Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
WildFly Configuration, Deployment, and Administration - Second Edition

You're reading from   WildFly Configuration, Deployment, and Administration - Second Edition Build a functional and efficient WildFly server with this step-by-step, practical guide

Arrow left icon
Product type Paperback
Published in Nov 2014
Publisher
ISBN-13 9781783286232
Length 402 pages
Edition 2nd Edition
Languages
Tools
Concepts
Arrow right icon
Toc

Table of Contents (14) Chapters Close

Preface 1. Installing WildFly FREE CHAPTER 2. Configuring the Core WildFly Subsystems 3. Configuring Enterprise Services 4. The Undertow Web Server 5. Configuring a WildFly Domain 6. Application Structure and Deployment 7. Using the Management Interfaces 8. Clustering 9. Load-balancing Web Applications 10. Securing WildFly 11. WildFly, OpenShift, and Cloud Computing A. CLI References Index

Securing the transport layer

If you create a mission-critical application with just the bare concepts we covered until now, you will not be guaranteed to be shielded from all security threats. For example, if you need to design a payment gateway, where credit card information is transmitted by means of an EJB or servlet, using just the authorization and authentication stack is really not enough.

In order to prevent disclosure of information, you have to use a protocol that provides data encryption. Encryption is the conversion of data into a form that cannot be understood by people or systems eavesdropping on your network. Conversely, decryption is the process of converting encrypted data back into its original form, so it can be understood.

The protocols used to secure communication are SSL and TLS, the latter being considered a replacement for the older SSL.

Note

The differences between the two protocols are minor. TLS uses stronger encryption algorithms and has the ability to work on different...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image