Red Hat Customer Portal

Skip to main content

Main Navigation

  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
Red Hat Customer Portal
  • Products & Services
    • Back
    • View All Products
    • Infrastructure and Management
      • Back
      • Red Hat Enterprise Linux
      • Red Hat Virtualization
      • Red Hat Identity Management
      • Red Hat Directory Server
      • Red Hat Certificate System
      • Red Hat Satellite
      • Red Hat Subscription Management
      • Red Hat Update Infrastructure
      • Red Hat Insights
      • Red Hat Ansible Automation Platform
    • Cloud Computing
      • Back
      • Red Hat CloudForms
      • Red Hat OpenStack Platform
      • Red Hat OpenShift Container Platform
      • Red Hat OpenShift Online
      • Red Hat OpenShift Dedicated
      • Red Hat Advanced Cluster Management for Kubernetes
      • Red Hat Quay
      • Red Hat CodeReady Workspaces
    • Storage
      • Back
      • Red Hat Gluster Storage
      • Red Hat Hyperconverged Infrastructure
      • Red Hat Ceph Storage
      • Red Hat Openshift Container Storage
    • Runtimes
      • Back
      • Red Hat Runtimes
      • Red Hat JBoss Enterprise Application Platform
      • Red Hat Data Grid
      • Red Hat JBoss Web Server
      • Red Hat Single Sign On
      • Red Hat support for Spring Boot
      • Red Hat build of Node.js
      • Red Hat build of Thorntail
      • Red Hat build of Eclipse Vert.x
      • Red Hat build of OpenJDK
      • Red Hat build of Quarkus
      • Red Hat CodeReady Studio
    • Integration and Automation
      • Back
      • Red Hat Integration
      • Red Hat Fuse
      • Red Hat AMQ
      • Red Hat 3scale API Management
      • Red Hat JBoss Data Virtualization
      • Red Hat Process Automation
      • Red Hat Process Automation Manager
      • Red Hat Decision Manager
    • Support
    • Production Support
    • Development Support
    • Product Life Cycles
    • Documentation
    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    • Services
    • Consulting
    • Technical Account Management
    • Training & Certifications
    • Ecosystem Catalog
    • Partner Resources
    • Red Hat in the Public Cloud
  • Tools
    • Back
    • Red Hat Insights
    • Tools
    • Solution Engine
    • Packages
    • Errata
    • Customer Portal Labs
    • Explore Labs
    • Configuration
    • Deployment
    • Security
    • Troubleshooting
  • Security
    • Back
    • Product Security Center
    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Security Labs
    • Resources
    • Overview
    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community
    • Back
    • Customer Portal Community
    • Discussions
    • Blogs
    • Private Groups
    • Community Activity
    • Customer Events
    • Red Hat Convergence
    • Red Hat Summit
    • Stories
    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Account
    • Back
    • Log In
    • Register
    • Red Hat Account Number:
    • Account Details
    • User Management
    • Account Maintenance
    • My Profile
    • Notifications
    • Help
    • Log Out
  • Language
    • Back
    • English
    • 한국어
    • 日本語
    • 中文 (中国)
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Search
  • Log In
  • Language
Or troubleshoot an issue.

Log in to Your Red Hat Account

Log In

Your Red Hat account gives you access to your profile, preferences, and services, depending on your status.

Register

If you are a new customer, register now for access to product evaluations and purchasing capabilities.

Need access to an account?

If your company has an existing Red Hat account, your organization administrator can grant you access.

If you have any questions, please contact customer service.

Red Hat Account Number:

Red Hat Account

  • Account Details
  • User Management
  • Account Maintenance
  • Account Team

Customer Portal

  • My Profile
  • Notifications
  • Help

For your security, if you’re on a public computer and have finished using your Red Hat services, please be sure to log out.

