blob: 989534b33418df59570f40e729909f6f2c5ee992 [file] [log] [blame]
type=page
status=published
title=Administering Security in Cluster Mode
next=administrative-security.html
prev=message-security.html
~~~~~~
Administering Security in Cluster Mode
======================================
[[GSSCG00038]][[gknpf]]
[[administering-security-in-cluster-mode]]
4 Administering Security in Cluster Mode
----------------------------------------
This chapter describes important information about administering
security in a cluster.
The following topics are described:
* link:#gksam[Configuring Certificates in Cluster Mode]
* link:#gkmhh[Dynamic Reconfiguration]
* link:#gktgi[Understanding Synchronization]
This chapter assumes that you are familiar with security features such
as authentication, authorization, and certificates. If you are not, see
link:system-security.html#ablnk[Administering System Security].
Instructions for accomplishing the tasks specific to GlassFish Server by
using the Administration Console are contained in the Administration
Console online help.
[[gksam]][[GSSCG00159]][[configuring-certificates-in-cluster-mode]]
Configuring Certificates in Cluster Mode
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The sections link:system-security.html#abloj[Certificates and SSL] and
link:system-security.html#ablqz[Administering JSSE Certificates] describe
the relevant concepts and use of certificates in GlassFish Server.
By default, GlassFish Server uses self-signed certificates. The
self-signed certificates that GlassFish Server uses might not be trusted
by clients by default because a certificate authority does not vouch for
the authenticity of the certificate.
You can instead use your own certificates, as described in
link:administrative-security.html#gkped[Using Your Own Certificates].
[[gkmhh]][[GSSCG00160]][[dynamic-reconfiguration]]
Dynamic Reconfiguration
~~~~~~~~~~~~~~~~~~~~~~~
Administrative commands that you execute on the domain administration
server (DAS) must either be replicated on the affected server instances,
or on all server instances that are part of the cluster. GlassFish
Server replicates the commands by sending the same administration
command request that was sent to the DAS to the server instances. As a
result of replicating the commands on the DAS and the individual
instances, the DAS and the instances make the same changes to their
respective copies of the domain's configuration.
[NOTE]
=======================================================================
Oracle recommends that you enable secure admin as described in
link:administrative-security.html#gknqh[Managing Administrative Security]
so that GlassFish Server securely transfers these files on the network.
=======================================================================
Dynamic reconfiguration refers to using the `--target` operand to CLI
subcommands to make a change to a server instance (if the user-specified
target is a server instance), or all server instances that are part of
the cluster (if the user-specified target is a cluster). For
example:`asadmin create-jdbc-resource some-options --target some-target`.
The --target operand allows the following values:
* `server` - Performs the command on the default server instance. This
is the default value.
* configuration_name - Performs the command in the specified
configuration.
* cluster_name - Performs the command on all server instances in the
specified cluster.
* instance_name - Performs the command on a specified server instance.
If a command fails for a cluster, the status shows all server instances
where dynamic reconfiguration failed, and suggests corrective next
steps.
The command status also shows when a restart is required for each server
instance.
The --target operand is supported for the following security-related CLI
subcommands:
* create-jacc-provider
* delete-jacc-provider
* list-jacc-providers
* create-audit-module
* create-auth-realm
* create-file-user
* delete-audit-module
* delete-auth-realm
* delete-file-user
* update-file-user
* create-message-security-provider
* delete-message-security-provider
* list-audit-modules
* list-file-groups
* list-file-users
* login
[[gkned]][[GSSCG00226]][[enabling-dynamic-configuration]]
Enabling Dynamic Configuration
^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
Dynamic configuration is enabled by default and no additional action is
required.
Use the following command to enable dynamic configuration from the
command line:
`asadmin --user user --passwordfile password-file set cluster-name-config.dynamic-reconfiguration-enabled=true`.
To enable dynamic configuration from the Administration Console, perform
the following steps:
1. Expand the Configurations node.
2. Click the name of the cluster's configuration.
3. On the Configuration System Properties page, check the Dynamic
Reconfiguration Enabled box.
4. Click Save.
[NOTE]
=======================================================================
The dynamic reconfiguration feature applies only to server instances,
not the DAS. Therefore, you cannot "disable" dynamic reconfiguration on
the DAS. There is no way to make changes to the DAS configuration using
`asadmin` commands, the Administration Console, or the REST interface
without having those changes take effect immediately.
=======================================================================
[[gktgi]][[GSSCG00161]][[understanding-synchronization]]
Understanding Synchronization
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
As described in "link:../ha-administration-guide/instances.html#GSHAG00189[Resynchronizing GlassFish Server
Instances and the DAS]" in GlassFish Server Open Source Edition High
Availability Administration Guide, configuration data for a GlassFish
Server instance is stored in the repository of the DAS and in a cache on
the host that is local to the instance. The configuration data in these
locations must be synchronized. The cache is synchronized only when a
user uses the administration tools to start or restart an instance.
See "link:../ha-administration-guide/instances.html#GSHAG00189[Resynchronizing GlassFish Server Instances and the
DAS]" in GlassFish Server Open Source Edition High Availability
Administration Guide for information about default synchronization for
files and directories, for the steps required to resynchronize an
instance and the DAS, and for additional synchronization topics.