Book Image

GlassFish Security

By : Masoud Kalali
Book Image

GlassFish Security

By: Masoud Kalali

Overview of this book

<p>Security was, is, and will be one of the most important aspects of Enterprise Applications and one of the most challenging areas for architects, developers, and administrators. It is mandatory for Java EE application developers to secure their enterprise applications using Glassfish security features.<br /><br />Learn to secure Java EE artifacts (like Servlets and EJB methods), configure and use GlassFish JAAS modules, and establish environment and network security using this practical guide filled with examples. One of the things you will love about this book is that it covers the advantages of protecting application servers and web service providers using OpenSSO.<br /><br />The book starts by introducing Java EE security in Web, EJB, and Application Client modules. Then it introduces the Security Realms provided in GlassFish, which developers and administrators can use to complete the authentication and authorization setup. In the next step, we develop a completely secure Java EE application with Web, EJB, and Application Client modules.<br /><br />The next part includes a detailed and practical guide to setting up, configuring, and extending GlassFish security. This part covers everything an administrator needs to know about GlassFish security, starting from installation and operating environment security, listeners and password security, through policy enforcement, to auditing and developing new auditing modules.</p> <p>Before starting the third major part of the book, we have a chapter on OpenDS discussing how to install, and administrate OpenDS. The chapter covers importing and exporting data, setting up replications, backup and recovery and finally developing LDAP based solutions using OpenDS and Java.</p> <p>Finally the third part starts by introducing OpenSSO and continues with guiding you through OpenSSO features, installation, configuration and how you can use it to secure Java EE applications in general and web services in particular. Identity Federation and SSO are discussed in the last chapter of the book along with a working sample.</p>
Table of Contents (14 chapters)
GlassFish Security
Credits
About the Author
About the Reviewers
Preface

Estimating security risks: Auditing


Auditing is an integral part of security measures to track back the events and check the overall health of the system security. Using auditing we can estimate security risks and get a thorough understanding of possible points of intrusions and attacks in the system.

The GlassFish auditing system let administrators audit seven important security events which are included in the following table:

Action

Description

Authentication*

Any authentication attempt can be audited.

Web resource invocation*

Any attempt to access a web resource can be audited.

EJB method invocation*

Any attempt to invoke an EJB method can be audited.

Web service invocation

Any attempt to invoke a web service can be audited.

EJB method as Web service invocation

Any attempt to invoke an EJB method as a web service can be audited.

Server startup

A successful startup can be audited.

Server shutdown

A successful shutdown can be audited.

GlassFish kernel produces the...