[jboss-cvs] JBossAS SVN: r88846 - projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR.

jboss-cvs-commits at lists.jboss.org jboss-cvs-commits at lists.jboss.org
Thu May 14 00:00:15 EDT 2009


Author: ldelima at redhat.com
Date: 2009-05-14 00:00:14 -0400 (Thu, 14 May 2009)
New Revision: 88846

Modified:
   projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR/J2EE_Security_On_JBOSS.po
Log:
translation ongoing

Modified: projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR/J2EE_Security_On_JBOSS.po
===================================================================
--- projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR/J2EE_Security_On_JBOSS.po	2009-05-13 23:24:06 UTC (rev 88845)
+++ projects/docs/enterprise/4.3.3/Server_Configuration_Guide/pt-BR/J2EE_Security_On_JBOSS.po	2009-05-14 04:00:14 UTC (rev 88846)
@@ -9,7 +9,7 @@
 "Project-Id-Version: J2EE_Security_On_JBOSS\n"
 "Report-Msgid-Bugs-To: http://bugs.kde.org\n"
 "POT-Creation-Date: 2009-01-20 02:37+0000\n"
-"PO-Revision-Date: 2009-05-13 16:35+1000\n"
+"PO-Revision-Date: 2009-05-14 13:59+1000\n"
 "Last-Translator: Leticia de Lima <ldelima at redhat.com>\n"
 "Language-Team: Brazilian Portuguese <en at li.org>\n"
 "MIME-Version: 1.0\n"
@@ -5781,6 +5781,97 @@
 "        throws LoginException;\n"
 "}"
 msgstr ""
+"package org.jboss.security.auth.spi;\n"
+"\n"
+"/**\n"
+" *  An abstract subclass of AbstractServerLoginModule that imposes a\n"
+" *  an identity == String username, credentials == String password\n"
+" *  view on the login process. Subclasses override the\n"
+" *  getUsersPassword() and getUsersRoles() methods to return the\n"
+" *  expected password and roles for the user.\n"
+" */\n"
+"public abstract class UsernamePasswordLoginModule\n"
+"    extends AbstractServerLoginModule\n"
+"{\n"
+"    /** The login identity */\n"
+"    private Principal identity;\n"
+"    /** The proof of login identity */\n"
+"    private char[] credential;\n"
+"    /** The principal to use when a null username and password are seen */\n"
+"    private Principal unauthenticatedIdentity;\n"
+"\n"
+"    /**\n"
+"     * The message digest algorithm used to hash passwords. If null then\n"
+"     * plain passwords will be used. */\n"
+"    private String hashAlgorithm = null;\n"
+"\n"
+"    /**\n"
+"     *  The name of the charset/encoding to use when converting the\n"
+"     * password String to a byte array. Default is the platform&#39;s\n"
+"     * default encoding.\n"
+"     */\n"
+"     private String hashCharset = null;\n"
+"\n"
+"    /** The string encoding format to use. Defaults to base64. */\n"
+"    private String hashEncoding = null;\n"
+"                \n"
+"    // ...\n"
+"                \n"
+"    /** \n"
+"     *  Override the superclass method to look for an\n"
+"     *  unauthenticatedIdentity property. This method first invokes\n"
+"     *  the super version.\n"
+"     *\n"
+"     *  @param options,\n"
+"     *  @option unauthenticatedIdentity: the name of the principal to\n"
+"     *  assign and authenticate when a null username and password are\n"
+"     *  seen.\n"
+"     */\n"
+"    public void initialize(Subject subject,\n"
