SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Secure Middleware with
 JBoss Application Server
 v5.x

Anil Saldhana
Red Hat Inc
6280
2


AGENDA

>   Security as we know it
>   Security Features versus configuration
>   Security in JBossAS5.x
>   Authentication
>   Authorization
>   Audit
>   Password Masking in Microcontainer Beans
>   References
3




Security as we know it
                         > Secure
                           – Shoot dog?
                           – Drugged food?
4




Security as we know it
                         > Top of the line security
                           – Not in action
5




Security Features versus configuration
> Goal is to provide new security features all the time
  – While minimizing additions to configuration
6




Security Features versus configuration
                                   > Great System
                                     – Hard Wiring
                                        between
                                        objects
7




Security Features versus configuration
                        > New Features
                          – Feeble foundation
8




Security in JBAS 5.x
9




Security in JBAS 5.x
> Makes use of the JBoss Microcontainer based architecture
> Introduce new features
  – Authentication: Support for JSR-196
  – Authorization: Pluggable access control stack (Spec, JACC, XACML ...)
  – Auditing
  – Mapping : Role mapping, Principal mapping
  – Password Masking Feature for MC beans
> Simplify Configuration
  – Security Domain Configuration
10




Security in JBAS 5.x : Authentication
> JSR-196: Java Authentication SPI for Containers
> Allows us to externalize authentication as Server Authentication Modules(SAM)
  – JAAS does not have a notion of a container message
       No access to HttpServletRequest, SOAPMessage etc
  – Tomcat authenticator code would be as an example in the SAM
11




Security in JBAS 5.x : Authentication
> JSR-196
12




Security in JBAS 5.x : Authentication
> JSR-196




 http://anil-identity.blogspot.com/search/label/jsr-196
13




Security in JBAS 5.x : Authorization
> Pluggable Access Control Stack for Web and EJB Applications.
> Apply spec access control, JACC, XACML (or custom) to web and ejb
  applications in a pluggable fashion.
  – Mix and match (JACC for Web, XACML for EJB)
> Value added feature that still maintains Java EE RBAC compliance
> Fine grained access control
  – JBossXACML: Oasis XACML v2.0 support
  – JBossACL :Instance based access control

http://server.dzone.com/articles/security-features-jboss-510-1
http://server.dzone.com/articles/security-features-jboss-510-2
http://server.dzone.com/articles/security-features-jboss-510-3
14




Security in JBAS 5.x : Audit
> Enable auditing of security events in web and ejb applications
> Plug in various auditing providers
  – Default provider is a Log4J provider

http://server.dzone.com/articles/security-auditing-jboss
15




Security in JBAS 5.x : Audit
2008-12-05 16:08:38,997 TRACE [org.jboss.security.audit.providers.LogAuditProvider]
(http-127.0.0.1-8080-17:)
[Success]policyRegistration=org.jboss.security.plugins.JBossPolicyRegistration@76ed4518;Resource:=[or
g.jboss.security.authorization.resources.WebResource:contextMap={policyRegistration=org.jboss.security.
plugins.JBossPolicyRegistration@76ed4518,securityConstraints=[Lorg.apache.catalina.deploy.SecurityCon
straint;@6feeae6, resourcePermissionCheck=true},canonicalRequestURI=/restricted/get-
only/x,request=[/web-constraints:cookies=null:headers=user-agent=Jakarta Commons-
HttpClient/3.0,authorization=host=localhost:8080,]
[parameters=],CodeSource=null];securityConstraints=SecurityConstraint[RestrictedAccess - Get
Only];Source=org.jboss.security.plugins.javaee.WebAuthorizationHelper;resourcePermissionCheck=true;
Exception:=;


2008-12-05 16:08:41,561 TRACE [org.jboss.security.audit.providers.LogAuditProvider]
(http-127.0.0.1-8080-4:)
[Failure]principal=anil;Source=org.jboss.web.tomcat.security.JBossWebRealm;request=[/jaspi-web-
basic:cookies=null:headers=user-agent=Jakarta Commons-
HttpClient/3.0,authorization=host=localhost:8080,][parameters=][attributes=];2008-12-05 16:07:30,129
TRACE [org.jboss.security.audit.providers.LogAuditProvider] (WorkerThread#1[127.0.0.1:55055]:)
16




