +7945,7 @@
"<literal>stateless-ssl-invoker</literal> that uses our custom JRMPInvoker. "
"We can declare the invoker binding and connect it to <literal>EchoBean4</"
"literal> as shown in the following <literal>jboss.xml</literal> file."
-msgstr ""
+msgstr "SSL å¼ã³åºãå´ãè¨å®ããã«ã¯ã ã«ã¹ã¿ã JRMPInvoker ã使ç¨ãã <literal>stateless-ssl-invoker</literal> ã¨ããååã®å¼ã³åºãå´ãã¤ã³ãã£ã³ã°ãä½æãã¾ãã å¼ã³åºãå´ãã¤ã³ãã£ã³ã°ã宣è¨ãã¦ã 次㮠<literal>jboss.xml</literal> ãã¡ã¤ã«ã«ç¤ºãããã« <literal>EchoBean4</literal> ã«æ¥ç¶ãããã¨ãã§ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1961
@@ -6567,6 +8003,57 @@
" </invoker-proxy-bindings>\n"
"</jboss>"
msgstr ""
+"<?xml version=\"1.0\"?>\n"
+"<jboss>\n"
+" <enterprise-beans>\n"
+" <session>\n"
+" <ejb-name>EchoBean4</ejb-name>\n"
+" <configuration-name>Standard Stateless SessionBean</"
+"configuration-name>\n"
+" <invoker-bindings>\n"
+" <invoker>\n"
+" <invoker-proxy-binding-name>\n"
+" stateless-ssl-invoker\n"
+" </invoker-proxy-binding-name>\n"
+" </invoker>\n"
+" </invoker-bindings>\n"
+" </session>\n"
+" </enterprise-beans>\n"
+" \n"
+" <invoker-proxy-bindings>\n"
+" <invoker-proxy-binding>\n"
+" <name>stateless-ssl-invoker</name>\n"
+" <invoker-mbean>jboss:service=invoker,type=jrmp,"
+"socketType=SSL</invoker-mbean>\n"
+" <proxy-factory>org.jboss.proxy.ejb.ProxyFactory</proxy-"
+"factory>\n"
+" <proxy-factory-config>\n"
+" <client-interceptors>\n"
+" <home>\n"
+" <interceptor>org.jboss.proxy.ejb."
+"HomeInterceptor</interceptor>\n"
+" <interceptor>org.jboss.proxy."
+"SecurityInterceptor</interceptor>\n"
+" <interceptor>org.jboss.proxy."
+"TransactionInterceptor</interceptor>\n"
+" <interceptor>org.jboss.invocation."
+"InvokerInterceptor</interceptor>\n"
+" </home>\n"
+" <bean>\n"
+" <interceptor>org.jboss.proxy.ejb."
+"StatelessSessionInterceptor</interceptor>\n"
+" <interceptor>org.jboss.proxy."
+"SecurityInterceptor</interceptor>\n"
+" <interceptor>org.jboss.proxy."
+"TransactionInterceptor</interceptor>\n"
+" <interceptor>org.jboss.invocation."
+"InvokerInterceptor</interceptor>\n"
+" </bean>\n"
+" </client-interceptors>\n"
+" </proxy-factory-config>\n"
+" </invoker-proxy-binding>\n"
+" </invoker-proxy-bindings>\n"
+"</jboss>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1962
@@ -6580,6 +8067,8 @@
"EJB deployment is in fact using SSL. Start the JBoss server using the "
"default configuration and then run example 4b as follows:"
msgstr ""
+"ãµã³ãã« 4 ã³ã¼ãã¯ããã¯ãµã³ãã«ã® <literal>src/main/org/jboss/book/"
+"security/ex4</literal> ãã£ã¬ã¯ããªé
ä¸ã«ããã¾ãã ããããã®å
¥åå¼æ°ãè¿ã echo ã¡ã½ãããæã¤ã·ã³ãã«ãªã¹ãã¼ãã¬ã¹ã»ãã·ã§ã³ bean ã«ãªãã¾ãã SSL ã¯å¤±æããªãéããã¤ä½¿ç¨ä¸ã§ããããç¥ãã®ã¯é£ããããã ãµã³ãã« 4 ã¯ã©ã¤ã¢ã³ãã 2 種é¡ã®æ¹æ³ã§å®è¡ãã¦æ¬å½ã« EJB é
åã SSL ã使ç¨ãã¦ãããã¨ãå®æ¼ãã¦ã¿ã¾ãã ããã©ã«ãè¨å®ã使ã£ã¦ JBoss ãµã¼ãã¼ãèµ·åããµã³ãã« 4b ã次ã®ããã«å®è¡ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1965
@@ -6597,6 +8086,17 @@
"n: No trusted certificate found\n"
"..."
