You are viewing a plain text version of this content. The canonical link for it is here.
Posted to derby-commits@db.apache.org by sc...@apache.org on 2007/07/06 04:27:54 UTC

svn commit: r553699 - /db/derby/docs/trunk/src/adminguide/cadminappsclientsecurity.dita

Author: scotsmatrix
Date: Thu Jul  5 19:27:53 2007
New Revision: 553699

URL: http://svn.apache.org/viewvc?view=rev&rev=553699
Log:
Derby-2837: Restructured the topic to remove all referne tags and fix the structure to comply with the concept template.. Patch was submitted by me.

Modified:
    db/derby/docs/trunk/src/adminguide/cadminappsclientsecurity.dita

Modified: db/derby/docs/trunk/src/adminguide/cadminappsclientsecurity.dita
URL: http://svn.apache.org/viewvc/db/derby/docs/trunk/src/adminguide/cadminappsclientsecurity.dita?view=diff&rev=553699&r1=553698&r2=553699
==============================================================================
--- db/derby/docs/trunk/src/adminguide/cadminappsclientsecurity.dita (original)
+++ db/derby/docs/trunk/src/adminguide/cadminappsclientsecurity.dita Thu Jul  5 19:27:53 2007
@@ -1,6 +1,7 @@
 <?xml version="1.0" encoding="utf-8"?>
-<!DOCTYPE reference PUBLIC "-//OASIS//DTD DITA Reference//EN"
- "../dtd/reference.dtd">
+
+<!DOCTYPE concept PUBLIC "-//OASIS//DTD DITA Concept//EN"
+ "../dtd/concept.dtd">
 <!-- 
 Licensed to the Apache Software Foundation (ASF) under one or more
 contributor license agreements.  See the NOTICE file distributed with
@@ -9,7 +10,7 @@
 (the "License"); you may not use this file except in compliance with
 the License.  You may obtain a copy of the License at      
 
-   http://www.apache.org/licenses/LICENSE-2.0  
+http://www.apache.org/licenses/LICENSE-2.0  
 
 Unless required by applicable law or agreed to in writing, software  
 distributed under the License is distributed on an "AS IS" BASIS,  
@@ -17,7 +18,8 @@
 See the License for the specific language governing permissions and  
 limitations under the License.
 -->
-<reference id="cadminappsclientsecurity" xml:lang="en-us">
+<!--##### DO NOT CHANGE ANYTHING ABOVE THIS LINE #####-->
+<concept id="cadminappsclientsecurity" xml:lang="en-us">
 <title>Network client security</title>
 <shortdesc>The <ph conref="../conrefs.dita#prod/productshortname"></ph> Network
 Client allows you to select a security mechanism by specifying a value for
@@ -25,9 +27,9 @@
 <prolog><metadata>
 <keywords><indexterm>Network Client security</indexterm></keywords>
 </metadata></prolog>
-<refbody>
-<section><p>You can set the <codeph>securityMechanism</codeph> property in
-one of the following ways:<ul>
+<conbody>
+<p>You can set the <codeph>securityMechanism</codeph> property in one of the
+following ways:<ul>
 <li>When you are using the <codeph>DriverManager</codeph> interface, set <codeph>securityMechanism</codeph> in
 a <codeph>java.util.Properties</codeph> object before you invoke the form
 of the <codeph>getConnection</codeph> method, which includes the <codeph>java.util.Properties</codeph> parameter.</li>
@@ -47,7 +49,7 @@
 <thead>
 <row valign="bottom">
 <entry colname="col1">Security mechanism</entry>
-<entry colname="col2"><codeph>securityMechanism</codeph> property value</entry>
+<entry colname="col2">securityMechanism property value</entry>
 <entry colname="col3">Comments</entry>
 </row>
 </thead>
@@ -64,9 +66,15 @@
 </row>
 <row>
 <entry colname="col1">Strong password substitution</entry>
-<entry colname="col2">ClientDataSource.STRONG_PASSWORD_SUBSTITUTE_SECURITY (0x08)</entry>
-<entry colname="col3">Strong password substitution cannot be used with external 
-Derby authentication schemes (for example, LDAP). Also, this security mechanism uses the SHA1PRNG algorithm to generate a random number that gets exchanged between client and server. If you need to use this security mechanism, make sure that support for the SHA1PRNG algorithm is available in the JCE provider available with your JVM. For example, it is available with JVM version 1.4.1 and higher from Sun and with JVM version 1.4.2 and higher from IBM.</entry>
+<entry colname="col2">ClientDataSource.STRONG_PASSWORD_SUBSTITUTE_SECURITY
+(0x08)</entry>
+<entry colname="col3">Strong password substitution cannot be used with external
+ Derby authentication schemes (for example, LDAP). Also, this security mechanism
+uses the SHA1PRNG algorithm to generate a random number that gets exchanged
+between client and server. If you need to use this security mechanism, make
+sure that support for the SHA1PRNG algorithm is available in the JCE provider
+available with your JVM. For example, it is available with JVM version 1.4.1
+and higher from Sun and with JVM version 1.4.2 and higher from IBM.</entry>
 </row>
 <row>
 <entry colname="col1">Encrypted user id and encrypted password</entry>
@@ -77,6 +85,6 @@
 </row>
 </tbody>
 </tgroup>
-</table></p></section>
-</refbody>
-</reference>
+</table> </p>
+</conbody>
+</concept>
\ No newline at end of file