Book Image

JBoss: Developer's Guide

By : Elvadas Nono Woguia
Book Image

JBoss: Developer's Guide

By: Elvadas Nono Woguia

Overview of this book

Have you often wondered what is the best JBoss product to solve a specific problem? Do you want to get started with a specific JBoss product and know how to integrate different JBoss products in your IT Systems? Then this is the book for you. Through hands-on examples from the business world, this guide presents details on the major products and how you can build your own Enterprise services around the JBoss ecosystem. Starting with an introduction to the JBoss ecosystem, you will gradually move on to developing and deploying clustered application on JBoss Application Server, and setting up high availability using undertow or HA proxy loadbalancers. As you are moving to a micro service archicture, you will be taught how to package existing Java EE applications as micro service using Swarm or create your new micro services from scratch by coupling most popular Java EE frameworks like JPA, CDI with Undertow handlers. Next, you will install and configure JBoss Data grid in development and production environments, develop cache based applications and aggregate various data source in JBoss data virtualization. You will learn to build, deploy, and monitor integration scenarios using JBoss Fuse and run both producers/consumers applications relying on JBoss AMQ. Finally, you will learn to develop and run business workflows and make better decisions in your applications using Drools and Jboss BPM Suite Platform.
Table of Contents (10 chapters)

Cache security

In the real world, some applications such as MoneyTransferAgency, used in different offices to check money transfer status and validate remittances, will only have read-only access to predefined JBoss datagrid caches. On the other hand, the ESB flow that pushed money transfer objects into the cache will at least have write access to the cache to be able to insert new transactions. Infinispan/JBoss datagrid leverages Java standards, such as JAAS and Security Manager, to protect access to caches and cache manager.

Different mechanisms can be used depending on your topologies: While using REST API to put/get entries, you can enable security on the REST connector using a custom security-domain and authentication method:

<rest-connector socket-binding="rest" cache-container="clustered" security-domain="other" auth-method="BASIC&quot...