Jump To Close Expand all Collapse all Table of contents Security Guide 1. Read Me Expand section "1. Read Me" Collapse section "1. Read Me" 1.1. Back Up Your Data 1.2. Variable Name: EAP_HOME 1.3. Variable Name: MODE 1.4. Red Hat Documentation Site 2. JBoss EAP Security Domains Expand section "2. JBoss EAP Security Domains" Collapse section "2. JBoss EAP Security Domains" 2.1. About Security Domains 2.2. About Authentication 2.3. Configure Authentication in a Security Domain 2.4. About Authorization 2.5. Configure Authorization in a Security Domain 2.6. Encryption 2.7. Temporary Data 3. Configuring Authentication and Authorization for JBoss Data Virtualization Expand section "3. Configuring Authentication and Authorization for JBoss Data Virtualization" Collapse section "3. Configuring Authentication and Authorization for JBoss Data Virtualization" 3.1. Client Authentication 3.2. Data Source Authentication 3.3. Pass-Through Authentication 3.4. Data Roles 4. Authentication Modules Expand section "4. Authentication Modules" Collapse section "4. Authentication Modules" 4.1. Configuring Transports 4.2. Default File Based Authentication Module 4.3. LDAP Based Authentication Module 4.4. Role Mapping LoginModule 4.5. Custom Authentication Modules 4.6. Example Custom Authentication Module 4.7. Configure Pass-Through Authentication 5. Authorization Modules Expand section "5. Authorization Modules" Collapse section "5. Authorization Modules" 5.1. Custom Authorization Modules 6. Configuring Transport Security Expand section "6. Configuring Transport Security" Collapse section "6. Configuring Transport Security" 6.1. Transport Security Configuration 6.2. Transport Security Properties 6.3. Transport Security Authentication Modes 7. Data Source Security Expand section "7. Data Source Security" Collapse section "7. Data Source Security" 7.1. Data Source Security 7.2. Authentication Modules for Data Source Security 7.3. Caller Identity Login Module 7.4. Configuring the Caller Identity Login Module 7.5. Role-Based Credential Map Identity Login Module 7.6. Configuring the Role-Based Credential Map Identity Login Module 8. Kerberos Support Expand section "8. Kerberos Support" Collapse section "8. Kerberos Support" 8.1. Kerberos Support Using GSSAPI 8.2. Kerberos Support: Local Connection 8.3. Kerberos Support: Remote Connection 8.4. Kerberos Support: JDBC Client Configuration 8.5. Kerberos Support: ODBC Client Configuration 9. Keytool Expand section "9. Keytool" Collapse section "9. Keytool" 9.1. Keytool 9.2. Using Keytool with JBoss Data Virtualization 9.3. Create a Private/Public Key Pair with Keytool 9.4. Extract a Self-signed Certificate from the Keystore 9.5. Add a Certificate to a Truststore Using Keytool 10. SAML-Based Security for OData Expand section "10. SAML-Based Security for OData" Collapse section "10. SAML-Based Security for OData" 10.1. SAML-Based Security for OData 11. Patch Installation Expand section "11. Patch Installation" Collapse section "11. Patch Installation" 11.1. About Patches and Upgrades 11.2. About Patching Mechanisms 11.3. Subscribe to Patch Mailing Lists 11.4. Install Patches in Zip Form Expand section "11.4. Install Patches in Zip Form" Collapse section "11.4. Install Patches in Zip Form" 11.4.1. The patch Command 11.4.2. Installing Patches in Zip Form Using the patch Command 11.4.3. Rollback the Application of a Patch in Zip Form Using the patch Command 11.5. Install Patches in RPM form 11.6. Severity and Impact Rating of JBoss Security Patches A. Revision History Legal Notice Settings Close Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Language and Page Formatting Options Language: English Format: Multi-page Single-page PDF Format: Multi-page Single-page PDF Red Hat Training A Red Hat training course is available for Red Hat JBoss Data Virtualization Appendix A. Revision History Revision HistoryRevision 6.2.0-23Tue Aug 4 2015David Le Sage Updates for 6.2. Previous Next