12.2. About the Structure of the Security Subsystem

download PDF
The security subsystem is configured in the managed domain or standalone configuration file. Most of the configuration elements can be configured using the web-based management console or the console-based management CLI. The following is the XML representing an example security subsystem.

Example 12.1. Example Security Subsystem Configuration

<subsystem xmlns="urn:jboss:domain:security:1.2">
        <security-domain name="other" cache-type="default">
                <login-module code="Remoting" flag="optional">
                    <module-option name="password-stacking" value="useFirstPass"/>
                <login-module code="RealmUsersRoles" flag="required">
                    <module-option name="usersProperties" value="${jboss.domain.config.dir}/"/>
                    <module-option name="rolesProperties" value="${jboss.domain.config.dir}/"/>
                    <module-option name="realm" value="ApplicationRealm"/>
                    <module-option name="password-stacking" value="useFirstPass"/>
        <security-domain name="jboss-web-policy" cache-type="default">
                <policy-module code="Delegating" flag="required"/>
        <security-domain name="jboss-ejb-policy" cache-type="default">
                <policy-module code="Delegating" flag="required"/>

The <security-management>, <subject-factory> and <security-properties> elements are not present in the default configuration. The <subject-factory> and <security-properties> elements have been deprecated in JBoss EAP 6.1 onwards.
Red Hat logoGithubRedditYoutubeTwitter


Try, buy, & sell


About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

© 2024 Red Hat, Inc.