Security in JBAS 5.x : Mapping
> Map Roles
  – Application role to deployment level role
> Map Principal
  – X509 principal to a simple name
17




Password Masking for Microcontainer Beans
> Make use of the JBoss MC life cycle callbacks
  – Inject the password at “create”




 http://server.dzone.com/articles/security-features-jboss-510-0
18




Password Masking for Microcontainer Beans
 <bean name="SecurityStore"
 class="org.jboss.jms.server.jbosssx.JBossASSecurityMetadataStore">
    <property name="suckerPassword">CHANGE ME!!</property>
    <property name="securityDomain">messaging</property>
    <property name="securityManagement">
   .<inject bean="JNDIBasedSecurityManagement"/></property>
 </bean>




                                                     Before
19




Password Masking for Microcontainer Beans
<bean name="SecurityStore"
class="org.jboss.jms.server.jbosssx.JBossASSecurityMetadataStore">
   <property name="securityDomain">messaging</property>
   <property name="securityManagement">
  .<inject bean="JNDIBasedSecurityManagement"/></property>
  <!-- Password Annotation to inject the password from the common
password utility -->
<annotation>@org.jboss.security.integration.password.Password(security
Domain=messaging,methodName=setSuckerPassword)</annotation>
</bean>


                                                          After
20




Simplified Configuration
> Single security domain configuration for Authentication, Authorization, Auditing,
  Mapping, Acl etc
> Again, a feature of JBoss Microcontainer is leveraged.

http://server.dzone.com/articles/security-features-jboss-510
21

Simplified Configuration
<application-policy name="MyDomain">
  <authentication>
   <login-module code="org.jboss.security.auth.spi.UsersRolesLoginModule"
    flag="required">
    <module-option name="usersProperties">users.properties</module-option>
    <module-option name="rolesProperties">roles.properties</module-option>
    <module-option name="password-stacking">useFirstPass</module-option>
   </login-module>
  </authentication>
  <authorization>
   <policy-module code="org.jboss.security.authorization.modules.DelegatingAuthorizationModule"
    flag="required"/>
  </authorization>
 <rolemapping>
   <mapping-module code="org.jboss.security.mapping.providers.DeploymentRolesMappingProvider">
   </mapping-module>
  </rolemapping>
 </application-policy>
Anil Saldhana
http://anil-identity.blogspot.com
Red Hat Inc
anil.saldhana@redhat.com

Weitere ähnliche Inhalte

Andere mochten auch

Anil saldhana identitycloud
Anil saldhana identitycloudAnil saldhana identitycloud
Anil saldhana identitycloud
Anil Saldanha
 
Anil saldhana securityassurancewithj_bosseap
Anil saldhana securityassurancewithj_bosseapAnil saldhana securityassurancewithj_bosseap
Anil saldhana securityassurancewithj_bosseap
Anil Saldanha
 
Advances inbrowsersecurity
Advances inbrowsersecurityAdvances inbrowsersecurity
Advances inbrowsersecurity
Anil Saldanha
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?
Anil Saldanha
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo Murris
Denis Gundarev
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris Rogers
Denis Gundarev
 
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevBriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
Denis Gundarev
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat Messaoud
Denis Gundarev
 

Andere mochten auch (20)

Anil saldhana identitycloud
Anil saldhana identitycloudAnil saldhana identitycloud
Anil saldhana identitycloud
 
Anil saldhana securityassurancewithj_bosseap
Anil saldhana securityassurancewithj_bosseapAnil saldhana securityassurancewithj_bosseap
Anil saldhana securityassurancewithj_bosseap
 
Oasis IDCloud TC - Anil Saldhana
Oasis IDCloud TC - Anil SaldhanaOasis IDCloud TC - Anil Saldhana
Oasis IDCloud TC - Anil Saldhana
 
Oasis Identity In The Cloud Technical Committee
Oasis Identity In The Cloud Technical CommitteeOasis Identity In The Cloud Technical Committee
Oasis Identity In The Cloud Technical Committee
 
