| |
| <!DOCTYPE HTML> |
| <html lang="" > |
| <head> |
| <title>Security ยท ActiveMQ Artemis Documentation</title> |
| <meta charset="UTF-8"> |
| <meta http-equiv="X-UA-Compatible" content="IE=edge" /> |
| <meta content="text/html; charset=utf-8" http-equiv="Content-Type"> |
| <meta name="description" content=""> |
| <meta name="generator" content="GitBook 3.1.1"> |
| |
| |
| |
| |
| <link rel="stylesheet" href="gitbook/style.css"> |
| |
| |
| |
| |
| <link rel="stylesheet" href="gitbook/gitbook-plugin-highlight/website.css"> |
| |
| |
| |
| <link rel="stylesheet" href="gitbook/gitbook-plugin-search/search.css"> |
| |
| |
| |
| <link rel="stylesheet" href="gitbook/gitbook-plugin-fontsettings/website.css"> |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| <meta name="HandheldFriendly" content="true"/> |
| <meta name="viewport" content="width=device-width, initial-scale=1, user-scalable=no"> |
| <meta name="apple-mobile-web-app-capable" content="yes"> |
| <meta name="apple-mobile-web-app-status-bar-style" content="black"> |
| <link rel="apple-touch-icon-precomposed" sizes="152x152" href="gitbook/images/apple-touch-icon-precomposed-152.png"> |
| <link rel="shortcut icon" href="gitbook/images/favicon.ico" type="image/x-icon"> |
| |
| |
| <link rel="next" href="resource-limits.html" /> |
| |
| |
| <link rel="prev" href="management.html" /> |
| |
| |
| </head> |
| <body> |
| |
| <div class="book"> |
| <div class="book-summary"> |
| |
| |
| <div id="book-search-input" role="search"> |
| <input type="text" placeholder="Type to search" /> |
| </div> |
| |
| |
| <nav role="navigation"> |
| |
| |
| |
| <ul class="summary"> |
| |
| |
| |
| |
| |
| |
| |
| |
| |
| <li class="chapter " data-level="1.1" data-path="./"> |
| |
| <a href="./"> |
| |
| |
| Introduction |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.2" data-path="notice.html"> |
| |
| <a href="notice.html"> |
| |
| |
| Legal Notice |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.3" data-path="preface.html"> |
| |
| <a href="preface.html"> |
| |
| |
| Preface |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.4" data-path="project-info.html"> |
| |
| <a href="project-info.html"> |
| |
| |
| Project Info |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.5" data-path="messaging-concepts.html"> |
| |
| <a href="messaging-concepts.html"> |
| |
| |
| Messaging Concepts |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.6" data-path="architecture.html"> |
| |
| <a href="architecture.html"> |
| |
| |
| Architecture |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.7" data-path="using-server.html"> |
| |
| <a href="using-server.html"> |
| |
| |
| Using the Server |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.8" data-path="address-model.html"> |
| |
| <a href="address-model.html"> |
| |
| |
| Address Model |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.9" data-path="using-jms.html"> |
| |
| <a href="using-jms.html"> |
| |
| |
| Using JMS |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.10" data-path="using-core.html"> |
| |
| <a href="using-core.html"> |
| |
| |
| Using Core |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.11" data-path="using-amqp.html"> |
| |
| <a href="using-amqp.html"> |
| |
| |
| Using AMQP |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.12" data-path="jms-core-mapping.html"> |
| |
| <a href="jms-core-mapping.html"> |
| |
| |
| Mapping JMS Concepts to the Core API |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.13" data-path="client-classpath.html"> |
| |
| <a href="client-classpath.html"> |
| |
| |
| The Client Classpath |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.14" data-path="examples.html"> |
| |
| <a href="examples.html"> |
| |
| |
| Examples |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.15" data-path="wildcard-routing.html"> |
| |
| <a href="wildcard-routing.html"> |
| |
| |
| Routing Messages With Wild Cards |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.16" data-path="wildcard-syntax.html"> |
| |
| <a href="wildcard-syntax.html"> |
| |
| |
| Understanding the Apache ActiveMQ Artemis Wildcard Syntax |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.17" data-path="filter-expressions.html"> |
| |
| <a href="filter-expressions.html"> |
| |
| |
| Filter Expressions |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.18" data-path="persistence.html"> |
| |
| <a href="persistence.html"> |
| |
| |
| Persistence |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.19" data-path="configuring-transports.html"> |
| |
| <a href="configuring-transports.html"> |
| |
| |
| Configuring Transports |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.20" data-path="config-reload.html"> |
| |
| <a href="config-reload.html"> |
| |
| |
| Configuration Reload |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.21" data-path="connection-ttl.html"> |
| |
| <a href="connection-ttl.html"> |
| |
| |
| Detecting Dead Connections |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.22" data-path="slow-consumers.html"> |
| |
| <a href="slow-consumers.html"> |
| |
| |
| Detecting Slow Consumers |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.23" data-path="network-isolation.html"> |
| |
| <a href="network-isolation.html"> |
| |
| |
| Avoiding Network Isolation |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.24" data-path="transaction-config.html"> |
| |
| <a href="transaction-config.html"> |
| |
| |
| Resource Manager Configuration |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.25" data-path="flow-control.html"> |
| |
| <a href="flow-control.html"> |
| |
| |
| Flow Control |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.26" data-path="send-guarantees.html"> |
| |
| <a href="send-guarantees.html"> |
| |
| |
| Guarantees of sends and commits |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.27" data-path="undelivered-messages.html"> |
| |
| <a href="undelivered-messages.html"> |
| |
| |
| Message Redelivery and Undelivered Messages |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.28" data-path="message-expiry.html"> |
| |
| <a href="message-expiry.html"> |
| |
| |
| Message Expiry |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.29" data-path="large-messages.html"> |
| |
| <a href="large-messages.html"> |
| |
| |
| Large Messages |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.30" data-path="paging.html"> |
| |
| <a href="paging.html"> |
| |
| |
| Paging |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.31" data-path="queue-attributes.html"> |
| |
| <a href="queue-attributes.html"> |
| |
| |
| Queue Attributes |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.32" data-path="scheduled-messages.html"> |
| |
| <a href="scheduled-messages.html"> |
| |
| |
| Scheduled Messages |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.33" data-path="last-value-queues.html"> |
| |
| <a href="last-value-queues.html"> |
| |
| |
| Last-Value Queues |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.34" data-path="message-grouping.html"> |
| |
| <a href="message-grouping.html"> |
| |
| |
| Message Grouping |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.35" data-path="pre-acknowledge.html"> |
| |
| <a href="pre-acknowledge.html"> |
| |
| |
| Extra Acknowledge Modes |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.36" data-path="management.html"> |
| |
| <a href="management.html"> |
| |
| |
| Management |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter active" data-level="1.37" data-path="security.html"> |
| |
| <a href="security.html"> |
| |
| |
| Security |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.38" data-path="resource-limits.html"> |
| |
| <a href="resource-limits.html"> |
| |
| |
| Resource Limits |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.39" data-path="jms-bridge.html"> |
| |
| <a href="jms-bridge.html"> |
| |
| |
| The JMS Bridge |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.40" data-path="client-reconnection.html"> |
| |
| <a href="client-reconnection.html"> |
| |
| |
| Client Reconnection and Session Reattachment |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.41" data-path="diverts.html"> |
| |
| <a href="diverts.html"> |
| |
| |
| Diverting and Splitting Message Flows |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.42" data-path="core-bridges.html"> |
| |
| <a href="core-bridges.html"> |
| |
| |
| Core Bridges |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.43" data-path="duplicate-detection.html"> |
