db-derby-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From chaa...@apache.org
Subject svn commit: r1401740 - in /db/derby/docs/trunk/src/devguide: cdevcsecure12392.dita cdevcsecuree.dita cdevcsecureidentity.dita derbydev.ditamap tdevcsecure81850.dita tdevcsecure82556.dita
Date Wed, 24 Oct 2012 15:46:52 GMT
Author: chaase3
Date: Wed Oct 24 15:46:51 2012
New Revision: 1401740

URL: http://svn.apache.org/viewvc?rev=1401740&view=rev
Log:
DERBY-5928  Add more task focus to Derby security documentation

Modified 4 Developer's Guide topics and added a new one. 

Patch: DERBY-5928.diff

Added:
    db/derby/docs/trunk/src/devguide/cdevcsecureidentity.dita   (with props)
Modified:
    db/derby/docs/trunk/src/devguide/cdevcsecure12392.dita
    db/derby/docs/trunk/src/devguide/cdevcsecuree.dita
    db/derby/docs/trunk/src/devguide/derbydev.ditamap
    db/derby/docs/trunk/src/devguide/tdevcsecure81850.dita
    db/derby/docs/trunk/src/devguide/tdevcsecure82556.dita

Modified: db/derby/docs/trunk/src/devguide/cdevcsecure12392.dita
URL: http://svn.apache.org/viewvc/db/derby/docs/trunk/src/devguide/cdevcsecure12392.dita?rev=1401740&r1=1401739&r2=1401740&view=diff
==============================================================================
--- db/derby/docs/trunk/src/devguide/cdevcsecure12392.dita (original)
+++ db/derby/docs/trunk/src/devguide/cdevcsecure12392.dita Wed Oct 24 15:46:51 2012
@@ -19,7 +19,7 @@ See the License for the specific languag
 limitations under the License.
 -->
 <concept id="cdevcsecure12392" xml:lang="en-us">
-<title>Configuring security for your environment</title>
+<title>Basic security configuration tasks</title>
 <shortdesc>In most cases, you enable <ph conref="../conrefs.dita#prod/productshortname"></ph>'s
 security features through the use of properties. It is important to understand
 the best way of setting properties for your environment.</shortdesc>