msgstr ""
+"[examples]$ ant -Dchap=security -Dex=4b run-example\n"
+"...\n"
+"run-example4b:\n"
+"...\n"
+" [java] Exception in thread \"main\" java.rmi.ConnectIOException: error "
+"during JRMP connect\n"
+"ion establishment; nested exception is: \n"
+" [java] javax.net.ssl.SSLHandshakeException: sun.security.validator."
+"ValidatorExceptio\n"
+"n: No trusted certificate found\n"
+"..."
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1966
@@ -6619,7 +8119,7 @@
"rather than <literal>-Dex=4b</literal> to pass the location of the correct "
"truststore using the <literal>javax.net.ssl.trustStore</literal> system "
"property:"
-msgstr ""
+msgstr "çµæãä¾å¤ã¨ãªãã®ã¯äºæãã¦ãããã¨ã§ã ããããµã³ãã«ã® 4b ãã¼ã¸ã§ã³ã®æå³ããã¨ããã§ãã ä¾å¤ã¹ã¿ãã¯ãã¬ã¼ã¹ãããã¯å½¢å¼ã«åãããç·¨éããã¦ããããè¥å¹²ã®éãããããã¨ã«æ³¨æãã¦ãã ããã 注ç®ãã¹ãç¹ã¯ã JBoss EJB ã³ã³ããã¨ã®éä¿¡ã« Sun JSSE ã¯ã©ã¹ã使ç¨ãã¦ãããã¨ãä¾å¤ãæ確ã«ç¤ºãã¦ãããã¨ã§ãã ãã®ä¾å¤ã¯ JBoss ãµã¼ãã¼è¨¼ææ¸ã¨ãã¦ä½¿ç¨ãã¦ããèªå·±ç½²åã®è¨¼ææ¸ã¯ããã©ã«ãã®è¨¼æ権éã®ããããã«ããç½²åããã¦ããããã«ã¯èªè¨¼ã§ããªããã¨ã示ãã¦ãã¾ãã JSSE ããã±ã¼ã¸ã«å梱ãããããã©ã«ãã®ç½²å権éãã¼ã¹ãã¢ã¯ VeriSignã Thawteã RSA Data Security ãªã©ããç¥ããã証æ権éããå«ãã§ããªãããã ãã®ä¾å¤ã¯äºæãããçµæã¨ãªãã¾ãã EJB ã¯ã©ã¤ã¢ã³ããèªå·±ç½²åã®è¨¼æ!
æ¸ãæå¹ã¨ãã¦åãä»ããããã«ããã«ã¯ã JSSE ã¯ã©ã¹ã«ä¿¡é ¼ã§ããã¹ãã¢ã¨ã㦠<literal>example.keystore</literal> ã使ç¨ããããæ示ããå¿
è¦ãããã¾ããä¿¡é ¼ã§ããã¹ãã¢ã¨ã¯ä»ã®è¨¼ææ¸ã®ç½²åã«ä½¿ç¨ãããããªãã¯ãã¼è¨¼ææ¸ãå«ããã¼ã¹ãã¢ã§ãã ãããè¡ãã«ã¯ã <literal>-Dex=4b</literal> ã§ã¯ãªã <literal>-Dex=4</literal> ã§ãµã³ãã« 4 ãå®è¡ã <literal>javax.net.ssl.trustStore</literal> ã·ã¹ãã ããããã£ã使ã£ã¦ä¿¡é ¼ã§ããã¹ãã¢ã®æ£ããå ´æã渡ãã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1969
@@ -6634,10 +8134,19 @@
" [java] Created Echo\n"
" [java] Echo.echo()#1 = This is call 1"
msgstr ""
+"[examples]$ ant -Dchap=security -Dex=4 run-example\n"
+"...\n"
+"run-example4:\n"
+" [copy] Copying 1 file to /tmp/jboss-4.2.0/server/production/deploy\n"
+" [echo] Waiting for 5 seconds for deploy...\n"
+"...\n"
+" [java] Created Echo\n"
+" [java] Echo.echo()#1 = This is call 1"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1970
#, no-c-format
+#, fuzzy
msgid ""
"This time the only indication that an SSL socket is involved is because of "
"the <literal>SSL handshakeCompleted</literal> message. This is coming from "
@@ -6649,6 +8158,9 @@
"random numbers that take time to seed the first time they are used. This "
"shows up as high CPU utilization and start up times."