| |
| <a href="duplicate-detection.html"> |
| |
| |
| Duplicate Message Detection |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.44" data-path="clusters.html"> |
| |
| <a href="clusters.html"> |
| |
| |
| Clusters |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.45" data-path="ha.html"> |
| |
| <a href="ha.html"> |
| |
| |
| High Availability and Failover |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.46" data-path="graceful-shutdown.html"> |
| |
| <a href="graceful-shutdown.html"> |
| |
| |
| Graceful Server Shutdown |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.47" data-path="libaio.html"> |
| |
| <a href="libaio.html"> |
| |
| |
| Libaio Native Libraries |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.48" data-path="thread-pooling.html"> |
| |
| <a href="thread-pooling.html"> |
| |
| |
| Thread management |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.49" data-path="logging.html"> |
| |
| <a href="logging.html"> |
| |
| |
| Logging |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.50" data-path="rest.html"> |
| |
| <a href="rest.html"> |
| |
| |
| REST Interface |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.51" data-path="embedding-activemq.html"> |
| |
| <a href="embedding-activemq.html"> |
| |
| |
| Embedding Apache ActiveMQ Artemis |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.52" data-path="karaf.html"> |
| |
| <a href="karaf.html"> |
| |
| |
| Apache Karaf |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.53" data-path="spring-integration.html"> |
| |
| <a href="spring-integration.html"> |
| |
| |
| Spring Integration |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.54" data-path="cdi-integration.html"> |
| |
| <a href="cdi-integration.html"> |
| |
| |
| CDI Integration |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.55" data-path="intercepting-operations.html"> |
| |
| <a href="intercepting-operations.html"> |
| |
| |
| Intercepting Operations |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.56" data-path="protocols-interoperability.html"> |
| |
| <a href="protocols-interoperability.html"> |
| |
| |
| Protocols and Interoperability |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.57" data-path="tools.html"> |
| |
| <a href="tools.html"> |
| |
| |
| Tools |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.58" data-path="maven-plugin.html"> |
| |
| <a href="maven-plugin.html"> |
| |
| |
| Maven Plugin |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.59" data-path="unit-testing.html"> |
| |
| <a href="unit-testing.html"> |
| |
| |
| Unit Testing |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.60" data-path="perf-tuning.html"> |
| |
| <a href="perf-tuning.html"> |
| |
| |
| Troubleshooting and Performance Tuning |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.61" data-path="configuration-index.html"> |
| |
| <a href="configuration-index.html"> |
| |
| |
| Configuration Reference |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| <li class="chapter " data-level="1.62" data-path="updating-artemis.html"> |
| |
| <a href="updating-artemis.html"> |
| |
| |
| Updating Artemis |
| |
| </a> |
| |
| |
| |
| </li> |
| |
| |
| |
| |
| <li class="divider"></li> |
| |
| <li> |
| <a href="https://www.gitbook.com" target="blank" class="gitbook-link"> |
| Published with GitBook |
| </a> |
| </li> |
| </ul> |
| |
| |
| </nav> |
| |
| |
| </div> |
| |
| <div class="book-body"> |
| |
| <div class="body-inner"> |
| |
| |
| |
| <div class="book-header" role="navigation"> |
| |
| |
| <!-- Title --> |
| <h1> |
| <i class="fa fa-circle-o-notch fa-spin"></i> |
| <a href="." >Security</a> |
| </h1> |
| </div> |
| |
| |
| |
| |
| <div class="page-wrapper" tabindex="-1" role="main"> |
| <div class="page-inner"> |
| |
| <div id="book-search-results"> |
| <div class="search-noresults"> |
| |
| <section class="normal markdown-section"> |
| |
| <h1 id="security">Security</h1> |
| <p>This chapter describes how security works with Apache ActiveMQ Artemis and how you can |
| configure it. To disable security completely simply set the |
| <code>security-enabled</code> property to false in the <code>broker.xml</code> |
| file.</p> |
| <p>For performance reasons security is cached and invalidated every so |
| long. To change this period set the property |
| <code>security-invalidation-interval</code>, which is in milliseconds. The default |
| is <code>10000</code> ms.</p> |
| <p>To assist in security auditing the <code>populate-validated-user</code> option exists. If this is <code>true</code> then |
| the server will add the name of the validated user to the message using the key <code>_AMQ_VALIDATED_USER</code>. |
| For JMS and Stomp clients this is mapped to the key <code>JMSXUserID</code>. For users authenticated based on |
| their SSL certificate this name is the name to which their certificate's DN maps. If <code>security-enabled</code> |
| is <code>false</code> and <code>populate-validated-user</code> is <code>true</code> then the server will simply use whatever user name |
| (if any) the client provides. This option is <code>false</code> by default.</p> |
| <h2 id="role-based-security-for-addresses">Role based security for addresses</h2> |
| <p>Apache ActiveMQ Artemis contains a flexible role-based security model for applying |
| security to queues, based on their addresses.</p> |
| <p>As explained in <a href="using-core.html">Using Core</a>, Apache ActiveMQ Artemis core consists mainly of sets of queues bound |
| to addresses. A message is sent to an address and the server looks up |
| the set of queues that are bound to that address, the server then routes |
| the message to those set of queues.</p> |
| <p>Apache ActiveMQ Artemis allows sets of permissions to be defined against the queues |
| based on their address. An exact match on the address can be used or a |
| wildcard match can be used using the wildcard characters '<code>#</code>' and |
| '<code>*</code>'.</p> |
| <p>Eight different permissions can be given to the set of queues which |
| match the address. Those permissions are:</p> |
| <ul> |
| <li><p><code>createDurableQueue</code>. This permission allows the user to create a |
| durable queue under matching addresses.</p> |
| </li> |
| <li><p><code>deleteDurableQueue</code>. This permission allows the user to delete a |
| durable queue under matching addresses.</p> |
| </li> |
| <li><p><code>createNonDurableQueue</code>. This permission allows the user to create a |
| non-durable queue under matching addresses.</p> |
| </li> |
| <li><p><code>deleteNonDurableQueue</code>. This permission allows the user to delete a |
| non-durable queue under matching addresses.</p> |
| </li> |
| <li><p><code>send</code>. This permission allows the user to send a message to |
| matching addresses.</p> |
| </li> |
| <li><p><code>consume</code>. This permission allows the user to consume a message from |
| a queue bound to matching addresses.</p> |
| </li> |
| <li><p><code>browse</code>. This permission allows the user to browse a queue bound to |
| the matching address.</p> |
| </li> |
| <li><p><code>manage</code>. This permission allows the user to invoke management |
| operations by sending management messages to the management address.</p> |
| </li> |
| </ul> |
| <p>For each permission, a list of roles who are granted that permission is |
| specified. If the user has any of those roles, he/she will be granted |
| that permission for that set of addresses.</p> |
| <p>Let's take a simple example, here's a security block from |
| <code>broker.xml</code> file:</p> |
| <pre><code><security-setting match="globalqueues.europe.#"> |
| <permission type="createDurableQueue" roles="admin"/> |
| <permission type="deleteDurableQueue" roles="admin"/> |
| <permission type="createNonDurableQueue" roles="admin, guest, europe-users"/> |
| <permission type="deleteNonDurableQueue" roles="admin, guest, europe-users"/> |
| <permission type="send" roles="admin, europe-users"/> |
| <permission type="consume" roles="admin, europe-users"/> |
| </security-setting> |
| </code></pre><p>The '<code>#</code>' character signifies "any sequence of words". Words are |
| delimited by the '<code>.</code>' character. For a full description of the wildcard |
| syntax please see <a href="wildcard-syntax.html">Understanding the Wildcard Syntax</a>. |
| The above security block applies to any address |
| that starts with the string "globalqueues.europe.":</p> |
| <p>Only users who have the <code>admin</code> role can create or delete durable queues |
