This section shows how to enable all available Derby defenses.
This example uses SSL encryption, NATIVE authentication, and both coarse-grained and fine-grained authorization.