SlideShare a Scribd company logo
Security-Jaas
2
Jaas Security
The JaasSimpleAuthenticationProvider is a security provider that provides
a way to interact with the Jaas Authentication Service.
The security provider for Jaas can be configured in a couple of different
ways. It allows you to configure Jaas either by passing to the provider a
Jaas configuration file or by passing the required attributes directly to the
JaasSimpleAuthenticationProvider. These two configuration methods are
described below.
3
Jaas Configuration
Using the Jaas Configuration File
Usually, JAAS authentication is performed in a pluggable fashion, so
applications can remain independent from underlying authentication
technologies.
jaasTest{
org.mule.module.jaas.loginmodule.DefaultLoginModule required
credentials="anon:anon;Marie.Rizzo:dragon;"
};
4
The above example was saved in a file called jaas.conf. This file contains
just one entry called com.ss.jaasTest, which is where the application we
want to protect can be found. The entry specifies the login module that's
used to authenticate the user. As a login module, you can either use Mule's
DefaultLoginModule, one of the login modules that come with Sun, or else
create your own. In this case, we have opted for Mule's
DefaultLoginModule.
5
The required flag that follows the login module specifies that the login
module must succeed for the authentication to be considered successful.
Additional flags are:
Required - The login module is required to succeed. If it succeeds or fails,
authentication still continues to proceed down the login module list.
Requisite - The login module is required to succeed. If it succeeds,
authentication continues down the login module list. If it fails, control
immediately returns to the application.
Sufficient - The login module is not required to succeed. If it does succeed,
control immediately returns to the application (authentication does not
proceed down the login module list). If it fails, authentication continues
down the login module list.
Optional - The login module is not required to succeed. If it succeeds or
fails, authentication still continues to proceed down the login module list.
6
The entry also specifies the credentials, in which we put a string of
authorized users together with their passwords. The credentials are put
here only when the DefaultLoginModule is going to be used, as the method
in which the user names and passwords are obtained may vary from one
login module to another.
The format of the credentials string must adhere to the following format if
the DefaultLoginModule is going to be used:
<username>:<password>;
7
Configuring the Provider in the Mule Configuration File
<mule xmlns="http://www.mulesource.org/schema/mule/core/3.2"
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xmlns:jaas="http://www.mulesource.org/schema/mule/jaas/3.2"
...cut...
<jaas:security-manager>
<jaas:security-provider name="jaasSecurityProvider"
loginContextName="jaasTest" loginConfig="jaas.conf"/>
</jaas:security-manager>
Mule security jaas

More Related Content

PPT
Mule security - jaas
PPT
Mule security-jaas
PDF
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
PPTX
Secure Code Warrior - Cross site scripting
PDF
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
PPTX
Secure Code Warrior - Authentication
PPTX
Secure Code Warrior - Remote file inclusion
PPTX
Sql injection attack
Mule security - jaas
Mule security-jaas
Web Component Development Using Servlet & JSP Technologies (EE6) - Chapter 1...
Secure Code Warrior - Cross site scripting
OWASP Top 10 Vulnerabilities - A5-Broken Access Control; A6-Security Misconfi...
Secure Code Warrior - Authentication
Secure Code Warrior - Remote file inclusion
Sql injection attack

What's hot (13)

PDF
Broken access control
PDF
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
PPT
Security authorizationusingspringsecurity-sathyaraj
PPT
Mule security - authorization using spring security
PPTX
Mule validators
PDF
Broken access controls
PPTX
Beefing Up Security In ASP.NET Dot Net Bangalore 3rd meet up on May 16 2015
PPTX
ASP.NET Web Security
PPTX
A10 - Unvalidated Redirects and Forwards
PPTX
SQL Injection
PPTX
Web Security: SQL Injection
PDF
Obiee 11g security creating users groups and catalog permissions
PPTX
Application security [appsec]
Broken access control
What is SQL Injection Attack | How to prevent SQL Injection Attacks? | Cybers...
Security authorizationusingspringsecurity-sathyaraj
Mule security - authorization using spring security
Mule validators
Broken access controls
Beefing Up Security In ASP.NET Dot Net Bangalore 3rd meet up on May 16 2015
ASP.NET Web Security
A10 - Unvalidated Redirects and Forwards
SQL Injection
Web Security: SQL Injection
Obiee 11g security creating users groups and catalog permissions
Application security [appsec]
Ad