| bound to an address that starts with the string "globalqueues.europe."</p> |
| <p>Any users with the roles <code>admin</code>, <code>guest</code>, or <code>europe-users</code> can create |
| or delete temporary queues bound to an address that starts with the |
| string "globalqueues.europe."</p> |
| <p>Any users with the roles <code>admin</code> or <code>europe-users</code> can send messages to |
| these addresses or consume messages from queues bound to an address that |
| starts with the string "globalqueues.europe."</p> |
| <p>The mapping between a user and what roles they have is handled by the |
| security manager. Apache ActiveMQ Artemis ships with a user manager that reads user |
| credentials from a file on disk, and can also plug into JAAS or JBoss |
| Application Server security.</p> |
| <p>For more information on configuring the security manager, please see 'Changing the Security Manager'.</p> |
| <p>There can be zero or more <code>security-setting</code> elements in each xml file. |
| Where more than one match applies to a set of addresses the <em>more |
| specific</em> match takes precedence.</p> |
| <p>Let's look at an example of that, here's another <code>security-setting</code> |
| block:</p> |
| <pre><code><security-setting match="globalqueues.europe.orders.#"> |
| <permission type="send" roles="europe-users"/> |
| <permission type="consume" roles="europe-users"/> |
| </security-setting> |
| </code></pre><p>In this <code>security-setting</code> block the match |
| 'globalqueues.europe.orders.#' is more specific than the previous match |
| 'globalqueues.europe.#'. So any addresses which match |
| 'globalqueues.europe.orders.#' will take their security settings <em>only</em> |
| from the latter security-setting block.</p> |
| <p>Note that settings are not inherited from the former block. All the |
| settings will be taken from the more specific matching block, so for the |
| address 'globalqueues.europe.orders.plastics' the only permissions that |
| exist are <code>send</code> and <code>consume</code> for the role europe-users. The |
| permissions <code>createDurableQueue</code>, <code>deleteDurableQueue</code>, |
| <code>createNonDurableQueue</code>, <code>deleteNonDurableQueue</code> are not inherited from |
| the other security-setting block.</p> |
| <p>By not inheriting permissions, it allows you to effectively deny |
| permissions in more specific security-setting blocks by simply not |
| specifying them. Otherwise it would not be possible to deny permissions |
| in sub-groups of addresses.</p> |
| <h2 id="security-setting-plugin">Security Setting Plugin</h2> |
| <p>Aside from configuring sets of permissions via XML these permissions can alternatively be |
| configured via a plugin which implements <code>org.apache.activemq.artemis.core.server.SecuritySettingPlugin</code> e.g.:</p> |
| <pre><code><security-settings> |
| <security-setting-plugin class-name="org.apache.activemq.artemis.core.server.impl.LegacyLDAPSecuritySettingPlugin"> |
| <setting name="initialContextFactory" value="com.sun.jndi.ldap.LdapCtxFactory"/> |
| <setting name="connectionURL" value="ldap://localhost:1024"/> |
| <setting name="connectionUsername" value="uid=admin,ou=system"/> |
| <setting name="connectionPassword" value="secret"/> |
| <setting name="connectionProtocol" value="s"/> |
| <setting name="authentication" value="simple"/> |
| </security-setting-plugin> |
| </security-settings> |
| </code></pre><p>Most of this configuration is specific to the plugin implementation. However, there are two configuration details that |
| will be specified for every implementation:</p> |
| <ul> |
| <li><p><code>class-name</code>. This attribute of <code>security-setting-plugin</code> indicates the name of the class which implements |
| <code>org.apache.activemq.artemis.core.server.SecuritySettingPlugin</code>.</p> |
| </li> |
| <li><p><code>setting</code>. Each of these elements represents a name/value pair that will be passed to the implementation for configuration |
| purposes.</p> |
| </li> |
| </ul> |
| <p>See the JavaDoc on <code>org.apache.activemq.artemis.core.server.SecuritySettingPlugin</code> for further details about the interface |
| and what each method is expected to do.</p> |
| <h3 id="available-plugins">Available plugins</h3> |
| <h4 id="legacyldapsecuritysettingplugin">LegacyLDAPSecuritySettingPlugin</h4> |
| <p>This plugin will read the security information that was previously handled by <a href="http://activemq.apache.org/security.html" target="_blank"><code>LDAPAuthorizationMap</code></a> |
| and the <a href="http://activemq.apache.org/cached-ldap-authorization-module.html" target="_blank"><code>cachedLDAPAuthorizationMap</code></a> in Apache ActiveMQ 5.x |
| and turn it into Artemis security settings where possible. The security implementations of ActiveMQ 5.x and Artemis don't |
| match perfectly so some translation must occur to achieve near equivalent functionality.</p> |
| <p>Here is an example of the plugin's configuration:</p> |
| <pre><code><security-setting-plugin class-name="org.apache.activemq.artemis.core.server.impl.LegacyLDAPSecuritySettingPlugin"> |
| <setting name="initialContextFactory" value="com.sun.jndi.ldap.LdapCtxFactory"/> |
| <setting name="connectionURL" value="ldap://localhost:1024"/> |
| <setting name="connectionUsername" value="uid=admin,ou=system"/> |
| <setting name="connectionPassword" value="secret"/> |
| <setting name="connectionProtocol" value="s"/> |
| <setting name="authentication" value="simple"/> |
| </security-setting-plugin> |
| </code></pre><ul> |
| <li><p><code>class-name</code>. The implementation is <code>org.apache.activemq.artemis.core.server.impl.LegacyLDAPSecuritySettingPlugin</code>.</p> |
| </li> |
| <li><p><code>initialContextFactory</code>. The initial context factory used to connect to LDAP. It must always be set to |
| <code>com.sun.jndi.ldap.LdapCtxFactory</code> (i.e. the default value).</p> |
| </li> |
| <li><p><code>connectionURL</code>. Specifies the location of the directory server using an ldap URL, <code>ldap://Host:Port</code>. You can |
| optionally qualify this URL, by adding a forward slash, <code>/</code>, followed by the DN of a particular node in the directory |
| tree. For example, <code>ldap://ldapserver:10389/ou=system</code>. The default is <code>ldap://localhost:1024</code>.</p> |
| </li> |
| <li><p><code>connectionUsername</code>. The DN of the user that opens the connection to the directory server. For example, <code>uid=admin,ou=system</code>. |
| Directory servers generally require clients to present username/password credentials in order to open a connection.</p> |
| </li> |
| <li><p><code>connectionPassword</code>. The password that matches the DN from <code>connectionUsername</code>. In the directory server, in the |
| DIT, the password is normally stored as a <code>userPassword</code> attribute in the corresponding directory entry.</p> |
| </li> |
| <li><p><code>connectionProtocol</code>. Currently the only supported value is a blank string. In future, this option will allow you to |
| select the Secure Socket Layer (SSL) for the connection to the directory server. Note: this option must be set |
| explicitly to an empty string, because it has no default value.</p> |
| </li> |
| <li><p><code>authentication</code>. Specifies the authentication method used when binding to the LDAP server. Can take either of the |
| values, <code>simple</code> (username and password, the default value) or <code>none</code> (anonymous). Note: Simple Authentication and |
| Security Layer (SASL) authentication is currently not supported.</p> |
| </li> |
| <li><p><code>destinationBase</code>. Specifies the DN of the node whose children provide the permissions for all destinations. In this |
| case the DN is a literal value (that is, no string substitution is performed on the property value). For example, a |
| typical value of this property is <code>ou=destinations,o=ActiveMQ,ou=system</code> (i.e. the default value).</p> |
| </li> |
| <li><p><code>filter</code>. Specifies an LDAP search filter, which is used when looking up the permissions for any kind of destination. |
| The search filter attempts to match one of the children or descendants of the queue or topic node. The default value |
| is <code>(cn=*)</code>.</p> |
| </li> |
| <li><p><code>roleAttribute</code>. Specifies an attribute of the node matched by <code>filter</code>, whose value is the DN of a role. Default |
