beautypg.com

HP Integrity NonStop H-Series User Manual

Page 44

background image

Table 7 Contents of host.xml

Description

Component

Within JBoss AS 7, the security realms are used to secure
access to the management interfaces. These realms are also

security-realms

used to provide security to resources, which get exposed by
JBoss Remoting such as EJB access. They are used to define
an identity for the server, where, the identity can be used for
both inbound and outbound connections which is established
by the server.

The host.xml defines two security realms namely, the
ManagementRealm

and ApplicationRealm. The

security-realm

ManagementRealm

is used by the management interface,

and the ApplicationRealm is used by the remoting
subsystem to authenticate and authorize incoming requests
for EJB invocations.

The default configuration in both the ManagementRealm
and the ApplicationRealm has two authentication

authentication

mechanisms. The local mechanism and username-password
authentication mechanism which use Digest authentication.
This means the password is encrypted using a digest
algorithm.

1.

Local authentication mechanism: When using this
mechanism (represented by the element), it is
optional for the remote clients to send a username to the
server. This configuration specifies that where clients do
not send a username to the server, it is assumed that the
clients username is $local (indicated by the
default-user

attribute). The local authentication can

also be configured to restrict users that are allowed access
by using the allowed-user attribute. This attribute with
a value of * means that the remote user can specify any
username, and is accepted over the local mechanism
provided that the username-password authentication
mechanism is a success.

2.

Username-password authentication mechanism: Here the
user details are loaded from the properties file referred to
by the attribute path. The entries are prehashed, and
each entry is of the format username=hash>

. The entries can be added to the properties file

using the add-user.sh script in the
/bin

folder.

For more information, see Authentication section in the
chapter Management Tasks

https://docs.jboss.org/author/

display/AS71/
Admin+Guide#AdminGuide-Managementtasks

.

The contents of this element are used to load properties for
a user. The entries are of the form =,

authorization

where ROLES is a comma separated list of roles that are
associated with the user. For more information, see
Authorization section in the chapter Management Tasks

https://docs.jboss.org/author/display/AS71/
Admin+Guide#AdminGuide-Managementtasks

.

This element defines the interfaces to access the management
functionality. In NSASJ, only the native interface is enabled,

management-interfaces

and the interface is by default associated with the security
realm by the name ManagementRealm. By default, the
management interface is available on the port
BASE_PORT+3

.

NOTE:

BASE_PORT

is obtained from the user during NSASJ

installation.

44

Configuring NSASJ

This manual is related to the following products: