User authentication examples using SQL authorization

These examples show how to use SQL authorization in conjunction with Derby's built-in user authentication and user authorization.

Important: Derby's built-in authentication mechanism is suitable only for development and testing purposes. It is strongly recommended that production systems rely on LDAP or a user-defined class for authentication. It is also strongly recommended that production systems protect network connections with SSL/TLS.

These examples are based on the examples in User authentication and authorization client example and User authentication and authorization embedded example.