| value is <code>uniqueMember</code>.</p> |
| </li> |
| <li><p><code>adminPermissionValue</code>. Specifies a value that matches the <code>admin</code> permission. The default value is <code>admin</code>.</p> |
| </li> |
| <li><p><code>readPermissionValue</code>. Specifies a value that matches the <code>read</code> permission. The default value is <code>read</code>.</p> |
| </li> |
| <li><p><code>writePermissionValue</code>. Specifies a value that matches the <code>write</code> permission. The default value is <code>write</code>.</p> |
| </li> |
| <li><p><code>enableListener</code>. Whether or not to enable a listener that will automatically receive updates made in the LDAP server |
| and update the broker's authorization configuration in real-time. The default value is <code>true</code>.</p> |
| </li> |
| </ul> |
| <p>The name of the queue or topic defined in LDAP will serve as the "match" for the security-setting, the permission value |
| will be mapped from the ActiveMQ 5.x type to the Artemis type, and the role will be mapped as-is. It's worth noting that |
| since the name of queue or topic coming from LDAP will server as the "match" for the security-setting the security-setting |
| may not be applied as expected to JMS destinations since Artemis always prefixes JMS destinations with "jms.queue." or |
| "jms.topic." as necessary.</p> |
| <p>ActiveMQ 5.x only has 3 permission types - <code>read</code>, <code>write</code>, and <code>admin</code>. These permission types are described on their |
| <a href="http://activemq.apache.org/security.html" target="_blank">website</a>. However, as described previously, ActiveMQ Artemis has 7 permission |
| types - <code>createDurableQueue</code>, <code>deleteDurableQueue</code>, <code>createNonDurableQueue</code>, <code>deleteNonDurableQueue</code>, <code>send</code>, <code>consume</code>, |
| <code>browse</code>, and <code>manage</code>. Here's how the old types are mapped to the new types:</p> |
| <ul> |
| <li><code>read</code> - <code>consume</code>, <code>browse</code></li> |
| <li><code>write</code> - <code>send</code></li> |
| <li><code>admin</code> - <code>createDurableQueue</code>, <code>deleteDurableQueue</code>, <code>createNonDurableQueue</code>, <code>deleteNonDurableQueue</code></li> |
| </ul> |
| <p>As mentioned, there are a few places where a translation was performed to achieve some equivalence.:</p> |
| <ul> |
| <li><p>This mapping doesn't include the Artemis <code>manage</code> permission type since there is no type analogous for that in ActiveMQ |
| 5.x.</p> |
| </li> |
| <li><p>The <code>admin</code> permission in ActiveMQ 5.x relates to whether or not the broker will auto-create a destination if |
| it doesn't exist and the user sends a message to it. Artemis automatically allows the automatic creation of a |
| destination if the user has permission to send message to it. Therefore, the plugin will map the <code>admin</code> permission |
| to the 4 aforementioned permissions in Artemis.</p> |
| </li> |
| </ul> |
| <h2 id="secure-sockets-layer-ssl-transport">Secure Sockets Layer (SSL) Transport</h2> |
| <p>When messaging clients are connected to servers, or servers are connected to other servers (e.g. via bridges) over an |
| untrusted network then Apache ActiveMQ Artemis allows that traffic to be encrypted using the Secure Sockets Layer (SSL) |
| transport.</p> |
| <p>For more information on configuring the SSL transport, please see <a href="configuring-transports.html">Configuring the Transport</a>.</p> |
| <h2 id="user-credentials">User credentials</h2> |
| <p>Apache ActiveMQ Artemis ships with two security manager implementations:</p> |
| <ul> |
| <li><p>The legacy, deprecated <code>ActiveMQSecurityManager</code> that reads user credentials, i.e. user names, passwords and role |
| information from properties files on the classpath called <code>artemis-users.properties</code> and <code>artemis-roles.properties</code>.</p> |
| </li> |
| <li><p>The flexible, pluggable <code>ActiveMQJAASSecurityManager</code> which supports any standard JAAS login module. Artemis ships |
| with several login modules which will be discussed further down. This is the default security manager.</p> |
| </li> |
| </ul> |
| <h3 id="jaas-security-manager">JAAS Security Manager</h3> |
| <p>When using JAAS much of the configuration depends on which login module is used. However, there are a few commonalities |
| for every case. The first place to look is in <code>bootstrap.xml</code>. Here is an example using the <code>PropertiesLogin</code> JAAS login |
| module which reads user, password, and role information from properties files:</p> |
| <pre><code><jaas-security domain="PropertiesLogin"/> |
| </code></pre><p>No matter what login module you're using, you'll need to specify it here in <code>bootstrap.xml</code>. The <code>domain</code> attribute |
| here refers to the relevant login module entry in <code>login.config</code>. For example:</p> |
| <pre><code>PropertiesLogin { |
| org.apache.activemq.artemis.spi.core.security.jaas.PropertiesLoginModule required |
| debug=true |
| org.apache.activemq.jaas.properties.user="artemis-users.properties" |
| org.apache.activemq.jaas.properties.role="artemis-roles.properties"; |
| }; |
| </code></pre><p>The <code>login.config</code> file is a standard JAAS configuration file. You can read more about this file on |
| <a href="https://docs.oracle.com/javase/8/docs/technotes/guides/security/jgss/tutorials/LoginConfigFile.html" target="_blank">Oracle's website</a>. |
| In short, the file defines:</p> |
| <ul> |
| <li><p>an alias for an entry (e.g. <code>PropertiesLogin</code>)</p> |
| </li> |
| <li><p>the implementation class for the login module (e.g. <code>org.apache.activemq.artemis.spi.core.security.jaas.PropertiesLoginModule</code>)</p> |
| </li> |
| <li><p>a flag which indicates whether the success of the login module is <code>required</code>, <code>requisite</code>, <code>sufficient</code>, or <code>optional</code> |
| (see more details on these flags in the <a href="http://docs.oracle.com/javase/8/docs/api/javax/security/auth/login/Configuration.html" target="_blank">JavaDoc</a></p> |
| </li> |
| <li><p>a list of configuration options specific to the login module implementation</p> |
| </li> |
| </ul> |
| <p>By default, the location and name of <code>login.config</code> is specified on the Artemis command-line which is set by |
| <code>etc/artemis.profile</code> on linux and <code>etc\artemis.profile.cmd</code> on Windows.</p> |
| <h4 id="dual-authentication">Dual Authentication</h4> |
| <p>The JAAS Security Manager also supports another configuration parameter - <code>certificate-domain</code>. This is useful when you |
| want to authenticate clients connecting with SSL connections based on their SSL certificates (e.g. using the <code>CertificateLoginModule</code> |
| discussed below) but you still want to authenticate clients connecting with non-SSL connections with, e.g., username and |
| password. Here's an example of what would go in <code>bootstrap.xml</code>:</p> |
| <pre><code><jaas-security domain="PropertiesLogin" certificate-domain="CertLogin"/> |
| </code></pre><p>And here's the corresponding <code>login.config</code>:</p> |
| <pre><code>PropertiesLogin { |
| org.apache.activemq.artemis.spi.core.security.jaas.PropertiesLoginModule required |
| debug=false |
| org.apache.activemq.jaas.properties.user="artemis-users.properties" |
| org.apache.activemq.jaas.properties.role="artemis-roles.properties"; |
| }; |
| |
| CertLogin { |
| org.apache.activemq.artemis.spi.core.security.jaas.TextFileCertificateLoginModule required |
| debug=true |
| org.apache.activemq.jaas.textfiledn.user="cert-users.properties" |
| org.apache.activemq.jaas.textfiledn.role="cert-roles.properties"; |
| }; |
| </code></pre><p>When the broker is configured this way then any client connecting with SSL and a client certificate will be authenticated |
| using <code>CertLogin</code> and any client connecting without SSL will be authenticated using <code>PropertiesLogin</code>.</p> |
| <h3 id="jaas-login-modules">JAAS Login Modules</h3> |
| <h4 id="guestloginmodule">GuestLoginModule</h4> |
| <p>Allows users without credentials (and, depending on how it is configured, possibly also users with invalid credentials) |
| to access the broker. Normally, the guest login module is chained with another login module, such as a properties login |
| module. It is implemented by <code>org.apache.activemq.artemis.spi.core.security.jaas.GuestLoginModule</code>.</p> |