Log Out

Select Your Language

  • English
  • 한국어
  • 日本語
  • 中文 (中国)
Red Hat Customer Portal Red Hat Customer Portal
  • Products & Services
  • Tools
  • Security
  • Community
  • Infrastructure and Management

  • Cloud Computing

  • Storage

  • Runtimes

  • Integration and Automation

  • Red Hat Enterprise Linux
  • Red Hat Virtualization
  • Red Hat Identity Management
  • Red Hat Directory Server
  • Red Hat Certificate System
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Update Infrastructure
  • Red Hat Insights
  • Red Hat Ansible Automation Platform
  • Red Hat CloudForms
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Online
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat CodeReady Workspaces
  • Red Hat OpenShift Service on AWS
  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat Openshift Container Storage
  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Thorntail
  • Red Hat build of Eclipse Vert.x
  • Red Hat build of OpenJDK
  • Red Hat build of Quarkus
  • Red Hat CodeReady Studio
  • Red Hat Integration
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
  • Red Hat JBoss Data Virtualization
  • Red Hat Process Automation
  • Red Hat Process Automation Manager
  • Red Hat Decision Manager
View All Products
  • Support
  • Production Support
  • Development Support
  • Product Life Cycles

Services

  • Consulting
  • Technical Account Management
  • Training & Certifications
  • Documentation
  • Red Hat Enterprise Linux
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Ecosystem Catalog
  • Red Hat in the Public Cloud
  • Partner Resources

Tools

  • Solution Engine
  • Packages
  • Errata
  • Customer Portal Labs
  • Configuration
  • Deployment
  • Security
  • Troubleshooting

Red Hat Insights

Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

  • Learn more
  • Go to Insights

Red Hat Product Security Center

Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

Product Security Center

Security Updates

  • Security Advisories
  • Red Hat CVE Database
  • Security Labs

Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

  • View Responses

Resources

  • Overview
  • Security Blog
  • Security Measurement
  • Severity Ratings
  • Backporting Policies
  • Product Signing (GPG) Keys

