Remoting WildFly Subsystem Concepts: Difference between revisions
No edit summary |
|||
Line 11: | Line 11: | ||
For more details on the local authentication mechanism see [[WildFly Security Realms#The_.24local_User|the 'LOCAL' authentication mechanism]]. | For more details on the local authentication mechanism see [[WildFly Security Realms#The_.24local_User|the 'LOCAL' authentication mechanism]]. | ||
Removing 'security-realm="ApplicationRealm"' from the remoting connector configuration ends up in the installation of the "ANONYMOUS" authentication mechanism, which enforces no authentication. | Removing '<tt>security-realm="ApplicationRealm"</tt>' from the remoting connector configuration ends up in the installation of the "ANONYMOUS" authentication mechanism, which enforces no authentication. | ||
For more on JBoss 7 security, see: | For more on JBoss 7 security, see: |
Revision as of 03:52, 7 March 2016
Internal
Security
Remoting connection attempts are authenticated against a configurable set of authentication mechanisms.
The presence of the 'security-realm' attribute in the remoting connector configuration triggers the enabling of authentication within the remoting service, by initializing the list of authentication mechanisms to those contributed by the security realm. The "ApplicationRealm" security realm employs "DIGEST" and "LOCAL" security mechanisms.
For more details on the local authentication mechanism see the 'LOCAL' authentication mechanism.
Removing 'security-realm="ApplicationRealm"' from the remoting connector configuration ends up in the installation of the "ANONYMOUS" authentication mechanism, which enforces no authentication.
For more on JBoss 7 security, see:
|[JBoss7 Security Realm]
!!Authenticated Remoting Call
How do I inject the credentials on the client so I actually make an authenticated remoting call?
!!!JBoss Remoting and JMX Access
JBoss Remoting provides the transport of the [JSR 160|JSR160 Java Management Extensions (JMX) Remote API]-compliant implementation of a [JMXConnector] that can be used by standard monitoring applications (such as [VisualVM]) to access the JMX bus. This is why JBoss Remoting configuration and security is relevant when an external JMX client needs access to JBoss.
The underlying remoting transport feeds into the "native management interface". For more details see [JBoss 7 Management Configuration#TheNativeManagementInterface].
__Referenced by:__\\ [{INSERT com.ecyrd.jspwiki.plugin.ReferringPagesPlugin WHERE max=20, maxwidth=50}]