Uses of Package
javax.security.auth.message.config

Packages that use javax.security.auth.message.config
javax.security.auth.message.config This package defines the interfaces implemented by JSR 196 compatible configuration systems. 
 

Classes in javax.security.auth.message.config used by javax.security.auth.message.config
AuthConfig
          This interface defines the common functionality implemented by Authentication context configuration objects.
AuthConfigFactory
          This class is used to obtain AuthConfigProvider objects that can be used to obtain authentication context configuration objects, that is, ClientAuthConfig and ServerAuthConfig objects.
AuthConfigFactory.RegistrationContext
          Represents the layer identifier, application context identifier, and description components of an AuthConfigProvider registration at the factory.
AuthConfigProvider
          This interface is implemented by objects that can be used to obtain authentication context configuration objects, that is, ClientAuthConfig or ServerAuthConfig objects.
ClientAuthConfig
          This interface encapsulates the configuration of ClientAuthContext objects for a message layer and application context (for example, the messaging context of a specific application, or set of applications).
ClientAuthContext
          This ClientAuthContext class encapsulates ClientAuthModules that are used to secure service requests made by a client, and to validate any responses received to those requests.
RegistrationListener
          An implementation of this interface may be associated with an AuthConfigProvider registration at an AuthConfigFactory at the time the AuthConfigProvider is obtained for use from the factory.
ServerAuthConfig
          This interface describes a configuration of ServerAuthConfiguration objects for a message layer and application context (for example, the messaging context of a specific application, or set of applications).
ServerAuthContext
          This ServerAuthContext class encapsulates ServerAuthModules that are used to validate service requests received from clients, and to secure any response returned for those requests.
 



Copyright © 2005-2015 Oracle Corporation. All Rights Reserved.