Customer Portal Community

  • Discussions
  • Blogs
  • Private Groups
  • Community Activity

Customer Events

  • Red Hat Convergence
  • Red Hat Summit

Stories

  • Red Hat Subscription Value
  • You Asked. We Acted.
  • Open Source Communities
Show Table of Contents
Hide Table of Contents
  • 日本語
  • English
  • Single-page HTML
  • PDF
  • ePub
  1. Administration and Configuration Guide
  2. Preface
  3. 1. Introduction to Administering the JBoss Enterprise Application Platform
    1. 1.1. Introducing JBoss Enterprise Application Platform 6
    2. 1.2. New and Changed Features in JBoss Enterprise Application Platform 6
  4. 2. Application Server Management
    1. 2.1. Manage the Application Server
    2. 2.2. Installation Structure and Details
    3. 2.3. JBoss Enterprise Application Platform 6 Profiles
    4. 2.4. About JBoss Enterprise Application Platform 6 Configuration Files
    5. 2.5. Management APIs
      1. 2.5.1. Management Application Programming Interfaces (APIs)
    6. 2.6. Start JBoss Enterprise Application Platform 6
      1. 2.6.1. Start JBoss Enterprise Application Platform 6
      2. 2.6.2. Start JBoss Enterprise Application Platform 6 as a Standalone Server
      3. 2.6.3. Start JBoss Enterprise Application Platform 6 as a Managed Domain
      4. 2.6.4. Start JBoss Enterprise Application Platform 6 with an Alternative Configuration
      5. 2.6.5. Stop JBoss Enterprise Application Platform 6
      6. 2.6.6. Reference of Switches and Arguments to pass at Server Runtime
    7. 2.7. Run JBoss Enterprise Application Platform 6 as a Service
      1. 2.7.1. Run JBoss Enterprise Application Platform 6 as an Operating System Service
      2. 2.7.2. Install JBoss Enterprise Application Platform as a Service in Red Hat Enterprise Linux
      3. 2.7.3. Install JBoss Enterprise Application Platform 6 as a Service in Microsoft Windows
    8. 2.8. Start and Stop Servers
      1. 2.8.1. Start and Stop Servers
      2. 2.8.2. Start a Server Using the Management Console
      3. 2.8.3. Stop a Server Using the Management Console
    9. 2.9. Filesystem Paths
      1. 2.9.1. Filesystem Paths
    10. 2.10. Configuration File History
      1. 2.10.1. Configuration File History
      2. 2.10.2. Start the Server with a Previous Configuration
      3. 2.10.3. Save a Configuration Snapshot Using the Management CLI
      4. 2.10.4. Load a Configuration Snapshot
      5. 2.10.5. Delete a Configuration Snapshot Using Management CLI
      6. 2.10.6. List All Configuration Snapshots Using Management CLI
  5. 3. Management Interfaces
    1. 3.1. About the Management Console and Management CLI
    2. 3.2. The Management Console
      1. 3.2.1. Management Console
      2. 3.2.2. Log in to the Management Console
      3. 3.2.3. Change the Language of the Management Console
      4. 3.2.4. Configure a Server Using the Management Console
      5. 3.2.5. Add a Deployment in the Management Console
      6. 3.2.6. Create a New Server in the Management Console
      7. 3.2.7. Change the Default Log Levels Using the Management Console
      8. 3.2.8. Create a New Server Group in the Management Console
    3. 3.3. The Management CLI
      1. 3.3.1. About the Management Command Line Interface (CLI)
      2. 3.3.2. Launch the Management CLI
      3. 3.3.3. Quit the Management CLI
      4. 3.3.4. Connect to a Managed Server Instance Using the Management CLI
      5. 3.3.5. Get Help with the Management CLI
      6. 3.3.6. Use the Management CLI in Batch Mode
      7. 3.3.7. Use Operations and Commands in the Management CLI
      8. 3.3.8. Reference of Management CLI Commands
      9. 3.3.9. Reference of Management CLI Operations
    4. 3.4. Management CLI Operations
      1. 3.4.1. Display the Attributes of a Resource with the Management CLI
      2. 3.4.2. Display the Active User in the Management CLI
      3. 3.4.3. Display System and Server Information in the Management CLI
      4. 3.4.4. Display an Operation Description using the Management CLI