msgstr ""
+"This time the only indication that an SSL socket is involved is because of "
+"the <literal>SSL handshakeCompleted</literal> message. "
+"ããã¯ãããã°ã¬ãã«ã®ãã°ã¡ãã»ã¼ã¸ã¨ã㦠<literal>RMISSLClientSocketFactory</literal> ããæ¥ã¾ãã log4j ãããã°ã¬ãã«ã®ã¡ãã»ã¼ã¸ãåºåããããã¯ã©ã¤ã¢ã³ããè¨å®ãã¦ããªãå ´åã SSL ãå¿
è¦ã§ãã£ããã¨ãç´æ¥ç¤ºããã®ã¯ãªãã§ãããã å®è¡åæ°ã¨ã·ã¹ãã CPUä¸ã®è² è·ã«æ³¨æãã¦ã¿ãã¨ã å¿
ãéããããã¾ãã SRP ã¨åæ§ SSL ã¯æåã«ä½¿ç¨ãããéã«ã·ã¼ããè¡ãã®ã«æéããããæå·æ¹å¼ã®å¼·åºãªã©ã³ãã æ°ã®ä½¿ç¨ãå¿
è¦ã¨ãã¾ãã CPU ã®ä½¿ç¨çããã³èµ·ååæ°ãé«ã表示ããã¾ãã??"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1973
@@ -6657,7 +8169,7 @@
"One consequence of this is that if you are running on a system that is "
"slower than the one used to run the examples for the book, such as when "
"running example 4b, you may seen an exception similar to the following:"
-msgstr ""
+msgstr "ããã«ä¼´ãçµæã®ã²ã¨ã¤ã¨ãã¦ã ããã¯ã®ãµã³ãã«ãå®è¡ããããã«ä½¿ç¨ããã·ã¹ãã ããé
ãã·ã¹ãã ã§å®è¡ãã¦ããå ´åã ãµã³ãã« 4 b ãå®è¡ãã¦ããå ´åãªã©ã 次ã®ãããªä¾å¤ã表示ãããå¯è½æ§ãããã¾ãã"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1976
@@ -6667,6 +8179,9 @@
" at sun.rmi.transport.StreamRemoteCall.exceptionReceivedFromServer\n"
"..."
msgstr ""
+"javax.naming.NameNotFoundException: EchoBean4 not bound\n"
+" at sun.rmi.transport.StreamRemoteCall.exceptionReceivedFromServer\n"
+"..."
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1977
@@ -6677,13 +8192,13 @@
"the secure random number generator used by the SSL server socket. If you see "
"this issue, simply rerun the example again or increase the deployment wait "
"time in the <literal>build-security.xml</literal> Ant script."
-msgstr ""
+msgstr "ã¯ã©ã¤ã¢ã³ãã許å¯ããã¦ãããã¡ã« JBoss ãµã¼ãã¼ããµã³ãã« EJB ã®é
åãå®äºããªãã£ããã¨ãåé¡ã§ãã ãã㯠SSL ãµã¼ãã¼ã½ã±ããã«ãã使ç¨ãããå®å
¨ãªã©ã³ãã æ°çæã®æ©è½ã®åæè¨å®æéã«ãããã®ã§ãã ãã®åé¡ã«ééããå ´åã¯ã ãµã³ãã«ã«æ»ã£ã¦ <literal>build-security.xml</literal> Ant ã¹ã¯ãªããã§é
åå¾
æ©æéãå¢ããã¦ãã ããã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1983
#, no-c-format
msgid "Configuring JBoss for use Behind a Firewall"
-msgstr ""
+msgstr "ãã¡ã¤ã¢ã¦ã©ã¼ã«ã®å
å´ã§ã®ä½¿ç¨ãç®çã¨ãã JBoss ã®è¨å®"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1984
@@ -6698,36 +8213,39 @@
"Additional_ports_in_the_all_configuration\"/> shows the same information for "
"the additional ports that exist in the all configuration file set."
