User guide
Security System Guide - Preface
iv
Organization of this Document
This document is organized as follows:
Part I Security Risks and Measures
• Chapter 1 Security Risks
This chapter explains security risks.
• Chapter 2 Security Measures
This chapter explains security measures.
Part II Authentication and Access Control
• Chapter 3 Authentication and Access Control for the Interstage HTTP Server
This chapter explains how to use the authentication and access control for the Interstage HTTP
Server.
Part III Firewall and Proxy Server
• Chapter 4 HTTP Tunneling
This chapter explains how to use HTTP tunneling.
• Chapter 5 HTTP Tunneling of J2EE
This chapter explains how to use HTTP tunneling with J2EE.
• Chapter 6 Linkage of the Proxy
This chapter explains proxy linkage.
Part IV Authentication and Encrypted Communications through Support for SSL
• Chapter 7 Setting and Use of the Interstage Certificate Environment
This chapter explains setting of the Interstage Certificate Environment ,and use of it.
• Chapter 8 Setting and Use of the Certificate/Key Management Environment Using the SMEE
Command
This chapter explains setting of the Certificate/Key Management Environment by the SMEE
command, and the use of it.
• Chapter 9 How to Use SSL with Interstage HTTP Server
This chapter explains how to use SSL with the Interstage HTTP Server
• Chapter 10 How to Use SSL with the CORBA Service
This chapter explains how to use SSL with the CORBA Service.
• Chapter 11 How to Use SSL with J2EE
This chapter explains how to use SSL with J2EE.
• Chapter 12 How to Use SSL with Smart Repository
This chapter explains how to Use SSL with Smart Repository.