[jboss-cvs] JBossAS SVN: r88846 - projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR.
jboss-cvs-commits at lists.jboss.org
jboss-cvs-commits at lists.jboss.org
Thu May 14 00:00:15 EDT 2009
Author: ldelima at redhat.com
Date: 2009-05-14 00:00:14 -0400 (Thu, 14 May 2009)
New Revision: 88846
Modified:
projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR/J2EE_Security_On_JBOSS.po
Log:
translation ongoing
Modified: projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR/J2EE_Security_On_JBOSS.po
===================================================================
--- projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR/J2EE_Security_On_JBOSS.po 2009-05-13 23:24:06 UTC (rev 88845)
+++ projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR/J2EE_Security_On_JBOSS.po 2009-05-14 04:00:14 UTC (rev 88846)
@@ -9,7 +9,7 @@
"Project-Id-Version: J2EE_Security_On_JBOSS\n"
"Report-Msgid-Bugs-To: http://bugs.kde.org\n"
"POT-Creation-Date: 2009-01-20 02:37+0000\n"
-"PO-Revision-Date: 2009-05-13 16:35+1000\n"
+"PO-Revision-Date: 2009-05-14 13:59+1000\n"
"Last-Translator: Leticia de Lima <ldelima at redhat.com>\n"
"Language-Team: Brazilian Portuguese <en at li.org>\n"
"MIME-Version: 1.0\n"
@@ -5781,6 +5781,97 @@
" throws LoginException;\n"
"}"
msgstr ""
+"package org.jboss.security.auth.spi;\n"
+"\n"
+"/**\n"
+" * An abstract subclass of AbstractServerLoginModule that imposes a\n"
+" * an identity == String username, credentials == String password\n"
+" * view on the login process. Subclasses override the\n"
+" * getUsersPassword() and getUsersRoles() methods to return the\n"
+" * expected password and roles for the user.\n"
+" */\n"
+"public abstract class UsernamePasswordLoginModule\n"
+" extends AbstractServerLoginModule\n"
+"{\n"
+" /** The login identity */\n"
+" private Principal identity;\n"
+" /** The proof of login identity */\n"
+" private char[] credential;\n"
+" /** The principal to use when a null username and password are seen */\n"
+" private Principal unauthenticatedIdentity;\n"
+"\n"
+" /**\n"
+" * The message digest algorithm used to hash passwords. If null then\n"
+" * plain passwords will be used. */\n"
+" private String hashAlgorithm = null;\n"
+"\n"
+" /**\n"
+" * The name of the charset/encoding to use when converting the\n"
+" * password String to a byte array. Default is the platform's\n"
+" * default encoding.\n"
+" */\n"
+" private String hashCharset = null;\n"
+"\n"
+" /** The string encoding format to use. Defaults to base64. */\n"
+" private String hashEncoding = null;\n"
+" \n"
+" // ...\n"
+" \n"
+" /** \n"
+" * Override the superclass method to look for an\n"
+" * unauthenticatedIdentity property. This method first invokes\n"
+" * the super version.\n"
+" *\n"
+" * @param options,\n"
+" * @option unauthenticatedIdentity: the name of the principal to\n"
+" * assign and authenticate when a null username and password are\n"
+" * seen.\n"
+" */\n"
+" public void initialize(Subject subject,\n"
+" CallbackHandler callbackHandler,\n"
+" Map sharedState,\n"
+" Map options)\n"
+" {\n"
+" super.initialize(subject, callbackHandler, sharedState,\n"
+" options);\n"
+" // Check for unauthenticatedIdentity option.\n"
+" Object option = options.get(\"unauthenticatedIdentity\");\n"
+" String name = (String) option;\n"
+" if (name != null) {\n"
+" unauthenticatedIdentity = new SimplePrincipal(name);\n"
+" }\n"
+" }\n"
+" \n"
+" // ...\n"
+" \n"
+" /**\n"
+" * A hook that allows subclasses to change the validation of the\n"
+" * input password against the expected password. This version\n"
+" * checks that neither inputPassword or expectedPassword are null\n"
