User authentication and authorization examples

This section provides examples that show user authentication and authorization in Derby in either a client/server environment or in an embedded environment.

Related concepts
Identity in Derby
Basic security configuration tasks
Working with user authentication
Users and authorization identifiers
User authorizations
Encrypting databases on disk
Signed jar files
Notes on the Derby security features
Running Derby under a security manager