User guide
J2EE Application
1-5
J2EE Application
This section gives an overview of security risks in J2EE applications.
Generally, a J2EE application performs operations with client programs using various components. The
client program of a J2EE application is sometimes executed as an independent Java program and
sometimes via a Web browser. When it is executed via a Web browser, a Web server mediates the
operation. The Web server is generally located in a Demilitarized Zone (DMZ) so that accesses to the
Web browser and intranet area go through a firewall.
Resources to be Protected
This section describes the resources to be protected when a general J2EE application is used.
Functions Used for Operation of J2EE Applications
The following functions require security for operation of a general J2EE application:
• User authentication
• Connection to Web server
• Invocation of Servlet (when an V5.0.1 or earlier version of Servlet service is used)
• Invocation of EJB (during operation in old version compatible environments)
• Invocation of Servlet and EJB
• Reading data from a database
• Writing data to a database
• Operating environment setup for Web Server
• Execution environment setup for Servlet (when an V5.0.1 or earlier version of Servlet service is
used)
• Execution environment setup for EJB (during operation in old version compatible environments)
• Execution environment setup for Servlet and EJB
• Deployment of a J2EE application