msgstr ""
+"JBoss ã¯å¾
æ©ãã¼ããéããµã¼ãã¹ããã¼ã¹ã¨ããå¤ãã®ã½ã±ãããå梱ãã¦ãã¾ãã ãã®ã»ã¯ã·ã§ã³ã§ã¯ã ãã¡ã¤ã¢ã¦ã©ã¼ã«ã®å
å´ã«ãã JBoss ã«ã¢ã¯ã»ã¹ããå ´åã«åä½ããããè¨å®ãå¿
è¦ãªãã¼ããéããµã¼ãã¹ã説æãã¦ããã¾ãã 次ã®è¡¨ã§ã¯ã ãã¼ãã ã½ã±ããã¿ã¤ãã ããã©ã«ãã®è¨å®ãã¡ã¤ã«ã»ããã«ãããµã¼ãã¹ã®é¢é£ãµã¼ãã¹ãªã©ã示ãã¾ãã <xref linkend="
+"\"Configuring_JBoss_for_use_Behind_a_Firewall-"
+"Additional_ports_in_the_all_configuration\"/> ã§ã¯ all è¨å®ãã¡ã¤ã«ã»ããã§çµäºãã追å ãã¼ãã®åæ
å ±ã示ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1988
#, no-c-format
msgid "The ports found in the default configuration"
-msgstr ""
+msgstr "ããã©ã«ãè¨å®ã«ãããã¼ã"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1995 J2EE_Security_On_JBOSS.xml:2106
#, no-c-format
msgid "Port"
-msgstr ""
+msgstr "ãã¼ã"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1998 J2EE_Security_On_JBOSS.xml:2109
#, no-c-format
msgid "Type"
-msgstr ""
+msgstr "ã¿ã¤ã"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2001 J2EE_Security_On_JBOSS.xml:2112
#, no-c-format
msgid "Service"
-msgstr ""
+msgstr "ãµã¼ãã¹"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2008
#, no-c-format
msgid "1098"
-msgstr ""
+msgstr "1098"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2011 J2EE_Security_On_JBOSS.xml:2022
@@ -6738,177 +8256,177 @@
#: J2EE_Security_On_JBOSS.xml:2177 J2EE_Security_On_JBOSS.xml:2188
#, no-c-format
msgid "<entry>TCP</entry>"
-msgstr ""
+msgstr "<entry>TCP</entry>"
#. Tag: literal
#: J2EE_Security_On_JBOSS.xml:2015 J2EE_Security_On_JBOSS.xml:2026
#, no-c-format
msgid "org.jboss.naming.NamingService"
-msgstr ""
+msgstr "org.jboss.naming.NamingService"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2019
#, no-c-format
msgid "1099"
-msgstr ""
+msgstr "1099"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2030
#, no-c-format
msgid "4444"
-msgstr ""
+msgstr "4444"
#. Tag: literal
#: J2EE_Security_On_JBOSS.xml:2037
#, no-c-format
msgid "org.jboss.invocation.jrmp.server.JRMPInvoker"
-msgstr ""
+msgstr "org.jboss.invocation.jrmp.server.JRMPInvoker"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2041
#, no-c-format
msgid "4445"
-msgstr ""
+msgstr "4445"
#. Tag: literal
#: J2EE_Security_On_JBOSS.xml:2048
#, no-c-format
msgid "org.jboss.invocation.pooled.server.PooledInvoker"
-msgstr ""
+msgstr "org.jboss.invocation.pooled.server.PooledInvoker"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2052
#, no-c-format
msgid "8009"
-msgstr ""
+msgstr "8009"
#. Tag: literal
#: J2EE_Security_On_JBOSS.xml:2059 J2EE_Security_On_JBOSS.xml:2070
#, no-c-format
msgid "org.jboss.web.tomcat.tc4.EmbeddedTomcatService"
-msgstr ""
+msgstr "org.jboss.web.tomcat.tc4.EmbeddedTomcatService"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2063
#, no-c-format
msgid "8080"
-msgstr ""
+msgstr "8080"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2074
#, no-c-format
msgid "8083"
-msgstr ""
+msgstr "8083"
#. Tag: literal
