helloworld-mutual-ssl-secured: Securing a Web Application with Mutual (two-way) TLS Configuration and Role-based Access Control
The helloworld-mutual-ssl-secured
quickstart demonstrates securing a Web application using client certificate authentication with authorization
This example demonstrates the configuration of mutual TLS authentication in WildFly Application Server 35 to secure a war application.
Mutual TLS provides the same security as TLS, with the addition of authentication and non-repudiation of the client authentication, using digital signatures. When mutual authentication is used, the server would request the client to provide a certificate in addition to the server certificate issued to the client. Mutual authentication requires an extra round trip time for client certificate exchange. In addition, the client must obtain and maintain a digital certificate. We can secure our war application deployed over WildFly with mutual(two-way) client certificate authentication and provide access permissions or privileges to legitimate users.
The out of the box configuration for WildFly has one-way TLS enabled by default. This quickstart shows how to configure WildFly with mutual (two-way) TLS authentication in order to secure a WAR application with restricted access.
The application this project produces is designed to be run on WildFly Application Server 35 or later.
All you need to build this project is Java SE 17.0 or later, and Maven 3.6.0 or later. See Configure Maven to Build and Deploy the Quickstarts to make sure you are configured correctly for testing the quickstarts.
In the following instructions, replace WILDFLY_HOME
with the actual path to your WildFly installation. The installation path is described in detail here: Use of WILDFLY_HOME and JBOSS_HOME Variables.
When you see the replaceable variable QUICKSTART_HOME, replace it with the path to the root directory of all of the quickstarts.
This quickstart uses secured application interfaces and requires that you create the following application user to access the running application.
UserName | Realm | Password | Roles |
---|---|---|---|
quickstartUser |
ApplicationRealm |
quickstartPwd1! |
JBossAdmin |
To add the application user, open a terminal and type the following command:
$ WILDFLY_HOME/bin/add-user.sh -a -u 'quickstartUser' -p 'quickstartPwd1!' -g 'JBossAdmin'
Note
|
For Windows, use the WILDFLY_HOME\bin\add-user.bat script.
|
Important
|
For the purpose of this quickstart the password can contain any valid value because the ApplicationRealm will be used for authorization only, for example, to obtain the security roles.
|
Before you begin, back up your server configuration file.
-
If it is running, stop the WildFly server.
-
Back up the
WILDFLY_HOME/standalone/configuration/standalone.xml
file.
After you have completed testing this quickstart, you can replace this file to restore the server to its original configuration.
-
Open a terminal and navigate to the root of the WildFly directory.
-
Start the WildFly server with the default profile by typing the following command.
$ WILDFLY_HOME/bin/standalone.sh
NoteFor Windows, use the WILDFLY_HOME\bin\standalone.bat
script.
-
Create the client certificate, which is used to authenticate against the server when accessing a resource through TLS.
$ WILDFLY_HOME/bin/jboss-cli.sh --connect --file=configure-client-cert.cli
NoteFor Windows, use the WILDFLY_HOME\bin\jboss-cli.bat
script.
The certificate and keystore are now properly configured.
You configure the SSL context and required security domain by running JBoss CLI commands. For your convenience, this quickstart batches the commands into a configure-ssl.cli
script provided in the root directory of this quickstart.
-
Before you begin, make sure you do the following:
-
Back up the WildFly standalone server configuration as described above.
-
Start the WildFly server with the standalone default profile as described above.
-
-
Review the
configure-ssl.cli
file in the root of this quickstart directory. Comments in the script describe the purpose of each block of commands. -
Open a new terminal, navigate to the root directory of this quickstart, and run the following command, replacing WILDFLY_HOME with the path to your server:
$ WILDFLY_HOME/bin/jboss-cli.sh --connect --file=configure-ssl.cli
NoteFor Windows, use the WILDFLY_HOME\bin\jboss-cli.bat
script.You should see the following result when you run the script.
The batch executed successfully process-state: reload-required
-
Stop the WildFly server.
After stopping the server, open the WILDFLY_HOME/standalone/configuration/standalone.xml
file and review the changes.