+"                           CallbackHandler callbackHandler,\n"
+"                           Map sharedState,\n"
+"                           Map options)\n"
+"    {\n"
+"        super.initialize(subject, callbackHandler, sharedState,\n"
+"                         options);\n"
+"        // Check for unauthenticatedIdentity option.\n"
+"        Object option = options.get(\"unauthenticatedIdentity\");\n"
+"        String name = (String) option;\n"
+"        if (name != null) {\n"
+"            unauthenticatedIdentity = new SimplePrincipal(name);\n"
+"        }\n"
+"    }\n"
+"                \n"
+"    // ...\n"
+"                \n"
+"    /**\n"
+"     *  A hook that allows subclasses to change the validation of the\n"
+"     *  input password against the expected password. This version\n"
+"     *  checks that neither inputPassword or expectedPassword are null\n"
+"     *  and that inputPassword.equals(expectedPassword) is true;\n"
+"     *\n"
+"     *  @return true if the inputPassword is valid, false otherwise.\n"
+"     */\n"
+"    protected boolean validatePassword(String inputPassword,\n"
+"                                       String expectedPassword)\n"
+"    {\n"
+"        if (inputPassword == null || expectedPassword == null) {\n"
+"            return false;\n"
+"        }\n"
+"        return inputPassword.equals(expectedPassword);\n"
+"    }\n"
+"    \n"
+"    /**\n"
+"     *  Get the expected password for the current username available\n"
+"     * via the getUsername() method. This is called from within the\n"
+"     * login() method after the CallbackHandler has returned the\n"
+"     * username and candidate password.\n"
+"     *\n"
+"     * @return the valid password String\n"
+"     */\n"
+"    abstract protected String getUsersPassword()\n"
+"        throws LoginException;\n"
+"}"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1403
@@ -6013,6 +6104,98 @@
 "    }   \n"
 "}"
 msgstr ""
+"package org.jboss.book.security.ex2;\n"
+"                    \n"
+"import java.security.acl.Group;\n"
+"import java.util.Map;\n"
+"import javax.naming.InitialContext;\n"
+"import javax.naming.NamingException;\n"
+"import javax.security.auth.Subject;\n"
+"import javax.security.auth.callback.CallbackHandler;\n"
+"import javax.security.auth.login.LoginException;\n"
+"\n"
+"import org.jboss.security.SimpleGroup;\n"
+"import org.jboss.security.SimplePrincipal;\n"
+"import org.jboss.security.auth.spi.UsernamePasswordLoginModule;\n"
+"\n"
+"/** \n"
+" *  An example custom login module that obtains passwords and roles\n"
+" *  for a user from a JNDI lookup.\n"
+" *     \n"
+" *  @author Scott.Stark at jboss.org\n"
+" *  @version $Revision: 1.4 $\n"
+"*/\n"
+"public class JndiUserAndPass \n"
+"    extends UsernamePasswordLoginModule\n"
+"{\n"
+"    /** The JNDI name to the context that handles the password/username "
+"lookup */\n"
+"    private String userPathPrefix;\n"
+"    /** The JNDI name to the context that handles the roles/ username lookup "
+"*/\n"
+"    private String rolesPathPrefix;\n"
+"    \n"
+"    /**\n"
+"     * Override to obtain the userPathPrefix and rolesPathPrefix options.\n"
+"     */\n"
