SlideShare a Scribd company logo
Geneva JUG, Aug 2014 
Introduction to Role Based Administration in WildFly 8 
Dimitris Andreadis 
JBoss EAP / WildFly 
Senior Engineering Manager 
Red Hat
Geneva JUG, Aug 2014 
Agenda 
•Admin Access Control 
•Configuring Roles 
•Configuring Constraints
Geneva JUG, Aug 2014 
WildFly v8 – Main Features 
•Java EE7 support 
•High Performance Web Server (Undertow) 
•Reduced Port Usage 
•Patching Infrastructure 
•Audit Logging 
•Role Based Administration
Geneva JUG, Aug 2014 
Admin Access Control in AS7 
•In JBoss AS7 authenticating with the management security realm provides full server control 
•All-or-nothing 
•Many users have more fine-grained requirements
Geneva JUG, Aug 2014 
Roles based Admin in WF8 
•Administrative users can be mapped to Roles 
•Role is set of Permissions 
•Permissions specify which Actions (lookup, read, write) are allowed on resources classified as: 
•Sensitive resource types, attributes, operations or data 
•Audit Resources 
•Application Resources
Geneva JUG, Aug 2014 
Predefined Roles 
•Basic Administration 
•Monitor 
•Operator 
•Maintainer 
•Deployer 
•Elevated Privileges 
•Administrator 
•Auditor 
•Super User
Geneva JUG, Aug 2014 
Monitor Role 
•Read Only Permissions 
•Runtime info: Read 
•Config info: Read 
•Sensitive info: No Access 
•Audit Log info: No Access 
•Browse server config and metrics 
Monitor R: r S: - C: r A: -
Geneva JUG, Aug 2014 
•Based on Monitor Role 
•plus ability to modify Runtime state 
•reload/shutdown a server 
•pause/resume JMS queues 
•flush connection pools 
•… 
Operator R: rw 
Operator Role 
Monitor R: r S: - C: r A: -
Geneva JUG, Aug 2014 
•Based on Operator Role 
•plus ability to modify configuration 
•deploy applications 
•setup datasources 
•setup JMS destinations 
•… 
Maintainer C: rw 
Operator R: rw 
Maintainer Role 
Monitor R: r S: - C: r A: -
Geneva JUG, Aug 2014 
•Based on Maintainer Role 
•but constrained to managing application deployments 
•… 
Deployer D: rw 
Maintainer C: rw 
Operator R: rw 
Deployer Role 
Monitor R: r S: - C: r A: -
Geneva JUG, Aug 2014 
•Based on Maintainer Role 
•can modify Sensitive information 
•still cannot access Audit Logging! 
•Setup the access control system 
•… 
Administrator S: rw 
Maintainer C: rw 
Operator R: rw 
Administrator Role 
Monitor R: r S: - C: r A: -
Geneva JUG, Aug 2014 
•Based on Monitor Role 
•plus ability to manage Audit Logging 
•and read Sensitive configuration 
•setup Audit Logging 
•read users, passwords 
•… 
Auditor S: r A:rw 
Auditor Role 
Monitor R: r S: - C: r A: -
Geneva JUG, Aug 2014 
SuperUser A: rw 
•Has all permissions 
•equivalent to an AS7 admin 
Administrator S: rw 
Maintainer C: rw 
Operator R: rw 
SuperUser Role 
Monitor R: r S: - C: r A: -
Geneva JUG, Aug 2014 
Access Control Providers 
•“simple” 
•any authenticated admin has all privileges 
•consistent with AS 7 behavior 
•the default 
•“rbac” 
•users are mapped to roles 
•new in WF 8
Geneva JUG, Aug 2014 
Security Realm 
Mapping Users to Roles 
User 
Role 
Group 
Access Control Provider
Geneva JUG, Aug 2014 
Scoped Roles 
•New roles can be created based on the standard ones 
•With Additional Permissions for limiting write access 
•to certain Hosts (Host Scoped) 
•to certain Server Groups (Server Group Scoped)
Geneva JUG, Aug 2014 
Sensitive Resources 
•Anything (resources, attributes, operations) that we want to restrict access for: 
•Addressing, Reading, Writing 
•Annotated with a sensitivity classification 
•System-wide (e.g. SOCKET_CONFIG) 
•Subsystem-scoped (e.g. JMS_SECURITY_SETTING)
Geneva JUG, Aug 2014 
Sensitive Data 
•AS7/WildFly supports an external security vault for storing sensitive information (e.g. passwords)* 
•By default, attributes using the vault syntax are classified as sensitive for reading/writing 
The syntax to access the vault ${VAULT::VaultBlock::AttributeName::SharedKey} 
*Password Masking
Geneva JUG, Aug 2014 
Application Resources 
•Main focus of the Deployer Role 
•to manage Deployments 
•Subsystems may annotate Application Resources 
•e.g. JMS destinations, Datasources 
•Additional Resource Types can be configured 
•but it applies to all Resources of that Type
Geneva JUG, Aug 2014 
JMX Access Control 
•Same access control rules apply to the jboss.as & jboss.as.expr JMX domains 
•MBeans in other JMX domains can be marked Sensitive 
•Yes – access only for Administrator, SuperUser 
•No – Monitor, Auditor, Deployer can only read
Geneva JUG, Aug 2014 
Future Directions 
•Custom Scoped Roles 
•Explicitly configure list or resources in scope 
•Use environmental data in role mapping, e.g. 
•time of day, day of week etc 
•whether incoming connection uses TLS 
•SPI and plug point for custom implementations 
•Delegate to a corporate XACML infrastructure
Geneva JUG, Aug 2014 
Get Involved! 
www.wildfly.org 
community.jboss.org/en/wildfly 
#wildfly on irc.freenode.net 
dandreadis.blogspot.ch @dandreadis

