- 浏览: 168721 次
- 性别:
- 来自: 北京
文章分类
- 全部博客 (81)
- UI (6)
- 后台 (22)
- 数据库 (3)
- 其他 (3)
- 问题集 (5)
- android (0)
- 随笔 (2)
- lucene (0)
- htmlParser (1)
- python (14)
- mongodb (1)
- HTTP (1)
- eclipse (1)
- EXTJS (2)
- Spring (1)
- maven (4)
- WEB JS (2)
- java tree (1)
- javascript ActionScript (1)
- 工具 (2)
- httpclient (1)
- tomcat gzip (1)
- 线程 (1)
- 数据库 MYSQL (1)
- 后台 缓存 (1)
- linux (3)
- SQL (1)
- hadoop (1)
最新评论
-
asqin:
getFileIO 时 in 对象为null
java修改,读取properties文件 -
holleyangyanges:
你试过你的代码吗?
HttpClient CAS -
a455642158:
tks……
java修改,读取properties文件 -
faikr:
请问,这个子表的数据,你是怎么和主表相关字段做对应的?比如,我 ...
jquery之jquerygrid-subgrid -
jrius:
这种方式 应该是抓不到的,百度指数使用了amf格式
JAVA抓取百度指数数据
<Server> <!--APR library loader. Documentation at /docs/apr.html --> <Listener className="org.apache.catalina.core.AprLifecycleListener" SSLEngine="on" /> <!--Initialize Jasper prior to webapps are loaded. Documentation at /docs/jasper-howto.html --> <Listener className="org.apache.catalina.core.JasperListener" /> <!-- Use a custom version of StandardService that allows the connectors to be started independent of the normal lifecycle start to allow web apps to be deployed before starting the connectors. --> <Service name="jboss.web"> <!-- A "Connector" represents an endpoint by which requests are received and responses are returned. Documentation at : Java HTTP Connector: /docs/config/http.html (blocking & non-blocking) Java AJP Connector: /docs/config/ajp.html APR (HTTP/AJP) Connector: /docs/apr.html Define a non-SSL HTTP/1.1 Connector on port 8080 --> <Connector port="8088" address="0.0.0.0" maxThreads="250" maxHttpHeaderSize="8192" emptySessionPath="true" protocol="HTTP/1.1" enableLookups="false" redirectPort="8443" acceptCount="100" connectionTimeout="20000" disableUploadTimeout="true" /> <!-- Define a SSL HTTP/1.1 Connector on port 8443 This connector uses the JSSE configuration, when using APR, the connector should be using the OpenSSL style configuration described in the APR documentation --> <!-- <Connector port="8443" protocol="HTTP/1.1" SSLEnabled="true" maxThreads="150" scheme="https" secure="true" clientAuth="false" sslProtocol="TLS" /> --> <!-- <Connector port="8443" maxHttpHeaderSize="8192" maxThreads="150" minSpareThreads="25" maxSpareThreads="75" enableLookups="false" disableUploadTimeout="true" acceptCount="100" scheme="https" secure="true" clientAuth="false" sslProtocol="TLS" keystoreFile="/conf/server.keystore" keystorePass="changeit" /> --> <Connector port="8443" minSpareThreads="5" maxSpareThreads="75" enableLookups="true" disableUploadTimeout="true" acceptCount="100" maxThreads="200" scheme="https" secure="true" SSLEnabled="true" keystoreFile="F:/jboss-4.2.3.GA/server/default/conf/server.keystore" keystorePass="changeit" clientAuth="false" sslProtocol="TLS"/> <!-- <Connector port="8443" maxThreads="100" minSpareThreads="5" maxSpareThreads="15" scheme="https" enableLookups="true" disableUploadTimeout="true" acceptCount="100" secure="true" clientAuth="false" keystoreFile="F:/jboss-4.2.3.GA/server/default/conf/server.keystore" keystorePass="changeit" sslProtocol="TLS"/> --> <!-- Define an AJP 1.3 Connector on port 8009 --> <Connector port="8009" address="${jboss.bind.address}" protocol="AJP/1.3" emptySessionPath="true" enableLookups="false" redirectPort="8443" /> <Engine name="jboss.web" defaultHost="localhost"> <!