      5. 3.4.5. Display the Operation Names using the Management CLI
      6. 3.4.6. Display Available Resources using the Management CLI
      7. 3.4.7. Display Available Resource Descriptions using the Management CLI
      8. 3.4.8. Reload the Application Server using the Management CLI
      9. 3.4.9. Shut the Application Server down using the Management CLI
      10. 3.4.10. Configure an Attribute with the Management CLI
    5. 3.5. The Management CLI Command History
      1. 3.5.1. Use the Management CLI Command History
      2. 3.5.2. Show the Management CLI Command history
      3. 3.5.3. Clear the Management CLI Command history
      4. 3.5.4. Disable the Management CLI Command history
      5. 3.5.5. Enable the Management CLI Command history
  6. 4. User Management
    1. 4.1. User Creation
      1. 4.1.1. Add the Initial User for the Management Interfaces
      2. 4.1.2. Add a User to the Management Interface
  7. 5. Network and Port Configuration
    1. 5.1. Interfaces
      1. 5.1.1. About Interfaces
      2. 5.1.2. Configure Interfaces
    2. 5.2. Socket Binding Groups
      1. 5.2.1. About Socket Binding Groups
      2. 5.2.2. Configure Socket Bindings
      3. 5.2.3. Network Ports Used By JBoss Enterprise Application Platform 6
      4. 5.2.4. About Port Offsets for Socket Binding Groups
      5. 5.2.5. Configure Port Offsets
    3. 5.3. IPv6
      1. 5.3.1. Configure JVM Stack Preferences for IPv6 Networking
      2. 5.3.2. Configure the Interface Declarations for IPv6 Networking
      3. 5.3.3. Configure JVM Stack Preferences for IPv6 Addresses
  8. 6. Datasource Management
    1. 6.1. Introduction
      1. 6.1.1. About JDBC
      2. 6.1.2. JBoss Enterprise Application Platform 6 Supported Databases
      3. 6.1.3. Types of Datasources
      4. 6.1.4. The Example Datasource
      5. 6.1.5. Deployment of -ds.xml files
    2. 6.2. JDBC Drivers
      1. 6.2.1. Install a JDBC Driver with the Management Console
      2. 6.2.2. Install a JDBC Driver as a Core Module
      3. 6.2.3. JDBC Driver Download Locations
      4. 6.2.4. Access Vendor Specific Classes
    3. 6.3. Non-XA Datasources
      1. 6.3.1. Create a Non-XA Datasource with the Management Interfaces
      2. 6.3.2. Modify a Non-XA Datasource with the Management Interfaces
      3. 6.3.3. Remove a Non-XA Datasource with the Management Interfaces
    4. 6.4. XA Datasources
      1. 6.4.1. Create an XA Datasource with the Management Interfaces
      2. 6.4.2. Modify an XA Datasource with the Management Interfaces
      3. 6.4.3. Remove an XA Datasource with the Management Interfaces
      4. 6.4.4. XA Recovery
    5. 6.5. Datasource Security
      1. 6.5.1. About Datasource Security
    6. 6.6. Datasource Configuration
      1. 6.6.1. Datasource Parameters
      2. 6.6.2. Datasource Connection URLs
      3. 6.6.3. Datasource Extensions
    7. 6.7. Example Datasources
      1. 6.7.1. Example PostgreSQL Datasource
      2. 6.7.2. Example PostgreSQL XA Datasource
      3. 6.7.3. Example MySQL Datasource
      4. 6.7.4. Example MySQL XA Datasource
      5. 6.7.5. Example Oracle Datasource
      6. 6.7.6. Example Oracle XA Datsource
      7. 6.7.7. Example Microsoft SQLServer Datasource
      8. 6.7.8. Example Microsoft SQLServer XA Datasource
      9. 6.7.9. Example IBM DB2 Datasource
      10. 6.7.10. Example IBM DB2 XA Datasource
      11. 6.7.11. Example Sybase Datasource
      12. 6.7.12. Example Sybase XA Datasource
  9. 7. Configuring Modules
    1. 7.1. Introduction
      1. 7.1.1. Modules
      2. 7.1.2. Global Modules
      3. 7.1.3. Module Dependencies
      4. 7.1.4. Subdeployment Class Loader Isolation
    2. 7.2. Disable Sub-Deployment Module Isolation for All Deployments
    3. 7.3. Add a module to all deployments
    4. 7.4. Reference
      1. 7.4.1. Included Modules
      2. 7.4.2. Dynamic Module Naming
  10. 8. Application Deployment
    1. 8.1. About Application Deployment
    2. 8.2. Deploy with the Management Console
      1. 8.2.1. Manage Application Deployment in the Management Console