More Related Content

PDF
Devoxx 2013, WildFly BOF
PDF
WildFly AppServer - State of the Union
PDF
WildFly BOF and V9 update @ Devoxx 2014
PDF
WildFly v9 - State of the Union Session at Voxxed, Istanbul, May/9th 2015.
PDF
jboss.org-jboss.com
PDF
WildFly & WildFly Swarm
PDF
Turn you Java EE Monoliths into Microservices with WildFly Swarm
PDF
JBoss EAP / WildFly, State of the Union
Devoxx 2013, WildFly BOF
WildFly AppServer - State of the Union
WildFly BOF and V9 update @ Devoxx 2014
WildFly v9 - State of the Union Session at Voxxed, Istanbul, May/9th 2015.
jboss.org-jboss.com
WildFly & WildFly Swarm
Turn you Java EE Monoliths into Microservices with WildFly Swarm
JBoss EAP / WildFly, State of the Union

What's hot (20)

PPTX
Introduction to Wildfly 8 - Marchioni
PDF
EAP6 performance Tuning
PDF
JBoss Enterprise Application Platform 6 Troubleshooting
PDF
Oracle WebLogic Diagnostics & Perfomance tuning
PPT
J boss
DOCX
Instruction on creating a cluster on jboss eap environment
PDF
JBoss at Work: Using JBoss AS 6
PPTX
JBoss AS 7
PDF
JBoss AS / EAP and Java EE6
PPTX
Jboss Tutorial Basics
PDF
JBoss started guide
PDF
Extending WildFly
PPTX
JBOSS Training
PDF
Conduct JBoss EAP 6 seminar
PDF
AAI-1305 Choosing WebSphere Liberty for Java EE Deployments
PDF
JBoss AS7 Reloaded
PDF
What's New in WildFly 9?
PPTX
Jboss App Server
PDF
12 Things About WebLogic 12.1.3 #oow2014 #otnla15
PDF
Oracle WebLogic 11g Topology
Introduction to Wildfly 8 - Marchioni
EAP6 performance Tuning
JBoss Enterprise Application Platform 6 Troubleshooting
Oracle WebLogic Diagnostics & Perfomance tuning
J boss
Instruction on creating a cluster on jboss eap environment
JBoss at Work: Using JBoss AS 6
JBoss AS 7
JBoss AS / EAP and Java EE6
Jboss Tutorial Basics
JBoss started guide
Extending WildFly
JBOSS Training
Conduct JBoss EAP 6 seminar
AAI-1305 Choosing WebSphere Liberty for Java EE Deployments
JBoss AS7 Reloaded
What's New in WildFly 9?
Jboss App Server
12 Things About WebLogic 12.1.3 #oow2014 #otnla15
Oracle WebLogic 11g Topology
Ad

