JADE Security Section [JadeSecurity]
The [JadeSecurity] section of the JADE initialization file contains parameters that:
-
Enable the JADE authentication and encryption hooks
-
Provide security access to tasks in your JADE development environment
With the exception of schema source file encryption and JADE development environment security that are disabled by default, all other security elements are enabled by default. For details about JADE security, see "
The security parameters are server‑driven; that is, if they are configured on a server‑capable node, client nodes attaching to the server must conform to the security requirements. If the security parameters are altered on a client node, security cannot be breached.
This server and client security enforcement assumes that the environment hosting a JADE server node prevents unauthorized tampering with this configuration, either directly by physical access or indirectly by remote access. This level of security can be achieved by using file security.
All parameters in this section are read when the database is next initialized; for example, when you restart the database server.
The [JadeSecurity] section can contain the following parameters.