      2. 8.2.2. Deploy an Application Using the Management Console
      3. 8.2.3. Undeploy an Application Using the Management Console
    3. 8.3. Deploy with the Management CLI
      1. 8.3.1. Manage Application Deployment in the Management CLI
      2. 8.3.2. Deploy an Application in a Managed Domain Using the Management CLI
      3. 8.3.3. Undeploy an Application in a Managed Domain Using the Management CLI
      4. 8.3.4. Deploy an Application in a Standalone Server Using the Management CLI
      5. 8.3.5. Undeploy an Application in a Standalone Server Using the Management CLI
    4. 8.4. Deploy with the Deployment Scanner
      1. 8.4.1. Manage Application Deployment in the Deployment Scanner
      2. 8.4.2. Deploy an Application to a Standalone Server Instance with the Deployment Scanner
      3. 8.4.3. Undeploy an Application to a Standalone Server Instance with the Deployment Scanner
      4. 8.4.4. Redeploy an Application to a Standalone Server Instance with the Deployment Scanner
      5. 8.4.5. Reference for Deployment Scanner Marker Files
      6. 8.4.6. Reference for Deployment Scanner Attributes
      7. 8.4.7. Configure the Deployment Scanner
      8. 8.4.8. Configure the Deployment Scanner with the Management CLI
    5. 8.5. Deploy with Maven
      1. 8.5.1. Manage Application Deployment with Maven
      2. 8.5.2. Deploy an Application with Maven
      3. 8.5.3. Undeploy an Application with Maven
  11. 9. Securing JBoss Enterprise Application Platform
    1. 9.1. About the Security Subsystem
    2. 9.2. About the Structure of the Security Subsystem
    3. 9.3. Configure the Security Subsystem
    4. 9.4. About Deep Copy Subject Mode
    5. 9.5. Enable Deep Copy Subject Mode
    6. 9.6. Security Domains
      1. 9.6.1. About Security Domains
      2. 9.6.2. About Picketbox
      3. 9.6.3. About Authentication
      4. 9.6.4. Configure Authentication in a Security Domain
      5. 9.6.5. About Authorization
      6. 9.6.6. Configure Authorization in a Security Domain
      7. 9.6.7. About Security Auditing
      8. 9.6.8. Configure Security Auditing
      9. 9.6.9. About Security Mapping
      10. 9.6.10. Configure Security Mapping in a Security Domain
      11. 9.6.11. Use a Security Domain in Your Application
      12. 9.6.12. Java Authorization Contract for Containers (JACC)
      13. 9.6.13. Java Authentication SPI for Containers (JASPI)
    7. 9.7. Management Interface Security
      1. 9.7.1. Default User Security Configuration
      2. 9.7.2. Overview of Advanced Management Interface Configuration
      3. 9.7.3. About LDAP
      4. 9.7.4. Use LDAP to Authenticate to the Management Interfaces
      5. 9.7.5. Disable the HTTP Management Interface
      6. 9.7.6. Remove Silent Authentication from the Default Security Realm
      7. 9.7.7. Disable Remote Access to the JMX Subsystem
      8. 9.7.8. Configure Security Realms for the Management Interfaces
    8. 9.8. Network Security
      1. 9.8.1. Secure the Management Interfaces
      2. 9.8.2. Specify Which Network Interface the JBoss Enterprise Application Platform Uses
      3. 9.8.3. Configure Network Firewalls to Work with JBoss Enterprise Application Platform 6
      4. 9.8.4. Network Ports Used By JBoss Enterprise Application Platform 6
    9. 9.9. Java Security Manager
      1. 9.9.1. About the Java Security Manager
      2. 9.9.2. Run JBoss Enterprise Application Platform Within the Java Security Manager
      3. 9.9.3. About Java Security Manager Policies
      4. 9.9.4. Write a Java Security Manager Policy
      5. 9.9.5. Debug Security Manager Policies
    10. 9.10. Application Security
      1. 9.10.1. Enabling/Disabling Descriptor Based Property Replacement
    11. 9.11. Password Vaults for Sensitive Strings
      1. 9.11.1. About Securing Sensitive Strings in Clear-Text Files
      2. 9.11.2. Create a Java Keystore to Store Sensitive Strings
      3. 9.11.3. Mask the Keystore Password and Initialize the Password Vault