Viewers also liked (20)

PPT
Sesion 4
PPTX
Sesion 5
ODP
Sense títol 1
PPTX
Sesion 4
PPTX
presentacion power point
PDF
核定計畫
PPTX
Presentation1
PPTX
Cartas y whatsapp alejandro
PPTX
Planning your Membership Campaign: MASAE 2014
PDF
criATIVIDADE & inovAÇÃO
PDF
Cirugía estética mamaria: aumento de pecho
PPTX
Estenosis del canal lumbar
PPTX
PDF
Glomerulonefritis Rápidamente Progresiva
PPT
Franycami
DOC
La historia___en__diversos__tiempos__y_lugares[1][1]
PPT
Motivos juarez leyes reforma exposición situacion problema
ODP
People Centric
PDF
Forum ATENA 2010: Facebook et liberté d'expression
PDF
Enquête sur les français et l'agriculture durable (Ginger - septembre 2010)
Sesion 4
Sesion 5
Sense títol 1
Sesion 4
presentacion power point
核定計畫
Presentation1
Cartas y whatsapp alejandro
Planning your Membership Campaign: MASAE 2014
criATIVIDADE & inovAÇÃO
Cirugía estética mamaria: aumento de pecho
Estenosis del canal lumbar
Glomerulonefritis Rápidamente Progresiva
Franycami
La historia___en__diversos__tiempos__y_lugares[1][1]
Motivos juarez leyes reforma exposición situacion problema
People Centric
Forum ATENA 2010: Facebook et liberté d'expression
Enquête sur les français et l'agriculture durable (Ginger - septembre 2010)
Ad

Similar to Mule security jaas (20)

PPT
MULE-JAAS
PPT
Mule security - jaas
PPTX
Spring Security services for web applications
PDF
IBM Streams V4.1 and JAAS Login Module Support
PDF
Steps to mitigate Top 5 OWASP Vulnerabilities 2013
DOC
Sap Access Risks Procedures
PDF
Spring security4.x
PDF
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
PPTX
Chapter 6 : Attack Execution (2)
PDF
Sap basis and_security_administration
PDF
Getting Started with IBM i Security: User Privileges
PDF
5 Reasons to Always Keep an Eye on Privileged Business Accounts
PDF
Introduction to SAP Security
PPTX
Validation module in mule
PDF
Managing Cloud identities in Hybrid Cloud | Sysfore
PDF
Configurable Password Management: Balancing Usability and Compliance
PDF
Spring security jwt tutorial toptal
PDF
Railsplitter: Simplify Your CRUD
PDF
Java EE Services
MULE-JAAS
Mule security - jaas
Spring Security services for web applications
IBM Streams V4.1 and JAAS Login Module Support
Steps to mitigate Top 5 OWASP Vulnerabilities 2013
Sap Access Risks Procedures
Spring security4.x
ADAPTIVE AUTHENTICATION: A CASE STUDY FOR UNIFIED AUTHENTICATION PLATFORM
Chapter 6 : Attack Execution (2)
Sap basis and_security_administration
Getting Started with IBM i Security: User Privileges
5 Reasons to Always Keep an Eye on Privileged Business Accounts
Introduction to SAP Security
Validation module in mule
Managing Cloud identities in Hybrid Cloud | Sysfore
Configurable Password Management: Balancing Usability and Compliance
Spring security jwt tutorial toptal
Railsplitter: Simplify Your CRUD
Java EE Services

More from princeirfancivil (20)

PPTX
Web services uddi
PPTX
Web services wsdl
PPTX
Web services SOAP
PPTX
WebServices introduction
PPTX
Introduction to java
PPTX
Building and managing java projects with maven part-III
PPTX
PPTX
Maven part 1
PPT
Anypoint data gateway
PPTX
Data weave
PPTX
How to use expression filter
PPTX
How to use message properties component
PPTX
Mapping and listing with mule
PPTX
Mmc rest api user groups
PPTX
PPT
Mule esb api layer
PPTX
Mule esb stripe
PPTX
Web services uddi
Web services wsdl
Web services SOAP
WebServices introduction
Introduction to java
Building and managing java projects with maven part-III
Maven part 1
Anypoint data gateway
Data weave
How to use expression filter
How to use message properties component
Mapping and listing with mule
Mmc rest api user groups
Mule esb api layer
Mule esb stripe

