This procedure requires a system with multiple databases and some
administrative resources.
- Configure security features as system properties. See Tuning Derby.
- Provide administrative-level protection for the derby.properties file
and Derby databases. For
example, you can protect these files and directories with operating system
permissions and firewalls.
- Turn on user authentication for your system. All users must provide
valid user IDs and passwords to access the Derby system.
If you are using Derby's
built-in users, configure users for the system in the derby.properties file.
Provide the protection for this file.
- Configure user authorization for sensitive databases in your system.
Only designated users will be able to access sensitive databases. You typically
configure user authorization with database-level properties. It is also possible
to configure user authorization with system-level properties. This is useful
when you are developing systems or when all databases have the same level
of sensitivity.
- Check and if necessary configure your Derby network security
according to your environment. See the section "Network client security" in the
Derby Server and Administration Guide.