This API is intended for use by application developers who need to secure RMI communication for remote Java objects. Default socket factories employed by Java remote objects provide a non-secure implementation. If developers have remote objects which exchange sensitive data, there is a need to provide the capability to provide for secure communication with remote clients.
Java applications may also need to be able to control the level of security they provide to their consumer. Some applications may desire to fully secure their remote objects while others may not require remote object security. Others may fall somewhere in between where they need to secure some remote objects which exchange sensitive data and employ non-secure communications for other remote objects which do not represent a security risk. In summary, we may encounter the following scenarios:
When a Java remote object is exported to the RMI system, it may optionally designate the RMI client and/or server socket factories. Sun's default implementation is to employ non-secure sockets.
This API provides the capability for an application developer to designate that all or some of its remote objects use secure socket factories provided by Sun's Java Secure Socket Extension (JSSE) implementation. Note that JSSE is not available in some locales where banned by U.S. export policy.
The approach taken by this API is to permit an application's remote
objects component to obtain its RMI socket factories from an instance of
SSLRMISocketFactories. The default configuration
is to not use secure sockets, but an application may enable security by
initializing the SSLRMISocketFactories
object with the desired
SSL RMI configuration prior to executing
any code which obtains socket factories.
This configuration specifies the security mode (None, All, Some) and other
parameters necessary to initialize an SSL context. Refer to the documentation
for SSLRMIConfiguration for additional details.
Remote object implementations will then obtain its RMI client and server socket factories from the SSLRMISocketFactories instance. Socket factories may be obtained based upon their fully-qualified Java class name which provides the capability to selectively employ a secure socket factory implementation based upon the application's security needs. A default selection policy configuration is packaged with the sas.core.net.jar file, but may be overridden by an application if necessary. Refer to the documentation for SSLRMIConfiguration for additional details.
For example, if the selection policy configuration specifies that class com.sas.xxx.MyRemoteObject requires security then secure socket factories will be provided. If an explicit entry does not match the fully qualified class name, then a process is initiated whereby the suffix is dropped to obtain the parenting package name. A check is then made to determine if a selection policy is specified for this package. This process continues until either a policy is defined for a package or until there are no more packages to test.
The Java Secure Socket Extension (JSSE) Reference Guide presents information from an application developer's perspective on securing Java remote objects.
In order to use SSL to secure RMI communication for remote Java objects, one must configure the JRE's key store and its trust store to meet the application's authentication needs. The two typical configuration scenarios and procedures necessary to configure the JRE are discussed in the Configuring the JRE for JSSE document.
jsse.jar
in order to use SSL.javax.net.debug