SlideShare a Scribd company logo
Security-Jaas
2
Jaas Security
The JaasSimpleAuthenticationProvider is a security provider that provides
a way to interact with the Jaas Authentication Service.
The security provider for Jaas can be configured in a couple of different
ways. It allows you to configure Jaas either by passing to the provider a
Jaas configuration file or by passing the required attributes directly to the
JaasSimpleAuthenticationProvider. These two configuration methods are
described below.
3
Jaas Configuration
Using the Jaas Configuration File
Usually, JAAS authentication is performed in a pluggable fashion, so
applications can remain independent from underlying authentication
technologies.
jaasTest{
org.mule.module.jaas.loginmodule.DefaultLoginModule required
credentials="anon:anon;Marie.Rizzo:dragon;"
};
4
The above example was saved in a file called jaas.conf. This file contains
just one entry called com.ss.jaasTest, which is where the application we
want to protect can be found. The entry specifies the login module that's
used to authenticate the user. As a login module, you can either use Mule's
DefaultLoginModule, one of the login modules that come with Sun, or else
create your own. In this case, we have opted for Mule's
DefaultLoginModule.
5
The required flag that follows the login module specifies that the login
module must succeed for the authentication to be considered successful.
Additional flags are:
Required - The login module is required to succeed. If it succeeds or fails,
authentication still continues to proceed down the login module list.
Requisite - The login module is required to succeed. If it succeeds,
authentication continues down the login module list. If it fails, control
immediately returns to the application.
Sufficient - The login module is not required to succeed. If it does succeed,
control immediately returns to the application (authentication does not
proceed down the login module list). If it fails, authentication continues
down the login module list.
Optional - The login module is not required to succeed. If it succeeds or
fails, authentication still continues to proceed down the login module list.
6
The entry also specifies the credentials, in which we put a string of
authorized users together with their passwords. The credentials are put
here only when the DefaultLoginModule is going to be used, as the method
in which the user names and passwords are obtained may vary from one
login module to another.
The format of the credentials string must adhere to the following format if
the DefaultLoginModule is going to be used:
<username>:<password>;
7
Configuring the Provider in the Mule Configuration File
<mule xmlns="http://www.mulesource.org/schema/mule/core/3.2"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:jaas="http://www.mulesource.org/schema/mule/jaas/3.2"
...cut...
<jaas:security-manager>
<jaas:security-provider name="jaasSecurityProvider"
loginContextName="jaasTest" loginConfig="jaas.conf"/>
</jaas:security-manager>
Mule security jaas

More Related Content

What's hot

Security authorizationusingspringsecurity-sathyaraj
Security authorizationusingspringsecurity-sathyarajSecurity authorizationusingspringsecurity-sathyaraj
Security authorizationusingspringsecurity-sathyaraj
sathyaraj Anand
 
Mule security - authorization using spring security
Mule  security - authorization using spring securityMule  security - authorization using spring security
Mule security - authorization using spring security
D.Rajesh Kumar
 
Mule security
Mule  securityMule  security
Mule security
charan teja R
 
Mule security
Mule securityMule security
Mule security
Praneethchampion
 
Mule debugging
Mule   debuggingMule   debugging
Mule debugging
Sindhu VL
 
Sql injection
Sql injectionSql injection
Sql injection
Sasha-Leigh Garret
 
Application security [appsec]
Application security [appsec]Application security [appsec]
Application security [appsec]
Judy Ngure
 
Mule reference
Mule referenceMule reference
Mule reference
himajareddys
 
Sql injection attack
Sql injection attackSql injection attack
Sql injection attack
Raghav Bisht
 

What's hot (10)

Security authorizationusingspringsecurity-sathyaraj
Security authorizationusingspringsecurity-sathyarajSecurity authorizationusingspringsecurity-sathyaraj
Security authorizationusingspringsecurity-sathyaraj
 
Mule security - authorization using spring security
Mule  security - authorization using spring securityMule  security - authorization using spring security
Mule security - authorization using spring security
 