-- The JAAS based authentication and authorization realm implementation that is compatible with the jboss 3.2.x realm implementation. - certificatePrincipal : the class name of the org.jboss.security.auth.certs.CertificatePrincipal impl used for mapping X509[] cert chains to a Princpal. - allRolesMode : how to handle an auth-constraint with a role-name=*, one of strict, authOnly, strictAuthOnly + strict = Use the strict servlet spec interpretation which requires that the user have one of the web-app/security-role/role-name + authOnly = Allow any authenticated user + strictAuthOnly = Allow any authenticated user only if there are no web-app/security-roles --> <Realm className="org.jboss.web.tomcat.security.JBossSecurityMgrRealm" certificatePrincipal="org.jboss.security.auth.certs.SubjectDNMapping" allRolesMode="authOnly" /> <!-- A subclass of JBossSecurityMgrRealm that uses the authentication behavior of JBossSecurityMgrRealm, but overrides the authorization checks to use JACC permissions with the current java.security.Policy to determine authorized access. - allRolesMode : how to handle an auth-constraint with a role-name=*, one of strict, authOnly, strictAuthOnly + strict = Use the strict servlet spec interpretation which requires that the user have one of the web-app/security-role/role-name + authOnly = Allow any authenticated user + strictAuthOnly = Allow any authenticated user only if there are no web-app/security-roles <Realm className="org.jboss.web.tomcat.security.JaccAuthorizationRealm" certificatePrincipal="org.jboss.security.auth.certs.SubjectDNMapping" allRolesMode="authOnly" /> --> <Host name="localhost" autoDeploy="false" deployOnStartup="false" deployXML="false" configClass="org.jboss.web.tomcat.security.config.JBossContextConfig" > <!-- Uncomment to enable request dumper. This Valve "logs interesting contents from the specified Request (before processing) and the corresponding Response (after processing). It is especially useful in debugging problems related to headers and cookies." --> <!-- <Valve className="org.apache.catalina.valves.RequestDumperValve" /> --> <!-- Access logger --> <!-- <Valve className="org.apache.catalina.valves.AccessLogValve" prefix="localhost_access_log." suffix=".log" pattern="common" directory="${jboss.server.log.dir}" resolveHosts="false" /> --> <!-- Uncomment to enable single sign-on across web apps deployed to this host. Does not provide SSO across a cluster. If this valve is used, do not use the JBoss ClusteredSingleSignOn valve shown below. A new configuration attribute is available beginning with release 4.0.4: cookieDomain configures the domain to which the SSO cookie will be scoped (i.e. the set of hosts to which the cookie will be presented). By default the cookie is scoped to "/", meaning the host that presented it. Set cookieDomain to a wider domain (e.g. "xyz.com") to allow an SSO to span more than one hostname. --> <!-- <Valve className="org.apache.catalina.authenticator.SingleSignOn" /> --> <!