Similar to Introduction to Role Based Administration in WildFly 8 (20)

PPTX
A first Draft to Java Configuration
PDF
Hive contributors meetup apache sentry
PDF
大数据数据治理及数据安全
PPTX
Azure App Service Deep Dive
PPT
Websphere - Introduction to SSL part 1
PPTX
Hadoop Security Features That make your risk officer happy
PPTX
Hadoop Security Features that make your risk officer happy
PDF
Big SQL 3.0 - Fast and easy SQL on Hadoop
PPTX
Hadoop security @ Philly Hadoop Meetup May 2015
PDF
Applying Novell Identity Manager to Your Everyday Problems
PPTX
Hadoop and Data Access Security
PDF
Cache Security- The Basics
PPTX
Big Data Warehousing Meetup: Securing the Hadoop Ecosystem by Cloudera
PPT
Introduction_to_Active_Directory and Windows Server
PDF
Enterprise Use Case Webinar - PaaS Metering and Monitoring
PPTX
GCE11 Apache Rave Presentation
DOC
Devin Black RHELSA Resume 2
PDF
Introduction to the IBM Java Tools
PDF
Webinar: What's new in CDAP 3.5?
PPTX
Enabling .NET Apps with Monitoring and Management Using Steeltoe
A first Draft to Java Configuration
Hive contributors meetup apache sentry
大数据数据治理及数据安全
Azure App Service Deep Dive
Websphere - Introduction to SSL part 1
Hadoop Security Features That make your risk officer happy
Hadoop Security Features that make your risk officer happy
Big SQL 3.0 - Fast and easy SQL on Hadoop
Hadoop security @ Philly Hadoop Meetup May 2015
Applying Novell Identity Manager to Your Everyday Problems
Hadoop and Data Access Security
Cache Security- The Basics
Big Data Warehousing Meetup: Securing the Hadoop Ecosystem by Cloudera
Introduction_to_Active_Directory and Windows Server
Enterprise Use Case Webinar - PaaS Metering and Monitoring
GCE11 Apache Rave Presentation
Devin Black RHELSA Resume 2
Introduction to the IBM Java Tools
Webinar: What's new in CDAP 3.5?
Enabling .NET Apps with Monitoring and Management Using Steeltoe
Ad

Recently uploaded (20)

PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Modernizing your data center with Dell and AMD
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Network Security Unit 5.pdf for BCA BBA.
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Empathic Computing: Creating Shared Understanding
PDF
Encapsulation theory and applications.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Understanding_Digital_Forensics_Presentation.pptx
Mobile App Security Testing_ A Comprehensive Guide.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
MYSQL Presentation for SQL database connectivity
Diabetes mellitus diagnosis method based random forest with bat algorithm
Modernizing your data center with Dell and AMD
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Monthly Chronicles - July 2025
Network Security Unit 5.pdf for BCA BBA.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Machine learning based COVID-19 study performance prediction
Reach Out and Touch Someone: Haptics and Empathic Computing
Review of recent advances in non-invasive hemoglobin estimation
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Empathic Computing: Creating Shared Understanding
Encapsulation theory and applications.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Agricultural_Statistics_at_a_Glance_2022_0.pdf