Mule security
Mule  securityMule  security
Mule security
 
persentation
persentationpersentation
persentation
 
Mule security
Mule securityMule security
Mule security
 
Mule debugging
Mule   debuggingMule   debugging
Mule debugging
 
Sql injection
Sql injectionSql injection
Sql injection
 
Application security [appsec]
Application security [appsec]Application security [appsec]
Application security [appsec]
 
Mule reference
Mule referenceMule reference
Mule reference
 
Sql injection attack
Sql injection attackSql injection attack
Sql injection attack
 

Viewers also liked

The Rochester
The RochesterThe Rochester
The Rochester
Sandrex Mano
 
Mango Tree Residences
Mango Tree ResidencesMango Tree Residences
Mango Tree Residences
Sandrex Mano
 
Datos matriculaciones eléctricos e híbridos mayo de 2013
Datos matriculaciones eléctricos e híbridos mayo de 2013Datos matriculaciones eléctricos e híbridos mayo de 2013
Datos matriculaciones eléctricos e híbridos mayo de 2013ANIACAM_PRENSA
 
MI EXPERIENCE CERTIFICATE
MI EXPERIENCE CERTIFICATEMI EXPERIENCE CERTIFICATE
MI EXPERIENCE CERTIFICATEUtpal Ganguly
 
Media question one
Media question oneMedia question one
Media question one
ArchieC
 
Exploiting stack overflow 101
Exploiting stack overflow 101Exploiting stack overflow 101
Exploiting stack overflow 101
n|u - The Open Security Community
 
FLYING HIGH BY STUART MANSELL ACCOUNTANCY AGE MAGAZINE (AA)
FLYING HIGH BY STUART MANSELL ACCOUNTANCY AGE MAGAZINE (AA)FLYING HIGH BY STUART MANSELL ACCOUNTANCY AGE MAGAZINE (AA)
FLYING HIGH BY STUART MANSELL ACCOUNTANCY AGE MAGAZINE (AA)
Ian Herman
 
【配布用】研究会ソシオ資料 20141031
【配布用】研究会ソシオ資料 20141031【配布用】研究会ソシオ資料 20141031
【配布用】研究会ソシオ資料 20141031
human-edu
 
Mathematical logic
Mathematical logicMathematical logic
Mathematical logic
ble nature
 
パネルディスカッション
パネルディスカッションパネルディスカッション
パネルディスカッション
NetAgent Co.,Ltd.
 
Fast Fish Forum 16 November 2016
Fast Fish Forum 16 November 2016Fast Fish Forum 16 November 2016
Fast Fish Forum 16 November 2016
BSGAfrica
 
松倉プレゼン資料(全国大会).Pptx
松倉プレゼン資料(全国大会).Pptx松倉プレゼン資料(全国大会).Pptx
松倉プレゼン資料(全国大会).Pptx
human-edu
 
Report on Options for Division Webinars - Final (Version 7) - APA - DC - EC (11)
Report on Options for Division Webinars - Final (Version 7) - APA - DC - EC (11)Report on Options for Division Webinars - Final (Version 7) - APA - DC - EC (11)
Report on Options for Division Webinars - Final (Version 7) - APA - DC - EC (11)
Harsh Prakash (AWS, Azure, Security+, Agile, PMP, GISP)
 
Stack Overflowで最も投票数の多かったiOS関連のQuestionベスト10(2015年版)
Stack Overflowで最も投票数の多かったiOS関連のQuestionベスト10(2015年版)Stack Overflowで最も投票数の多かったiOS関連のQuestionベスト10(2015年版)
Stack Overflowで最も投票数の多かったiOS関連のQuestionベスト10(2015年版)
Kosuke Ogawa
 
Clustering of Mule ESB
Clustering of Mule ESBClustering of Mule ESB
Clustering of Mule ESB
Sreekanth Kondapalli
 
Mule oracle connectors
Mule oracle connectorsMule oracle connectors
Mule oracle connectors
princeirfancivil
 
Reston Network Analysis Community Meeting 2050 Results and Funding Plan: Nov....
Reston Network Analysis Community Meeting 2050 Results and Funding Plan: Nov....Reston Network Analysis Community Meeting 2050 Results and Funding Plan: Nov....
Reston Network Analysis Community Meeting 2050 Results and Funding Plan: Nov....
Fairfax County
 
