How To Configure Server Security
Red Hat JBoss Enterprise Application Platform 6.4
How to Configure Server Security
Abstract
The purpose of this document is to provide a practical guide to securing Red Hat JBoss Enterprise Application Platform 6. More specifically, this guide details how to secure all of the management interfaces on JBoss EAP 6. Before reading this guide, users should read through the Security Architecture document for Red Hat JBoss Enterprise Application Platform 6 and have a solid understanding of how JBoss EAP 6 handles security. This document also makes use of the JBoss EAP 6 CLI interface for performing configuration changes. For more information on using the CLI for both standalone JBoss EAP 6 instances as well as JBoss EAP 6 domains, please consult the The Management CLI section of the Administration and Configuration guide. When completing this document, readers should have a solid, working understanding of how to secure JBoss EAP 6.