+" * and that inputPassword.equals(expectedPassword) is true;\n"
+" *\n"
+" * @return true if the inputPassword is valid, false otherwise.\n"
+" */\n"
+" protected boolean validatePassword(String inputPassword,\n"
+" String expectedPassword)\n"
+" {\n"
+" if (inputPassword == null || expectedPassword == null) {\n"
+" return false;\n"
+" }\n"
+" return inputPassword.equals(expectedPassword);\n"
+" }\n"
+" \n"
+" /**\n"
+" * Get the expected password for the current username available\n"
+" * via the getUsername() method. This is called from within the\n"
+" * login() method after the CallbackHandler has returned the\n"
+" * username and candidate password.\n"
+" *\n"
+" * @return the valid password String\n"
+" */\n"
+" abstract protected String getUsersPassword()\n"
+" throws LoginException;\n"
+"}"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1403
@@ -6013,6 +6104,98 @@
" } \n"
"}"
msgstr ""
+"package org.jboss.book.security.ex2;\n"
+" \n"
+"import java.security.acl.Group;\n"
+"import java.util.Map;\n"
+"import javax.naming.InitialContext;\n"
+"import javax.naming.NamingException;\n"
+"import javax.security.auth.Subject;\n"
+"import javax.security.auth.callback.CallbackHandler;\n"
+"import javax.security.auth.login.LoginException;\n"
+"\n"
+"import org.jboss.security.SimpleGroup;\n"
+"import org.jboss.security.SimplePrincipal;\n"
+"import org.jboss.security.auth.spi.UsernamePasswordLoginModule;\n"
+"\n"
+"/** \n"
+" * An example custom login module that obtains passwords and roles\n"
+" * for a user from a JNDI lookup.\n"
+" * \n"
+" * @author Scott.Stark at jboss.org\n"
+" * @version $Revision: 1.4 $\n"
+"*/\n"
+"public class JndiUserAndPass \n"
+" extends UsernamePasswordLoginModule\n"
+"{\n"
+" /** The JNDI name to the context that handles the password/username "
+"lookup */\n"
+" private String userPathPrefix;\n"
+" /** The JNDI name to the context that handles the roles/ username lookup "
+"*/\n"
+" private String rolesPathPrefix;\n"
+" \n"
+" /**\n"
+" * Override to obtain the userPathPrefix and rolesPathPrefix options.\n"
+" */\n"
+" public void initialize(Subject subject, CallbackHandler "
+"callbackHandler,\n"
+" Map sharedState, Map options)\n"
+" {\n"
+" super.initialize(subject, callbackHandler, sharedState, options);\n"
+" userPathPrefix = (String) options.get(\"userPathPrefix\");\n"
+" rolesPathPrefix = (String) options.get(\"rolesPathPrefix\");\n"
+" }\n"
+" \n"
+" /**\n"
+" * Get the roles the current user belongs to by querying the\n"
+" * rolesPathPrefix + '/' + super.getUsername() JNDI location.\n"
+" */\n"
+" protected Group[] getRoleSets() throws LoginException\n"
+" {\n"
+" try {\n"
+" InitialContext ctx = new InitialContext();\n"
+" String rolesPath = rolesPathPrefix + '/' + super."
+"getUsername();\n"
+"\n"
+" String[] roles = (String[]) ctx.lookup(rolesPath);\n"
+" Group[] groups = {new SimpleGroup(\"Roles\")};\n"
+" log.info(\"Getting roles for user=\"+super.getUsername());\n"
+" for(int r = 0; r < roles.length; r ++) {\n"
+" SimplePrincipal role = new SimplePrincipal(roles[r]);\n"
+" log.info(\"Found role=\"+roles[r]);\n"
+" groups[0].addMember(role);\n"
+" }\n"
+" return groups;\n"
+" } catch(NamingException e) {\n"
+" log.error(\"Failed to obtain groups for\n"
+" user=\"+super.getUsername(), e);\n"
+" throw new LoginException(e.toString(true));\n"
+" }\n"
+" }\n"
+" \n"
+" /** \n"
+" * Get the password of the current user by querying the\n"
+" * userPathPrefix + '/' + super.getUsername() JNDI location.\n"
+" */\n"
+" protected String getUsersPassword() \n"
+" throws LoginException\n"
+" {\n"
+" try {\n"
+" InitialContext ctx = new InitialContext();\n"
+" String userPath = userPathPrefix + '/' + super."