      4. 9.11.4. Configure the JBoss Enterprise Application Platform to Use the Password Vault
      5. 9.11.5. Store and Retrieve Encrypted Sensitive Strings in the Java Keystore
      6. 9.11.6. Store and Resolve Sensitive Strings In Your Applications
  12. 10. Security Administration Reference
    1. 10.1. Included Authentication Modules
    2. 10.2. Included Authorization Modules
    3. 10.3. Included Security Mapping Modules
    4. 10.4. Included Security Auditing Provider Modules
  13. 11. The Logging Subsystem
    1. 11.1. Introduction
      1. 11.1.1. Overview of Logging
      2. 11.1.2. Application Logging Frameworks Supported By JBoss LogManager
      3. 11.1.3. Configure Boot Logging
      4. 11.1.4. Default Log File Locations
      5. 11.1.5. About Log Levels
      6. 11.1.6. Supported Log Levels
      7. 11.1.7. About Log Categories
      8. 11.1.8. About the Root Logger
      9. 11.1.9. About Log Handlers
      10. 11.1.10. Types of Log Handlers
      11. 11.1.11. About Log Formatters
      12. 11.1.12. Log Formatter Syntax
    2. 11.2. Configure Logging in the Management Console
    3. 11.3. Logging Configuration in the CLI
      1. 11.3.1. Configure the Root Logger with the CLI
      2. 11.3.2. Configure a Log Category in the CLI
      3. 11.3.3. Configure a Console Log Handler in the CLI
      4. 11.3.4. Configure a File Log Handler in the CLI
      5. 11.3.5. Configure a Periodic Log Handler in the CLI
      6. 11.3.6. Configure a Size Log Handler in the CLI
      7. 11.3.7. Configure a Async Log Handler in the CLI
    4. 11.4. Logging Configuration Properties
      1. 11.4.1. Root Logger Properties
      2. 11.4.2. Log Category Properties
      3. 11.4.3. Console Log Handler Properties
      4. 11.4.4. File Log Handler Properties
      5. 11.4.5. Periodic Log Handler Properties
      6. 11.4.6. Size Log Handler Properties
      7. 11.4.7. Async Log Handler Properties
    5. 11.5. Sample XML Configuration for Logging
      1. 11.5.1. Sample XML Configuration for the Root Logger
      2. 11.5.2. Sample XML Configuration for a Log Category
      3. 11.5.3. Sample XML Configuration for a Console Log Handler
      4. 11.5.4. Sample XML Configuration for a File Log Handler
      5. 11.5.5. Sample XML Configuration for a Periodic Log Handler
      6. 11.5.6. Sample XML Configuration for a Size Log Handler
      7. 11.5.7. Sample XML Configuration for a Async Log Handler
  14. 12. JVM
    1. 12.1. About JVM
      1. 12.1.1. About JVM Settings
      2. 12.1.2. Display the JVM Status in the Management Console
  15. 13. HTTP Clustering and Load Balancing
    1. 13.1. Introduction
      1. 13.1.1. About High-Availability and Load Balancing Clusters
      2. 13.1.2. Components Which Can Benefit from High Availability
      3. 13.1.3. Overview of HTTP Connectors
      4. 13.1.4. Worker Node
    2. 13.2. General Configuration
      1. 13.2.1. Subsystem Configuration Overview
      2. 13.2.2. Configure the Web Subsystem
      3. 13.2.3. Implement SSL Encryption for the JBoss Enterprise Application Platform Web Server
      4. 13.2.4. Generate a SSL Encryption Key and Certificate
      5. 13.2.5. SSL Connector Reference
      6. 13.2.6. About Web Service Endpoints
      7. 13.2.7. Replace the Default Welcome Web Application
      8. 13.2.8. About the Stand-Alone HTTPD
      9. 13.2.9. Install the Apache HTTPD included with JBoss Enterprise Application Platform 6
      10. 13.2.10. Use an External HTTPD as the Web Front-end for JBoss Enterprise Application Platform Applications
      11. 13.2.11. Configure the JBoss Enterprise Application Platform to Accept Requests From an External HTTPD
      12. 13.2.12. Use TCP Communication for the Clustering Subsystem
      13. 13.2.13. Configure the JGroups Subsystem to Use TCP
      14. 13.2.14. Configure the mod_cluster Subsystem to Use TCP
    3. 13.3. Web, HTTP Connectors, and HTTP Clustering
      1. 13.3.1. About the mod_cluster HTTP Connector
      2. 13.3.2. Configure the mod_cluster Subsystem
      3. 13.3.3. Install the mod_cluster Module Into Apache HTTPD or Enterprise Web Server HTTPD