| <ul> |
| <li><p><code>org.apache.activemq.jaas.guest.user</code> - the user name to assign; default is "guest"</p> |
| </li> |
| <li><p><code>org.apache.activemq.jaas.guest.role</code> - the role name to assign; default is "guests"</p> |
| </li> |
| <li><p><code>credentialsInvalidate</code> - boolean flag; if <code>true</code>, reject login requests that include a password (i.e. guest login |
| succeeds only when the user does not provide a password); default is <code>false</code></p> |
| </li> |
| <li><p><code>debug</code> - boolean flag; if <code>true</code>, enable debugging; this is used only for testing or debugging; normally, it |
| should be set to <code>false</code>, or omitted; default is <code>false</code></p> |
| </li> |
| </ul> |
| <p>There are two basic use cases for the guest login module, as follows:</p> |
| <ul> |
| <li><p>Guests with no credentials or invalid credentials.</p> |
| </li> |
| <li><p>Guests with no credentials only.</p> |
| </li> |
| </ul> |
| <p>The following snippet shows how to configure a JAAS login entry for the use case where users with no credentials or |
| invalid credentials are logged in as guests. In this example, the guest login module is used in combination with the |
| properties login module.</p> |
| <pre><code>activemq-domain { |
| org.apache.activemq.artemis.spi.core.security.jaas.PropertiesLoginModule sufficient |
| debug=true |
| org.apache.activemq.jaas.properties.user="artemis-users.properties" |
| org.apache.activemq.jaas.properties.role="artemis-roles.properties"; |
| |
| org.apache.activemq.artemis.spi.core.security.jaas.GuestLoginModule sufficient |
| debug=true |
| org.apache.activemq.jaas.guest.user="anyone" |
| org.apache.activemq.jaas.guest.role="restricted"; |
| }; |
| </code></pre><p>Depending on the user login data, authentication proceeds as follows:</p> |
| <ul> |
| <li><p>User logs in with a valid password — the properties login module successfully authenticates the user and returns |
| immediately. The guest login module is not invoked.</p> |
| </li> |
| <li><p>User logs in with an invalid password — the properties login module fails to authenticate the user, and authentication |
| proceeds to the guest login module. The guest login module successfully authenticates the user and returns the guest principal.</p> |
| </li> |
| <li><p>User logs in with a blank password — the properties login module fails to authenticate the user, and authentication |
| proceeds to the guest login module. The guest login module successfully authenticates the user and returns the guest principal.</p> |
| </li> |
| </ul> |
| <p>The following snipped shows how to configure a JAAS login entry for the use case where only those users with no |
| credentials are logged in as guests. To support this use case, you must set the credentialsInvalidate option to true in |
| the configuration of the guest login module. You should also note that, compared with the preceding example, the order |
| of the login modules is reversed and the flag attached to the properties login module is changed to requisite.</p> |
| <pre><code>activemq-guest-when-no-creds-only-domain { |
| org.apache.activemq.artemis.spi.core.security.jaas.GuestLoginModule sufficient |
| debug=true |
| credentialsInvalidate=true |
| org.apache.activemq.jaas.guest.user="guest" |
| org.apache.activemq.jaas.guest.role="guests"; |
| |
| org.apache.activemq.artemis.spi.core.security.jaas.PropertiesLoginModule requisite |
| debug=true |
| org.apache.activemq.jaas.properties.user="artemis-users.properties" |
| org.apache.activemq.jaas.properties.role="artemis-roles.properties"; |
| }; |
| </code></pre><p>Depending on the user login data, authentication proceeds as follows:</p> |
| <ul> |
| <li><p>User logs in with a valid password — the guest login module fails to authenticate the user (because the user has |
| presented a password while the credentialsInvalidate option is enabled) and authentication proceeds to the properties |
| login module. The properties login module successfully authenticates the user and returns.</p> |
| </li> |
| <li><p>User logs in with an invalid password — the guest login module fails to authenticate the user and authentication proceeds |
| to the properties login module. The properties login module also fails to authenticate the user. The nett result is |
| authentication failure.</p> |
| </li> |
| <li><p>User logs in with a blank password — the guest login module successfully authenticates the user and returns immediately. |
| The properties login module is not invoked.</p> |
| </li> |
| </ul> |
| <h4 id="propertiesloginmodule">PropertiesLoginModule</h4> |
| <p>The JAAS properties login module provides a simple store of authentication data, where the relevant user data is stored |
| in a pair of flat files. This is convenient for demonstrations and testing, but for an enterprise system, the integration |
| with LDAP is preferable. It is implemented by <code>org.apache.activemq.artemis.spi.core.security.jaas.PropertiesLoginModule</code>.</p> |
| <ul> |
| <li><p><code>org.apache.activemq.jaas.properties.user</code> - the path to the file which contains user and password properties</p> |
| </li> |
| <li><p><code>org.apache.activemq.jaas.properties.role</code> - the path to the file which contains user and role properties</p> |
| </li> |
| <li><p><code>reload</code> - boolean flag; whether or not to reload the properties files when a modification occurs; default is <code>false</code></p> |
| </li> |
| <li><p><code>debug</code> - boolean flag; if <code>true</code>, enable debugging; this is used only for testing or debugging; normally, it |
| should be set to <code>false</code>, or omitted; default is <code>false</code></p> |
| </li> |
| </ul> |
| <p>In the context of the properties login module, the <code>artemis-users.properties</code> file consists of a list of properties of the |
| form, <code>UserName=Password</code>. For example, to define the users <code>system</code>, <code>user</code>, and <code>guest</code>, you could create a file like |
| the following:</p> |
| <pre><code>system=manager |
| user=password |
| guest=password |
| </code></pre><p>The <code>artemis-roles.properties</code> file consists of a list of properties of the form, <code>Role=UserList</code>, where UserList is a |
| comma-separated list of users. For example, to define the roles <code>admins</code>, <code>users</code>, and <code>guests</code>, you could create a file |
| like the following:</p> |
| <pre><code>admins=system |
| users=system,user |
| guests=guest |
| </code></pre><h4 id="ldaploginmodule">LDAPLoginModule</h4> |
| <p>The LDAP login module enables you to perform authentication and authorization by checking the incoming credentials against |
| user data stored in a central X.500 directory server. For systems that already have an X.500 directory server in place, |
| this means that you can rapidly integrate ActiveMQ Artemis with the existing security database and user accounts can be |
| managed using the X.500 system. It is implemented by <code>org.apache.activemq.artemis.spi.core.security.jaas.LDAPLoginModule</code>.</p> |
| <ul> |
| <li><p><code>initialContextFactory</code> - must always be set to <code>com.sun.jndi.ldap.LdapCtxFactory</code></p> |
| </li> |
| <li><p><code>connectionURL</code> - specify the location of the directory server using an ldap URL, ldap://Host:Port. You can |
| optionally qualify this URL, by adding a forward slash, <code>/</code>, followed by the DN of a particular node in the directory |
| tree. For example, ldap://ldapserver:10389/ou=system.</p> |
| </li> |
| <li><p><code>authentication</code> - specifies the authentication method used when binding to the LDAP server. Can take either of |
| the values, <code>simple</code> (username and password) or <code>none</code> (anonymous).</p> |
| </li> |
| <li><p><code>connectionUsername</code> - the DN of the user that opens the connection to the directory server. For example, |
| <code>uid=admin,ou=system</code>. Directory servers generally require clients to present username/password credentials in order |
| to open a connection.</p> |
| </li> |
| <li><p><code>connectionPassword</code> - the password that matches the DN from <code>connectionUsername</code>. In the directory server, |
| in the DIT, the password is normally stored as a <code>userPassword</code> attribute in the corresponding directory entry.</p> |
| </li> |