+"getUsername();\n"
+" log.info(\"Getting password for user=\"+super.getUsername());\n"
+" String passwd = (String) ctx.lookup(userPath);\n"
+" log.info(\"Found password=\"+passwd);\n"
+" return passwd;\n"
+" } catch(NamingException e) {\n"
+" log.error(\"Failed to obtain password for\n"
+" user=\"+super.getUsername(), e);\n"
+" throw new LoginException(e.toString(true));\n"
+" }\n"
+" } \n"
+"}"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1466
@@ -6054,6 +6237,14 @@
" [java] [INFO,ExClient] Created Echo\n"
" [java] [INFO,ExClient] Echo.echo('Hello') = Hello"
msgstr ""
+"[examples]$ ant -Dchap=security -Dex=2 run-example\n"
+"...\n"
+"run-example2:\n"
+" [echo] Waiting for 5 seconds for deploy...\n"
+" [java] [INFO,ExClient] Login with username=jduke, password=theduke\n"
+" [java] [INFO,ExClient] Looking up EchoBean2\n"
+" [java] [INFO,ExClient] Created Echo\n"
+" [java] [INFO,ExClient] Echo.echo('Hello') = Hello"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1473
@@ -6067,16 +6258,17 @@
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1476
-#, fuzzy, no-c-format
+#, no-c-format
msgid ""
"<?xml version=\"1.0\"?>\n"
"<jboss>\n"
" <security-domain>java:/jaas/security-ex2</security-domain>\n"
"</jboss>"
msgstr ""
-"<jboss-web>\n"
-" <security-domain>java:/jaas/digest</security-domain>\n"
-"</jboss-web>"
+"<?xml version=\"1.0\"?>\n"
+"<jboss>\n"
+" <security-domain>java:/jaas/security-ex2</security-domain>\n"
+"</jboss>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1477
@@ -6103,6 +6295,18 @@
" </authentication>\n"
"</application-policy>"
msgstr ""
+"<application-policy name = \"security-ex2\">\n"
+" <authentication>\n"
+" <login-module code=\"org.jboss.book.security.ex2.JndiUserAndPass"
+"\"\n"
+" flag=\"required\">\n"
+" <module-option name = \"userPathPrefix\">/security/store/"
+"password</module-option>\n"
+" <module-option name = \"rolesPathPrefix\">/security/store/"
+"roles</module-option>\n"
+" </login-module>\n"
+" </authentication>\n"
+"</application-policy>"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1488
@@ -6351,6 +6555,15 @@
" ;\n"
"};"
msgstr ""
+"srp {\n"
+" org.jboss.security.srp.jaas.SRPLoginModule required\n"
+" srpServerJndiName=\"SRPServerInterface\"\n"
+" ;\n"
+" \n"
+" org.jboss.security.ClientLoginModule required\n"
+" password-stacking=\"useFirstPass\"\n"
+" ;\n"
+"};"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1587
@@ -6540,6 +6753,8 @@
"public void addUser(String username, String password) throws IOException;\n"
"public void delUser(String username) throws IOException;"
msgstr ""
+"public void addUser(String username, String password) throws IOException;\n"
+"public void delUser(String username) throws IOException;"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1661
@@ -6630,6 +6845,57 @@
" throws SecurityException;\n"
"}"
msgstr ""
+"package org.jboss.security.srp;\n"
+"\n"
+"import java.io.IOException;\n"
+"import java.io.Serializable;\n"
+"import java.security.KeyException;\n"
+"\n"
+"public interface SRPVerifierStore\n"
+"{\n"
+" public static class VerifierInfo implements Serializable\n"
+" {\n"
+" /**\n"
+" * The username the information applies to. Perhaps redundant\n"
+" * but it makes the object self contained.\n"
+" */\n"
+" public String username;\n"
+"\n"
+" /** The SRP password verifier hash */\n"
+" public byte[] verifier;\n"
+" /** The random password salt originally used to verify the password "
+"*/\n"
+" public byte[] salt;\n"
+" /** The SRP algorithm primitive generator */\n"
+" public byte[] g;\n"
+" /** The algorithm safe-prime modulus */\n"
+" public byte[] N;\n"
+" }\n"
+" \n"
+" /**\n"
+" * Get the indicated user's password verifier information.\n"
+" */\n"
+" public VerifierInfo getUserVerifier(String username)\n"