+"    public void initialize(Subject subject, CallbackHandler "
+"callbackHandler,\n"
+"                           Map sharedState, Map options)\n"
+"    {\n"
+"        super.initialize(subject, callbackHandler, sharedState, options);\n"
+"        userPathPrefix = (String) options.get(\"userPathPrefix\");\n"
+"        rolesPathPrefix = (String) options.get(\"rolesPathPrefix\");\n"
+"    }\n"
+"    \n"
+"    /**\n"
+"     *  Get the roles the current user belongs to by querying the\n"
+"     * rolesPathPrefix + &#39;/&#39; + super.getUsername() JNDI location.\n"
+"     */\n"
+"    protected Group[] getRoleSets() throws LoginException\n"
+"    {\n"
+"        try {\n"
+"            InitialContext ctx = new InitialContext();\n"
+"            String rolesPath = rolesPathPrefix + &#39;/&#39; + super."
+"getUsername();\n"
+"\n"
+"            String[] roles = (String[]) ctx.lookup(rolesPath);\n"
+"            Group[] groups = {new SimpleGroup(\"Roles\")};\n"
+"            log.info(\"Getting roles for user=\"+super.getUsername());\n"
+"            for(int r = 0; r &lt; roles.length; r ++) {\n"
+"                SimplePrincipal role = new SimplePrincipal(roles[r]);\n"
+"                log.info(\"Found role=\"+roles[r]);\n"
+"                groups[0].addMember(role);\n"
+"            }\n"
+"            return groups;\n"
+"        } catch(NamingException e) {\n"
+"            log.error(\"Failed to obtain groups for\n"
+"                        user=\"+super.getUsername(), e);\n"
+"            throw new LoginException(e.toString(true));\n"
+"        }\n"
+"    }\n"
+"                    \n"
+"    /** \n"
+"     * Get the password of the current user by querying the\n"
+"     * userPathPrefix + &#39;/&#39; + super.getUsername() JNDI location.\n"
+"     */\n"
+"    protected String getUsersPassword() \n"
+"        throws LoginException\n"
+"    {\n"
+"        try {\n"
+"            InitialContext ctx = new InitialContext();\n"
+"            String userPath = userPathPrefix + &#39;/&#39; + super."
+"getUsername();\n"
+"            log.info(\"Getting password for user=\"+super.getUsername());\n"
+"            String passwd = (String) ctx.lookup(userPath);\n"
+"            log.info(\"Found password=\"+passwd);\n"
+"            return passwd;\n"
+"        } catch(NamingException e) {\n"
+"            log.error(\"Failed to obtain password for\n"
+"                        user=\"+super.getUsername(), e);\n"
+"            throw new LoginException(e.toString(true));\n"
+"        }\n"
+"    }   \n"
+"}"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1466
@@ -6054,6 +6237,14 @@
 "     [java] [INFO,ExClient] Created Echo\n"
 "     [java] [INFO,ExClient] Echo.echo(&#39;Hello&#39;) = Hello"
 msgstr ""
+"[examples]$ ant -Dchap=security -Dex=2 run-example\n"
+"...\n"
+"run-example2:\n"
+"     [echo] Waiting for 5 seconds for deploy...\n"
+"     [java] [INFO,ExClient] Login with username=jduke, password=theduke\n"
+"     [java] [INFO,ExClient] Looking up EchoBean2\n"
+"     [java] [INFO,ExClient] Created Echo\n"
+"     [java] [INFO,ExClient] Echo.echo(&#39;Hello&#39;) = Hello"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1473
@@ -6067,16 +6258,17 @@
 