| <li><p><code>connectionProtocol</code> - currently, the only supported value is a blank string. In future, this option will allow |
| you to select the Secure Socket Layer (SSL) for the connection to the directory server. This option must be set |
| explicitly to an empty string, because it has no default value.</p> |
| </li> |
| <li><p><code>userBase</code> - selects a particular subtree of the DIT to search for user entries. The subtree is specified by a |
| DN, which specifes the base node of the subtree. For example, by setting this option to <code>ou=User,ou=ActiveMQ,ou=system</code>, |
| the search for user entries is restricted to the subtree beneath the <code>ou=User,ou=ActiveMQ,ou=system</code> node.</p> |
| </li> |
| <li><p><code>userSearchMatching</code> - specifies an LDAP search filter, which is applied to the subtree selected by <code>userBase</code>. |
| Before passing to the LDAP search operation, the string value you provide here is subjected to string substitution, |
| as implemented by the <code>java.text.MessageFormat</code> class. Essentially, this means that the special string, <code>{0}</code>, is |
| substituted by the username, as extracted from the incoming client credentials.</p> |
| <p>After substitution, the string is interpreted as an LDAP search filter, where the LDAP search filter syntax is |
| defined by the IETF standard, RFC 2254. A short introduction to the search filter syntax is available from Oracle's |
| JNDI tutorial, <a href="http://download.oracle.com/javase/jndi/tutorial/basics/directory/filter.html" target="_blank">Search Filters</a>.</p> |
| <p>For example, if this option is set to <code>(uid={0})</code> and the received username is <code>jdoe</code>, the search filter becomes |
| <code>(uid=jdoe)</code> after string substitution. If the resulting search filter is applied to the subtree selected by the |
| user base, <code>ou=User,ou=ActiveMQ,ou=system</code>, it would match the entry, <code>uid=jdoe,ou=User,ou=ActiveMQ,ou=system</code> |
| (and possibly more deeply nested entries, depending on the specified search depth—see the <code>userSearchSubtree</code> option).</p> |
| </li> |
| <li><p><code>userSearchSubtree</code> - specify the search depth for user entries, relative to the node specified by <code>userBase</code>. |
| This option is a boolean. <code>false</code> indicates it will try to match one of the child entries of the <code>userBase</code> node |
| (maps to <code>javax.naming.directory.SearchControls.ONELEVEL_SCOPE</code>). <code>true</code> indicates it will try to match any entry |
| belonging to the subtree of the <code>userBase</code> node (maps to <code>javax.naming.directory.SearchControls.SUBTREE_SCOPE</code>).</p> |
| </li> |
| <li><p><code>userRoleName</code> - specifies the name of the multi-valued attribute of the user entry that contains a list of |
| role names for the user (where the role names are interpreted as group names by the broker's authorization plug-in). |
| If you omit this option, no role names are extracted from the user entry.</p> |
| </li> |
| <li><p><code>roleBase</code> - if you want to store role data directly in the directory server, you can use a combination of role |
| options (<code>roleBase</code>, <code>roleSearchMatching</code>, <code>roleSearchSubtree</code>, and <code>roleName</code>) as an alternative to (or in addition |
| to) specifying the <code>userRoleName</code> option. This option selects a particular subtree of the DIT to search for role/group |
| entries. The subtree is specified by a DN, which specifes the base node of the subtree. For example, by setting this |
| option to <code>ou=Group,ou=ActiveMQ,ou=system</code>, the search for role/group entries is restricted to the subtree beneath |
| the <code>ou=Group,ou=ActiveMQ,ou=system</code> node.</p> |
| </li> |
| <li><p><code>roleName</code> - specifies the attribute type of the role entry that contains the name of the role/group (e.g. C, O, |
| OU, etc.). If you omit this option, the role search feature is effectively disabled.</p> |
| </li> |
| <li><p><code>roleSearchMatching</code> - specifies an LDAP search filter, which is applied to the subtree selected by <code>roleBase</code>. |
| This works in a similar manner to the <code>userSearchMatching</code> option, except that it supports two substitution strings, |
| as follows:</p> |
| <ul> |
| <li><p><code>{0}</code> - substitutes the full DN of the matched user entry (that is, the result of the user search). For |
| example, for the user, <code>jdoe</code>, the substituted string could be <code>uid=jdoe,ou=User,ou=ActiveMQ,ou=system</code>.</p> |
| </li> |
| <li><p><code>{1}</code> - substitutes the received username. For example, <code>jdoe</code>.</p> |
| </li> |
| </ul> |
| <p>For example, if this option is set to <code>(member=uid={1})</code> and the received username is <code>jdoe</code>, the search filter |
| becomes <code>(member=uid=jdoe)</code> after string substitution (assuming ApacheDS search filter syntax). If the resulting |
| search filter is applied to the subtree selected by the role base, <code>ou=Group,ou=ActiveMQ,ou=system</code>, it matches all |
| role entries that have a <code>member</code> attribute equal to <code>uid=jdoe</code> (the value of a <code>member</code> attribute is a DN).</p> |
| <p>This option must always be set, even if role searching is disabled, because it has no default value.</p> |
| <p>If you use OpenLDAP, the syntax of the search filter is <code>(member:=uid=jdoe)</code>.</p> |
| </li> |
| <li><p><code>roleSearchSubtree</code> - specify the search depth for role entries, relative to the node specified by <code>roleBase</code>. |
| This option can take boolean values, as follows:</p> |
| <ul> |
| <li><p><code>false</code> (default) - try to match one of the child entries of the roleBase node (maps to |
| <code>javax.naming.directory.SearchControls.ONELEVEL_SCOPE</code>).</p> |
| </li> |
| <li><p><code>true</code> — try to match any entry belonging to the subtree of the roleBase node (maps to |
| <code>javax.naming.directory.SearchControls.SUBTREE_SCOPE</code>).</p> |
| </li> |
| </ul> |
| </li> |
| <li><p><code>debug</code> - boolean flag; if <code>true</code>, enable debugging; this is used only for testing or debugging; normally, it |
| should be set to <code>false</code>, or omitted; default is <code>false</code></p> |
| </li> |
| </ul> |
| <p>Add user entries under the node specified by the <code>userBase</code> option. When creating a new user entry in the directory, |
| choose an object class that supports the <code>userPassword</code> attribute (for example, the <code>person</code> or <code>inetOrgPerson</code> object |
| classes are typically suitable). After creating the user entry, add the <code>userPassword</code> attribute, to hold the user's |
| password.</p> |
| <p>If you want to store role data in dedicated role entries (where each node represents a particular role), create a role |
| entry as follows. Create a new child of the <code>roleBase</code> node, where the <code>objectClass</code> of the child is <code>groupOfNames</code>. Set |
| the <code>cn</code> (or whatever attribute type is specified by <code>roleName</code>) of the new child node equal to the name of the |
| role/group. Define a <code>member</code> attribute for each member of the role/group, setting the <code>member</code> value to the DN of the |
| corresponding user (where the DN is specified either fully, <code>uid=jdoe,ou=User,ou=ActiveMQ,ou=system</code>, or partially, |
| <code>uid=jdoe</code>).</p> |
| <p>If you want to add roles to user entries, you would need to customize the directory schema, by adding a suitable |
| attribute type to the user entry's object class. The chosen attribute type must be capable of handling multiple values.</p> |
| <h4 id="certificateloginmodule">CertificateLoginModule</h4> |
| <p>The JAAS certificate authentication login module must be used in combination with SSL and the clients must be configured |
| with their own certificate. In this scenario, authentication is actually performed during the SSL/TLS handshake, not |
| directly by the JAAS certificate authentication plug-in. The role of the plug-in is as follows:</p> |
| <ul> |
| <li><p>To further constrain the set of acceptable users, because only the user DNs explicitly listed in the relevant |
| properties file are eligible to be authenticated.</p> |
| </li> |
| <li><p>To associate a list of groups with the received user identity, facilitating integration with the authorization feature.</p> |
| </li> |