-
The following
key-store
was added to theelytron
subsystem:<key-store name="qsTrustStore"> <credential-reference clear-text="secret"/> <implementation type="JKS"/> <file path="server.truststore" relative-to="jboss.server.config.dir"/> </key-store>
-
The following
trust-manager
was added to theelytron
subsystem:<trust-managers> <trust-manager name="qsTrustManager" key-store="qsTrustStore"/> </trust-managers>
-
The default
ssl-context
was updated to reference thetrust-manager
to enable two-way TLS:<server-ssl-contexts> <server-ssl-context name="applicationSSC" need-client-auth="true" key-manager="applicationKM" trust-manager="qsTrustManager"/> </server-ssl-contexts>
Note that the
https-listener
in theundertow
subsystem references theapplicationSSC
server-ssl-context
by default. -
The following realms were added to the
elytron
subsystem:<key-store-realm name="KeyStoreRealm" key-store="qsTrustStore"/> <aggregate-realm name="QuickstartRealm" authentication-realm="KeyStoreRealm" authorization-realm="ApplicationRealm"/>
The
aggregate-realm
defines different security realms for authentication and authorization. In this case, theKeyStoreRealm
is responsible for authenticating the principal extracted from the client’s certificate and theApplicationRealm
is responsible for obtaining the roles required to access the application. -
The following
principal-decoder
andsecurity-domain
were added to theelytron
subsystem:<x500-attribute-principal-decoder name="QuickstartDecoder" attribute-name="cn"/> <security-domain name="QuickstartDomain" default-realm="QuickstartRealm" permission-mapper="default-permission-mapper" principal-decoder="QuickstartDecoder"> <realm name="QuickstartRealm" role-decoder="groups-to-roles"/> </security-domain>
The
x500-attribute-principal-decoder
creates a newPrincipal
from the CN attribute of theX500Principal
obtained from the client’s certificate. This new principal is supplied to the security realms and is also the principal returned in methods likegetUserPrincipal
andgetCallerPrincipal
. -
The following
http-authentication-factory
was added to theelytron
subsystem:<http-authentication-factory name="quickstart-http-authentication" http-server-mechanism-factory="global" security-domain="QuickstartDomain"> <mechanism-configuration> <mechanism mechanism-name="CLIENT_CERT"/> </mechanism-configuration> </http-authentication-factory>
It defines the security domain that will handle requests using the
CLIENT_CERT
HTTP mechanism. -
The following
application-security-domain
was added to theundertow
subsystem:<application-security-domains> <application-security-domain name="client_cert_domain" http-authentication-factory="quickstart-http-authentication"/> </application-security-domains>
It maps the
client_cert_domain
from the quickstart application to thehttp-authentication-factory
shown above, so requests made to the application go through the configured HTTP authentication factory.
To test the TLS configuration, start WildFly and access: https://localhost:8443
If it is configured correctly, you should be asked to trust the server certificate.
Before you access the application, you must import the client.keystore.P12, which holds the client certificate, into your browser.
-
Click the Chrome menu icon (3 dots) in the upper right on the browser toolbar and choose Settings. This takes you to
link:`chrome://settings/
. -
Click on Privacy and security and then on Security.
-
Scroll down to the Advanced section and on the Manage certificates screen, select the Your Certificates tab and click on the Import button.
-
Select the client.keystore.p12 file. You will be prompted to enter the password:
secret
. -
The client certificate is now installed in the Google Chrome browser.
-
Click the Edit menu item on the browser menu and choose Settings.
-
A new window will open. Click on Privacy & Security and scroll down to the Certificates section.
-
Click the View Certificates button.
-
A new window will open. Select the Your Certificates tab and click the Import button.
-
Select the client.keystore.p12 file. You will be prompted to enter the password:
secret
. -
The certificate is now installed in the Mozilla Firefox browser.
-
Make sure WildFly server is started.
-
Open a terminal and navigate to the root directory of this quickstart.
-
Type the following command to build the quickstart.
$ mvn clean package
-
Type the following command to deploy the quickstart.
$ mvn wildfly:deploy
This deploys the helloworld-mutual-ssl-secured/target/helloworld-mutual-ssl-secured.war
to the running instance of the server.
