Jump To Close Expand all Collapse all Table of contents Data Grid Security Guide Red Hat Data Grid Expand section "Red Hat Data Grid" Collapse section "Red Hat Data Grid" Data Grid documentation Data Grid downloads Making open source more inclusive Providing feedback on Red Hat documentation 1. Configuring user roles and permissions Expand section "1. Configuring user roles and permissions" Collapse section "1. Configuring user roles and permissions" 1.1. Security authorization Expand section "1.1. Security authorization" Collapse section "1.1. Security authorization" 1.1.1. User roles and permissions 1.1.2. Permissions Expand section "1.1.2. Permissions" Collapse section "1.1.2. Permissions" 1.1.2.1. Cache Manager permissions 1.1.2.2. Cache permissions 1.1.3. Role mappers Expand section "1.1.3. Role mappers" Collapse section "1.1.3. Role mappers" 1.1.3.1. Cluster role mappers 1.1.3.2. Identity role mappers 1.1.3.3. CommonName role mappers 1.1.3.4. Custom role mappers 1.2. Access control list (ACL) cache 1.3. Customizing roles and permissions 1.4. Configuring caches with security authorization 1.5. Disabling security authorization 1.6. Programmatically configuring authorization 1.7. Code execution with security authorization 2. Security realms Expand section "2. Security realms" Collapse section "2. Security realms" 2.1. Creating security realms 2.2. Setting up Kerberos identities 2.3. Property realms 2.4. LDAP realms Expand section "2.4. LDAP realms" Collapse section "2.4. LDAP realms" 2.4.1. LDAP realm principal re-writing 2.5. Token realms 2.6. Trust store realms 2.7. Distributed security realms 3. Endpoint authentication mechanisms Expand section "3. Endpoint authentication mechanisms" Collapse section "3. Endpoint authentication mechanisms" 3.1. Data Grid Server authentication 3.2. Configuring Data Grid Server authentication mechanisms Expand section "3.2. Configuring Data Grid Server authentication mechanisms" Collapse section "3.2. Configuring Data Grid Server authentication mechanisms" 3.2.1. Disabling authentication 3.3. Data Grid Server authentication mechanisms Expand section "3.3. Data Grid Server authentication mechanisms" Collapse section "3.3. Data Grid Server authentication mechanisms" 3.3.1. SASL authentication mechanisms 3.3.2. SASL quality of protection (QoP) 3.3.3. SASL policies 3.3.4. HTTP authentication mechanisms 4. Configuring TLS/SSL encryption Expand section "4. Configuring TLS/SSL encryption" Collapse section "4. Configuring TLS/SSL encryption" 4.1. Configuring Data Grid Server keystores Expand section "4.1. Configuring Data Grid Server keystores" Collapse section "4.1. Configuring Data Grid Server keystores" 4.1.1. Generating Data Grid Server keystores 4.1.2. Configuring TLS versions and cipher suites 4.2. Configuring Data Grid Server on a system with FIPS 140-2 compliant cryptography Expand section "4.2. Configuring Data Grid Server on a system with FIPS 140-2 compliant cryptography" Collapse section "4.2. Configuring Data Grid Server on a system with FIPS 140-2 compliant cryptography" 4.2.1. Configuring the PKCS11 cryptographic provider 4.2.2. Configuring the Bouncy Castle FIPS cryptographic provider 4.3. Configuring client certificate authentication 4.4. Configuring authorization with client certificates 5. Storing Data Grid Server credentials in keystores Expand section "5. Storing Data Grid Server credentials in keystores" Collapse section "5. Storing Data Grid Server credentials in keystores" 5.1. Setting up credential keystores 5.2. Credential keystore configuration 6. Encrypting cluster transport Expand section "6. Encrypting cluster transport" Collapse section "6. Encrypting cluster transport" 6.1. Securing cluster transport with TLS identities 6.2. JGroups encryption protocols 6.3. Securing cluster transport with asymmetric encryption 6.4. Securing cluster transport with symmetric encryption 7. Data Grid ports and protocols Expand section "7. Data Grid ports and protocols" Collapse section "7. Data Grid ports and protocols" 7.1. Data Grid Server ports and protocols Expand section "7.1. Data Grid Server ports and protocols" Collapse section "7.1. Data Grid Server ports and protocols" 7.1.1. Configuring network firewalls for Data Grid traffic 7.2. TCP and UDP ports for cluster traffic Legal Notice Settings Close Language: 日本語 简体中文 English Language: 日本語 简体中文 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: 日本語 简体中文 English Language: 日本語 简体中文 English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Data Grid documentation Documentation for Data Grid is available on the Red Hat customer portal. Data Grid 8.3 Documentation Data Grid 8.3 Component Details Supported Configurations for Data Grid 8.3 Data Grid 8 Feature Support Data Grid Deprecated Features and Functionality Previous Next