| <li><p>To require the presence of an incoming certificate (by default, the SSL/TLS layer is configured to treat the |
| presence of a client certificate as optional).</p> |
| </li> |
| </ul> |
| <p>The JAAS certificate login module stores a collection of certificate DNs in a pair of flat files. The files associate a |
| username and a list of group IDs with each DN.</p> |
| <p>The certificate login module is implemented by the following class:</p> |
| <pre><code>org.apache.activemq.artemis.spi.core.security.jaas.TextFileCertificateLoginModule |
| </code></pre><p>The following <code>CertLogin</code> login entry shows how to configure certificate login module in the login.config file:</p> |
| <pre><code>CertLogin { |
| org.apache.activemq.artemis.spi.core.security.jaas.TextFileCertificateLoginModule |
| debug=true |
| org.apache.activemq.jaas.textfiledn.user="users.properties" |
| org.apache.activemq.jaas.textfiledn.role="roles.properties"; |
| }; |
| </code></pre><p>In the preceding example, the JAAS realm is configured to use a single <code>org.apache.activemq.artemis.spi.core.security.jaas.TextFileCertificateLoginModule</code> |
| login module. The options supported by this login module are as follows:</p> |
| <ul> |
| <li><p><code>debug</code> - boolean flag; if true, enable debugging; this is used only for testing or debugging; normally, |
| it should be set to <code>false</code>, or omitted; default is <code>false</code></p> |
| </li> |
| <li><p><code>org.apache.activemq.jaas.textfiledn.user</code> - specifies the location of the user properties file (relative to the |
| directory containing the login configuration file).</p> |
| </li> |
| <li><p><code>org.apache.activemq.jaas.textfiledn.role</code> - specifies the location of the role properties file (relative to the |
| directory containing the login configuration file).</p> |
| </li> |
| <li><p><code>reload</code> - boolean flag; whether or not to reload the properties files when a modification occurs; default is <code>false</code></p> |
| </li> |
| </ul> |
| <p>In the context of the certificate login module, the <code>users.properties</code> file consists of a list of properties of the form, |
| <code>UserName=StringifiedSubjectDN</code>. For example, to define the users, system, user, and guest, you could create a file like |
| the following:</p> |
| <pre><code>system=CN=system,O=Progress,C=US |
| user=CN=humble user,O=Progress,C=US |
| guest=CN=anon,O=Progress,C=DE |
| </code></pre><p>Each username is mapped to a subject DN, encoded as a string (where the string encoding is specified by RFC 2253). For |
| example, the system username is mapped to the <code>CN=system,O=Progress,C=US</code> subject DN. When performing authentication, |
| the plug-in extracts the subject DN from the received certificate, converts it to the standard string format, and |
| compares it with the subject DNs in the <code>users.properties</code> file by testing for string equality. Consequently, you must |
| be careful to ensure that the subject DNs appearing in the <code>users.properties</code> file are an exact match for the subject |
| DNs extracted from the user certificates.</p> |
| <p>Note: Technically, there is some residual ambiguity in the DN string format. For example, the <code>domainComponent</code> attribute |
| could be represented in a string either as the string, <code>DC</code>, or as the OID, <code>0.9.2342.19200300.100.1.25</code>. Normally, you do |
| not need to worry about this ambiguity. But it could potentially be a problem, if you changed the underlying |
| implementation of the Java security layer.</p> |
| <p>The easiest way to obtain the subject DNs from the user certificates is by invoking the <code>keytool</code> utility to print the |
| certificate contents. To print the contents of a certificate in a keystore, perform the following steps:</p> |
| <ol> |
| <li><p>Export the certificate from the keystore file into a temporary file. For example, to export the certificate with |
| alias <code>broker-localhost</code> from the <code>broker.ks</code> keystore file, enter the following command:</p> |
| <p> keytool -export -file broker.export -alias broker-localhost -keystore broker.ks -storepass password</p> |
| <p>After running this command, the exported certificate is in the file, <code>broker.export</code>.</p> |
| </li> |
| <li><p>Print out the contents of the exported certificate. For example, to print out the contents of <code>broker.export</code>, |
| enter the following command:</p> |
| <p> keytool -printcert -file broker.export</p> |
| <p>Which should produce output similar to that shown here:</p> |
| <p> Owner: CN=localhost, OU=broker, O=Unknown, L=Unknown, ST=Unknown, C=Unknown |
| Issuer: CN=localhost, OU=broker, O=Unknown, L=Unknown, ST=Unknown, C=Unknown |
| Serial number: 4537c82e |
| Valid from: Thu Oct 19 19:47:10 BST 2006 until: Wed Jan 17 18:47:10 GMT 2007 |
| Certificate fingerprints:</p> |
| <pre><code> MD5: 3F:6C:0C:89:A8:80:29:CC:F5:2D:DA:5C:D7:3F:AB:37 |
| SHA1: F0:79:0D:04:38:5A:46:CE:86:E1:8A:20:1F:7B:AB:3A:46:E4:34:5C |
| </code></pre><p>The string following <code>Owner:</code> gives the subject DN. The format used to enter the subject DN depends on your |
| platform. The <code>Owner:</code> string above could be represented as either <code>CN=localhost,\ OU=broker,\ O=Unknown,\ L=Unknown,\ ST=Unknown,\ C=Unknown</code> |
| or <code>CN=localhost,OU=broker,O=Unknown,L=Unknown,ST=Unknown,C=Unknown</code>.</p> |
| </li> |
| </ol> |
| <p>The <code>roles.properties</code> file consists of a list of properties of the form, <code>Role=UserList</code>, where <code>UserList</code> is a |
| comma-separated list of users. For example, to define the roles <code>admins</code>, <code>users</code>, and <code>guests</code>, you could create a file |
| like the following:</p> |
| <pre><code>admins=system |
| users=system,user |
| guests=guest |
| </code></pre><p>The simplest way to make the login configuration available to JAAS is to add the directory containing the file, |
| <code>login.config</code>, to your CLASSPATH.</p> |
| <h2 id="changing-the-usernamepassword-for-clustering">Changing the username/password for clustering</h2> |
| <p>In order for cluster connections to work correctly, each node in the |
| cluster must make connections to the other nodes. The username/password |
| they use for this should always be changed from the installation default |
| to prevent a security risk.</p> |
| <p>Please see <a href="management.html">Management</a> for instructions on how to do this.</p> |
| <h2 id="securing-the-console">Securing the console</h2> |
| <p>Artemis comes with a web console that allows user to browse Artemis documentation via an embedded server. By default the |
| web access is plain HTTP. It is configured in <code>bootstrap.xml</code>:</p> |
| <pre><code><web bind="http://localhost:8161" path="web"> |
| <app url="jolokia" war="jolokia-war-1.3.5.war"/> |
| </web> |
| </code></pre><p>Alternatively you can edit the above configuration to enable secure access using HTTPS protocol. e.g.:</p> |
| <pre><code><web bind="https://localhost:8443" |
| path="web" |
| keyStorePath="${artemis.instance}/etc/keystore.jks" |
| keyStorePassword="password"> |
| <app url="jolokia" war="jolokia-war-1.3.5.war"/> |
| </web> |
| </code></pre><p>As shown in the example, to enable https the first thing to do is config the <code>bind</code> to be an <code>https</code> url. In addition, |
| You will have to configure a few extra properties desribed as below.</p> |
| <ul> |
| <li><p><code>keyStorePath</code> - The path of the key store file.</p> |
| </li> |
| <li><p><code>keyStorePassword</code> - The key store's password.</p> |
| </li> |
| <li><p><code>clientAuth</code> - The boolean flag indicates whether or not client authentication is required. Default is <code>false</code>.</p> |
| </li> |
| <li><p><code>trustStorePath</code> - The path of the trust store file. This is needed only if <code>clientAuth</code> is <code>true</code>.</p> |
| </li> |
| <li><p><code>trustStorePassword</code> - The trust store's password.</p> |
| </li> |
| </ul> |
| <h2 id="controlling-jms-objectmessage-deserialization">Controlling JMS ObjectMessage deserialization</h2> |
| <p>Artemis provides a simple class filtering mechanism with which a user can specify which |
| packages are to be trusted and which are not. Objects whose classes are from trusted packages |
| can be deserialized without problem, whereas those from 'not trusted' packages will be denied |