Modified: db/derby/docs/trunk/src/devguide/cdevcsecuree.dita
URL: http://svn.apache.org/viewvc/db/derby/docs/trunk/src/devguide/cdevcsecuree.dita?rev=1401740&r1=1401739&r2=1401740&view=diff
==============================================================================
--- db/derby/docs/trunk/src/devguide/cdevcsecuree.dita (original)
+++ db/derby/docs/trunk/src/devguide/cdevcsecuree.dita Wed Oct 24 15:46:51 2012
@@ -1,5 +1,4 @@
 <?xml version="1.0" encoding="utf-8"?>
- 
 <!DOCTYPE concept PUBLIC "-//OASIS//DTD DITA Concept//EN"
  "../dtd/concept.dtd">
 <!-- 
@@ -19,108 +18,74 @@ See the License for the specific languag
 limitations under the License.
 -->
 <concept id="cdevcsecuree" xml:lang="en-us">
-<title>Derby and security</title>
+<title>Configuring security for
+<ph conref="../conrefs.dita#prod/productshortname"></ph></title>
 <shortdesc><ph conref="../conrefs.dita#prod/productshortname"></ph> can
be
-deployed in a number of ways and in a number of different environments. The
-security needs of the <ph conref="../conrefs.dita#prod/productshortname"></ph>
system
-are also diverse.</shortdesc>
+deployed in a number of ways and in a number of different environments, ranging
+from a single-user deployment for small-scale development and testing to a
+multi-user deployment of a large database. For all but the smallest deployments,
+however, it is essential to make the
+<ph conref="../conrefs.dita#prod/productshortname"></ph> system secure.</shortdesc>
 <prolog><metadata>
 <keywords><indexterm>user authentication<indexterm>definition</indexterm></indexterm>
-<indexterm>authentication<indexterm>definition</indexterm></indexterm><indexterm>disk
-encryption</indexterm><indexterm>encrypting databases</indexterm></keywords>
+<indexterm>authentication<indexterm>definition</indexterm></indexterm>
+<indexterm>disk encryption<indexterm>definition</indexterm></indexterm>
+<indexterm>encrypting databases<indexterm>definition</indexterm></indexterm></keywords>
 </metadata></prolog>
 <conbody>
-<p><ph conref="../conrefs.dita#prod/productshortname"></ph> supplies or
supports
-the following optional security mechanisms:</p>
-<ul>
-<li><i>Authentication</i>
-<p>Authentication determines whether you are a legal user. It establishes your
-identity. <ph conref="../conrefs.dita#prod/productshortname"></ph> verifies
-user names and passwords before permitting access to the
+<p>To secure a <ph conref="../conrefs.dita#prod/productshortname"></ph>
+database or databases, take the following steps.</p>
+<ol>
+<li>Understand the concept of identity in
+<ph conref="../conrefs.dita#prod/productshortname"></ph>.
+<p>See <xref href="cdevcsecureidentity.dita#cdevcsecureidentity"></xref>
for
+details.</p></li>
+<li>Understand the basic tasks involved in configuring security in a
+client-server environment or an embedded environment.
+<p>See <xref href="cdevcsecure12392.dita#cdevcsecure12392"></xref> for
+details.</p></li>
+<li>Configure <i>authentication</i> by setting up users and passwords.
+<p>Authentication determines whether someone is a legal user. It establishes
+a user's identity. <ph conref="../conrefs.dita#prod/productshortname"></ph>
+verifies user names and passwords before permitting access to the
 <ph conref="../conrefs.dita#prod/productshortname"></ph> system.</p>
 <p>For more information about authentication, see
 <xref href="cdevcsecure42374.dita#cdevcsecure42374"></xref>.</p></li>
-<li><i>Authorization</i>
-<p>Authorization determines what operations can be performed by you, that is, by
-your <ph conref="../conrefs.dita#prod/productshortname"></ph> identity. 
+<li>Configure <i>user authorization</i> for the system.
+<p>Authorization determines what operations can be performed by a user's
+<ph conref="../conrefs.dita#prod/productshortname"></ph> identity. 
 Authorization grants users or roles permission to read a database or to write
 to a database.</p>
 <p>For more information about authorization, see
 <xref href="cdevcsecure36595.dita#cdevcsecure36595"></xref>.</p></li>
-<li><i>Disk encryption</i>
+<li>Encrypt your databases.
 <p><ph conref="../conrefs.dita#prod/productshortname"></ph> provides ways
to
 encrypt data stored on disk.</p>
 <p>For more information about encryption, see
 <xref href="cdevcsecure24366.dita#cdevcsecure24366"></xref>.</p></li>
-<li><i>Validation of certificates for signed jar files</i>
+<li>Sign any jar files that you use in your databases.
 <p><ph conref="../conrefs.dita#prod/productshortname"></ph> validates
 certificates for classes loaded from signed jar files.</p>
 <p>For more information about using signed jar files, see
 <xref href="cdevcsecure90988.dita#cdevcsecure90988"></xref>.</p></li>
-<li><i>Network encryption and authentication</i>
-<p><ph conref="../conrefs.dita#prod/productshortname"></ph> network traffic
may
-be encrypted with SSL/TLS. SSL/TLS certificate authentication is also supported.
-See "Network encryption and authentication with SSL/TLS" in the
-<ph conref="../conrefs.dita#pub/citadmin"></ph> for details.</p></li>

-</ul>
+<li>Encrypt network traffic with SSL/TLS.
+<p>SSL/TLS certificate authentication is also supported. See
+"Network encryption and authentication with SSL/TLS" in the
+<ph conref="../conrefs.dita#pub/citadmin"></ph> for details.</p></li>
+<li>Customize the default security policy.
+<p>For details, see <xref href="cdevcbabejdfj.dita#cdevcbabejdfj"></xref>,
and
+see "Running the Network Server under the security manager" in the
+<ph conref="../conrefs.dita#pub/citadmin"></ph>.</p></li>
+<li>If necessary, restrict database file access to the operating system account
+that started the JVM.
+<p>For details, see "Controlling database file access" in the
+<ph conref="../conrefs.dita#pub/citadmin"></ph>.</p></li>
+</ol>
 <p>The section "Derby Network Server advanced topics" in the
 <ph conref="../conrefs.dita#pub/citadmin"></ph> has more information on
 security issues. The <ph conref="../conrefs.dita#pub/citref"></ph> describes
 many security-related properties and system procedures, as well as such
 statements as GRANT, REVOKE, CREATE ROLE, DROP ROLE, CREATE PROCEDURE, and
 CREATE FUNCTION.</p>
-<section><title>Identity in
-<ph conref="../conrefs.dita#prod/productshortname"></ph></title>
-<p><ph conref="../conrefs.dita#prod/productshortname"></ph> provides two
-kinds of identity:</p>
-<ul>
-<li><i>System-wide identity</i>: Currently, any legal system-wide identity
-enjoys authorization to perform the following operations:
-<ul>
-<li>Create databases</li>
-<li>Restore databases</li>
-<li>Shut down the <ph conref="../conrefs.dita#prod/productshortname"></ph>
-engine</li>
-</ul>
-</li>
-<li><i>Database-specific identity</i>: If you are a legal identity in a
specific
-database, you may enjoy the following rights:
-<ul>
-<li>You can connect to that database, provided that coarse-grained connection
-authorization has not been set to <i>noAccess</i>.</li>
-<li>You can shut down that database, encrypt it, and upgrade it, provided that
-you are the database owner.</li>
-<li>You can create your own SQL objects and write data to your own tables,
-provided that your coarse-grained connection authorization has not been set to
-<i>readOnlyAccess</i>.</li>
-<li>You can access other SQL objects, provided that the owners have granted you
-fine-grained SQL access to those objects, and provided you have not been limited
-by coarse-grained <i>readOnlyAccess</i>.</li>
-</ul>
-</li>
-</ul>
-<p>The distinction between fine-grained SQL authorization and coarse-grained
-connection organization is described in
-<xref href="cdevcsecure36595.dita#cdevcsecure36595"></xref>.</p>
-</section>
-<section><title>Security mechanisms in action</title>
-<p>The following figure shows some of the <ph conref="../conrefs.dita#prod/productshortname"></ph>
security
-mechanisms at work in a client/server environment. User authentication is
-performed by accessing an LDAP directory service. The data in the database
-is not encrypted in this trusted environment.</p>
-<fig expanse="column"><title>Using an LDAP directory service in a trusted
-environment</title>
-<image href="security_os.gif" placement="break"><alt>This figure shows user authentication
from an LDAP directory service to the Derby engine, and user authorization to read and write
data. The Derby database is a trusted environment, and the data is not encrypted.</alt>
-</image>
-</fig>
-<p>The following figure shows how another <ph conref="../conrefs.dita#prod/productshortname"></ph>
security
-mechanism, disk encryption, protects data when the recipient might not know
-how to protect data. It is useful for databases deployed in an embedded
-environment.</p>
-<fig expanse="column"><title>Using disk encryption to protect data</title>
-<image href="security2_os.gif" placement="break"><alt>This figure shows disk
encryption between the Derby engine and the database.</alt>
-</image>
-</fig>
-</section>
 </conbody>
 </concept>

