LibraryToggle FramesPrintFeedback

Fuse MQ Enterprise Security Overview

Overview

The Fuse MQ Enterprise runtime exposes three ports for remote access. These ports, which are mostly intended for managing the broker, are essentially disabled by default. They are configured to require authentication, but have no defined users. This makes the broker immune to breaches, but is not ideal for remote management.

Ports exposed by the Fuse MQ Enterprise container

Figure 2 shows the ports exposed by the Fuse MQ Enterprise container by default.

Figure 2. Ports Exposed by the Fuse MQ Enterprise Container

Ports Exposed by the Fuse MQ Enterprise Container

The following ports are exposed by the container:

  • Console port—enables remote control of a container instance, through Apache Karaf shell commands. This port is enabled by default and is secured both by JAAS authentication and by SSL.

  • JMX port—enables management of the container through the JMX protocol. This port is enabled by default and is secured by JAAS authentication.

  • Web console port—provides access to an embedded Jetty container that can host Web console servlet.

Authentication and authorization system

Fuse MQ Enterprise uses Java Authentication and Authorization Service (JAAS) for ensuring the users trying to access the broker have the proper credentials. The implementation is modular, with individual JAAS modules providing the authentication implementations. Fuse MQ Enterprise's command console provides commands to configure the JAAS system.

Comments powered by Disqus