-- Uncomment to enable single sign-on across web apps deployed to this host AND to all other hosts in the cluster. If this valve is used, do not use the standard Tomcat SingleSignOn valve shown above. Valve uses a JBossCache instance to support SSO credential caching and replication across the cluster. The JBossCache instance must be configured separately. By default, the valve shares a JBossCache with the service that supports HttpSession replication. See the "jboss-web-cluster-service.xml" file in the server/all/deploy directory for cache configuration details. Besides the attributes supported by the standard Tomcat SingleSignOn valve (see the Tomcat docs), this version also supports the following attributes: cookieDomain see above treeCacheName JMX ObjectName of the JBossCache MBean used to support credential caching and replication across the cluster. If not set, the default value is "jboss.cache:service=TomcatClusteringCache", the standard ObjectName of the JBossCache MBean used to support session replication. --> <!-- <Valve className="org.jboss.web.tomcat.service.sso.ClusteredSingleSignOn" /> --> <!-- Check for unclosed connections and transaction terminated checks in servlets/jsps. Important: The dependency on the CachedConnectionManager in META-INF/jboss-service.xml must be uncommented, too --> <Valve className="org.jboss.web.tomcat.service.jca.CachedConnectionValve" cachedConnectionManagerObjectName="jboss.jca:service=CachedConnectionManager" transactionManagerObjectName="jboss:service=TransactionManager" /> </Host> </Engine> </Service> </Server>
http://docs.jboss.org/jbossweb/latest/ssl-howto.html
发表评论
-
iptables
2012-11-08 09:24 9341、安装iptables防火墙 Cen ... -
Hadoop 查找最大数
2012-08-15 11:11 2456package com.lch.find; import ... -
Externalizable
2012-07-11 12:27 981被Serializable接口声明的类的对象的内容都将被序列化 ... -
cxf Dynamic webservice
2012-06-06 11:18 1638/** * @Title: DynamicClient ... -
枚举单例
2012-06-02 22:23 971package myproject.javatest; ... -
Java 自定义错误类【转】
2012-03-29 11:37 861原文地址 :[url] http://www.cnblogs. ... -
eclipse: Access restriction Error
2012-02-22 15:32 933在搭建项目环境时出现了以下编译错误: Access res ... -
eclipse 不自动编译java文件的问题
2012-02-21 11:14 1704「Project」菜单 「项目」菜单可以对工作台中的项目执行动 ... -
Filter指定浏览器来缓存或不缓存服务器数据
2012-02-17 15:08 1751import java.io.*; import ... -
JAVA 单例的两种模式
2012-02-16 09:52 1450/** * 单例模式:保证一个java的类只有一个实例 ... -
httpclient4 小例子
2012-02-01 16:29 1452import java.io.BufferedReader ... -
java修改,读取properties文件
2011-11-22 16:04 11816package com.ideamov.platform.ut ... -
【转】JSONLIB
2011-11-17 12:44 818Json-lib可以将Java对象转成json格式的字符串,也 ... -
转 HttpClient 基础
2011-01-14 11:57 673原文地址:http://blog.csdn ... -
java 综合
2011-01-12 15:34 793JAVA 打包 CMD下进入WEB目录下 jar cvf ca ... -
JBOSS HTTPS 续
2011-01-12 15:01 1518原文地址:http://docs.jboss.org/jbos ... -
HttpClient CAS
2011-01-11 10:09 2640package com.lch.sso; import ... -
spring security2.x 统一权限管理 数据库读取权限
2010-11-30 14:41 1434最近在研究统一权限管理,在网上深找了这一块资料,虽然JAVA开 ... -
java执行CMD命令
2010-11-12 15:22 1448package com.lch.swf; impor ... -
JAVA抓取百度指数数据
2010-11-09 09:41 6533在论坛看帖子看到一则 ...
相关推荐
JBoss,作为一个流行的Java应用服务器,提供了配置HTTPS(安全套接层超文本传输协议)的能力,以确保数据传输的加密和安全性。以下是配置JBoss服务器使用HTTPS的详细步骤: 1. **生成Keystore文件**: 使用Java...
Jboss 配置 HTTPS protocol Jboss 配置 HTTPS 协议是为了在 Web 应用传输过程中,保护数据的安全性。HTTPS 协议使用密钥对数据进行加密,从而防止数据在传输过程中的泄露。 首先,需要使用 keytool 工具生成 ...
JBOSS 7 基于 HTTPS 双向 SSL 认证 JBOSS 7 基于 HTTPS 双向 SSL 认证是一种高级别的安全认证机制,该机制使用 SSL 证书对服务器和客户端进行身份验证,以确保数据传输的安全性。在本文中,我们将详细介绍 JBOSS 7 ...
Windows 环境下 JBoss AS 7 配置 HTTPS 在 Windows 环境下,配置 JBoss AS 7 的 HTTPS 需要按照特定的步骤进行。下面将详细介绍配置 HTTPS 的过程。 生成服务器端证书文件 首先,需要使用 JDK 自带的工具制作 ...
