How To Configure Server Security

Red Hat JBoss Enterprise Application Platform 6.4

How to Configure Server Security

Red Hat Customer Content Services

Abstract

The purpose of this document is to provide a practical guide to securing Red Hat JBoss Enterprise Application Platform 6. More specifically, this guide details how to secure all of the management interfaces on JBoss EAP 6. Before reading this guide, users should read through the Security Architecture document for Red Hat JBoss Enterprise Application Platform 6 and have a solid understanding of how JBoss EAP 6 handles security. This document also makes use of the JBoss EAP 6 CLI interface for performing configuration changes. For more information on using the CLI for both standalone JBoss EAP 6 instances as well as JBoss EAP 6 domains, please consult the The Management CLI section of the Administration and Configuration guide. When completing this document, readers should have a solid, working understanding of how to secure JBoss EAP 6.