The default security settings block access to a broker's remote ports. If you want to access the Fuse MQ Enterprise runtime remotely, you must first customize the security configuration. The first thing you will want to do is create at least one JAAS user. This will enable remote access to the broker.
Other common configuration changes you may want to make are:
configure access to the Web console
assign roles to each of the remote ports to limit access
strengthen the credentials needed to access the remote console
By default, no JAAS users are defined for the container, which effectively disables remote access (it is impossible to log on).
To create a secure JAAS user, edit the
file and add a new
user field, as follows:InstallDir/etc/users.properties
Username=Password,admin
Where and
Username are the new user credentials. The
Passwordadmin role gives this user the privileges to access all administration and
management functions of the container. For more details about JAAS, see
JAAS Authentication in Security Guide.
![]() | Warning |
|---|---|
It is strongly recommended that you define custom user credentials with a strong password. |
If you want to access the Web console (for remote administration of JMS messaging), you must provide the Web console servlet with the credentials it needs to login to the JMS broker.
Edit the file
and modify the InstallDir/etc/system.propertieswebconsole.jmx.* and webconsole.jms.* properties as
follows:
webconsole.jmx.user=Usernamewebconsole.jmx.password=Passwordwebconsole.jms.user=Usernamewebconsole.jms.password=Password
Where the and
Username are the credentials of a JAAS user with
Passwordadmin privileges.
For more details on securing the Web console see Securing the Web Console.
You can independently configure roles for the following different administrative protocols:
SSH (remote console login)
To override the default role for the remote console add a
sshRoleproperty to theorg.apache.karaf.shellPID. The following sets the role toadmin:sshRole=admin
JMX management
To override the default role for JMX add a
jmxRoleproperty to theorg.apache.karaf.managementPID. The following sets the role tojmx:jmxRole=jmx
Web console
You can employ the following measures to strengthen security on the remote console port:
Make sure that the JAAS user credentials have strong passwords.
Customize the X.509 certificate (replace the Java keystore file,
, with a custom key pair).InstallDir/etc/host.key
For more details, see Securing the Fuse MQ Enterprise Container.






![[Warning]](imagesdb/warning.gif)