+" throws KeyException, IOException;\n"
+" /** \n"
+" * Set the indicated users' password verifier information. This\n"
+" * is equivalent to changing a user's password and should\n"
+" * generally invalidate any existing SRP sessions and caches.\n"
+" */\n"
+" public void setUserVerifier(String username, VerifierInfo info)\n"
+" throws IOException;\n"
+"\n"
+" /** \n"
+" * Verify an optional auxiliary challenge sent from the client to\n"
+" * the server. The auxChallenge object will have been decrypted\n"
+" * if it was sent encrypted from the client. An example of a\n"
+" * auxiliary challenge would be the validation of a hardware token\n"
+" * (SafeWord, SecureID, iButton) that the server validates to\n"
+" * further strengthen the SRP password exchange.\n"
+" */\n"
+" public void verifyUserChallenge(String username, Object auxChallenge)\n"
+" throws SecurityException;\n"
+"}"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1671
@@ -6958,6 +7224,16 @@
"users.properties\n"
"security-ex3.sar"
msgstr ""
+"[examples]$ jar tf output/security/security-ex3.jar \n"
+"META-INF/MANIFEST.MF\n"
+"META-INF/ejb-jar.xml\n"
+"META-INF/jboss.xml\n"
+"org/jboss/book/security/ex3/Echo.class\n"
+"org/jboss/book/security/ex3/EchoBean.class\n"
+"org/jboss/book/security/ex3/EchoHome.class\n"
+"roles.properties\n"
+"users.properties\n"
+"security-ex3.sar"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1787
@@ -7024,6 +7300,45 @@
" </mbean>\n"
"</server>"
msgstr ""
+"<server>\n"
+" <!-- The custom JAAS login configuration that installs\n"
+" a Configuration capable of dynamically updating the\n"
+" config settings -->\n"
+"\n"
+" <mbean code=\"org.jboss.book.security.service.SecurityConfig\" \n"
+" name=\"jboss.docs.security:service=LoginConfig-EX3\">\n"
+" <attribute name=\"AuthConfig\">META-INF/login-config.xml</"
+"attribute>\n"
+" <attribute name=\"SecurityConfigName\">jboss.security:"
+"name=SecurityConfig</attribute>\n"
+" </mbean>\n"
+"\n"
+" <!-- The SRP service that provides the SRP RMI server and server "
+"side\n"
+" authentication cache -->\n"
+" <mbean code=\"org.jboss.security.srp.SRPService\" \n"
+" name=\"jboss.docs.security:service=SRPService\">\n"
+" <attribute name=\"VerifierSourceJndiName\">srp-test/security-"
+"ex3</attribute>\n"
+" <attribute name=\"JndiName\">srp-test/SRPServerInterface</"
+"attribute>\n"
+" <attribute name=\"AuthenticationCacheJndiName\">srp-test/"
+"AuthenticationCache</attribute>\n"
+" <attribute name=\"ServerPort\">0</attribute>\n"
+" <depends>jboss.docs.security:"
+"service=PropertiesVerifierStore</depends>\n"
+" </mbean>\n"
+"\n"
+" <!-- The SRP store handler service that provides the user password "
+"verifier\n"
+" information -->\n"
+" <mbean code=\"org.jboss.security.ex3.service.PropertiesVerifierStore"
+"\"\n"
+" name=\"jboss.docs.security:service=PropertiesVerifierStore\">\n"
+" <attribute name=\"JndiName\">srp-test/security-ex3</"
+"attribute>\n"
+" </mbean>\n"
+"</server>"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1792
@@ -7045,6 +7360,15 @@
" ;\n"
"};"
msgstr ""
+"srp {\n"
+" org.jboss.security.srp.jaas.SRPLoginModule required\n"
+" srpServerJndiName=\"srp-test/SRPServerInterface\"\n"
+" ;\n"
+" \n"
+" org.jboss.security.ClientLoginModule required\n"
+" password-stacking=\"useFirstPass\"\n"
+" ;\n"
+"};"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1794
@@ -7073,6 +7397,22 @@
" </authentication>\n"
"</application-policy>"
msgstr ""
+"<application-policy name=\"security-ex3\">\n"
+" <authentication>\n"
+" <login-module code=\"org.jboss.security.srp.jaas."
+"SRPCacheLoginModule\"\n"
+" flag = \"required\">\n"
+" <module-option name=\"cacheJndiName\">srp-test/"
+"AuthenticationCache</module-option>\n"
+" </login-module>\n"
+" <login-module code=\"org.jboss.security.auth.spi."