Added: db/derby/docs/trunk/src/devguide/cdevcsecureidentity.dita
URL: http://svn.apache.org/viewvc/db/derby/docs/trunk/src/devguide/cdevcsecureidentity.dita?rev=1401740&view=auto
==============================================================================
--- db/derby/docs/trunk/src/devguide/cdevcsecureidentity.dita (added)
+++ db/derby/docs/trunk/src/devguide/cdevcsecureidentity.dita Wed Oct 24 15:46:51 2012
@@ -0,0 +1,64 @@
+<?xml version="1.0" encoding="utf-8"?>
+<!DOCTYPE concept PUBLIC "-//OASIS//DTD DITA Concept//EN"
+ "../dtd/concept.dtd">
+<!-- 
+Licensed to the Apache Software Foundation (ASF) under one or more
+contributor license agreements.  See the NOTICE file distributed with
+this work for additional information regarding copyright ownership.
+The ASF licenses this file to You under the Apache License, Version 2.0
+(the "License"); you may not use this file except in compliance with
+the License.  You may obtain a copy of the License at      
+
+   http://www.apache.org/licenses/LICENSE-2.0  
+
+Unless required by applicable law or agreed to in writing, software  
+distributed under the License is distributed on an "AS IS" BASIS,  
+WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.  
+See the License for the specific language governing permissions and  
+limitations under the License.
+-->
+<concept id="cdevcsecureidentity" xml:lang="en-us">
+<title>Identity in <ph conref="../conrefs.dita#prod/productshortname"></ph></title>
+<shortdesc><ph conref="../conrefs.dita#prod/productshortname"></ph> provides
two
+kinds of identity, <i>system-wide identity</i> and
+<i>database-specific identity</i>.</shortdesc>
+<prolog><metadata>
+<keywords>
+<indexterm>identity<indexterm>system-wide</indexterm></indexterm>
+<indexterm>identity<indexterm>database-specific</indexterm></indexterm>
+</keywords>
+</metadata></prolog>
+<conbody>
+<section>
+<ul>
+<li>System-wide identity: Currently, any legal system-wide identity enjoys
+authorization to perform the following operations:
+<ul>
+<li>Create databases</li>
+<li>Restore databases</li>
+<li>Shut down the <ph conref="../conrefs.dita#prod/productshortname"></ph>
+engine</li>
+</ul>
+</li>
+<li>Database-specific identity: If you are a legal identity in a specific
+database, you may enjoy the following rights:
+<ul>
+<li>You can connect to that database, provided that coarse-grained connection
+authorization has not been set to <i>noAccess</i>.</li>
+<li>You can shut down that database, encrypt it, and upgrade it, provided that
+you are the database owner.</li>
+<li>You can create your own SQL objects and write data to your own tables,
+provided that your coarse-grained connection authorization has not been set to
+<i>readOnlyAccess</i>.</li>
+<li>You can access other SQL objects, provided that the owners have granted you
+fine-grained SQL access to those objects, and provided you have not been limited
+by coarse-grained <i>readOnlyAccess</i>.</li>
+</ul>
+</li>
+</ul>
+<p>The distinction between fine-grained SQL authorization and coarse-grained
+connection organization is described in
+<xref href="cdevcsecure36595.dita#cdevcsecure36595"></xref>.</p>
+</section>
+</conbody>
+</concept>

Propchange: db/derby/docs/trunk/src/devguide/cdevcsecureidentity.dita
------------------------------------------------------------------------------
    svn:eol-style = native