Anil saldhana cloud identity
Anil saldhana cloud identityAnil saldhana cloud identity
Anil saldhana cloud identity
 
Anil saldhana cloudidentitybestpractices
Anil saldhana cloudidentitybestpracticesAnil saldhana cloudidentitybestpractices
Anil saldhana cloudidentitybestpractices
 
Advances inbrowsersecurity
Advances inbrowsersecurityAdvances inbrowsersecurity
Advances inbrowsersecurity
 
Securing Applications With Picketlink
Securing Applications With PicketlinkSecuring Applications With Picketlink
Securing Applications With Picketlink
 
Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?Saml vs Oauth : Which one should I use?
Saml vs Oauth : Which one should I use?
 
DaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo MurrisDaaS/IaaS Forum Moscow - Ivo Murris
DaaS/IaaS Forum Moscow - Ivo Murris
 
Who Are You? From Meat to Electrons - SXSW 2014
Who Are You? From Meat to Electrons - SXSW 2014Who Are You? From Meat to Electrons - SXSW 2014
Who Are You? From Meat to Electrons - SXSW 2014
 
Cloud Identity: A Recipe for Higher Education
Cloud Identity: A Recipe for Higher EducationCloud Identity: A Recipe for Higher Education
Cloud Identity: A Recipe for Higher Education
 
Mule security - saml
Mule  security - samlMule  security - saml
Mule security - saml
 
Briforum 2011 Chicago
Briforum 2011 ChicagoBriforum 2011 Chicago
Briforum 2011 Chicago
 
DaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris RogersDaaS/IaaS Forum Moscow - Chris Rogers
DaaS/IaaS Forum Moscow - Chris Rogers
 
RSA Europe: Future of Cloud Identity
RSA Europe: Future of Cloud IdentityRSA Europe: Future of Cloud Identity
RSA Europe: Future of Cloud Identity
 
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
RUCUG: 9. Sergey Khalyapin: Представляем XenDesktop 5
 
The Tools I Use
The Tools I UseThe Tools I Use
The Tools I Use
 
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis GundarevBriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
BriForum 2013 Chicago - Citrix Troubleshooting - Denis Gundarev
 
DaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat MessaoudDaaS/IaaS Forum Moscow - Najat Messaoud
DaaS/IaaS Forum Moscow - Najat Messaoud
 

Ähnlich wie Secure Middleware with JBoss AS 5

They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web InterfacesThey Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
michelemanzotti
 
Stronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSOStronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSO
Ramesh Nagappan
 

Ähnlich wie Secure Middleware with JBoss AS 5 (20)

Java secure development part 3
Java secure development   part 3Java secure development   part 3
Java secure development part 3
 
JBoss Negotiation in AS7
JBoss Negotiation in AS7JBoss Negotiation in AS7
JBoss Negotiation in AS7
 
Securing Java EE apps using WildFly Elytron
Securing Java EE apps using WildFly ElytronSecuring Java EE apps using WildFly Elytron
Securing Java EE apps using WildFly Elytron
 
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicConfiguring kerberos based sso in weblogic
Configuring kerberos based sso in weblogic
 
Java EE Services
Java EE ServicesJava EE Services
Java EE Services
 
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
 
Utilize the Full Power of GlassFish Server and Java EE Security
Utilize the Full Power of GlassFish Server and Java EE SecurityUtilize the Full Power of GlassFish Server and Java EE Security
Utilize the Full Power of GlassFish Server and Java EE Security
 
Beefing Up Security In ASP.NET Dot Net Bangalore 3rd meet up on May 16 2015
Beefing Up Security In ASP.NET Dot Net Bangalore 3rd meet up on May 16 2015Beefing Up Security In ASP.NET Dot Net Bangalore 3rd meet up on May 16 2015
Beefing Up Security In ASP.NET Dot Net Bangalore 3rd meet up on May 16 2015
 
Configuring was webauth
Configuring was webauthConfiguring was webauth
Configuring was webauth
 
Running your Java EE 6 applications in the cloud
Running your Java EE 6 applications in the cloudRunning your Java EE 6 applications in the cloud
Running your Java EE 6 applications in the cloud
 
