Want to win a PS4? Go Premium and enter to win our High-Tech Treats giveaway. Enter to Win

x
?
Solved

Tomcat 6 - Session Serializable

Posted on 2007-03-20
5
Medium Priority
?
764 Views
Last Modified: 2013-12-02
Is adding <distributable/> in my webapps web.xml file is good enough to force all session attributes implement java.io.Serializable
0
Comment
Question by:fylix0000
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 4
5 Comments
 
LVL 30

Expert Comment

by:Mayank S
ID: 18757038
It means that the application can be distributed over a cluster but I you need to manually ensure that the session attributes implement Serializable - you need to say 'implements Serializable' in the source code of those classes.
0
 
LVL 30

Expert Comment

by:Mayank S
ID: 18757428
>> but I you

but I think you
0
 

Author Comment

by:fylix0000
ID: 18782361
Sounds good to me. I checked that yes and need to do that in any Servlet my web Apps is using.
0
 
LVL 30

Accepted Solution

by:
Mayank S earned 1500 total points
ID: 18784079
Any objects which your servlets are storing in the session need to be serializable
0
 
LVL 30

Expert Comment

by:Mayank S
ID: 18827518
Any reason for the B grade? You can ask for more clarification if you want.
0

Featured Post

Free Tool: SSL Checker

Scans your site and returns information about your SSL implementation and certificate. Helpful for debugging and validating your SSL configuration.

One of a set of tools we are providing to everyone as a way of saying thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Configure Web Service (server application) I. Configure security for Web Services methods First, we need to protect Session bean which implements the service: 1. Open EJB deployment descriptor (ejb-jar.xml) in the EJB project that contains you…
It’s been over a month into 2017, and there is already a sophisticated Gmail phishing email making it rounds. New techniques and tactics, have given hackers a way to authentically impersonate your contacts.How it Works The attack works by targeti…
Windows 8 came with a dramatically different user interface known as Metro. Notably missing from that interface was a Start button and Start Menu. Microsoft responded to negative user feedback of the Metro interface, bringing back the Start button a…
With the advent of Windows 10, Microsoft is pushing a Get Windows 10 icon into the notification area (system tray) of qualifying computers. There are many reasons for wanting to remove this icon. This two-part Experts Exchange video Micro Tutorial s…

609 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question