Book Image

Wildfly Cookbook

Book Image

Wildfly Cookbook

Overview of this book

Table of Contents (23 chapters)
WildFly Cookbook
Credits
About the Author
Acknowledgments
About the Reviewers
www.PacktPub.com
Preface
Index

Introduction


In this chapter, you will learn how to secure your WildFly systems from a communication channel point of view, which is the HTTPS protocol. If system security is a concern, you will need to provide such a capability. By the way, when securing your system at any layer, keep an eye on performance, because it may cause some overhead.

We will learn how to provide security in a WildFly system at different stages, that is,:

  • Securing your application communication access protocol

  • Securing the WildFly management console

  • Securing the communication between the domain controller and all the host controllers

While the last two points do not impact performance that much as they are administrative tools, the first one may impact your performance. By the way, in an enterprise environment, often times, your WildFly middleware platform is behind a reverse proxy (that is, Apache HTTPD), and into a Demilitarized Zone (DMZ). For this reason, you should eventually secure the reverse proxy and not the...