This section shows how to enable all available Derby defenses.
This example uses Java security, SSL encryption, NATIVE authentication, and both coarse-grained and fine-grained authorization.