 #. Tag: programlisting
 #: J2EE_Security_On_JBOSS.xml:1476
-#, fuzzy, no-c-format
+#, no-c-format
 msgid ""
 "&lt;?xml version=\"1.0\"?&gt;\n"
 "&lt;jboss&gt;\n"
 "    &lt;security-domain&gt;java:/jaas/security-ex2&lt;/security-domain&gt;\n"
 "&lt;/jboss&gt;"
 msgstr ""
-"&lt;jboss-web&gt;\n"
-"    &lt;security-domain&gt;java:/jaas/digest&lt;/security-domain&gt;\n"
-"&lt;/jboss-web&gt;"
+"&lt;?xml version=\"1.0\"?&gt;\n"
+"&lt;jboss&gt;\n"
+"    &lt;security-domain&gt;java:/jaas/security-ex2&lt;/security-domain&gt;\n"
+"&lt;/jboss&gt;"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1477
@@ -6103,6 +6295,18 @@
 "    &lt;/authentication&gt;\n"
 "&lt;/application-policy&gt;"
 msgstr ""
+"&lt;application-policy name = \"security-ex2\"&gt;\n"
+"    &lt;authentication&gt;\n"
+"        &lt;login-module code=\"org.jboss.book.security.ex2.JndiUserAndPass"
+"\"\n"
+"                      flag=\"required\"&gt;\n"
+"            &lt;module-option name = \"userPathPrefix\"&gt;/security/store/"
+"password&lt;/module-option&gt;\n"
+"            &lt;module-option name = \"rolesPathPrefix\"&gt;/security/store/"
+"roles&lt;/module-option&gt;\n"
+"        &lt;/login-module&gt;\n"
+"    &lt;/authentication&gt;\n"
+"&lt;/application-policy&gt;"
 
