Putting it all together

This section shows how to enable all available Derby defenses.

This example uses Java security, SSL encryption, NATIVE authentication, and both coarse-grained and fine-grained authorization.

Related concepts
Basic security configuration tasks
Configuring database encryption
Using signed jar files
Configuring SSL/TLS
Understanding identity in Derby
Configuring user authentication
Configuring user authorization
Configuring Java security
Restricting file permissions