Java
Java SE
Technologies
Java security technology includes a large set of APIs, tools, and implementations of commonly used security algorithms, mechanisms, and protocols. The Java security APIs span a wide range of areas, including cryptography, public key infrastructure, secure communication, authentication, and access control. Java security technology provides the developer with a comprehensive security framework for writing applications, and also provides the user or administrator with a set of tools to securely manage applications.
Java SE Security Documentation: Java SE 8 | Java SE 7 | Java SE 6 | J2SE 5.0
|
Underlying the Java SE Platform is a dynamic, extensible security architecture, standards-based and interoperable. Security features — cryptography, authentication and authorization, public key infrastructure, and more — are built in. The Java security model is based on a customizable "sandbox" in which Java software programs can run safely, without potential risk to systems or users.
The table below describes each security feature in more detail and points you to resources with more information.
See the Java SE 8 Security Documentation for further information on the security features and changes for the current release.
|
High-level Features |
Low-level Features |
Benefits |
References |
|---|---|---|---|
|
Platform Security |
Built-in language security features enforced by the Java compiler and virtual machine:
|
Provides a safe and secure platform for developing and running applications. Compile-time data type checking and automatic memory management leads to more robust code and reduces memory corruption and vulnerabilities. Bytecode verification ensures code conforms to the JVM specification and prevents hostile code from corrupting the runtime environment. Class loaders ensure that untrusted code cannot interfere with the running of other Java programs. |
|
|
Cryptography |
|
Provides an extensible, full featured API for building secure applications:
|
|
|
Authentication and Access Control |
|
Enables single sign-on of multiple authentication mechanisms and fine-grained access to resources based on the identity of the user or code signer. Recent support (in JDK 5) for timestamped signatures makes it easier to deploy signed code by avoiding the need to re-sign code when the signer's certificate expires. |
|
|
Secure Communications |
APIs and implementations for the following standards-based secure communications protocols: Transport Layer Security (TLS), Secure Sockets Layer (SSL), Kerberos (accessible through GSS-API), and the Simple Authentication and Security Layer (SASL). Full support for HTTPS over SSL/TLS is also included. |
Authenticates peers over an untrusted network and protects the integrity and privacy of data transmitted between them. |
|
|
Public Key Infrastructure (PKI) |
Tools for managing keys and certificates and comprehensive, abstract APIs with support for the following features and algorithms:
|
Eases the development and deployment of complex PKI applications. Recent support (in JDK 5) for OCSP provides a more scalable and timely method for applications to check certificate revocation status. |
|
Java SDKs and Tools
|
||
Java Resources | ||