Red Hat Training

A Red Hat training course is available for JBoss Enterprise Application Platform Common Criteria Certification

Chapter 7. Overview of the Security Functions

The following sections describe the JBoss security functions included in the product evaluation.

7.1. Access Control

JBoss EAP 6.2.2 has access control mechanisms to restrict access for the following request types:
HTTP
URLs and paths provided with URLs, as well as Plain Old Java Objects (POJOs) deployed as Servlets and Session Beans, can be protected from access by subjects.
EJB
EJBs and associated method names can be protected from invocation by subjects.
HornetQ
Message queue destinations and topic destinations can be protected from access by subjects.
For more information see the Administration and Configuration Guide.