Reston Transportation Funding Plan: July 15, 2016
Reston Transportation Funding Plan: July 15, 2016Reston Transportation Funding Plan: July 15, 2016
Reston Transportation Funding Plan: July 15, 2016
Fairfax County
 
Fairfax Countywide Transit Network Study: Proposed High Quality Transit Network
Fairfax Countywide Transit Network Study: Proposed High Quality Transit NetworkFairfax Countywide Transit Network Study: Proposed High Quality Transit Network
Fairfax Countywide Transit Network Study: Proposed High Quality Transit Network
Fairfax County
 

Viewers also liked (19)

The Rochester
The RochesterThe Rochester
The Rochester
 
Mango Tree Residences
Mango Tree ResidencesMango Tree Residences
Mango Tree Residences
 
Datos matriculaciones eléctricos e híbridos mayo de 2013
Datos matriculaciones eléctricos e híbridos mayo de 2013Datos matriculaciones eléctricos e híbridos mayo de 2013
Datos matriculaciones eléctricos e híbridos mayo de 2013
 
MI EXPERIENCE CERTIFICATE
MI EXPERIENCE CERTIFICATEMI EXPERIENCE CERTIFICATE
MI EXPERIENCE CERTIFICATE
 
Media question one
Media question oneMedia question one
Media question one
 
Exploiting stack overflow 101
Exploiting stack overflow 101Exploiting stack overflow 101
Exploiting stack overflow 101
 
FLYING HIGH BY STUART MANSELL ACCOUNTANCY AGE MAGAZINE (AA)
FLYING HIGH BY STUART MANSELL ACCOUNTANCY AGE MAGAZINE (AA)FLYING HIGH BY STUART MANSELL ACCOUNTANCY AGE MAGAZINE (AA)
FLYING HIGH BY STUART MANSELL ACCOUNTANCY AGE MAGAZINE (AA)
 
【配布用】研究会ソシオ資料 20141031
【配布用】研究会ソシオ資料 20141031【配布用】研究会ソシオ資料 20141031
【配布用】研究会ソシオ資料 20141031
 
Mathematical logic
Mathematical logicMathematical logic
Mathematical logic
 
パネルディスカッション
パネルディスカッションパネルディスカッション
パネルディスカッション
 
Fast Fish Forum 16 November 2016
Fast Fish Forum 16 November 2016Fast Fish Forum 16 November 2016
Fast Fish Forum 16 November 2016
 
松倉プレゼン資料(全国大会).Pptx
松倉プレゼン資料(全国大会).Pptx松倉プレゼン資料(全国大会).Pptx
松倉プレゼン資料(全国大会).Pptx
 
Report on Options for Division Webinars - Final (Version 7) - APA - DC - EC (11)
Report on Options for Division Webinars - Final (Version 7) - APA - DC - EC (11)Report on Options for Division Webinars - Final (Version 7) - APA - DC - EC (11)
Report on Options for Division Webinars - Final (Version 7) - APA - DC - EC (11)
 
Stack Overflowで最も投票数の多かったiOS関連のQuestionベスト10(2015年版)
Stack Overflowで最も投票数の多かったiOS関連のQuestionベスト10(2015年版)Stack Overflowで最も投票数の多かったiOS関連のQuestionベスト10(2015年版)
Stack Overflowで最も投票数の多かったiOS関連のQuestionベスト10(2015年版)
 
Clustering of Mule ESB
Clustering of Mule ESBClustering of Mule ESB
Clustering of Mule ESB
 
Mule oracle connectors
Mule oracle connectorsMule oracle connectors
Mule oracle connectors
 
Reston Network Analysis Community Meeting 2050 Results and Funding Plan: Nov....
Reston Network Analysis Community Meeting 2050 Results and Funding Plan: Nov....Reston Network Analysis Community Meeting 2050 Results and Funding Plan: Nov....
Reston Network Analysis Community Meeting 2050 Results and Funding Plan: Nov....
 
