Show Table of Contents
2.5.4. Security Configuration
The following configuration steps must be performed to ensure security compliance with Common Criteria requirements.
2.5.4.1. JBoss SX
Custom Login Modules are not permitted; the only login modules allowed are the following:
org.jboss.security.auth.spi.UsersRolesLoginModuleorg.jboss.security.auth.spi.LdapLoginModuleorg.jboss.security.auth.spi.DatabaseServerLoginModuleorg.jboss.security.auth.spi.BaseCertLoginModule
This restriction on login modules is also applicable to the DynamicLoginConfig service.
Only the following security managers are allowed to be configured and used for authentication purposes:
org.jboss.security.plugins.JaasSecurityManagerorg.jboss.security.plugins.JaasSecurityDomain
Additional security-related modules that are permitted are the following:
org.jboss.security.authorization.modules.DelegatingAuthorizationModuleorg.jboss.security.integration.JNDIBasedSecurityRegistrationorg.jboss.security.auth.certs.SubjectDNMapping
Other modules, such as SRP module are not allowed.

Where did the comment section go?
Red Hat's documentation publication system recently went through an upgrade to enable speedier, more mobile-friendly content. We decided to re-evaluate our commenting platform to ensure that it meets your expectations and serves as an optimal feedback mechanism. During this redesign, we invite your input on providing feedback on Red Hat documentation via the discussion platform.