User authentication and authorization examples

This section provides examples on using user authentication and authorization in Derby in either a client/server environment or in an embedded environment.

Related concepts
Configuring security for your environment
Working with user authentication
Encrypting databases on disk
Signed jar files
Notes on the Derby security features
Running Derby under a security manager