Introduction to Role Based Administration in WildFly 8

  • 1. Geneva JUG, Aug 2014 Introduction to Role Based Administration in WildFly 8 Dimitris Andreadis JBoss EAP / WildFly Senior Engineering Manager Red Hat
  • 2. Geneva JUG, Aug 2014 Agenda •Admin Access Control •Configuring Roles •Configuring Constraints
  • 3. Geneva JUG, Aug 2014 WildFly v8 – Main Features •Java EE7 support •High Performance Web Server (Undertow) •Reduced Port Usage •Patching Infrastructure •Audit Logging •Role Based Administration
  • 4. Geneva JUG, Aug 2014 Admin Access Control in AS7 •In JBoss AS7 authenticating with the management security realm provides full server control •All-or-nothing •Many users have more fine-grained requirements
  • 5. Geneva JUG, Aug 2014 Roles based Admin in WF8 •Administrative users can be mapped to Roles •Role is set of Permissions •Permissions specify which Actions (lookup, read, write) are allowed on resources classified as: •Sensitive resource types, attributes, operations or data •Audit Resources •Application Resources
  • 6. Geneva JUG, Aug 2014 Predefined Roles •Basic Administration •Monitor •Operator •Maintainer •Deployer •Elevated Privileges •Administrator •Auditor •Super User
  • 7. Geneva JUG, Aug 2014 Monitor Role •Read Only Permissions •Runtime info: Read •Config info: Read •Sensitive info: No Access •Audit Log info: No Access •Browse server config and metrics Monitor R: r S: - C: r A: -
  • 8. Geneva JUG, Aug 2014 •Based on Monitor Role •plus ability to modify Runtime state •reload/shutdown a server •pause/resume JMS queues •flush connection pools •… Operator R: rw Operator Role Monitor R: r S: - C: r A: -
  • 9. Geneva JUG, Aug 2014 •Based on Operator Role •plus ability to modify configuration •deploy applications •setup datasources •setup JMS destinations •… Maintainer C: rw Operator R: rw Maintainer Role Monitor R: r S: - C: r A: -
  • 10. Geneva JUG, Aug 2014 •Based on Maintainer Role •but constrained to managing application deployments •… Deployer D: rw Maintainer C: rw Operator R: rw Deployer Role Monitor R: r S: - C: r A: -
  • 11. Geneva JUG, Aug 2014 •Based on Maintainer Role •can modify Sensitive information •still cannot access Audit Logging! •Setup the access control system •… Administrator S: rw Maintainer C: rw Operator R: rw Administrator Role Monitor R: r S: - C: r A: -
  • 12. Geneva JUG, Aug 2014 •Based on Monitor Role •plus ability to manage Audit Logging •and read Sensitive configuration •setup Audit Logging •read users, passwords •… Auditor S: r A:rw Auditor Role Monitor R: r S: - C: r A: -
  • 13. Geneva JUG, Aug 2014 SuperUser A: rw •Has all permissions •equivalent to an AS7 admin Administrator S: rw Maintainer C: rw Operator R: rw SuperUser Role Monitor R: r S: - C: r A: -
  • 14. Geneva JUG, Aug 2014 Access Control Providers •“simple” •any authenticated admin has all privileges •consistent with AS 7 behavior •the default •“rbac” •users are mapped to roles •new in WF 8
  • 15. Geneva JUG, Aug 2014 Security Realm Mapping Users to Roles User Role Group Access Control Provider
  • 16. Geneva JUG, Aug 2014 Scoped Roles •New roles can be created based on the standard ones •With Additional Permissions for limiting write access •to certain Hosts (Host Scoped) •to certain Server Groups (Server Group Scoped)
  • 17. Geneva JUG, Aug 2014 Sensitive Resources •Anything (resources, attributes, operations) that we want to restrict access for: •Addressing, Reading, Writing •Annotated with a sensitivity classification •System-wide (e.g. SOCKET_CONFIG) •Subsystem-scoped (e.g. JMS_SECURITY_SETTING)
  • 18. Geneva JUG, Aug 2014 Sensitive Data •AS7/WildFly supports an external security vault for storing sensitive information (e.g. passwords)* •By default, attributes using the vault syntax are classified as sensitive for reading/writing The syntax to access the vault ${VAULT::VaultBlock::AttributeName::SharedKey} *Password Masking
  • 19. Geneva JUG, Aug 2014 Application Resources •Main focus of the Deployer Role •to manage Deployments •Subsystems may annotate Application Resources •e.g. JMS destinations, Datasources •Additional Resource Types can be configured •but it applies to all Resources of that Type
  • 20. Geneva JUG, Aug 2014 JMX Access Control •Same access control rules apply to the jboss.as & jboss.as.expr JMX domains •MBeans in other JMX domains can be marked Sensitive •Yes – access only for Administrator, SuperUser •No – Monitor, Auditor, Deployer can only read
  • 21. Geneva JUG, Aug 2014 Future Directions •Custom Scoped Roles •Explicitly configure list or resources in scope •Use environmental data in role mapping, e.g. •time of day, day of week etc •whether incoming connection uses TLS •SPI and plug point for custom implementations •Delegate to a corporate XACML infrastructure
  • 22. Geneva JUG, Aug 2014 Get Involved! www.wildfly.org community.jboss.org/en/wildfly #wildfly on irc.freenode.net dandreadis.blogspot.ch @dandreadis