 #. Tag: title
 #: J2EE_Security_On_JBOSS.xml:1488
@@ -6351,6 +6555,15 @@
 "    ;\n"
 "};"
 msgstr ""
+"srp {\n"
+"    org.jboss.security.srp.jaas.SRPLoginModule required\n"
+"    srpServerJndiName=\"SRPServerInterface\"\n"
+"    ;\n"
+"            \n"
+"    org.jboss.security.ClientLoginModule required\n"
+"    password-stacking=\"useFirstPass\"\n"
+"    ;\n"
+"};"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1587
@@ -6540,6 +6753,8 @@
 "public void addUser(String username, String password) throws IOException;\n"
 "public void delUser(String username) throws IOException;"
 msgstr ""
+"public void addUser(String username, String password) throws IOException;\n"
+"public void delUser(String username) throws IOException;"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1661
@@ -6630,6 +6845,57 @@
 "         throws SecurityException;\n"
 "}"
 msgstr ""
+"package org.jboss.security.srp;\n"
+"\n"
+"import java.io.IOException;\n"
+"import java.io.Serializable;\n"
+"import java.security.KeyException;\n"
+"\n"
+"public interface SRPVerifierStore\n"
+"{\n"
+"    public static class VerifierInfo implements Serializable\n"
+"    {\n"
+"        /**\n"
+"         * The username the information applies to. Perhaps redundant\n"
+"         * but it makes the object self contained.\n"
+"         */\n"
+"        public String username;\n"
+"\n"
+"        /** The SRP password verifier hash */\n"
+"        public byte[] verifier;\n"
+"        /** The random password salt originally used to verify the password "
+"*/\n"
+"        public byte[] salt;\n"
+"        /** The SRP algorithm primitive generator */\n"
+"        public byte[] g;\n"
+"        /** The algorithm safe-prime modulus */\n"
+"        public byte[] N;\n"
+"    }\n"
+"    \n"
+"    /**\n"
+"     *  Get the indicated user&#39;s password verifier information.\n"
+"     */\n"
+"    public VerifierInfo getUserVerifier(String username)\n"
+"        throws KeyException, IOException;\n"
+"    /** \n"
+"     *  Set the indicated users&#39; password verifier information. This\n"
+"     *  is equivalent to changing a user&#39;s password and should\n"
+"     *  generally invalidate any existing SRP sessions and caches.\n"
+"     */\n"
+"    public void setUserVerifier(String username, VerifierInfo info)\n"
+"        throws IOException;\n"
+"\n"
+"    /** \n"
+"     * Verify an optional auxiliary challenge sent from the client to\n"
+"     * the server.  The auxChallenge object will have been decrypted\n"
+"     * if it was sent encrypted from the client. An example of a\n"
+"     * auxiliary challenge would be the validation of a hardware token\n"
+"     * (SafeWord, SecureID, iButton) that the server validates to\n"
+"     * further strengthen the SRP password exchange.\n"
+"     */\n"
+"     public void verifyUserChallenge(String username, Object auxChallenge)\n"
+"         throws SecurityException;\n"
+"}"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1671
@@ -6958,6 +7224,16 @@
 "users.properties\n"
 "security-ex3.sar"
 msgstr ""
+"[examples]$ jar tf output/security/security-ex3.jar \n"
+"META-INF/MANIFEST.MF\n"
+"META-INF/ejb-jar.xml\n"
+"META-INF/jboss.xml\n"
+"org/jboss/book/security/ex3/Echo.class\n"
+"org/jboss/book/security/ex3/EchoBean.class\n"
+"org/jboss/book/security/ex3/EchoHome.class\n"
+"roles.properties\n"
+"users.properties\n"
+"security-ex3.sar"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1787
@@ -7024,6 +7300,45 @@
 "    &lt;/mbean&gt;\n"
 "&lt;/server&gt;"
 msgstr ""
+"&lt;server&gt;\n"
+"    &lt;!-- The custom JAAS login configuration that installs\n"
+"         a Configuration capable of dynamically updating the\n"
+"         config settings --&gt;\n"
+"\n"
+"    &lt;mbean code=\"org.jboss.book.security.service.SecurityConfig\" \n"
+"           name=\"jboss.docs.security:service=LoginConfig-EX3\"&gt;\n"
+"        &lt;attribute name=\"AuthConfig\"&gt;META-INF/login-config.xml&lt;/"
+"attribute&gt;\n"
+"        &lt;attribute name=\"SecurityConfigName\"&gt;jboss.security:"
+"name=SecurityConfig&lt;/attribute&gt;\n"
+"    &lt;/mbean&gt;\n"
+"\n"
+"    &lt;!-- The SRP service that provides the SRP RMI server and server "
+"side\n"
+"         authentication cache --&gt;\n"
+"    &lt;mbean code=\"org.jboss.security.srp.SRPService\" \n"
+"           name=\"jboss.docs.security:service=SRPService\"&gt;\n"
+"        &lt;attribute name=\"VerifierSourceJndiName\"&gt;srp-test/security-"
+"ex3&lt;/attribute&gt;\n"
+"        &lt;attribute name=\"JndiName\"&gt;srp-test/SRPServerInterface&lt;/"
+"attribute&gt;\n"
+"        &lt;attribute name=\"AuthenticationCacheJndiName\"&gt;srp-test/"
+"AuthenticationCache&lt;/attribute&gt;\n"
+"        &lt;attribute name=\"ServerPort\"&gt;0&lt;/attribute&gt;\n"
+"        &lt;depends&gt;jboss.docs.security:"
+"service=PropertiesVerifierStore&lt;/depends&gt;\n"
+"    &lt;/mbean&gt;\n"
+"\n"
+"    &lt;!-- The SRP store handler service that provides the user password "
+"verifier\n"
+"         information --&gt;\n"
+"    &lt;mbean code=\"org.jboss.security.ex3.service.PropertiesVerifierStore"
+"\"\n"
+"           name=\"jboss.docs.security:service=PropertiesVerifierStore\"&gt;\n"
+"        &lt;attribute name=\"JndiName\"&gt;srp-test/security-ex3&lt;/"
+"attribute&gt;\n"
+"    &lt;/mbean&gt;\n"
+"&lt;/server&gt;"
 