#: J2EE_Security_On_JBOSS.xml:2081
#, no-c-format
msgid "org.jboss.web.WebService"
-msgstr ""
+msgstr "org.jboss.web.WebService"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2085
#, no-c-format
msgid "8093"
-msgstr ""
+msgstr "8093"
#. Tag: literal
#: J2EE_Security_On_JBOSS.xml:2092
#, no-c-format
msgid "org.jboss.mq.il.uil2.UILServerILService"
-msgstr ""
+msgstr "org.jboss.mq.il.uil2.UILServerILService"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:2099
#, no-c-format
msgid "Additional ports in the all configuration"
-msgstr ""
+msgstr "all è¨å®ã®è¿½å ãã¼ã"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2119
#, no-c-format
msgid "1100"
-msgstr ""
+msgstr "1100"
#. Tag: literal
#: J2EE_Security_On_JBOSS.xml:2126 J2EE_Security_On_JBOSS.xml:2137
#: J2EE_Security_On_JBOSS.xml:2148
#, no-c-format
msgid "org.jboss.ha.jndi.HANamingService"
-msgstr ""
+msgstr "org.jboss.ha.jndi.HANamingService"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2130
#, no-c-format
msgid "1101"
-msgstr ""
+msgstr "1101"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2141
#, no-c-format
msgid "1102"
-msgstr ""
+msgstr "1102"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2144 J2EE_Security_On_JBOSS.xml:2155
#: J2EE_Security_On_JBOSS.xml:2166 J2EE_Security_On_JBOSS.xml:2202
#, no-c-format
msgid "<entry>UDP</entry>"
-msgstr ""
+msgstr "<entry>UDP</entry>"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2152
#, no-c-format
msgid "1161"
-msgstr ""
+msgstr "1161"
#. Tag: literal
#: J2EE_Security_On_JBOSS.xml:2159
#, no-c-format
msgid "org.jboss.jmx.adaptor.snmp.agent.SnmpAgentService"
-msgstr ""
+msgstr "org.jboss.jmx.adaptor.snmp.agent.SnmpAgentService"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2163
#, no-c-format
msgid "1162"
-msgstr ""
+msgstr "1162"
#. Tag: literal
#: J2EE_Security_On_JBOSS.xml:2170
#, no-c-format
msgid "org.jboss.jmx.adaptor.snmp.trapd.TrapdService"
-msgstr ""
+msgstr "org.jboss.jmx.adaptor.snmp.trapd.TrapdService"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2174
#, no-c-format
msgid "3528"
-msgstr ""
+msgstr "3528"
#. Tag: literal
#: J2EE_Security_On_JBOSS.xml:2181
#, no-c-format
msgid "org.jboss.invocation.iiop.IIOPInvoker"
-msgstr ""
+msgstr "org.jboss.invocation.iiop.IIOPInvoker"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2185
#, no-c-format
msgid "4447"
-msgstr ""
+msgstr "4447"
#. Tag: literal
#: J2EE_Security_On_JBOSS.xml:2192
#, no-c-format
msgid "org.jboss.invocation.jrmp.server.JRMPInvokerHA"
-msgstr ""
+msgstr "org.jboss.invocation.jrmp.server.JRMPInvokerHA"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:2196
#, no-c-format
msgid "45566"
-msgstr ""
+msgstr "45566"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:2197
@@ -6916,19 +8434,19 @@
msgid ""
"Plus two additional anonymous UDP ports, one can be set using the "
"<literal>rcv_port</literal>, and the other cannot be set."
