Book Image

Mastering JBoss Enterprise Application Platform 7

By : Francesco Marchioni, Luigi Fugaro
Book Image

Mastering JBoss Enterprise Application Platform 7

By: Francesco Marchioni, Luigi Fugaro

Overview of this book

The JBoss Enterprise Application Platform (EAP) has been one of the most popular tools for Java developers to create modular, cloud-ready, and modern applications. It has achieved a reputation for architectural excellence and technical savvy, making it a solid and efficient environment for delivering your applications. The book will first introduce application server configuration and the management instruments that can be used to control the application server. Next, the focus will shift to enterprise solutions such as clustering, load balancing, and data caching; this will be the core of the book. We will also discuss services provided by the application server, such as database connectivity and logging. We focus on real-world example configurations and how to avoid common mistakes. Finally, we will implement the knowledge gained so far in terms of Docker containers and cloud availability using RedHat's OpenShift.
Table of Contents (20 chapters)
Mastering JBoss Enterprise Application Platform 7
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface

Creating security domains


The legacy security subsystem provides security to the application server via the org.jboss.as.security extension:

<extension module="org.jboss.as.security"/> 

This subsystem is designed around the concept of a security domain, which is a set of Java Authentication and Authorization Service (JAAS) declarative security configurations. By defining security domains, your applications can control authentication, authorization, auditing, and mapping. Within each security domain, you can define login modules, which are the building blocks of your server security.

Note

A login module in the JBoss security model is derived from the Java interface javax.security.auth.spi.LoginModule, which contains some basic methods for authenticating a subject accessing your applications.

The list of available login modules is broad enough that we cannot discuss them all in detail. Generally speaking, the login modules are split into two main categories, depending on the location...