Profile Photo
Dear Team!   My task is to migrate a web application from jboss-as-7.1.1.Final application server to wildfly-14.0.1.Final server. The applicatin consist of some user modules with different funtionalities and a separate module for EJBs. We have a custom login module (the name is AsirDBLogin) for the authentication and authorization. I followed the… (Show more)
in WildFly
Profile Photo
I'm using Elytron to secure my application with security context propagation from web to ejb. My realm use Keycloak as identity store. I would like to add some values from token attributes to default roles decoded from keycloak identity, but I didn't find an "aggregate" role decoder.   With this configuration <security-domains>… (Show more)
in WildFly
Profile Photo
I am trying to migrate an application with WildFly 11.0.0.Final to WildFly 15.0.1.Final. I cannot get through the Authentication, which is based on Database-identity-store. I have a few users in DB and among them, one is username: Admin, password: admin. When I request for usernames in DB I use WildFly user and password as shown below, however… (Show more)
in WildFly
Profile Photo
Hi, I'm trying to upgrade a personal system from JBossEAP6.4 to Wildfly 15. In EAP6.4 I could connect remotely to my secured EJB's after authenticating via client code. With Wildfly 15 I have the server set up correctly because I can connect to the secured EJB if I store the plain password in the database, and if I use DIGEST-MD5 in my client to… (Show more)
in WildFly
Profile Photo
Hello!   I'm novice with Wildfly. I have a task to deploy Wildfly 15 server with kerberos authentication and RBAC authorization using Active Directory. I managed to configure kerberos auth as described in https://hkalina.github.io/2018/01/02/kerberos/ using properties files or filesystem realm. I try to set RBAC for management different ways,… (Show more)
in WildFly
Profile Photo
We have users that use U+00A8 (Diaeresis (diacritic) - Wikipedia ) as an Active Directory password. They can not log in using the Elytron LDAP realm. Here's the sequence of events: PlainSaslClient.evaluateChallenge calls StringPrep.encode with the profile StringPrep.PROFILE_SASL_STORED… (Show more)
in WildFly