+"UsersRolesLoginModule\"\n"
+" flag = \"required\">\n"
+" <module-option name=\"password-stacking\">useFirstPass</"
+"module-option>\n"
+" </login-module>\n"
+" </authentication>\n"
+"</application-policy>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1796
@@ -7151,6 +7491,14 @@
" [java] Echo.echo()#1 = This is call 1\n"
" [java] Echo.echo()#2 = This is call 2"
msgstr ""
+"[examples]$ ant -Dchap=security -Dex=3 run-example\n"
+"...\n"
+"run-example3:\n"
+" [echo] Waiting for 5 seconds for deploy...\n"
+" [java] Logging in using the 'srp' configuration\n"
+" [java] Created Echo\n"
+" [java] Echo.echo()#1 = This is call 1\n"
+" [java] Echo.echo()#2 = This is call 2"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1809
@@ -7256,6 +7604,10 @@
" permission java.security.AllPermission;\n"
"};"
msgstr ""
+"grant {\n"
+" // Allow everything for now\n"
+" permission java.security.AllPermission;\n"
+"};"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1845
@@ -7278,7 +7630,7 @@
#: J2EE_Security_On_JBOSS.xml:1854
#, no-c-format
msgid "TargetName"
-msgstr ""
+msgstr "TargetName"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1857
@@ -7296,7 +7648,7 @@
#: J2EE_Security_On_JBOSS.xml:1867
#, no-c-format
msgid "org.jboss.security.SecurityAssociation.getPrincipalInfo"
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation.getPrincipalInfo"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1870
@@ -7316,7 +7668,7 @@
#: J2EE_Security_On_JBOSS.xml:1878
#, no-c-format
msgid "org.jboss.security.SecurityAssociation.setPrincipalInfo"
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation.setPrincipalInfo"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1881
@@ -7336,7 +7688,7 @@
#: J2EE_Security_On_JBOSS.xml:1889
#, no-c-format
msgid "org.jboss.security.SecurityAssociation.setServer"
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation.setServer"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1892
@@ -7356,7 +7708,7 @@
#: J2EE_Security_On_JBOSS.xml:1900
#, no-c-format
msgid "org.jboss.security.SecurityAssociation.setRunAsRole"
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation.setRunAsRole"
#. Tag: entry
#: J2EE_Security_On_JBOSS.xml:1903
@@ -7407,6 +7759,25 @@
"\n"
"Note: Separate multiple options with a comma"
msgstr ""
+"[bin]$ java -Djava.security.debug=help\n"
+" \n"
+"all turn on all debugging\n"
+"access print all checkPermission results\n"
+"combiner SubjectDomainCombiner debugging\n"
+"jar jar verification\n"
+"logincontext login context results\n"
+"policy loading and granting\n"
+"provider security provider debugging\n"
+"scl permissions SecureClassLoader assigns\n"
+"\n"
+"The following can be used with access:\n"
+"\n"
+"stack include stack trace\n"
+"domain dumps all domains in context\n"
+"failure before throwing exception, dump stack\n"
+" and domain that didn't have permission\n"
+"\n"
+"Note: Separate multiple options with a comma"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1916
@@ -7537,6 +7908,22 @@
" Trust this certificate? [no]: yes\n"
" Certificate was added to keystore"
msgstr ""
+"$ keytool -import -alias ejb3-ssl -file mycert.cer -keystore localhost."
+"truststore\n"
+" Enter keystore password: opensource\n"
+" Owner: CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, "
+"C=Unknown\n"
+" Issuer: CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, "
+"C=Unknown\n"
+" Serial number: 43bff927\n"
+" Valid from: Sat Jan 07 18:23:51 CET 2006 until: Fri Apr 07 19:23:51 CEST "
+"2006\n"
+" Certificate fingerprints:\n"
+" MD5: CF:DC:71:A8:F4:EA:8F:5A:E9:94:E3:E6:5B:A9:C8:F3\n"
+" SHA1: 0E:AD:F3:D6:41:5E:F6:84:9A:D1:54:3D:DE:A9:B2:01:28:"
+"F6:7C:26\n"
+" Trust this certificate? [no]: yes\n"
+" Certificate was added to keystore"
#. Tag: title
#: J2EE_Security_On_JBOSS.xml:1945 J2EE_Security_On_JBOSS.xml:1989
@@ -7573,6 +7960,21 @@
