Red Hat JBoss Fuse 6.3 Security Guide En US
User Manual:
Open the PDF directly: View PDF
Page Count: 141 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Table of Contents
- CHAPTER 1. SECURITY ARCHITECTURE
- CHAPTER 2. SECURING THE CONTAINER
- 2.1. JAAS AUTHENTICATION
- 2.1.1. Default JAAS Realm
- Overview
- Default JAAS realm
- How to integrate an application with JAAS
- Default JAAS login modules
- Configuring users in the properties login module
- Configuring user groups in the properties login module
- Configuring the public key login module
- Configuring user groups in the public key login module
- Encrypting the stored passwords
- Overriding the default realm
- 2.1.2. Defining JAAS Realms
- 2.1.3. JAAS Properties Login Module
- 2.1.4. JAAS OSGi Config Login Module
- 2.1.5. JAAS Public Key Login Module
- 2.1.6. JAAS JDBC Login Module
- 2.1.7. JAAS LDAP Login Module
- 2.1.8. Encrypting Stored Passwords
- 2.1.1. Default JAAS Realm
- 2.2. ROLE-BASED ACCESS CONTROL
- 2.3. USING ENCRYPTED PROPERTY PLACEHOLDERS
- 2.4. ENABLING REMOTE JMX SSL
- 2.1. JAAS AUTHENTICATION
- CHAPTER 3. SECURING THE JETTY HTTP SERVER
- CHAPTER 4. SECURING THE CAMEL ACTIVEMQ COMPONENT
- CHAPTER 5. SECURING THE CAMEL JETTY COMPONENT
- CHAPTER 6. CONFIGURING TRANSPORT SECURITY FOR CAMEL COMPONENTS
- CHAPTER 7. SECURING THE CAMEL CXF COMPONENT
- 7.1. THE CAMEL CXF PROXY DEMONSTRATION
- 7.2. SECURING THE WEB SERVICES PROXY
- Overview
- Implicit configuration
- Steps to add SSL/TLS security to the Jetty container
- Add certificates to the bundle resources
- Modify POM to switch off resource filtering
- Instantiate the CXF Bus
- Add the httpj:engine-factory element to Spring configuration
- Define the cxfcore:, sec: and httpj: prefixes
- Modify proxy address URL to use HTTPS
- 7.3. DEPLOYING THE APACHE CAMEL ROUTE
- 7.4. SECURING THE WEB SERVICES CLIENT
- CHAPTER 8. SECURING THE MANAGEMENT CONSOLE
- CHAPTER 9. LDAP AUTHENTICATION TUTORIAL
- APPENDIX A. MANAGING CERTIFICATES
- A.1. WHAT IS AN X.509 CERTIFICATE?
- A.2. CERTIFICATION AUTHORITIES
- A.3. CERTIFICATE CHAINING
- A.4. SPECIAL REQUIREMENTS ON HTTPS CERTIFICATES
- A.5. CREATING YOUR OWN CERTIFICATES
- APPENDIX B. ASN.1 AND DISTINGUISHED NAMES
- INDEX