User authentication and authorization examples

This section provides examples that show user authentication and authorization in Derby in either a client/server environment or in an embedded environment.

Related concepts
Configuring security for your environment
Working with user authentication
Encrypting databases on disk
Signed jar files
Notes on the Derby security features
Running Derby under a security manager