Modified: db/derby/docs/trunk/src/devguide/derbydev.ditamap
URL: http://svn.apache.org/viewvc/db/derby/docs/trunk/src/devguide/derbydev.ditamap?rev=1401740&r1=1401739&r2=1401740&view=diff
==============================================================================
--- db/derby/docs/trunk/src/devguide/derbydev.ditamap (original)
+++ db/derby/docs/trunk/src/devguide/derbydev.ditamap Wed Oct 24 15:46:51 2012
@@ -193,7 +193,6 @@ limitations under the License.
 </topicref>
 <topicref href="cdevadvjdbc41138.dita" navtitle="Offering connection choices to the user">
 </topicref>
-<topicref href="cdevcsecuree.dita" navtitle="Derby and Security"></topicref>
 </relcell>
 </relrow>
 <relrow>
@@ -1103,151 +1102,6 @@ limitations under the License.
 </relrow>
 <relrow>
 <relcell>
-<topicref href="cdevcsecure12392.dita" navtitle="Configuring security for your environment">
-</topicref>
-</relcell>
-<relcell>
-<topicref href="cdevcsecure42374.dita" navtitle="Working with user authentication">
-</topicref>
-<topicref href="cdevcsecure37241.dita" navtitle="Users and authorization identifiers">
-</topicref>
-<topicref href="cdevcsecure36595.dita" navtitle="User authorizations"></topicref>
-<topicref href="cdevcsecure24366.dita" navtitle="Encrypting databases on disk">
-</topicref>
-<topicref href="cdevcsecure90988.dita" navtitle="Signed jar files"></topicref>
-<topicref href="cdevcsecure10983.dita" navtitle="Notes on the Derby security features">
-</topicref>
-<topicref href="cdevcsecure51876.dita" navtitle="User authentication and authorization
examples">
-</topicref>
-<topicref href="cdevcbabejdfj.dita" navtitle="Running Derby under a security manager">
-</topicref>
-</relcell>
-</relrow>
-<relrow>
-<relcell>
-<topicref href="tdevcsecure82556.dita" navtitle="Configuring security in a client/server
environment">
-</topicref>
-<topicref href="tdevcsecure81850.dita" navtitle="Configuring security in an embedded environment">
-</topicref>
-</relcell>
-<relcell>
-<topicref href="cdevcsecure42374.dita" navtitle="Working with user authentication">
-</topicref>
-<topicref href="cdevcsecure36595.dita" navtitle="User authorizations"></topicref>
-</relcell>
-</relrow>
-<relrow>
-<relcell>
-<topicref href="cdevcsecure42374.dita" navtitle="Working with user authentication">
-</topicref>
-</relcell>
-<relcell>
-<topicref href="cdevcsecure37241.dita" navtitle="Users and authorization identifiers">
-</topicref>
-<topicref href="cdevcsecure36595.dita" navtitle="User authorizations"></topicref>
-<topicref href="cdevcsecure24366.dita" navtitle="Encrypting databases on disk">
-</topicref>
-<topicref href="cdevcsecure90988.dita" navtitle="Signed jar files"></topicref>
-<topicref href="cdevcsecure10983.dita" navtitle="Notes on the Derby security features">
-</topicref>
-<topicref href="cdevcsecure51876.dita" navtitle="User authentication and authorization
examples">
-</topicref>
-<topicref href="cdevcbabejdfj.dita" navtitle="Running Derby under a security manager">
-</topicref>
-</relcell>
-</relrow>
-<relrow>
-<relcell>
-<topicref href="cdevcsecure37241.dita" navtitle="Users and authorization identifiers">
-</topicref>
-</relcell>
-<relcell>
-<topicref href="cdevcsecure36595.dita" navtitle="User authorizations"></topicref>
-<topicref href="cdevcsecure24366.dita" navtitle="Encrypting databases on disk">
-</topicref>
-<topicref href="cdevcsecure90988.dita" navtitle="Signed jar files"></topicref>
-<topicref href="cdevcsecure10983.dita" navtitle="Notes on the Derby security features">
-</topicref>
-<topicref href="cdevcbabejdfj.dita" navtitle="Running Derby under a security manager">
-</topicref>
-</relcell>
-</relrow>
-<relrow>
-<relcell>
-<topicref href="cdevcsecure36595.dita" navtitle="User authorizations"></topicref>
-</relcell>
-<relcell>
-<topicref href="cdevcsecure24366.dita" navtitle="Encrypting databases on disk">
-</topicref>
-<topicref href="cdevcsecure90988.dita" navtitle="Signed jar files"></topicref>
-<topicref href="cdevcsecure10983.dita" navtitle="Notes on the Derby security features">
-</topicref>
-<topicref href="cdevcbabejdfj.dita" navtitle="Running Derby under a security manager">
-</topicref>
-</relcell>
-</relrow>
-<relrow>
-<relcell>
-<topicref href="cdevcsecure24366.dita" navtitle="Encrypting databases on disk">
-</topicref>
-</relcell>
-<relcell>
-<topicref href="cdevcsecure90988.dita" navtitle="Signed jar files"></topicref>
-<topicref href="cdevcsecure10983.dita" navtitle="Notes on the Derby security features">
-</topicref>
-<topicref href="cdevcsecure51876.dita" navtitle="User authentication and authorization
examples">
-</topicref>
-<topicref href="cdevcbabejdfj.dita" navtitle="Running Derby under a security manager">
-</topicref>
-</relcell>
-</relrow>
-<relrow>
-<relcell>
-<topicref href="cdevcsecure90988.dita" navtitle="Signed jar files"></topicref>
-</relcell>
-<relcell>
-<topicref href="cdevcsecure10983.dita" navtitle="Notes on the Derby security features">
-</topicref>
-<topicref href="cdevcsecure51876.dita" navtitle="User authentication and authorization
examples">
-</topicref>
-<topicref href="cdevcbabejdfj.dita" navtitle="Running Derby under a security manager">
-</topicref>
-</relcell>
-</relrow>
-<relrow>
-<relcell>
-<topicref href="cdevcsecure10983.dita" navtitle="Notes on the Derby security features">
-</topicref>
-</relcell>
-<relcell>
-<topicref href="cdevcsecure51876.dita" navtitle="User authentication and authorization
examples">
-</topicref>
-<topicref href="cdevcbabejdfj.dita" navtitle="Running Derby under a security manager">
-</topicref>
-</relcell>
-</relrow>
-<relrow>
-<relcell>
-<topicref href="cdevcsecure51876.dita" navtitle="User authentication and authorization
examples">
-</topicref>
-</relcell>
-<relcell>
-<topicref href="cdevcbabejdfj.dita" navtitle="Running Derby under a security manager">
-</topicref>
-</relcell>
-</relrow>
-<relrow>
-<relcell>
-<topicref href="tdevcsecure82556.dita" navtitle="Configuring security in a client/server
environment">
-</topicref>
-</relcell>
-<relcell>
-<topicref href="tdevcsecure81850.dita" navtitle="Configuring security in an embedded environment">
-</topicref>
-</relcell>
-</relrow>
-<relrow>
-<relcell>
 <topicref href="cdevcsecurenativeauth.dita" navtitle="Using NATIVE authentication">
 </topicref>
 </relcell>
@@ -1982,8 +1836,10 @@ with updatable result sets"></topicref>
 <topicref href="cdevresman92946.dita" navtitle="Shutting down or creating a database">
 </topicref>
 </topicref>
-<topicref href="cdevcsecuree.dita" navtitle="Derby and Security">
-<topicref href="cdevcsecure12392.dita" navtitle="Configuring security for your environment">
+<topicref collection-type="family" href="cdevcsecuree.dita" navtitle="Configuring security
for Derby">
+<topicref href="cdevcsecureidentity.dita" navtitle="Identity in Derby">
+</topicref>
+<topicref href="cdevcsecure12392.dita" navtitle="Basic security configuration tasks">
 <topicref href="tdevcsecure82556.dita" navtitle="Configuring security in a client/server
environment">
 </topicref>
 <topicref href="tdevcsecure81850.dita" navtitle="Configuring security in an embedded environment">

