7.5. Configuring Access to OSGi Administrative Functions
Overview
This tutorial explains how to configure the OSGi administrative functions to use specific roles for authorization. By configuring each of the administrative functions to use a different role for access, you can provide fine grained control over who can monitor and manipulate running containers.
When LDAP is enabled, the OSGi container expects the user role data to be stored along with the user authentication data in the LDAP directory server. The LDAP search query to extract the role data is specified by the
role.*
properties in the jaas:module
element.
The JAAS LDAP login module used in this tutorial, shown in Example 7.1, “JAAS Realm for Standalone”, is configured to extract the role name from the
cn
property of all entries selected by the filter member=uid=%u
which is run on the tree selected using the base DN uo=roles,ou=system
. In the section called “Adding groups for the roles”, you added three groups to the uo=roles,ou=system
tree. The filter will match with any group that has a member specified by uid=%u
.
For example, when you attempted to connect to the remote console as user
jdoe
the filter searched for a group with a member uid=jdoe
and matched on the group cn=admin,uo=roles,ou=system
. The LDAP module extracted the cn
property's value of admin
and used it as the role for authorizing user jdoe
.
Goals
You will change the role used for each of the administrative functions:
Prerequisites
Before you can perfrom any of the following tutorials, you must ensure that the ApacheDS server is running.
Configure a role for the remote console
To configure a role for the remote console:
- Open
InstallDir/etc/org.apache.karaf.shell.cfg
in a text editor. - Add the following line:
sshRole=sshConsole
- Save the changes.
- Start Red Hat JBoss Fuse by entering the following command in a terminal window:
>
fuse - Open a new command prompt.
- Change directory to the JBoss Fuse install directory.
- Enter the following command to log on to the running container instance using the identity
janedoe
:client -u janedoe -p secret
You should successfully log into the container's remote console becausejanedoe
does have thesshConsole
role.
Configure a role for JMX access
To configure a role for JMX access:
- Open
InstallDir/etc/org.apache.karaf.management.cfg
in a text editor. - Add the following line:
jmxRole=jmxUser
- Save the changes.
- Start JBoss Fuse by entering the following command in a terminal window:
>
fuse - Start JConsole or another JMX console.
- Connect to JBoss Fuse's JMX server using the following settings:
- JMX URL:
service:jmx:rmi:///jndi/rmi://localhost:1099/karaf-root
- User:
jdoe
- Password:
secret
The connection will fail becausejdoe
user does not have thejmxUser
role. - Connect to JBoss Fuse's JMX server as using the following settings:
- JMX URL:
service:jmx:rmi:///jndi/rmi://localhost:1099/karaf-root
- User:
crider
- Password:
secret
The connection will succeed becausecrider
user does have thejmxUser
role.
More information
See the following links for more information:
- chapter "Configuring JMX" in "Configuring and Running Red Hat JBoss Fuse" for details about JMX,
- Section 2.2, “Enabling LDAP Authentication” for configuring the JBoss Fuse LDAP login module,
- Section 2.4, “Configuring Roles for the Administrative Protocols” for configuring the JBoss Fuse administrative functions.