Running Derby under a security manager

When running within an application or application server with a Java 2 Security Manager enabled, Derby must be granted certain permissions to execute and access database files.

For more information about permissions and examples of creating permission objects and granting permissions, see the Security Architecture specification at

Related concepts
Configuring security for your environment
Working with user authentication
Users and authorization identifiers
User authorization
Encrypting databases on disk
Signed jar files
Notes on the Derby security features
User authentication and authorization examples