Reston Transportation Funding Plan: July 15, 2016
Reston Transportation Funding Plan: July 15, 2016Reston Transportation Funding Plan: July 15, 2016
Reston Transportation Funding Plan: July 15, 2016
 
Fairfax Countywide Transit Network Study: Proposed High Quality Transit Network
Fairfax Countywide Transit Network Study: Proposed High Quality Transit NetworkFairfax Countywide Transit Network Study: Proposed High Quality Transit Network
Fairfax Countywide Transit Network Study: Proposed High Quality Transit Network
 

Similar to Mule security jaas

MULE-JAAS
MULE-JAASMULE-JAAS
MULE-JAAS
D.Rajesh Kumar
 
Mule security - jaas
Mule  security - jaasMule  security - jaas
Mule security - jaas
himajareddys
 
IBM Streams V4.1 and JAAS Login Module Support
IBM Streams V4.1 and JAAS Login Module SupportIBM Streams V4.1 and JAAS Login Module Support
IBM Streams V4.1 and JAAS Login Module Support
lisanl
 
Steps to mitigate Top 5 OWASP Vulnerabilities 2013
Steps to mitigate Top 5 OWASP Vulnerabilities 2013Steps to mitigate Top 5 OWASP Vulnerabilities 2013
Steps to mitigate Top 5 OWASP Vulnerabilities 2013Jayasree Veliyath
 
Sap Access Risks Procedures
Sap Access  Risks ProceduresSap Access  Risks Procedures
Sap Access Risks ProceduresInprise Group
 
Spring security4.x
Spring security4.xSpring security4.x
Spring security4.x
Zeeshan Khan
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
csandit
 
Chapter 6 : Attack Execution (2)
Chapter 6 : Attack Execution (2)Chapter 6 : Attack Execution (2)
Chapter 6 : Attack Execution (2)
Dr.Sami Khiami
 
Getting Started with IBM i Security: User Privileges
Getting Started with IBM i Security: User PrivilegesGetting Started with IBM i Security: User Privileges
Getting Started with IBM i Security: User Privileges
HelpSystems
 
5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts
AnayaGrewal
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
Nasir Gondal
 
Validation module in mule
Validation module in muleValidation module in mule
Validation module in mule
Ankit Lawaniya
 
Managing Cloud identities in Hybrid Cloud | Sysfore
Managing Cloud identities in Hybrid Cloud | SysforeManaging Cloud identities in Hybrid Cloud | Sysfore
Managing Cloud identities in Hybrid Cloud | Sysfore
Sysfore Technologies
 
Configurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and ComplianceConfigurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and CompliancePortalGuard
 
Spring security jwt tutorial toptal
Spring security jwt tutorial   toptalSpring security jwt tutorial   toptal
Spring security jwt tutorial toptal
jbsysatm
 
Railsplitter: Simplify Your CRUD
Railsplitter: Simplify Your CRUDRailsplitter: Simplify Your CRUD
Railsplitter: Simplify Your CRUD
Flurry, Inc.
 
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
 Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1... Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
WebStackAcademy
 

Similar to Mule security jaas (20)

MULE-JAAS
MULE-JAASMULE-JAAS
MULE-JAAS
 
Mule security - jaas
Mule  security - jaasMule  security - jaas
Mule security - jaas
 
IBM Streams V4.1 and JAAS Login Module Support
IBM Streams V4.1 and JAAS Login Module SupportIBM Streams V4.1 and JAAS Login Module Support
IBM Streams V4.1 and JAAS Login Module Support
 
Steps to mitigate Top 5 OWASP Vulnerabilities 2013
Steps to mitigate Top 5 OWASP Vulnerabilities 2013Steps to mitigate Top 5 OWASP Vulnerabilities 2013
Steps to mitigate Top 5 OWASP Vulnerabilities 2013
 
Sap Access Risks Procedures
Sap Access  Risks ProceduresSap Access  Risks Procedures
Sap Access Risks Procedures
 
Spring security4.x
Spring security4.xSpring security4.x
Spring security4.x
 
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
 
Chapter 6 : Attack Execution (2)
Chapter 6 : Attack Execution (2)Chapter 6 : Attack Execution (2)
Chapter 6 : Attack Execution (2)
 