 #. Tag: title
 #: J2EE_Security_On_JBOSS.xml:1792
@@ -7045,6 +7360,15 @@
 "    ;\n"
 "};"
 msgstr ""
+"srp {\n"
+"    org.jboss.security.srp.jaas.SRPLoginModule required\n"
+"    srpServerJndiName=\"srp-test/SRPServerInterface\"\n"
+"    ;\n"
+"                    \n"
+"    org.jboss.security.ClientLoginModule required\n"
+"    password-stacking=\"useFirstPass\"\n"
+"    ;\n"
+"};"
 
 #. Tag: title
 #: J2EE_Security_On_JBOSS.xml:1794
@@ -7073,6 +7397,22 @@
 "    &lt;/authentication&gt;\n"
 "&lt;/application-policy&gt;"
 msgstr ""
+"&lt;application-policy name=\"security-ex3\"&gt;\n"
+"    &lt;authentication&gt;\n"
+"        &lt;login-module code=\"org.jboss.security.srp.jaas."
+"SRPCacheLoginModule\"\n"
+"                      flag = \"required\"&gt;\n"
+"            &lt;module-option name=\"cacheJndiName\"&gt;srp-test/"
+"AuthenticationCache&lt;/module-option&gt;\n"
+"        &lt;/login-module&gt;\n"
+"        &lt;login-module code=\"org.jboss.security.auth.spi."
+"UsersRolesLoginModule\"\n"
+"                      flag = \"required\"&gt;\n"
+"            &lt;module-option name=\"password-stacking\"&gt;useFirstPass&lt;/"
+"module-option&gt;\n"
+"        &lt;/login-module&gt;\n"
+"    &lt;/authentication&gt;\n"
+"&lt;/application-policy&gt;"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1796
@@ -7151,6 +7491,14 @@
 "     [java] Echo.echo()#1 = This is call 1\n"
 "     [java] Echo.echo()#2 = This is call 2"
 msgstr ""
+"[examples]$ ant -Dchap=security -Dex=3 run-example\n"
+"...\n"
+"run-example3:\n"
+"     [echo] Waiting for 5 seconds for deploy...\n"
+"     [java] Logging in using the &#39;srp&#39; configuration\n"
+"     [java] Created Echo\n"
+"     [java] Echo.echo()#1 = This is call 1\n"
+"     [java] Echo.echo()#2 = This is call 2"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1809
@@ -7256,6 +7604,10 @@
 "    permission java.security.AllPermission;\n"
 "};"
 msgstr ""
+"grant {\n"
+"    // Allow everything for now\n"
+"    permission java.security.AllPermission;\n"
+"};"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1845
@@ -7278,7 +7630,7 @@
 #: J2EE_Security_On_JBOSS.xml:1854
 #, no-c-format
 msgid "TargetName"
-msgstr ""
+msgstr "TargetName"
 
 #. Tag: entry
 #: J2EE_Security_On_JBOSS.xml:1857
@@ -7296,7 +7648,7 @@
 #: J2EE_Security_On_JBOSS.xml:1867
 #, no-c-format
 msgid "org.jboss.security.SecurityAssociation.getPrincipalInfo"
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation.getPrincipalInfo"
 
 #. Tag: entry
 #: J2EE_Security_On_JBOSS.xml:1870
@@ -7316,7 +7668,7 @@
 #: J2EE_Security_On_JBOSS.xml:1878
 #, no-c-format
 msgid "org.jboss.security.SecurityAssociation.setPrincipalInfo"
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation.setPrincipalInfo"
 
 #. Tag: entry
 #: J2EE_Security_On_JBOSS.xml:1881
@@ -7336,7 +7688,7 @@
 #: J2EE_Security_On_JBOSS.xml:1889
 #, no-c-format
 msgid "org.jboss.security.SecurityAssociation.setServer"
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation.setServer"
 
 #. Tag: entry
 #: J2EE_Security_On_JBOSS.xml:1892
@@ -7356,7 +7708,7 @@
 #: J2EE_Security_On_JBOSS.xml:1900
 #, no-c-format
 msgid "org.jboss.security.SecurityAssociation.setRunAsRole"
-msgstr ""
+msgstr "org.jboss.security.SecurityAssociation.setRunAsRole"
 
 #. Tag: entry
 #: J2EE_Security_On_JBOSS.xml:1903
@@ -7407,6 +7759,25 @@
 "\n"
 "Note: Separate multiple options with a comma"
 msgstr ""
+"[bin]$ java -Djava.security.debug=help\n"
+"            \n"
+"all           turn on all debugging\n"
+"access        print all checkPermission results\n"
+"combiner      SubjectDomainCombiner debugging\n"
+"jar           jar verification\n"
+"logincontext  login context results\n"
+"policy        loading and granting\n"
+"provider      security provider debugging\n"
+"scl           permissions SecureClassLoader assigns\n"
+"\n"
+"The following can be used with access:\n"
+"\n"
+"stack     include stack trace\n"
+"domain    dumps all domains in context\n"
+"failure   before throwing exception, dump stack\n"
+"          and domain that didn&#39;t have permission\n"
+"\n"
+"Note: Separate multiple options with a comma"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1916
@@ -7537,6 +7908,22 @@
 "   Trust this certificate? [no]:  yes\n"
 "   Certificate was added to keystore"
 msgstr ""
+"$ keytool -import -alias ejb3-ssl -file mycert.cer -keystore localhost."
+"truststore\n"
+"   Enter keystore password:  opensource\n"
+"   Owner: CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, "
+"C=Unknown\n"
+"   Issuer: CN=Unknown, OU=Unknown, O=Unknown, L=Unknown, ST=Unknown, "
+"C=Unknown\n"
+"   Serial number: 43bff927\n"
+"   Valid from: Sat Jan 07 18:23:51 CET 2006 until: Fri Apr 07 19:23:51 CEST "
+"2006\n"
+"   Certificate fingerprints:\n"
+"            MD5:  CF:DC:71:A8:F4:EA:8F:5A:E9:94:E3:E6:5B:A9:C8:F3\n"
+"            SHA1: 0E:AD:F3:D6:41:5E:F6:84:9A:D1:54:3D:DE:A9:B2:01:28:"
+"F6:7C:26\n"
+"   Trust this certificate? [no]:  yes\n"
+"   Certificate was added to keystore"
 