| deserialization.</p> |
| <p>Artemis keeps a <code>black list</code> to keep track of packages that are not trusted and a <code>white list</code> |
| for trusted packages. By default both lists are empty, meaning any serializable object is |
| allowed to be deserialized. If an object whose class matches one of the packages in black list, |
| it is not allowed to be deserialized. If it matches one in the white list |
| the object can be deserialized. If a package appears in both black list and white list, |
| the one in black list takes precedence. If a class neither matches with <code>black list</code> |
| nor with the <code>white list</code>, the class deserialization will be denied |
| unless the white list is empty (meaning the user doesn't specify the white list at all).</p> |
| <p>A class is considered as a 'match' if</p> |
| <ul> |
| <li>its full name exactly matches one of the entries in the list.</li> |
| <li>its package matches one of the entries in the list or is a sub-package of one of the entries.</li> |
| </ul> |
| <p>For example, if a class full name is "org.apache.pkg1.Class1", some matching entries could be:</p> |
| <ul> |
| <li><code>org.apache.pkg1.Class1</code> - exact match.</li> |
| <li><code>org.apache.pkg1</code> - exact package match.</li> |
| <li><code>org.apache</code> -- sub package match.</li> |
| </ul> |
| <p>A <code>*</code> means 'match-all' in a black or white list.</p> |
| <h3 id="specifying-black-list-and-white-list-via-connection-factories">Specifying black list and white list via Connection Factories</h3> |
| <p>To specify the white and black lists one can append properties <code>deserializationBlackList</code> and <code>deserializationWhiteList</code> respectively |
| to a Connection Factory's url string. For example:</p> |
| <pre><code> ActiveMQConnectionFactory factory = new ActiveMQConnectionFactory("vm://0?deserializationBlackList=org.apache.pkg1,org.some.pkg2"); |
| </code></pre><p>The above statement creates a factory that has a black list contains two forbidden packages, "org.apache.pkg1" and "org.some.pkg2", |
| separated by a comma.</p> |
| <p>You can also set the values via ActiveMQConnectionFactory's API:</p> |
| <pre><code>public void setDeserializationBlackList(String blackList); |
| public void setDeserializationWhiteList(String whiteList); |
| </code></pre><p>Again the parameters are comma separated list of package/class names.</p> |
| <h3 id="specifying-black-list-and-white-list-via-system-properties">Specifying black list and white list via system properties</h3> |
| <p>There are two system properties available for specifying black list and white list:</p> |
| <ul> |
| <li><code>org.apache.activemq.artemis.jms.deserialization.whitelist</code> - comma separated list of entries for the white list.</li> |
| <li><code>org.apache.activemq.artemis.jms.deserialization.blacklist</code> - comma separated list of entries for the black list.</li> |
| </ul> |
| <p>Once defined, all JMS object message deserialization in the VM is subject to checks against the two lists. However if you create a ConnectionFactory |
| and set a new set of black/white lists on it, the new values will override the system properties.</p> |
| <h3 id="specifying-black-list-and-white-list-for-resource-adapters">Specifying black list and white list for resource adapters</h3> |
| <p>Message beans using a JMS resource adapter to receive messages can also control their object deserialization via properly configuring relevant |
| properties for their resource adapters. There are two properties that you can configure with connection factories in a resource adapter:</p> |
| <ul> |
| <li><code>deserializationBlackList</code> - comma separated values for black list</li> |
| <li><code>deserializationWhiteList</code> - comma separated values for white list</li> |
| </ul> |
| <p>These properties, once specified, are eventually set on the corresponding internal factories.</p> |
| <h3 id="specifying-black-list-and-white-list-for-rest-interface">Specifying black list and white list for REST interface</h3> |
| <p>Apache Artemis REST interface (<a href="rest.html">Rest</a>) allows interactions between jms client and rest clients. |
| It uses JMS ObjectMessage to wrap the actual user data between the 2 types of clients and deserialization |
| is needed during this process. If you want to control the deserialization for REST, you need to set the |
| black/white lists for it separately as Apache Artemis REST Interface is deployed as a web application. |
| You need to put the black/white lists in its web.xml, as context parameters, as follows</p> |
| <pre><code><web-app> |
| <context-param> |
| <param-name>org.apache.activemq.artemis.jms.deserialization.whitelist</param-name> |
| <param-value>some.allowed.class</param-value> |
| </context-param> |
| <context-param> |
| <param-name>org.apache.activemq.artemis.jms.deserialization.blacklist</param-name> |
| <param-value>some.forbidden.class</param-value> |
| </context-param> |
| ... |
| </web-app> |
| </code></pre><p>The param-value for each list is a comma separated string value representing the list.</p> |
| |
| |
| </section> |
| |
| </div> |
| <div class="search-results"> |
| <div class="has-results"> |
| |
| <h1 class="search-results-title"><span class='search-results-count'></span> results matching "<span class='search-query'></span>"</h1> |
| <ul class="search-results-list"></ul> |
| |
| </div> |
| <div class="no-results"> |
| |
| <h1 class="search-results-title">No results matching "<span class='search-query'></span>"</h1> |
| |
| </div> |
| </div> |
| </div> |
| |
| </div> |
| </div> |
| |
| </div> |
| |
| |
| |
| <a href="management.html" class="navigation navigation-prev " aria-label="Previous page: Management"> |
| <i class="fa fa-angle-left"></i> |
| </a> |
| |
| |
| <a href="resource-limits.html" class="navigation navigation-next " aria-label="Next page: Resource Limits"> |
| <i class="fa fa-angle-right"></i> |
| </a> |
| |
| |
| |
| </div> |
| |
| <script> |
| var gitbook = gitbook || []; |
| gitbook.push(function() { |
| gitbook.page.hasChanged({"page":{"title":"Security","level":"1.37","depth":1,"next":{"title":"Resource Limits","level":"1.38","depth":1,"path":"resource-limits.md","ref":"resource-limits.md","articles":[]},"previous":{"title":"Management","level":"1.36","depth":1,"path":"management.md","ref":"management.md","articles":[]},"dir":"ltr"},"config":{"plugins":[],"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"pluginsConfig":{"highlight":{},"search":{},"lunr":{"maxIndexSize":1000000},"sharing":{"facebook":true,"twitter":true,"google":false,"weibo":false,"instapaper":false,"vk":false,"all":["facebook","google","twitter","weibo","instapaper"]},"fontsettings":{"theme":"white","family":"sans","size":2},"theme-default":{"styles":{"website":"styles/website.css","pdf":"styles/pdf.css","epub":"styles/epub.css","mobi":"styles/mobi.css","ebook":"styles/ebook.css","print":"styles/print.css"},"showLevel":false}},"github":"apache/activemq-artemis","theme":"default","githubHost":"https://github.com/","pdf":{"pageNumbers":true,"fontSize":12,"fontFamily":"Arial","paperSize":"a4","chapterMark":"pagebreak","pageBreaksBefore":"/","margin":{"right":62,"left":62,"top":56,"bottom":56}},"structure":{"langs":"LANGS.md","readme":"README.md","glossary":"GLOSSARY.md","summary":"SUMMARY.md"},"variables":{},"title":"ActiveMQ Artemis Documentation","links":{"home":"http://activemq.apache.org/","issues":"http://activemq.apache.org/","contribute":"http://activemq.apache.org/contributing.html"},"gitbook":"3.x.x","description":"ActiveMQ Artemis User Guide and Reference Documentation"},"file":{"path":"security.md","mtime":"2017-05-03T16:38:23.000Z","type":"markdown"},"gitbook":{"version":"3.1.1","time":"2017-05-15T16:53:09.087Z"},"basePath":".","book":{"language":""}}); |
| }); |
| </script> |
| </div> |
| |
| |
| <script src="gitbook/gitbook.js"></script> |
| <script src="gitbook/theme.js"></script> |
| |
| |
| <script src="gitbook/gitbook-plugin-search/search-engine.js"></script> |
| |
| |
| |
| <script src="gitbook/gitbook-plugin-search/search.js"></script> |
| |
| |
| |
| <script src="gitbook/gitbook-plugin-lunr/lunr.min.js"></script> |
| |
| |
| |
| <script src="gitbook/gitbook-plugin-lunr/search-lunr.js"></script> |
| |
| |
| |
| <script src="gitbook/gitbook-plugin-sharing/buttons.js"></script> |
| |
| |
| |
| <script src="gitbook/gitbook-plugin-fontsettings/fontsettings.js"></script> |
| |
| |
| |
| </body> |
| </html> |
| |