Sap basis and_security_administration
Sap basis and_security_administrationSap basis and_security_administration
Sap basis and_security_administration
 
Getting Started with IBM i Security: User Privileges
Getting Started with IBM i Security: User PrivilegesGetting Started with IBM i Security: User Privileges
Getting Started with IBM i Security: User Privileges
 
5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts5 Reasons to Always Keep an Eye on Privileged Business Accounts
5 Reasons to Always Keep an Eye on Privileged Business Accounts
 
Introduction to SAP Security
Introduction to SAP SecurityIntroduction to SAP Security
Introduction to SAP Security
 
Validation module in mule
Validation module in muleValidation module in mule
Validation module in mule
 
Managing Cloud identities in Hybrid Cloud | Sysfore
Managing Cloud identities in Hybrid Cloud | SysforeManaging Cloud identities in Hybrid Cloud | Sysfore
Managing Cloud identities in Hybrid Cloud | Sysfore
 
Configurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and ComplianceConfigurable Password Management: Balancing Usability and Compliance
Configurable Password Management: Balancing Usability and Compliance
 
Spring security jwt tutorial toptal
Spring security jwt tutorial   toptalSpring security jwt tutorial   toptal
Spring security jwt tutorial toptal
 
Railsplitter: Simplify Your CRUD
Railsplitter: Simplify Your CRUDRailsplitter: Simplify Your CRUD
Railsplitter: Simplify Your CRUD
 
Java EE Services
Java EE ServicesJava EE Services
Java EE Services
 
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
 Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1... Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
 
Saas security
Saas securitySaas security
Saas security
 

More from Phaniu

Anypoint data gateway
Anypoint data gatewayAnypoint data gateway
Anypoint data gateway
Phaniu
 
Data weave
Data weave Data weave
Data weave
Phaniu
 
How to use expression filter
How to use expression filterHow to use expression filter
How to use expression filter
Phaniu
 
How to use message properties component
How to use message properties componentHow to use message properties component
How to use message properties component
Phaniu
 
Mapping and listing with mule
Mapping and listing with muleMapping and listing with mule
Mapping and listing with mule
Phaniu
 
Mmc rest api user groups
Mmc rest api user groupsMmc rest api user groups
Mmc rest api user groups
Phaniu
 
Mmc
MmcMmc
Mmc
Phaniu
 
Mmc 2
Mmc 2Mmc 2
Mmc 2
Phaniu
 
Mule esb stripe
Mule esb stripeMule esb stripe
Mule esb stripe
Phaniu
 
Mule for each scope headerc ollection
Mule for each scope headerc ollectionMule for each scope headerc ollection
Mule for each scope headerc ollection
Phaniu
 
Mule esb
Mule esbMule esb
Mule esb
Phaniu
 
Mule for each scope headerc ollection
Mule for each scope headerc ollectionMule for each scope headerc ollection
Mule for each scope headerc ollection
Phaniu
 
Mule for each scope headerc ollection
Mule for each scope headerc ollectionMule for each scope headerc ollection
Mule for each scope headerc ollection
Phaniu
 
Mule esb
Mule esbMule esb
Mule esb
Phaniu
 
Mule for each scope headerc ollection
Mule for each scope headerc ollectionMule for each scope headerc ollection
Mule for each scope headerc ollection
Phaniu
 
Mule security jaas
Mule security jaasMule security jaas
Mule security jaas
Phaniu
 
Mule security saml
Mule security samlMule security saml
Mule security saml
Phaniu
 
Mule soa
Mule soaMule soa
Mule soa
Phaniu
 
Mule soap
Mule soapMule soap
Mule soap
Phaniu
 
Mule soap
Mule soapMule soap
Mule soap
Phaniu
 

More from Phaniu (20)

Anypoint data gateway
Anypoint data gatewayAnypoint data gateway
Anypoint data gateway
 
Data weave
Data weave Data weave
Data weave
 
How to use expression filter
How to use expression filterHow to use expression filter
How to use expression filter
 