 #. Tag: title
 #: J2EE_Security_On_JBOSS.xml:1945 J2EE_Security_On_JBOSS.xml:1989
@@ -7573,6 +7960,21 @@
 "      &lt;/attribute&gt;\n"
 "   &lt;/mbean&gt;"
 msgstr ""
+"&lt;mbean code=\"org.jboss.remoting.transport.Connector\"\n"
+"      xmbean-dd=\"org/jboss/remoting/transport/Connector.xml\"\n"
+"      name=\"jboss.remoting:type=Connector,transport=socket3843,handler=ejb3"
+"\"&gt;\n"
+"      &lt;depends&gt;jboss.aop:service=AspectDeployer&lt;/depends&gt;\n"
+"      &lt;attribute name=\"InvokerLocator\"&gt;sslsocket://0.0.0.0:3843&lt;/"
+"attribute&gt;\n"
+"      &lt;attribute name=\"Configuration\"&gt;\n"
+"         &lt;handlers&gt;\n"
+"            &lt;handler subsystem=\"AOP\"&gt;\n"
+"             org.jboss.aspects.remoting.AOPRemotingInvocationHandler\n"
+"            &lt;/handler&gt;\n"
+"         &lt;/handlers&gt;\n"
+"      &lt;/attribute&gt;\n"
+"   &lt;/mbean&gt;"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1950 J2EE_Security_On_JBOSS.xml:1990
@@ -7627,6 +8029,13 @@
 "      ...\n"
 "   }"
 msgstr ""
+"@RemoteBinding(clientBindUrl=\"sslsocket://0.0.0.0:3843\", jndiBinding="
+"\"StatefulSSL\"),\n"
+"   @Remote(BusinessInterface.class)\n"
+"   public class StatefulBean implements BusinessInterface\n"
+"   {\n"
+"      ...\n"
+"   }"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1961
@@ -7658,6 +8067,16 @@
 "      ...\n"
 "   }"
 msgstr ""
+"@RemoteBindings({\n"
+"      @RemoteBinding(clientBindUrl=\"sslsocket://0.0.0.0:3843\", jndiBinding="
+"\"StatefulSSL\"),\n"
+"      @RemoteBinding(jndiBinding=\"StatefulNormal\")\n"
+"   })\n"
+"   @Remote(BusinessInterface.class)\n"
+"   public class StatefulBean implements BusinessInterface\n"
+"   {\n"
+"      ...\n"
+"   }"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:1968
@@ -7758,6 +8177,42 @@
 "      &lt;attribute name=\"KeyStoreType\"&gt;JKS&lt;/attribute&gt;\n"
 "   &lt;/mbean&gt;"
 msgstr ""
+"&lt;!-- This section is for custom (SSL) server socket factory  --&gt;\n"
+"   &lt;mbean code=\"org.jboss.remoting.security.SSLSocketBuilder\"\n"
+"      name=\"jboss.remoting:service=SocketBuilder,type=SSL\"\n"
+"      display-name=\"SSL Server Socket Factory Builder\"&gt;\n"
+"      &lt;!-- IMPORTANT - If making ANY customizations, this MUST be set to "
+"false. --&gt;\n"
+"      &lt;!-- Otherwise, will used default settings and the following "
+"attributes will be ignored. --&gt;\n"
+"      &lt;attribute name=\"UseSSLServerSocketFactory\"&gt;false&lt;/"
+"attribute&gt;\n"
+"      &lt;!-- This is the url string to the key store to use --&gt;\n"
+"      &lt;attribute name=\"KeyStoreURL\"&gt;localhost.keystore&lt;/"
+"attribute&gt;\n"
+"      &lt;!-- The password for the key store --&gt;\n"
+"      &lt;attribute name=\"KeyStorePassword\"&gt;sslsocket&lt;/"
+"attribute&gt;\n"
+"      &lt;!-- The password for the keys (will use KeystorePassword if this "
+"is not set explicitly. --&gt;\n"
+"      &lt;attribute name=\"KeyPassword\"&gt;sslsocket&lt;/attribute&gt;\n"
+"      &lt;!-- The protocol for the SSLContext.  Default is TLS. --&gt;\n"
+"      &lt;attribute name=\"SecureSocketProtocol\"&gt;TLS&lt;/attribute&gt;\n"
+"      &lt;!-- The algorithm for the key manager factory.  Default is "
+"SunX509. --&gt;\n"
+"      &lt;attribute name=\"KeyManagementAlgorithm\"&gt;SunX509&lt;/"
+"attribute&gt;\n"
+"      &lt;!-- The type to be used for the key store. --&gt;\n"
+"      &lt;!-- Defaults to JKS.  Some acceptable values are JKS (Java "
+"Keystore - Sun's keystore format), --&gt;\n"
+"      &lt;!-- JCEKS (Java Cryptography Extension keystore - More secure "
+"version of JKS), and --&gt;\n"
+"      &lt;!-- PKCS12 (Public-Key Cryptography Standards #12 \n"
+"                 keystore - RSA's Personal Information Exchange Syntax "
+"Standard). --&gt;\n"
+"      &lt;!-- These are not case sensitive. --&gt;\n"
+"      &lt;attribute name=\"KeyStoreType\"&gt;JKS&lt;/attribute&gt;\n"
+"   &lt;/mbean&gt;"
 
 #. Tag: programlisting
 #: J2EE_Security_On_JBOSS.xml:1997
@@ -7772,6 +8227,14 @@
 "type=SSL&lt;/depends&gt;\n"
 "  &lt;/mbean&gt;"
 msgstr ""
+"&lt;mbean code=\"org.jboss.remoting.security.SSLServerSocketFactoryService"
+"\"\n"
+"     name=\"jboss.remoting:service=ServerSocketFactory,type=SSL\"\n"
+"     display-name=\"SSL Server Socket Factory\"&gt;\n"
+"     &lt;depends optional-attribute-name=\"SSLSocketBuilder\"\n"
+"        proxy-type=\"attribute\"&gt;jboss.remoting:service=SocketBuilder,"
+"type=SSL&lt;/depends&gt;\n"
+"  &lt;/mbean&gt;"
 
 #. Tag: para
 #: J2EE_Security_On_JBOSS.xml:2002




More information about the jboss-cvs-commits mailing list