Newsletter sign-up
View all newsletters

Enterprise Java Newsletter
Stay up to date on the latest tutorials and Java community news posted on JavaWorld

Sponsored Links

Optimize with a SATA RAID Storage Solution
Range of capacities as low as $1250 per TB. Ideal if you currently rely on servers/disks/JBODs

Construct secure networked applications with certificates, Part 3

Use the Java CRL and X509CRL classes

  • Print
  • Feedback

Page 4 of 4

Conclusion

You now know how to use certificates, which are useful for establishing your identity online, and CRLs, which are useful when the private key that protects your certificate falls into the wrong hands. Now that you understand both certificates and CRLs, and the Java APIs that manipulate them, you're ready to put them to use. In Part 4 of this series, you'll look at practical applications for the certificates in your projects.

About the author

Todd Sundsted has been writing programs since computers became available in desktop models. Though originally interested in building distributed applications in C++, Todd moved on to the Java programming language when it became the obvious choice for that sort of thing. In addition to writing, Todd is cofounder and chief architect of PointFire.

Read more about Tools & Methods in JavaWorld's Tools & Methods section.

  • Print
  • Feedback

Resources