" </attribute>\n"
" </mbean>"
msgstr ""
+"<mbean code=\"org.jboss.remoting.transport.Connector\"\n"
+" xmbean-dd=\"org/jboss/remoting/transport/Connector.xml\"\n"
+" name=\"jboss.remoting:type=Connector,transport=socket3843,handler=ejb3"
+"\">\n"
+" <depends>jboss.aop:service=AspectDeployer</depends>\n"
+" <attribute name=\"InvokerLocator\">sslsocket://0.0.0.0:3843</"
+"attribute>\n"
+" <attribute name=\"Configuration\">\n"
+" <handlers>\n"
+" <handler subsystem=\"AOP\">\n"
+" org.jboss.aspects.remoting.AOPRemotingInvocationHandler\n"
+" </handler>\n"
+" </handlers>\n"
+" </attribute>\n"
+" </mbean>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1950 J2EE_Security_On_JBOSS.xml:1990
@@ -7627,6 +8029,13 @@
" ...\n"
" }"
msgstr ""
+"@RemoteBinding(clientBindUrl=\"sslsocket://0.0.0.0:3843\", jndiBinding="
+"\"StatefulSSL\"),\n"
+" @Remote(BusinessInterface.class)\n"
+" public class StatefulBean implements BusinessInterface\n"
+" {\n"
+" ...\n"
+" }"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1961
@@ -7658,6 +8067,16 @@
" ...\n"
" }"
msgstr ""
+"@RemoteBindings({\n"
+" @RemoteBinding(clientBindUrl=\"sslsocket://0.0.0.0:3843\", jndiBinding="
+"\"StatefulSSL\"),\n"
+" @RemoteBinding(jndiBinding=\"StatefulNormal\")\n"
+" })\n"
+" @Remote(BusinessInterface.class)\n"
+" public class StatefulBean implements BusinessInterface\n"
+" {\n"
+" ...\n"
+" }"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:1968
@@ -7758,6 +8177,42 @@
" <attribute name=\"KeyStoreType\">JKS</attribute>\n"
" </mbean>"
msgstr ""
+"<!-- This section is for custom (SSL) server socket factory -->\n"
+" <mbean code=\"org.jboss.remoting.security.SSLSocketBuilder\"\n"
+" name=\"jboss.remoting:service=SocketBuilder,type=SSL\"\n"
+" display-name=\"SSL Server Socket Factory Builder\">\n"
+" <!-- IMPORTANT - If making ANY customizations, this MUST be set to "
+"false. -->\n"
+" <!-- Otherwise, will used default settings and the following "
+"attributes will be ignored. -->\n"
+" <attribute name=\"UseSSLServerSocketFactory\">false</"
+"attribute>\n"
+" <!-- This is the url string to the key store to use -->\n"
+" <attribute name=\"KeyStoreURL\">localhost.keystore</"
+"attribute>\n"
+" <!-- The password for the key store -->\n"
+" <attribute name=\"KeyStorePassword\">sslsocket</"
+"attribute>\n"
+" <!-- The password for the keys (will use KeystorePassword if this "
+"is not set explicitly. -->\n"
+" <attribute name=\"KeyPassword\">sslsocket</attribute>\n"
+" <!-- The protocol for the SSLContext. Default is TLS. -->\n"
+" <attribute name=\"SecureSocketProtocol\">TLS</attribute>\n"
+" <!-- The algorithm for the key manager factory. Default is "
+"SunX509. -->\n"
+" <attribute name=\"KeyManagementAlgorithm\">SunX509</"
+"attribute>\n"
+" <!-- The type to be used for the key store. -->\n"
+" <!-- Defaults to JKS. Some acceptable values are JKS (Java "
+"Keystore - Sun's keystore format), -->\n"
+" <!-- JCEKS (Java Cryptography Extension keystore - More secure "
+"version of JKS), and -->\n"
+" <!-- PKCS12 (Public-Key Cryptography Standards #12 \n"
+" keystore - RSA's Personal Information Exchange Syntax "
+"Standard). -->\n"
+" <!-- These are not case sensitive. -->\n"
+" <attribute name=\"KeyStoreType\">JKS</attribute>\n"
+" </mbean>"
#. Tag: programlisting
#: J2EE_Security_On_JBOSS.xml:1997
@@ -7772,6 +8227,14 @@
"type=SSL</depends>\n"
" </mbean>"
msgstr ""
+"<mbean code=\"org.jboss.remoting.security.SSLServerSocketFactoryService"
+"\"\n"
+" name=\"jboss.remoting:service=ServerSocketFactory,type=SSL\"\n"
+" display-name=\"SSL Server Socket Factory\">\n"
+" <depends optional-attribute-name=\"SSLSocketBuilder\"\n"
+" proxy-type=\"attribute\">jboss.remoting:service=SocketBuilder,"
+"type=SSL</depends>\n"
+" </mbean>"
#. Tag: para
#: J2EE_Security_On_JBOSS.xml:2002
More information about the jboss-cvs-commits
mailing list