Book Image

Mastering JBoss Enterprise Application Platform 7

By : Francesco Marchioni, Luigi Fugaro
Book Image

Mastering JBoss Enterprise Application Platform 7

By: Francesco Marchioni, Luigi Fugaro

Overview of this book

The JBoss Enterprise Application Platform (EAP) has been one of the most popular tools for Java developers to create modular, cloud-ready, and modern applications. It has achieved a reputation for architectural excellence and technical savvy, making it a solid and efficient environment for delivering your applications. The book will first introduce application server configuration and the management instruments that can be used to control the application server. Next, the focus will shift to enterprise solutions such as clustering, load balancing, and data caching; this will be the core of the book. We will also discuss services provided by the application server, such as database connectivity and logging. We focus on real-world example configurations and how to avoid common mistakes. Finally, we will implement the knowledge gained so far in terms of Docker containers and cloud availability using RedHat's OpenShift.
Table of Contents (20 chapters)
Mastering JBoss Enterprise Application Platform 7
Credits
About the Authors
About the Reviewer
www.PacktPub.com
Preface

Hardening datasource configuration


As you have seen by reading this chapter, configuring a datasource, either XA or non-XA, includes providing passwords. As long as you keep the configuration to yourself, there is no issue with that. But what happens if you are working with different people, or a different team, who are not related directly to your company? Would you mind giving passwords out? I guess you would, or at least you should.

Fortunately, JBoss EAP 7 (actually, since JBoss EAP 5) provides two ways to hide your password.

One way is to encrypt your password by using hashing. The other way is to use a vault to protect one or more password in one place. We will look at both procedures in detail.

Password encryption

First of all, let's talk about hashing. Hashing is about integrity. This means that it is used to check whether a message (a text, a password, a file, and so on) that has arrived at its destination has been changed during its journey or not. A hash is not reversible. Given an...