Este contenido no está disponible en el idioma seleccionado.
9.2. Configure Node Security in Library Mode
SASL
protocol to your JGroups XML configuration.
CallbackHandlers
, to obtain certain information necessary for the authentication handshake. Users must supply their own CallbackHandlers
on both client and server sides.
Important
JAAS
API is only available when configuring user authentication and authorization, and is not available for node security.
Note
CallbackHandler
classes are examples only, and not contained in the Red Hat JBoss Data Grid release. Users must provide the appropriate CallbackHandler
classes for their specific LDAP implementation.
Example 9.4. Setting Up SASL Authentication in JGroups
DIGEST-MD5
mechanism. Each node must declare the user and password it will use when joining the cluster.
Important
CallbackHandler
class. In this example, login and password are checked against values provided via Java properties when JBoss Data Grid is started, and authorization is checked against role
which is defined in the class ("test_user"
).
Example 9.5. Callback Handler Class
javax.security.auth.callback.NameCallback
and javax.security.auth.callback.PasswordCallback
callbacks
javax.security.sasl.AuthorizeCallback
callback.
9.2.1. Configure Node Authentication for Library Mode (DIGEST-MD5) Copiar enlaceEnlace copiado en el portapapeles!
CallbackHandlers
are required:
- The
server_callback_handler_class
is used by the coordinator. - The
client_callback_handler_class
is used by other nodes.
CallbackHandlers
.
Example 9.6. Callback Handlers
9.2.2. Configure Node Authentication for Library Mode (GSSAPI) Copiar enlaceEnlace copiado en el portapapeles!
login_module_name
parameter must be specified instead of callback
.
server_name
must also be specified, as the client principal is constructed as jgroups/$server_name@REALM
.
Example 9.7. Specifying the login module and server on the coordinator node
<SASL mech="GSSAPI" server_name="node0/clustered" login_module_name="krb-node0" server_callback_handler_class="org.infinispan.test.integration.security.utils.SaslPropCallbackHandler" />
<SASL mech="GSSAPI"
server_name="node0/clustered"
login_module_name="krb-node0"
server_callback_handler_class="org.infinispan.test.integration.security.utils.SaslPropCallbackHandler" />
server_callback_handler_class
must be specified for node authorization. This will determine if the authenticated joining node has permission to join the cluster.
Note
jgroups/server_name
, therefore the server principal in Kerberos must also be jgroups/server_name
. For example, if the server name in Kerberos is jgroups/node1/mycache
, then the server name must be node1/mycache
.
9.2.3. Node Authorization in Library Mode Copiar enlaceEnlace copiado en el portapapeles!
SASL
protocol in JGroups is concerned only with the authentication process. To implement node authorization, you can do so within the server callback handler by throwing an Exception.
Example 9.8. Implementing Node Authorization