-msgstr ""
+msgstr "å ãã¦è¿½å ã® anonymous UDP ãã¼ãã§ãã <literal>rcv_port</literal> ã使ã£ã¦è¨å®ã§ãããã®ã¨ã§ããªããã®ã«ãªãã¾ãã"
#. Tag: literal
#: J2EE_Security_On_JBOSS.xml:2206
#, no-c-format
msgid "org.jboss.ha.framework.server.ClusterPartition"
-msgstr ""
+msgstr "org.jboss.ha.framework.server.ClusterPartition"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:2215
#, no-c-format
msgid "How to Secure the JBoss Server"
-msgstr ""
+msgstr "JBoss Server ã®å®å
¨åãå³ãæ¹æ³"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:2216
@@ -6938,13 +8456,13 @@
"removed to prevent unauthorized access to administrative functions in a "
"deployment. This section describes the various admin services and how to "
"secure them."
-msgstr ""
+msgstr "JBoss ã«ã¯å®å
¨åãå³ãå¿
è¦ãããã ã¾ãã¯ãããã¤ã¡ã³ãã§ç®¡çæ©è½ã«èªè¨¼ã®ãªãã¢ã¯ã»ã¹ãé²æ¢ããããåé¤ããå¿
è¦ããã管çã¢ã¯ã»ã¹ãã¤ã³ããããã¤ãå梱ããã¦ãã¾ãã ãã®ã»ã¯ã·ã§ã³ã§ã¯å種管çãµã¼ãã¹ããã³ãããã®å®å
¨åãå³ãæ¹æ³ã説æãã¦ããã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:2220
#, no-c-format
msgid "The JMX Console"
-msgstr ""
+msgstr "JMX ã³ã³ã½ã¼ã«"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:2221
@@ -6955,13 +8473,13 @@
"to arbitrary admin type access like shutting down the server, stopping "
"services, deploying new services, etc. It should either be secured like any "
"other web application, or removed."
-msgstr ""
+msgstr "é
åãã£ã¬ã¯ããªã«ãã <literal>jmx-console.war</literal> 㯠JMX ãã¤ã¯ãã«ã¼ãã«ã« HTML ãã¥ã¼ãæä¾ãã¾ãã ãã®ããã«ã ãµã¼ãã¼ã®ã·ã£ãããã¦ã³ã ãµã¼ãã¹ã®åæ¢ã æ°ãããµã¼ãã¹ã®é
åãªã©ã®ãããªä»»æã®ç®¡çã¿ã¤ãã¢ã¯ã»ã¹ã«ã¢ã¯ã»ã¹ãæä¾ãã¾ãã ä»ã®ã¦ã§ãã¢ããªã±ã¼ã·ã§ã³ã®ç¨ã«å®å
¨åãå³ããã åé¤ããå¿
è¦ãããã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:2227
#, no-c-format
msgid "The Web Console"
-msgstr ""
+msgstr "ã¦ã§ãã³ã³ã½ã¼ã«"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:2228
@@ -6977,12 +8495,14 @@
"commented out setup for a security domain in <literal>WEB-INF/jboss-web.xml</"
"literal>."
msgstr ""
+"<literal>deploy/management</literal> ãã£ã¬ã¯ããªã«ãã <literal>web-console.war</literal> 㯠JMX ãã¤ã¯ãã«ã¼ãã«ã¸ã®ããã²ã¨ã¤ã®ã¦ã§ãã¢ããªã±ã¼ã·ã§ã³ãã¥ã¼ã«ãªãã¾ãã ããã¯ã¢ãã¬ãã㨠HTML ãã¥ã¼ã®çµã¿åããã使ç¨ã㦠<literal>jmx-console.war</literal> ã¨ãã¦ç®¡çæ©è½ã¸ã®åã¬ãã«ã®ã¢ã¯ã»ã¹ãæä¾ãã¾ãã ãã®ããã«ã å®å
¨åãå³ããåé¤ããå¿
è¦ãããã¾ãã <literal>web-console.war</literal> ã¯ãã® <literal>WEB-INF/web.xml</literal> ã«åºæ¬çãªã»ãã¥ãªãã£ç¨ã®ãã³ãã¬ã¼ããã³ã¡ã³ãã¢ã¦ããããå½¢ã§å«ãä»ã <literal>WEB-INF/jboss-web.xml</"
+"literal> ã«ã¯ã»ãã¥ãªãã£ãã¡ã¤ã³ç¨ã®è¨å®ãã³ã¡ã³ãã¢ã¦ããããå½¢ã§å«ã¾ãã¦ãã¾ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:2234
#, no-c-format
msgid "The HTTP Invokers"
-msgstr ""
+msgstr "HTTP å¼ã³åºãå´"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:2235
@@ -7004,12 +8524,15 @@
"domain setup in the <literal>http-invoker.sar/invoker.war/WEB-INF/jboss-web."
