| Interface | Description | 
|---|---|
| IntegrityVerifier | Defines the interface for integrity verifiers used by  Security.verifyCodebaseIntegrity, allowing the URLs that provide content integrity to be
 extended. | 
| ProxyPreparer | Performs operations on a newly unmarshalled remote proxy to prepare it for use. | 
| SecurityContext | Interface implemented by objects representing security contexts, returned from the  getContextmethod of theSecurityclass, which in turn may obtain
 them from a security manager or policy provider implementing theSecurityContextSourceinterface. | 
| TrustVerifier | Defines the interface for trust verifiers used by  Security.verifyObjectTrust, allowing the objects that are trusted to be extended. | 
| TrustVerifier.Context | Defines the context for trust verification used by  TrustVerifierinstances andSecurity.verifyObjectTrust. | 
| Class | Description | 
|---|---|
| AccessPermission | Represents permission to call a method. | 
| AuthenticationPermission | Represents permission to use the private credentials of subjects for the purpose of
 authenticating as any subset of the local principals specified in the target name, during secure
 remote calls with any peer that authenticates as at least the set of peer principals specified in
 the target name. | 
| BasicProxyPreparer | A  ProxyPreparerfor verifying that proxies are trusted, granting them dynamic
 permissions, and setting their constraints, as well as for creating other proxy preparer
 subclasses that include those operations. | 
| GrantPermission | Permission required to dynamically grant permissions by security policy providers which implement
 the  DynamicPolicyinterface. | 
| Security | Provides methods for executing actions with privileges enabled, for snapshotting security
 contexts, for verifying trust in proxies, for verifying codebase integrity, and for dynamically
 granting permissions. | 
| VerifyingProxyPreparer | A  ProxyPreparerfor verifying that proxies are trusted, dynamically granting
 permissions to trusted proxies, and optionally setting the client constraints on trusted
 proxies. | 
Copyright © GigaSpaces.