Configuring security in a client/server environment This procedure requires a system with multiple databases and some administrative resources. Configure security features as system properties. See and . Provide administrative-level protection for the derby.properties file and databases. For example, you can protect these files and directories with operating system permissions and firewalls. Turn on user authentication for your system. All users must provide valid user IDs and passwords to access the system. If you are using 's built-in users, configure users for the system in the derby.properties file. Provide the protection for this file.

's built-in authentication mechanism is suitable only for development and testing purposes. It is strongly recommended that production systems rely on LDAP or a user-defined class for authentication. It is also strongly recommended that production systems protect network connections with SSL/TLS.

Configure user authorization for sensitive databases in your system. Only designated users will be able to access sensitive databases. You typically configure user authorization with database-level properties. It is also possible to configure user authorization with system-level properties. This is useful when you are developing systems or when all databases have the same level of sensitivity. Check and if necessary configure your Derby network security according to your environment. See the section "Network client security" in the .