Automated RBAC Java Security Tool Released

McLean, VA-based Advanced Modeling Concepts recently released a Java security tool designed to help developers add security to existing Java applications. The product adds role-based access control (RBAC) security via a tool called AfterthoughtSoft-Secure.

Organizations can use the product to inject Java authentication and authorization (JAAS) security into legacy code. It can work with any Java applications that use the JAR (Java Archive) file format. The solution is designed mostly to work with client-side applications, according to company literature.

The product identifies what needs to be secured in the runnable JAR file and creates a copy of the file with the RBAC security inserted, according to the company.

"One of the hardest parts of dealing with JAAS implementations is getting the security policy files done correctly," commented Advanced Modeling Concepts' CEO Bart Jenkins in a prepared statement. "The tool automatically generates all the necessary .java.policy and .java.login.config files for you."

Advanced Modeling Concepts has released three versions of AfterthoughtSoft-Secure: Community, Pro and Enterprise.

The free community edition covers only "text file-based RBAC." The Pro edition adds NT, Unix and Linux security. The Enterprise Edition offers LDAP and Kerberos V support. Introductory pricing through February for the Pro and Enterprise editions is $29 and $99, respectively.

More information on all the versions can be found here.

About the Author

Becky Nagel serves as vice president of AI for 1105 Media specializing in developing media, events and training for companies around AI and generative AI technology. She also regularly writes and reports on AI news for PureAI.com, a site she founded, among others. She's the author of "ChatGPT Prompt 101 Guide for Business Users" and other popular AI resources with a real-world business perspective. She regularly speaks, writes and develops content around AI, generative AI and other business tech. Find her on X/Twitter @beckynagel.

Featured

  • Cyber threat vectors illuminate global map

    Cyber Espionage Campaign Exploits Claude Code Tool to Infiltrate Global Targets

    Anthropic recently reported that attackers linked to China leveraged its Claude Code AI to carry out intrusions against about 30 global organizations.

  • college students sitting with laptops at an outdoor table

    How Colleges Are Building More Connected and Responsive Student Support

    Colleges are making steady progress in building more connected and responsive student support systems. By aligning services and improving coordination, institutions are enhancing both the student and staff experience.

  • large group of college students sitting on an academic quad

    Student Readiness: Learning to Learn

    Melissa Loble, Instructure's chief academic officer, recommends a focus on 'readiness' as a broader concept as we try to understand how to build meaningful education experiences that can form a bridge from the university to the workplace. Here, we ask Loble what readiness is and how to offer students the ability to 'learn to learn'.

  • Abstract digital cloudscape of glowing interconnected clouds and radiant lines

    Cloud Complexity Outpacing Human Defenses, Report Warns

    According to the 2026 Cloud Security Report from Fortinet, while cloud security budgets are rising, 66% of organizations lack confidence in real-time threat detection across increasingly complex multi-cloud environments, with identity risks, tool sprawl, and fragmented visibility creating persistent operational gaps despite significant investment increases.