Recently uploaded (20)

PPTX
Tartificialntelligence_presentation.pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Chapter 5: Probability Theory and Statistics
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
Architecture types and enterprise applications.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PDF
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PDF
STKI Israel Market Study 2025 version august
PPT
Module 1.ppt Iot fundamentals and Architecture
PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
PPTX
TLE Review Electricity (Electricity).pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPTX
1. Introduction to Computer Programming.pptx
Tartificialntelligence_presentation.pptx
WOOl fibre morphology and structure.pdf for textiles
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Chapter 5: Probability Theory and Statistics
Assigned Numbers - 2025 - Bluetooth® Document
observCloud-Native Containerability and monitoring.pptx
A comparative study of natural language inference in Swahili using monolingua...
Architecture types and enterprise applications.pdf
Web App vs Mobile App What Should You Build First.pdf
How ambidextrous entrepreneurial leaders react to the artificial intelligence...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
STKI Israel Market Study 2025 version august
Module 1.ppt Iot fundamentals and Architecture
A novel scalable deep ensemble learning framework for big data classification...
TrustArc Webinar - Click, Consent, Trust: Winning the Privacy Game
TLE Review Electricity (Electricity).pptx
DP Operators-handbook-extract for the Mautical Institute
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
1. Introduction to Computer Programming.pptx

Mule security jaas

  • 2. 2 Jaas Security The JaasSimpleAuthenticationProvider is a security provider that provides a way to interact with the Jaas Authentication Service. The security provider for Jaas can be configured in a couple of different ways. It allows you to configure Jaas either by passing to the provider a Jaas configuration file or by passing the required attributes directly to the JaasSimpleAuthenticationProvider. These two configuration methods are described below.
  • 3. 3 Jaas Configuration Using the Jaas Configuration File Usually, JAAS authentication is performed in a pluggable fashion, so applications can remain independent from underlying authentication technologies. jaasTest{ org.mule.module.jaas.loginmodule.DefaultLoginModule required credentials="anon:anon;Marie.Rizzo:dragon;" };
  • 4. 4 The above example was saved in a file called jaas.conf. This file contains just one entry called com.ss.jaasTest, which is where the application we want to protect can be found. The entry specifies the login module that's used to authenticate the user. As a login module, you can either use Mule's DefaultLoginModule, one of the login modules that come with Sun, or else create your own. In this case, we have opted for Mule's DefaultLoginModule.
  • 5. 5 The required flag that follows the login module specifies that the login module must succeed for the authentication to be considered successful. Additional flags are: Required - The login module is required to succeed. If it succeeds or fails, authentication still continues to proceed down the login module list. Requisite - The login module is required to succeed. If it succeeds, authentication continues down the login module list. If it fails, control immediately returns to the application. Sufficient - The login module is not required to succeed. If it does succeed, control immediately returns to the application (authentication does not proceed down the login module list). If it fails, authentication continues down the login module list. Optional - The login module is not required to succeed. If it succeeds or fails, authentication still continues to proceed down the login module list.
  • 6. 6 The entry also specifies the credentials, in which we put a string of authorized users together with their passwords. The credentials are put here only when the DefaultLoginModule is going to be used, as the method in which the user names and passwords are obtained may vary from one login module to another. The format of the credentials string must adhere to the following format if the DefaultLoginModule is going to be used: <username>:<password>;
  • 7. 7 Configuring the Provider in the Mule Configuration File <mule xmlns="http://www.mulesource.org/schema/mule/core/3.2" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:jaas="http://www.mulesource.org/schema/mule/jaas/3.2" ...cut... <jaas:security-manager> <jaas:security-provider name="jaasSecurityProvider" loginContextName="jaasTest" loginConfig="jaas.conf"/> </jaas:security-manager>