"xml</literal> descriptor."
msgstr ""
+"é
åãã£ã¬ã¯ããªã«ãã <literal>http-invoker.sar</literal> 㯠EJB ããã³ JNDI <literal>Naming</"
+"literal> ãµã¼ãã¹ã« RMI/HTTP ã¢ã¯ã»ã¹ãæä¾ãããµã¼ãã¹ã«ãªãã¾ãã ããã«ã¯ <literal>MBeanServer</literal> ã§åé¢ãããã¹ãå¼ã³åºãã表ããã¼ã·ã£ã«ããã <literal>org.jboss.invocation.Invocation</literal> ãªãã¸ã§ã¯ãã®ãã¹ããå¦çãããµã¼ãã¬ãããå«ã¾ãã¾ãã é©å㪠HTTP ãã¹ãããã©ã¼ãããåããæ¹æ³ã解æãããã¨ãå¯è½ã§ããããã å¹æçã« HTTP çµç±ã§åé¢ãããå¼ã³åºãå´ã®æ¼ç®ããµãã¼ããã MBean ã«ã¢ã¯ã»ã¹ã許å¯ãã¦ãã¾ãã¾ãã ãã®ã¢ã¯ã»ã¹ãã¤ã³ãã®å®å
¨åãå³ãããã«ã¯ã <literal>http-invoker.sar/invoker.war/WEB-INF/web.xml</literal> è¨è¿°åã«ãã <literal>JMXInvokerServlet</literal> ãµã¼ãã¬ããã®å®å
¨åãè¡ãå¿
è¦ãããã§ãããã ããã©ã«ã㧠<literal>/restricted/JMXInvokerServlet</literal> ãã¹ç¨ã«å®ç¾©ããã¦ããå®å
¨ãªãããã³ã°ãããã!
®ã§ã åç´ã«ãã®ä»ã®ãã¹ãåé¤ã㦠<literal>http-invoker.sar/invoker.war/WEB-INF/jboss-web."
+"xml</literal> è¨è¿°åå
㧠<literal>http-invoker</literal> ã»ãã¥ãªãã£ãã¡ã¤ã³ã®è¨å®ãè¡ãã ãã§ãã"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:2241
#, no-c-format
msgid "The JMX Invoker"
-msgstr ""
+msgstr "JMX å¼ã³åºãå´"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:2242
@@ -7022,4 +8545,5 @@
"<literal>http-invoker.sar</literal> as described in the previous section. In "
"the future this service will be deployed as an XMBean with a security "
"interceptor that supports role based access checks."
-msgstr ""
+msgstr "<literal>jmx-invoker-adaptor-server.sar</literal> 㯠RMI/JRMP åé¢å¼ã³åºãå´ãµã¼ãã¹ã使ã£ã¦ RMI äºæã®ã¤ã³ã¿ã¼ãã§ã¼ã¹ãã JMX MBeanServer ã¤ã³ã¿ã¼ãã§ã¼ã¹ãå
¬éãããµã¼ãã¹ã«ãªãã¾ãã ãã®ãµã¼ãã¹ã®å®å
¨åãå³ãæ¹æ³ã¯ã ç¾å¨ã ãããã³ã«ã RMI/HTTP ã«åãæ¿ãã¦åè¿°ããããã« <literal>http-invoker.sar</literal> ã®å®å
¨åãå³ãæ¹æ³ã®ã¿ã«ãªãã¾ãã å°æ¥çã«ã¯ã ãã®ãµã¼ãã¹ã¯ãã¼ã«ãã¼ã¹ã®ã¢ã¯ã»ã¹ãã§ãã¯ã«å¯¾å¿ããã»ãã¥ãªãã£ã¤ã³ã¿ã¼ã»ãã¿ã§ XMBean ã¨ãã¦å°å
¥ãããããã«ãªãã¾ãã"
+
More information about the jboss-cvs-commits
mailing list