Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
WildFly Configuration, Deployment, and Administration - Second Edition

You're reading from   WildFly Configuration, Deployment, and Administration - Second Edition Build a functional and efficient WildFly server with this step-by-step, practical guide

Arrow left icon
Product type Paperback
Published in Nov 2014
Publisher
ISBN-13 9781783286232
Length 402 pages
Edition 2nd Edition
Languages
Tools
Concepts
Arrow right icon
Toc

Table of Contents (14) Chapters Close

Preface 1. Installing WildFly FREE CHAPTER 2. Configuring the Core WildFly Subsystems 3. Configuring Enterprise Services 4. The Undertow Web Server 5. Configuring a WildFly Domain 6. Application Structure and Deployment 7. Using the Management Interfaces 8. Clustering 9. Load-balancing Web Applications 10. Securing WildFly 11. WildFly, OpenShift, and Cloud Computing A. CLI References Index

Summary

We began this chapter discussing the basic concepts of security and the difference between authentication and authorization.

Authentication is used to verify the identity of a user, while authorization is used to check if the user has the rights to access a particular resource.

WildFly uses the PicketBox framework. PicketBox sits at the top of the Java Authentication and Authorization Service (JAAS) and secures all the Java EE technologies running in the application. The core section of the security subsystem is contained in the security-domain element, which performs all the required authorization and authentication checks.

We then took a look at some of the login modules used to check user credentials against different datastores. Each login module can be used by enterprise applications in either a programmatic or a declarative way. While programmatic security can provide a fine-grained security model, you should consider using declarative security, which allows a clean separation...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime
Banner background image