Modified: db/derby/docs/trunk/src/devguide/tdevcsecure81850.dita
URL: http://svn.apache.org/viewvc/db/derby/docs/trunk/src/devguide/tdevcsecure81850.dita?rev=1401740&r1=1401739&r2=1401740&view=diff
==============================================================================
--- db/derby/docs/trunk/src/devguide/tdevcsecure81850.dita (original)
+++ db/derby/docs/trunk/src/devguide/tdevcsecure81850.dita Wed Oct 24 15:46:51 2012
@@ -41,6 +41,13 @@ are booted, turn on user authentication 
 Use NATIVE authentication or, alternatively, LDAP or a user-defined
 class.</cmd></step>
 </steps>
-<result></result>
+<result><p>The following figure shows how disk encryption protects data when
the
+recipient might not know how to protect data. It is useful for databases
+deployed in an embedded environment.</p>
+<fig expanse="column"><title>Using disk encryption to protect data</title>
+<image href="security2_os.gif" placement="break"><alt>This figure shows disk
encryption between the Derby engine and the database.</alt>
+</image>
+</fig>
+</result>
 </taskbody>
 </task>

Modified: db/derby/docs/trunk/src/devguide/tdevcsecure82556.dita
URL: http://svn.apache.org/viewvc/db/derby/docs/trunk/src/devguide/tdevcsecure82556.dita?rev=1401740&r1=1401739&r2=1401740&view=diff
==============================================================================
--- db/derby/docs/trunk/src/devguide/tdevcsecure82556.dita (original)
+++ db/derby/docs/trunk/src/devguide/tdevcsecure82556.dita Wed Oct 24 15:46:51 2012
@@ -45,6 +45,16 @@ systems protect network connections with
 according to your environment. See the section "Network client security" in the
 <cite><ph conref="../conrefs.dita#pub/citadmin"></ph></cite>.</cmd></step>
 </steps>
-<result></result>
+<result><p>The following figure shows some of the
+<ph conref="../conrefs.dita#prod/productshortname"></ph> security mechanisms
at
+work in a client/server environment. User authentication is performed by
+accessing an LDAP directory service. The data in the database is not encrypted
+in this trusted environment.</p>
+<fig expanse="column"><title>Using an LDAP directory service in a trusted
+environment</title>
+<image href="security_os.gif" placement="break"><alt>This figure shows user authentication
from an LDAP directory service to the Derby engine, and user authorization to read and write
data. The Derby database is a trusted environment, and the data is not encrypted.</alt>
+</image>
+</fig>
+</result>
 </taskbody>
 </task>



Mime
View raw message