      4. 13.3.4. Configure Server Advertisement Properties for Your mod_cluster-enabled HTTPD
      5. 13.3.5. Configure a mod_cluster Worker Node
    4. 13.4. Apache mod_jk
      1. 13.4.1. About the Apache mod_jk HTTP Connector
      2. 13.4.2. Configure the JBoss Enterprise Application Platform to Communicate with Apache Mod_jk
      3. 13.4.3. Install the Mod_jk Module Into Apache HTTPD or Enterprise Web Server HTTPD
      4. 13.4.4. Configuration Reference for Apache Mod_jk Workers
    5. 13.5. Apache mod_proxy
      1. 13.5.1. About the Apache mod_proxy HTTP Connector
      2. 13.5.2. Install the Mod_proxy HTTP Connector Into Apache HTTPD
    6. 13.6. Microsoft ISAPI
      1. 13.6.1. About the Internet Server API (ISAPI) HTTP Connector
      2. 13.6.2. Configure Microsoft IIS to Use the ISAPI Redirector
      3. 13.6.3. Configure the ISAPI Redirector to Send Client Requests to the JBoss Enterprise Application Platform
      4. 13.6.4. Configure ISAPI to Balance Client Requests Across Multiple JBoss Enterprise Application Platform Servers
    7. 13.7. Oracle NSAPI
      1. 13.7.1. About the Netscape Server API (NSAPI) HTTP Connector
      2. 13.7.2. Configure the NSAPI Connector on Oracle Solaris
      3. 13.7.3. Configure NSAPI as a Basic HTTP Connector
      4. 13.7.4. Configure NSAPI as a Load-balancing Cluster
  16. 14. Messaging
    1. 14.1. HornetQ
      1. 14.1.1. HornetQ
      2. 14.1.2. About Java Messaging Service (JMS)
      3. 14.1.3. Supported Messaging Styles
      4. 14.1.4. About Acceptors and Connectors
      5. 14.1.5. About Bridges
      6. 14.1.6. Work with Large Messages
      7. 14.1.7. Configure High-availability (HA) Failover
      8. 14.1.8. Embed HornetQ in Applications
      9. 14.1.9. Configure the JMS Server
      10. 14.1.10. About Java Naming and Directory Interface (JNDI)
      11. 14.1.11. Configure JNDI for HornetQ
      12. 14.1.12. Configure JMS Address Settings
      13. 14.1.13. Reference for HornetQ Configuration Attributes
      14. 14.1.14. Configure Messaging with HornetQ
      15. 14.1.15. Configure Delayed Redelivery
      16. 14.1.16. Configure Dead Letter Addresses
      17. 14.1.17. Configure Message Expiry Addresses
      18. 14.1.18. Set Message Expiry
  17. 15. Transaction Subsystem
    1. 15.1. Transaction Subsystem Configuration
      1. 15.1.1. Transactions Configuration Overview
      2. 15.1.2. Configure the Transaction Manager
      3. 15.1.3. Configure Your Datasource to Use JTA Transactions
      4. 15.1.4. Configure an XA Datasource
      5. 15.1.5. About Transaction Log Messages
      6. 15.1.6. Configure Logging for the Transaction Subsystem
    2. 15.2. Transaction Administration
      1. 15.2.1. Browse and Manage Transactions
    3. 15.3. Transaction References
      1. 15.3.1. JBoss Transactions Errors and Exceptions
      2. 15.3.2. JTA Clustering Limitations
    4. 15.4. ORB Configuration
      1. 15.4.1. About Common Object Request Broker Architecture (CORBA)
      2. 15.4.2. Configure the ORB for JTS Transactions
  18. 16. Enterprise JavaBeans
    1. 16.1. Introduction
      1. 16.1.1. Overview of Enterprise JavaBeans
      2. 16.1.2. Overview of Enterprise JavaBeans for Administrators
      3. 16.1.3. Enterprise Beans
      4. 16.1.4. Session Beans
      5. 16.1.5. Message-Driven Beans
    2. 16.2. Configuring Bean Pools
      1. 16.2.1. Bean Pools
      2. 16.2.2. Create a Bean Pool
      3. 16.2.3. Remove a Bean Pool
      4. 16.2.4. Edit a Bean Pool
      5. 16.2.5. Assign Bean Pools for Session and Message-Driven Beans
    3. 16.3. Configuring EJB Thread Pools
      1. 16.3.1. Enterprise Bean Thread Pools
      2. 16.3.2. Create a Thread Pool
      3. 16.3.3. Remove a Thread Pool
      4. 16.3.4. Edit a Thread Pool
    4. 16.4. Configuring Session Beans
      1. 16.4.1. Session Bean Access Timeout
      2. 16.4.2. Set Default Session Bean Access Timeout Values
    5. 16.5. Configuring Message-Driven Beans