Javaee6 Jazoon 2010 100603081147 Phpapp01
Javaee6 Jazoon 2010 100603081147 Phpapp01Javaee6 Jazoon 2010 100603081147 Phpapp01
Javaee6 Jazoon 2010 100603081147 Phpapp01
 
Java Web Programming [9/9] : Web Application Security
Java Web Programming [9/9] : Web Application SecurityJava Web Programming [9/9] : Web Application Security
Java Web Programming [9/9] : Web Application Security
 
JSF Security
JSF SecurityJSF Security
JSF Security
 
Securing your Oracle Fusion Middleware Environment, On-Prem and in the Cloud
Securing your Oracle Fusion Middleware Environment, On-Prem and in the CloudSecuring your Oracle Fusion Middleware Environment, On-Prem and in the Cloud
Securing your Oracle Fusion Middleware Environment, On-Prem and in the Cloud
 
UCS Management APIs A Technical Deep Dive
UCS Management APIs A Technical Deep DiveUCS Management APIs A Technical Deep Dive
UCS Management APIs A Technical Deep Dive
 
Top Ten Settings that Leave your IBM i Vulnerable
Top Ten Settings that Leave your IBM i VulnerableTop Ten Settings that Leave your IBM i Vulnerable
Top Ten Settings that Leave your IBM i Vulnerable
 
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web InterfacesThey Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
They Ought to Know Better: Exploiting Security Gateways via Their Web Interfaces
 
Stronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSOStronger Authentication with Biometric SSO
Stronger Authentication with Biometric SSO
 
Spring security
Spring securitySpring security
Spring security
 
MySQL Audit using Percona audit plugin and ELK
MySQL Audit using Percona audit plugin and ELKMySQL Audit using Percona audit plugin and ELK
MySQL Audit using Percona audit plugin and ELK
 

Kürzlich hochgeladen

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 

Kürzlich hochgeladen (20)

DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024AXA XL - Insurer Innovation Award Americas 2024
AXA XL - Insurer Innovation Award Americas 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 

