Access Point Administration Guide Domibus 3.3.3

Total Page:16

File Type:pdf, Size:1020Kb

Access Point Administration Guide Domibus 3.3.3 EUROPEAN COMMISSION DIGIT Connecting Europe Facility Access Point Administration Guide Domibus 3.3.3 Version [1.10] Status [Final] © European Union, 2018 Reuse of this document is authorised provided the source is acknowledged. The Commission's reuse policy is implemented by Commission Decision 2011/833/EU of 12 December 2011 on the reuse of Commission documents. Date: 21/06/2018 Domibus 3.3.3 Administration Guide Document Approver(s): Approver Name Role Adrien FERIAL CEF Technical Office Document Reviewers: Reviewer Name Role Cosmin BACIU CEF Technical Office Catalin-Emanuel ENACHE CEF Technical Office Summary of Changes: Version Date Created by Short Description of Changes 1.07 09/02/2018 Chaouki BERRAH Update for version 3.3.2 Caroline AEBY Information on MySQL and Oracle deletion scripts added as well as Domibus operational guidelines. 1.08 20/03/2018 Caroline AEBY Reuse notice added, links to AS4 specifications upated. 1.09 04/04/2018 Chaouki BERRAH Domibus 3.3.3 Caroline AEBY 1.10 20/06/2018 CEF Support Reference to nexus replaced by CEF Digital site Page 2 / 129 Domibus 3.3.3 Administration Guide Table of Contents 1. INTRODUCTION ................................................................................................................. 7 1.1. Purpose ...................................................................................................................................... 7 1.2. References ................................................................................................................................. 7 2. CONVENTIONS ................................................................................................................... 9 2.1. Example 1: Sample Oracle Statement ....................................................................................... 9 2.2. Example 2: Sample Configuration file ....................................................................................... 9 3. PREREQUISITES ................................................................................................................ 10 3.1. Binaries repository .................................................................................................................. 10 4. DOMIBUS DEPLOYMENT .................................................................................................. 11 4.1. Database Configuration ........................................................................................................... 11 4.1.1. MySQL and Oracle Deletion scripts ...................................................................................... 11 4.1.2. MySQL configuration ............................................................................................................ 11 4.1.3. Oracle configuration ............................................................................................................. 13 4.2. Domibus on WebLogic 12.1.3 .................................................................................................. 13 4.2.1. Single Server Deployment .................................................................................................... 13 4.2.2. Clustered Deployment .......................................................................................................... 22 4.3. Domibus on Tomcat ................................................................................................................ 33 4.3.1. Pre-Configured Single Server Deployment ........................................................................... 33 4.3.2. Single Server Deployment .................................................................................................... 36 4.3.3. Clustered Deployment .......................................................................................................... 38 4.4. Domibus on WildFly ................................................................................................................ 39 4.4.1. Pre-Configured Single Server Deployment ........................................................................... 39 4.4.2. Single Server Deployment .................................................................................................... 44 4.4.3. Clustered Deployment .......................................................................................................... 50 5. DOMIBUS CONFIGURATION ............................................................................................. 54 5.1. Security Configuration ............................................................................................................. 54 5.1.1. Security Policies .................................................................................................................... 54 5.1.2. Certificates............................................................................................................................ 54 5.2. Domibus Properties ................................................................................................................. 55 6. PLUGIN MANAGEMENT ................................................................................................... 62 6.1. Default Plugins ......................................................................................................................... 62 6.1.1. JMS Plugin............................................................................................................................. 62 6.1.2. WS Plugin .............................................................................................................................. 62 6.1.2.1. Domibus authentication .................................................................................................... 62 6.1.2.2. Domibus Authorization ..................................................................................................... 63 6.1.2.3. Enable the authentication in Domibus .............................................................................. 63 6.1.3. File System Plugin ................................................................................................................. 63 Page 3 / 129 Domibus 3.3.3 Administration Guide 6.2. Custom Plugin .......................................................................................................................... 64 6.2.1. Plugin registration ................................................................................................................ 