You should see a message in the server log indicating that the archive deployed successfully.
If mutual TLS is configured properly and the WAR application is secured, you will be able to access the application only if the DN of client certificate, for example client.keystore.p12
, is same as the one defined in app-roles.properties
file. Otherwise, it will result in an HTTP error status code of 403 Access Denied/Forbidden
.
The application will be running at the following URL: https://localhost:8443/helloworld-mutual-ssl-secured
A page displaying the caller principal and the client certificate used for mutual TLS should be visible:
Hello World ! Mutual TLS client authentication is successful and your war app is secured.!!
Caller Principal: quickstartUser
Client Certificate Pem: MIIDhTCCAm2gAwIBAgIEf9lc5DANBgkqhkiG9w0BAQsFADBzMQswCQYDVQQGEwJCUjESMBAGA1UECBMJU2FvIFBhdW
xvMRIwEAYDVQQHEwlTYW8gUGF1bG8xEzARBgNVBAoTCk15IENvbXBhbnkxDjAMBgNVBAsTBVNhbGVzMRcwFQYDVQQDEw5xdWlja3N0YXJ0VXNlcjAe
Fw0xNzA3MjQxOTE0MDNaFw0xODA3MjQxOTE0MDNaMHMxCzAJBgNVBAYTAkJSMRIwEAYDVQQIEwlTYW8gUGF1bG8xEjAQBgNVBAcTCVNhbyBQYXVsbz
ETMBEGA1UEChMKTXkgQ29tcGFueTEOMAwGA1UECxMFU2FsZXMxFzAVBgNVBAMTDnF1aWNrc3RhcnRVc2VyMIIBIjANBgkqhkiG9w0BAQEFAAOCAQ8A
MIIBCgKCAQEAnHwflE8K/ArTPbTeZZEFK+1jtpg9grPSD62GIz/awoIDr6Rf9vCBTpAg4lom62A0BNZDEJKdab/ExNOOBRY+/pOnYlXZTYlDpdQQap
0E7UP5EfHNZsafgpfILCop2LdTuUbcV7tLKBsthJLJ0ZCoG5QJFble+OPxEbissOvIqHfvUJZi34k9ULteLJc330g0uTuDrLgtoFQ0cbHa4FCQ86o8
5EuRPpFeW6EBA3iYE/tKHSYsK7QSajefX6jZjXoZiUflw97SAGL43ZtvNbrKRywEfsVqDpDurjBg2HI+YahuDz5R1QWTSyTHWMZzcyJYqxjXiSf0oK
1cUahn6m5t1wIDAQABoyEwHzAdBgNVHQ4EFgQUlYS+xjK7KxNMf13UxMgiEssJOQkwDQYJKoZIhvcNAQELBQADggEBADkp+R6kSNXJNfihqbDRp3uF
tNMG6OgaYsfC7RtNLMdrhvoLlU7uWzxVCFuifvNlWVRiADBHDCRQU2uNRFW35GQSfHQyok4KoBuKlfBtQ+Xu7c8R0JzxN/rPJPXoCbShzDHo1uoz5/
dzXZz0EjjWCPJk+LVEhEvH0GcWAp3x3irpNU4hRZLd0XomY0Z4NnUt7VMBNYDOxVxgT9qcLnEaEpIfYULubLLCFHwAga2YgsKzZYLuwMaEWK4zhPVF
ynfnMaOxI67FC2QzhfzERyKqHj47WuwN0xWbS/1gBypS2nUwvItyxaEQG2X5uQY8j8QoY9wcMzIIkP2Mk14gJGHUnA8=
This quickstart includes integration tests, which are located under the src/test/
directory. The integration tests verify that the quickstart runs correctly when deployed on the server.
Follow these steps to run the integration tests.
-
Make sure WildFly server is started.
-
Make sure the quickstart is deployed.
-
Type the following command to run the
verify
goal with theintegration-testing
profile activated.$ mvn verify -Pintegration-testing -Dserver.dir=__WILDFLY_HOME__
When you are finished testing the quickstart, follow these steps to undeploy the archive.