Secure Middleware with JBoss AS 5

  • 1. Secure Middleware with JBoss Application Server v5.x Anil Saldhana Red Hat Inc 6280
  • 2. 2 AGENDA > Security as we know it > Security Features versus configuration > Security in JBossAS5.x > Authentication > Authorization > Audit > Password Masking in Microcontainer Beans > References
  • 3. 3 Security as we know it > Secure – Shoot dog? – Drugged food?
  • 4. 4 Security as we know it > Top of the line security – Not in action
  • 5. 5 Security Features versus configuration > Goal is to provide new security features all the time – While minimizing additions to configuration
  • 6. 6 Security Features versus configuration > Great System – Hard Wiring between objects
  • 7. 7 Security Features versus configuration > New Features – Feeble foundation
  • 9. 9 Security in JBAS 5.x > Makes use of the JBoss Microcontainer based architecture > Introduce new features – Authentication: Support for JSR-196 – Authorization: Pluggable access control stack (Spec, JACC, XACML ...) – Auditing – Mapping : Role mapping, Principal mapping – Password Masking Feature for MC beans > Simplify Configuration – Security Domain Configuration
  • 10. 10 Security in JBAS 5.x : Authentication > JSR-196: Java Authentication SPI for Containers > Allows us to externalize authentication as Server Authentication Modules(SAM) – JAAS does not have a notion of a container message  No access to HttpServletRequest, SOAPMessage etc – Tomcat authenticator code would be as an example in the SAM
  • 11. 11 Security in JBAS 5.x : Authentication > JSR-196
  • 12. 12 Security in JBAS 5.x : Authentication > JSR-196 http://anil-identity.blogspot.com/search/label/jsr-196
  • 13. 13 Security in JBAS 5.x : Authorization > Pluggable Access Control Stack for Web and EJB Applications. > Apply spec access control, JACC, XACML (or custom) to web and ejb applications in a pluggable fashion. – Mix and match (JACC for Web, XACML for EJB) > Value added feature that still maintains Java EE RBAC compliance > Fine grained access control – JBossXACML: Oasis XACML v2.0 support – JBossACL :Instance based access control http://server.dzone.com/articles/security-features-jboss-510-1 http://server.dzone.com/articles/security-features-jboss-510-2 http://server.dzone.com/articles/security-features-jboss-510-3
  • 14. 14 Security in JBAS 5.x : Audit > Enable auditing of security events in web and ejb applications > Plug in various auditing providers – Default provider is a Log4J provider http://server.dzone.com/articles/security-auditing-jboss
  • 15. 15 Security in JBAS 5.x : Audit 2008-12-05 16:08:38,997 TRACE [org.jboss.security.audit.providers.LogAuditProvider] (http-127.0.0.1-8080-17:) [Success]policyRegistration=org.jboss.security.plugins.JBossPolicyRegistration@76ed4518;Resource:=[or g.jboss.security.authorization.resources.WebResource:contextMap={policyRegistration=org.jboss.security. plugins.JBossPolicyRegistration@76ed4518,securityConstraints=[Lorg.apache.catalina.deploy.SecurityCon straint;@6feeae6, resourcePermissionCheck=true},canonicalRequestURI=/restricted/get- only/x,request=[/web-constraints:cookies=null:headers=user-agent=Jakarta Commons- HttpClient/3.0,authorization=host=localhost:8080,] [parameters=],CodeSource=null];securityConstraints=SecurityConstraint[RestrictedAccess - Get Only];Source=org.jboss.security.plugins.javaee.WebAuthorizationHelper;resourcePermissionCheck=true; Exception:=; 2008-12-05 16:08:41,561 TRACE [org.jboss.security.audit.providers.LogAuditProvider] (http-127.0.0.1-8080-4:) [Failure]principal=anil;Source=org.jboss.web.tomcat.security.JBossWebRealm;request=[/jaspi-web- basic:cookies=null:headers=user-agent=Jakarta Commons- HttpClient/3.0,authorization=host=localhost:8080,][parameters=][attributes=];2008-12-05 16:07:30,129 TRACE [org.jboss.security.audit.providers.LogAuditProvider] (WorkerThread#1[127.0.0.1:55055]:)
  • 16. 16 Security in JBAS 5.x : Mapping > Map Roles – Application role to deployment level role > Map Principal – X509 principal to a simple name
  • 17. 17 Password Masking for Microcontainer Beans > Make use of the JBoss MC life cycle callbacks – Inject the password at “create” http://server.dzone.com/articles/security-features-jboss-510-0
  • 18. 18 Password Masking for Microcontainer Beans <bean name="SecurityStore" class="org.jboss.jms.server.jbosssx.JBossASSecurityMetadataStore"> <property name="suckerPassword">CHANGE ME!!</property> <property name="securityDomain">messaging</property> <property name="securityManagement"> .<inject bean="JNDIBasedSecurityManagement"/></property> </bean> Before
  • 19. 19 Password Masking for Microcontainer Beans <bean name="SecurityStore" class="org.jboss.jms.server.jbosssx.JBossASSecurityMetadataStore"> <property name="securityDomain">messaging</property> <property name="securityManagement"> .<inject bean="JNDIBasedSecurityManagement"/></property> <!-- Password Annotation to inject the password from the common password utility --> <annotation>@org.jboss.security.integration.password.Password(security Domain=messaging,methodName=setSuckerPassword)</annotation> </bean> After
  • 20. 20 Simplified Configuration > Single security domain configuration for Authentication, Authorization, Auditing, Mapping, Acl etc > Again, a feature of JBoss Microcontainer is leveraged. http://server.dzone.com/articles/security-features-jboss-510
  • 21. 21 Simplified Configuration <application-policy name="MyDomain"> <authentication> <login-module code="org.jboss.security.auth.spi.UsersRolesLoginModule" flag="required"> <module-option name="usersProperties">users.properties</module-option> <module-option name="rolesProperties">roles.properties</module-option> <module-option name="password-stacking">useFirstPass</module-option> </login-module> </authentication> <authorization> <policy-module code="org.jboss.security.authorization.modules.DelegatingAuthorizationModule" flag="required"/> </authorization> <rolemapping> <mapping-module code="org.jboss.security.mapping.providers.DeploymentRolesMappingProvider"> </mapping-module> </rolemapping> </application-policy>