How to use message properties component
How to use message properties componentHow to use message properties component
How to use message properties component
 
Mapping and listing with mule
Mapping and listing with muleMapping and listing with mule
Mapping and listing with mule
 
Mmc rest api user groups
Mmc rest api user groupsMmc rest api user groups
Mmc rest api user groups
 
Mmc
MmcMmc
Mmc
 
Mmc 2
Mmc 2Mmc 2
Mmc 2
 
Mule esb stripe
Mule esb stripeMule esb stripe
Mule esb stripe
 
Mule for each scope headerc ollection
Mule for each scope headerc ollectionMule for each scope headerc ollection
Mule for each scope headerc ollection
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule for each scope headerc ollection
Mule for each scope headerc ollectionMule for each scope headerc ollection
Mule for each scope headerc ollection
 
Mule for each scope headerc ollection
Mule for each scope headerc ollectionMule for each scope headerc ollection
Mule for each scope headerc ollection
 
Mule esb
Mule esbMule esb
Mule esb
 
Mule for each scope headerc ollection
Mule for each scope headerc ollectionMule for each scope headerc ollection
Mule for each scope headerc ollection
 
Mule security jaas
Mule security jaasMule security jaas
Mule security jaas
 
Mule security saml
Mule security samlMule security saml
Mule security saml
 
Mule soa
Mule soaMule soa
Mule soa
 
Mule soap
Mule soapMule soap
Mule soap
 
Mule soap
Mule soapMule soap
Mule soap
 

Recently uploaded

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
Elena Simperl
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 

Recently uploaded (20)

FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Knowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and backKnowledge engineering: from people to machines and back
Knowledge engineering: from people to machines and back
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 

Mule security jaas

  • 2. 2 Jaas Security The JaasSimpleAuthenticationProvider is a security provider that provides a way to interact with the Jaas Authentication Service. The security provider for Jaas can be configured in a couple of different ways. It allows you to configure Jaas either by passing to the provider a Jaas configuration file or by passing the required attributes directly to the JaasSimpleAuthenticationProvider. These two configuration methods are described below.
  • 3. 3 Jaas Configuration Using the Jaas Configuration File Usually, JAAS authentication is performed in a pluggable fashion, so applications can remain independent from underlying authentication technologies. jaasTest{ org.mule.module.jaas.loginmodule.DefaultLoginModule required credentials="anon:anon;Marie.Rizzo:dragon;" };
  • 4. 4 The above example was saved in a file called jaas.conf. This file contains just one entry called com.ss.jaasTest, which is where the application we want to protect can be found. The entry specifies the login module that's used to authenticate the user. As a login module, you can either use Mule's DefaultLoginModule, one of the login modules that come with Sun, or else create your own. In this case, we have opted for Mule's DefaultLoginModule.
  • 5. 5 The required flag that follows the login module specifies that the login module must succeed for the authentication to be considered successful. Additional flags are: Required - The login module is required to succeed. If it succeeds or fails, authentication still continues to proceed down the login module list. Requisite - The login module is required to succeed. If it succeeds, authentication continues down the login module list. If it fails, control immediately returns to the application. Sufficient - The login module is not required to succeed. If it does succeed, control immediately returns to the application (authentication does not proceed down the login module list). If it fails, authentication continues down the login module list. Optional - The login module is not required to succeed. If it succeeds or fails, authentication still continues to proceed down the login module list.
  • 6. 6 The entry also specifies the credentials, in which we put a string of authorized users together with their passwords. The credentials are put here only when the DefaultLoginModule is going to be used, as the method in which the user names and passwords are obtained may vary from one login module to another. The format of the credentials string must adhere to the following format if the DefaultLoginModule is going to be used: <username>:<password>;
  • 7. 7 Configuring the Provider in the Mule Configuration File <mule xmlns="http://www.mulesource.org/schema/mule/core/3.2" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:jaas="http://www.mulesource.org/schema/mule/jaas/3.2" ...cut... <jaas:security-manager> <jaas:security-provider name="jaasSecurityProvider" loginContextName="jaasTest" loginConfig="jaas.conf"/> </jaas:security-manager>