Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Java EE 7 Development with WildFly

You're reading from   Java EE 7 Development with WildFly Leverage the power of the WildFly application server from JBoss to develop modern Java EE 7 applications

Arrow left icon
Product type Paperback
Published in Dec 2014
Publisher
ISBN-13 9781782171980
Length 434 pages
Edition 1st Edition
Languages
Tools
Arrow right icon
Toc

Table of Contents (16) Chapters Close

Preface 1. Getting Started with WildFly FREE CHAPTER 2. Your First Java EE Application on WildFly 3. Introducing Java EE 7 – EJBs 4. Learning Context and Dependency Injection 5. Combining Persistence with CDI 6. Developing Applications with JBoss JMS Provider 7. Adding Web Services to Your Applications 8. Adding WebSockets 9. Managing the Application Server 10. Securing WildFly Applications 11. Clustering WildFly Applications 12. Long-term Tasks' Execution 13. Testing Your Applications A. Rapid Development Using JBoss Forge Index

Summary


We started this chapter by discussing the basic concepts of security and the difference between authentication and authorization.

WildFly uses the PicketBox framework sitting on top of the Java Authentication and Authorization Service (JAAS), which secures all the Java EE technologies running in the application. The core section of the security subsystem is contained in the security-domain element that performs all the required authorization and authentication checks.

Then, we took a much closer look at the login modules, which are used to store the user credentials and their associated roles. In particular, you learned how to apply the file-based UserRoles login module and the Database login module. Each login module can be used by Enterprise applications in either a programmatic or declarative way. While programmatic security can provide a fine-grained security model, you should consider using declarative security, which allows a clean separation between the business layer and the...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image