How to make use of JASPI with a standalone Undertow.
How to implement a configure a custom HTTP authentication mechanism.
A blog post describing how to override the authentication policy of an existing web application and add SPNEGO authentication to it.
Although developed for use within the WildFly application server the WildFly Elytron project can also be used in isolation, this blog post demonstrates how it can be used to secure an embedded Undertow server.
An early blog post describing how SSL configuration was being centrally defined within a new subsystem. Written early 2016 it is potentially due to be reviewed as exact commands may have evolved since it was written.
Tags
acmeadapter
aes
algorithm
ama
anomaly-detection
audit-logging
auth0
authentication
authorization
basic
bearer
caching
certificate
cli
client
client-cert
client-config
console
context
credential-store
custom-component
custom-principal
default-ssl-context
delegation
digest
distributed-realm
dynamic
ejb
elytron-tool
encoding
encryption
expression
external
factory
failover-realm
faq
filesystem
filesystem-realm
galleon
galleon-pack
ghc
ghc22
ghc23
git-persistence
git-tips
github
hacktoberfest
hash
http
https
identity
integrity
intrusion-detection
jaas
jaspi
java
jetty
jvm
jwt
kerberos
keycloak
keystore
kubernetes
ldap
lets-encrypt
login-context
login-module
machine-learning
management
management-model
migration
netty
oath2
oidc
okta
openshift
opensource
opensourceday
openssl
osd
peer
permissions
planning
principal
principal-decoder
principal-propagation
principal-transformer
propagation
properties
provider
proxy
realm
realm-mapper
recap
release
remote
resteasy
reverse
rfc
role-mapper
rule-engine
saml
sasl
scopes
security-events
security-realm
sha-256
sha-512-256
sni
spi
spnego
ssh
ssl
ssl-context
sso
tls
token
tool
trust-manager
truststore
undertow
updates
ux
vault
vlog
webservices
wildfly-config
x509