Book Image

GlassFish Security

By : Masoud Kalali
Book Image

GlassFish Security

By: Masoud Kalali

Overview of this book

<p>Security was, is, and will be one of the most important aspects of Enterprise Applications and one of the most challenging areas for architects, developers, and administrators. It is mandatory for Java EE application developers to secure their enterprise applications using Glassfish security features.<br /><br />Learn to secure Java EE artifacts (like Servlets and EJB methods), configure and use GlassFish JAAS modules, and establish environment and network security using this practical guide filled with examples. One of the things you will love about this book is that it covers the advantages of protecting application servers and web service providers using OpenSSO.<br /><br />The book starts by introducing Java EE security in Web, EJB, and Application Client modules. Then it introduces the Security Realms provided in GlassFish, which developers and administrators can use to complete the authentication and authorization setup. In the next step, we develop a completely secure Java EE application with Web, EJB, and Application Client modules.<br /><br />The next part includes a detailed and practical guide to setting up, configuring, and extending GlassFish security. This part covers everything an administrator needs to know about GlassFish security, starting from installation and operating environment security, listeners and password security, through policy enforcement, to auditing and developing new auditing modules.</p> <p>Before starting the third major part of the book, we have a chapter on OpenDS discussing how to install, and administrate OpenDS. The chapter covers importing and exporting data, setting up replications, backup and recovery and finally developing LDAP based solutions using OpenDS and Java.</p> <p>Finally the third part starts by introducing OpenSSO and continues with guiding you through OpenSSO features, installation, configuration and how you can use it to secure Java EE applications in general and web services in particular. Identity Federation and SSO are discussed in the last chapter of the book along with a working sample.</p>
Table of Contents (14 chapters)
GlassFish Security
Credits
About the Author
About the Reviewers
Preface

Securing different network listeners


Everything an application server offers to the users is accessible by a listener. Basically each listener is assigned a server socket that handles requests placed on the socket it listens on. For example, by default the admin-listener listens on 0.0.0.0:4848, which means it listens on all available network addresses on port 4848.

Because of the diversity of Java EE platform and application servers, different application servers have multiple types of listeners which administrators can use to configure the application server to listen on different port and addresses for handling different set of protocols.

In GlassFish we have three types of listeners and for each type we have one or more instance configured by default. The following table shows these listeners.

Listener type

Description

HTTP listener

Serves HTTP requests for admin, user, and asadmin requests. There are three different instances confi gured by default.

JMX listener

Serves JMX requests...