-
Make sure WildFly server is started.
-
Open a terminal and navigate to the root directory of this quickstart.
-
Type this command to undeploy the archive:
$ mvn wildfly:undeploy
You can restore the original server configuration using either of the following methods.
-
You can run the
restore-configuration.cli
script provided in the root directory of this quickstart. -
You can manually restore the configuration using the backup copy of the configuration file.
-
Start the WildFly server as described above.
-
Open a new terminal, navigate to the root directory of this quickstart, and run the following command, replacing
WILDFLY_HOME
with the path to your server:$ WILDFLY_HOME/bin/jboss-cli.sh --connect --file=restore-configuration.cli
NoteFor Windows, use the WILDFLY_HOME\bin\jboss-cli.bat
script.
This script reverts the changes made to the elytron
subsystem. You should see the following result when you run the script:
The batch executed successfully
process-state: reload-required
When you have completed testing the quickstart, you can restore the original server configuration by manually restoring the backup copy the configuration file.
-
If it is running, stop the WildFly server.
-
Replace the
WILDFLY_HOME/standalone/configuration/standalone.xml
file with the backup copy of the file.
-
Run the CLI script to restore client cert configuration:
$ WILDFLY_HOME/bin/jboss-cli.sh --connect --file=restore-client-cert.cli
-
Open a terminal and navigate to the WildFly server
configuration
directory:$ cd WILDFLY_HOME/standalone/configuration/
NoteFor Windows, use the WILDFLY_HOME\bin\standalone.bat
script. -
Remove the
client.keystore.P12
,clientCert.crt
, andserver.truststore
files that were generated for this quickstart.
After you are done with this quickstart, remember to remove the certificate that was imported into your browser.
-
Click the Chrome menu icon (3 dots) in the upper right on the browser toolbar and choose Settings. This takes you to chrome://settings/.
-
Click on Privacy and security and then on Security.
-
Scroll down to the Advanced section and on the Manage certificates screen, select the Your Certificates tab and then click on the arrow to the right of the certificate to be removed.
-
The certificate is expanded, displaying the
quickstartUser
entry. Click on the icon (3 dots) to the right of it and then select Delete. -
Confirm the deletion in the dialog box. The certificate has now been removed from the Google Chrome browser.
-
Click the Edit menu item on the browser menu and choose Preferences.
-
A new window will open. Click on Privacy & Security and scroll down to the Certificates section.
-
Click the View Certificates button.
-
A new window will open. Select the Your Certificates tab.
-
Select the quickstartUser certificate and click the Delete button.
-
The certificate has now been removed from the Mozilla Firefox browser.
Instead of using a standard WildFly server distribution, you can alternatively provision a WildFly server to deploy and run the quickstart. The functionality is provided by the WildFly Maven Plugin, and you may find its configuration in the quickstart pom.xml
:
<profile>
<id>provisioned-server</id>
<activation>
<activeByDefault>true</activeByDefault>
</activation>
<build>
<plugins>
<plugin>
<groupId>org.wildfly.plugins</groupId>
<artifactId>wildfly-maven-plugin</artifactId>
<configuration>
<discover-provisioning-info>
<version>${version.server}</version>
</discover-provisioning-info>
<add-ons>...</add-ons>
</configuration>
<executions>
<execution>
<goals>
<goal>package</goal>
</goals>
</execution>
</executions>
</plugin>
...
</plugins>
</build>
</profile>
When built, the provisioned WildFly server can be found in the target/server
directory, and its usage is similar to a standard server distribution, with the simplification that there is never the need to specify the server configuration to be started.
Follow these steps to run the quickstart using the provisioned server.
-
Make sure the server is provisioned.
$ mvn clean package
-
Add the quickstart user:
$ target/server/bin/add-user.sh -a -u 'quickstartUser' -p 'quickstartPwd1!' -g 'JBossAdmin'
-
Start the WildFly provisioned server, using the WildFly Maven Plugin
start
goal.$ mvn wildfly:start
-
Type the following command to run the integration tests.
$ mvn verify -Pintegration-testing
-
Shut down the WildFly provisioned server.
$ mvn wildfly:shutdown