- 启动监听器:开启HTTP、HTTPS、JMS等网络端口监听。 - 部署应用:扫描`deploy`目录下的应用并进行部署。 6. **日志与诊断**: - `standalone.log`是服务器的主要日志文件,记录了启动过程和运行时信息。 - ...
1. **下载JBoss**:从JBoss官网(https://www.jboss.org/jbossas/downloads)获取`jboss-as-distribution-6.1.0.Final`。 2. **解压JBoss**:将下载的JBoss解压到任意目录,比如`/usr/local/JBoss`。 3. **配置环境...
- SSL配置:如果需要启用HTTPS服务,则需要配置SSL证书及相关的安全策略。 - 集群配置:对于需要高可用性和负载均衡的应用场景,还需要对JBoss进行集群配置。 4. **启动与验证**:启动JBoss服务并验证其是否正常...
3. SSL配置:启用HTTPS协议,保证通信过程的安全性。 五、JBoss AS7的集群与高可用性 1. 集群配置:通过JGroups实现节点间的通信,创建高可用性的集群环境。 2. 负载均衡:通过负载均衡器分配请求到不同的服务器...
1. **HTTP/HTTPS端口**:默认情况下,JBoss的HTTP端口是8080,HTTPS端口是8443,用于处理HTTP和安全的HTTPS请求。 2. **管理端口**:如`management-http`的9990端口用于管理控制台,`management-native`的9999端口...
### 一台机器部署多个JBoss服务器的配置方法 在企业级应用开发中,有时需要在同一台物理机器上部署多个JBoss应用服务器实例。这可能是出于性能测试、开发环境搭建或是资源利用等多种考虑因素。然而,在同一台机器上...
主要内容涵盖JBoss的基本介绍、配置技巧、HTTPS的配置、Apache的安装与配置流程、JBoss集群的搭建以及粘性Session策略的应用。 - **JBoss简介**:JBoss是一款开源应用服务器,100%基于Java开发,与底层操作系统...
2. **web服务的端口号的修改**:如果需要更改HTTP或HTTPS端口,可以在standalone/configuration/standalone.xml或domain/configuration/domain.xml中找到相应的socket-binding配置。 3. **JBoss的安全设置**:JBoss...
- **SSL/TLS**:可以配置服务器使用HTTPS协议,提高网络通信的安全性。 6. **故障排查与性能优化** - **日志分析**:查看`standalone/log/server.log`或`domain/log/host-controller.log`等日志文件,有助于定位...
### Eclipse与JBoss远程调试详解 #### 一、引言 在软件开发过程中,经常会遇到部署在测试或生产环境的应用出现问题但无法在本地环境中重现的情况。这种情况下,使用远程调试技术能够有效地帮助开发者定位问题所在...
- Red Hat官方网站:https://www.redhat.com/en/technologies/jboss-middleware - GitHub仓库:https://github.com/wildfly/wildfly/releases 下载时要注意选择适合你的操作系统(例如Linux、Windows或macOS)和...
- 涉及HTTP/HTTPS监听器、管理接口等。 - **5.4.2 配置安全领域**:指导如何设置认证机制、权限控制等安全措施。 - **5.4.3 开箱即用配置**:介绍了JBoss AS7预设的一些常用配置。 - **5.4.4 详细配置**:深入探讨...
JBoss AS 7.x系列在Web服务方面有显著提升,支持HTTP/HTTPS协议,以及Servlet、JSP、JSF等Web技术。此外,它还包含了对EJB(Enterprise JavaBeans)3.1的支持,使企业级业务逻辑的实现更加便捷。 解压这个包后,...
- **源代码仓库**:https://github.com/jbossas/jboss-as - **讨论论坛**:http://community.jboss.org/community/jbossas/dev/jboss_as7_development?view=all - **下载页面**:...
- **SSL加密**:支持HTTPS协议,保障通信过程中的数据安全。 - **角色与权限**:定义不同角色并分配相应的操作权限,强化系统安全。 6. **开发与调试** - **IDE集成**:与Eclipse、IntelliJ IDEA等开发工具无缝...