      1. 16.5.1. Set Default Resource Adapter for Message-Driven Beans
    6. 16.6. Configuring the EJB3 Timer Service
      1. 16.6.1. EJB3 Timer Service
      2. 16.6.2. Configure the EJB3 timer Service
    7. 16.7. Configuring the EJB Asynchronous Invocation Service
      1. 16.7.1. EJB3 Asynchronous Invocation Service
      2. 16.7.2. Configure the EJB3 Asynchronous Invocation Service Thread Pool
    8. 16.8. Configuring the EJB3 Remote Invocation Service
      1. 16.8.1. EJB3 Remote Service
      2. 16.8.2. Configure the EJB3 Remote Service
    9. 16.9. Configuring EJB 2.x Entity Beans
      1. 16.9.1. EJB Entity Beans
      2. 16.9.2. Container-Managed Persistence
      3. 16.9.3. Enable EJB 2.x Container-Managed Persistence
      4. 16.9.4. Configure EJB 2.x Container-Managed Persistence
      5. 16.9.5. CMP Subsystem Properties for HiLo Key Generators
  19. 17. Java Connector Architecture (JCA)
    1. 17.1. Introduction
      1. 17.1.1. About the Java EE Connector API (JCA)
      2. 17.1.2. Java Connector Architecture (JCA)
      3. 17.1.3. Resource Adapters
    2. 17.2. Configure the Java Connector Architecture (JCA) Subsystem
    3. 17.3. Deploy a Resource Adapter
    4. 17.4. Configure a Deployed Resource Adapter
    5. 17.5. Resource Adapter Descriptor Reference
    6. 17.6. Deploy the WebSphere MQ Resource Adapter
  20. 18. Deploy JBoss Enterprise Application Platform 6 on Amazon EC2
    1. 18.1. Introduction
      1. 18.1.1. About Amazon EC2
      2. 18.1.2. About Amazon Machine Instances (AMIs)
      3. 18.1.3. About JBoss Cloud Access
      4. 18.1.4. JBoss Cloud Access Features
      5. 18.1.5. Supported Amazon EC2 Instance Types
      6. 18.1.6. Supported Red Hat AMIs
    2. 18.2. Deploying JBoss Enterprise Application Platform 6 on Amazon EC2
      1. 18.2.1. Overview of Deploying JBoss Enterprise Application Platform 6 on Amazon EC2
      2. 18.2.2. Non-clustered JBoss Enterprise Application Platform 6
      3. 18.2.3. Clustered JBoss Enterprise Application Platform 6
    3. 18.3. Establishing Monitoring with JBoss Operations Network (JON)
      1. 18.3.1. About AMI Monitoring
      2. 18.3.2. About Connectivity Requirements
      3. 18.3.3. About Network Address Translation (NAT)
      4. 18.3.4. About Amazon EC2 and DNS
      5. 18.3.5. About Routing in EC2
      6. 18.3.6. About Terminating and Restarting with JON
      7. 18.3.7. Configure an Instance to Register with JBoss Operations Network
    4. 18.4. User Script Configuration
      1. 18.4.1. Permanent Configuration Parameters
      2. 18.4.2. Custom Script Parameters
    5. 18.5. Troubleshooting
      1. 18.5.1. About Troubleshooting Amazon EC2
      2. 18.5.2. Diagnostic Information
  21. 19. Supplemental References
    1. 19.1. Download Files From the Red Hat Customer Portal
    2. 19.2. Configure the Default JDK on Red Hat Enterprise Linux
  22. A. Revision History
  23. Legal Notice

2.6. Start JBoss Enterprise Application Platform 6

2.6.1. Start JBoss Enterprise Application Platform 6

Task

Start JBoss Enterprise Application Platform 6 in one of the following ways:
  • Section 2.6.3, “Start JBoss Enterprise Application Platform 6 as a Managed Domain”
  • Section 2.6.2, “Start JBoss Enterprise Application Platform 6 as a Standalone Server”
  • Section 2.7.1, “Run JBoss Enterprise Application Platform 6 as an Operating System Service”

Report a bug
  • 2.5.1. Management Application Programming Interfaces (APIs)
  • 2.6.2. Start JBoss Enterprise Application Platform 6 as a Standalone Server
Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • openshift.com
  • developers.redhat.com
  • connect.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
Copyright © 2021 Red Hat, Inc.
  • Privacy Statement
  • Customer Portal Terms of Use
  • All Policies and Guidelines
Red Hat Summit
Twitter Facebook

Formatting Tips

Here are the common uses of Markdown.

Code blocks
~~~
Code surrounded in tildes is easier to read
~~~
Links/URLs
[Red Hat Customer Portal](https://access.redhat.com)
Learn more