64 6.2.1.1. Tomcat ............................................................................................................................... 64 6.2.1.2. WebLogic ........................................................................................................................... 64 6.2.1.3. WildFly ............................................................................................................................... 64 6.3. PMode Configuration .............................................................................................................. 65 6.3.1. Configuration ........................................................................................................................ 65 6.3.2. Adding a new participant ..................................................................................................... 65 6.3.3. Sample PMode file ............................................................................................................... 66 6.3.4. Domibus PMode configuration to ebMS3 PMode Mapping ................................................ 69 6.3.5. Upload new Configuration ................................................................................................... 74 6.3.5.1. Upload the PMode file ...................................................................................................... 74 6.3.5.2. Upload the Truststore ....................................................................................................... 77 7. SPECIAL SCENARIO: SENDER AND RECEIVER ARE THE SAME .............................................. 79 7.1. PMode Configuration .............................................................................................................. 79 7.2. Message structure ................................................................................................................... 79 7.3. Message ID convention ........................................................................................................... 80 8. ADMINISTRATION TOOLS ................................................................................................. 81 8.1. Administration Console ........................................................................................................... 81 8.1.1. Changing passwords ............................................................................................................. 81 8.1.2. User Account Lockout Policy ................................................................................................ 83 8.1.3. Adding new users ................................................................................................................. 85 8.1.4. Message Filtering ................................................................................................................. 86 8.2. Message Log ............................................................................................................................ 89 8.3. Application Logging ................................................................................................................
Recommended publications
  • Weld 3.0.2.Final - CDI Reference Implementation
    Weld 3.0.2.Final - CDI Reference Implementation CDI: Contexts and Dependency In- jection for the Java EE platform by Gavin King, Pete Muir, Jozef Hartinger, Martin Kouba, Dan Allen, and David Allen and thanks to Nicola Benaglia, Gladys Guerrero, Eun- Ju Ki,, Terry Chuang, Francesco Milesi, and Sean Wu A note about naming and nomenclature ............................................................................. ix I. Beans ............................................................................................................................ 1 1. Introduction ......................................................................................................... 5 1.1. What is a bean? ......................................................................................... 5 1.2. Getting our feet wet .................................................................................... 5 2. More about beans ................................................................................................ 9 2.1. The anatomy of a bean ............................................................................. 10 2.1.1. Bean types, qualifiers and dependency injection ............................... 10 2.1.2. Scope ............................................................................................ 13 2.1.3. EL name ........................................................................................ 13 2.1.4. Alternatives .................................................................................... 14 2.1.5. Interceptor
    [Show full text]
  • 10 Steps to Improving Your Deployment Process to Wildfly and Jboss EAP Whitepaper
    10 steps to improving your deployment process to WildFly and JBoss EAP Whitepaper Table of contents Best practices for application deployments 3 Versioned artifacts together with application configuration 3 Versioned and templatized JBoss profile configuration 4 Best practices for deployments to IIS 4 Standard runtime control setup 4 Runtime control, insight, and deployment service 5 Automation 5 Automated application and configuration deployment 5 Automated JBoss middleware provisioning 5 Secure self-service 5 Integration 6 Consider components outside the Red Hat stack 6 Integrate with your development toolchain 6 Digital.ai | 10 steps to improving your deployment process to WildFly and JBoss EAP 2 Whitepaper At Digital.ai, we have decades of accumulated experience deploying to JBoss EAP and broader Red Hat middleware environments. Based on this Versioning knowledge, we have collected a list of practices and recommendations that can help you improve your 1. Versioned artifacts together with application deployment process to your JBoss- application configuration based middleware stack. 2. Versioned and templatized JBoss Many of the following practices, which we have profile configuration grouped into Versioning, Management, Automation, and Integration “tracks”, are applicable and valuable in other middleware environments too. Management The lightweight and flexible nature of JBoss1, the 3. Standard runtime control setup consequent wide variety of possible setups, and the relatively rapid pace of change of automation 4. Runtime control, insight, and interfaces, result in a number of JBoss-specific deployment service challenges too. Automation Versioning 5. Automated application and 1. Versioned artifacts together with application configuration deployment configuration 6. Automated JBoss middleware Real apps running on JBoss are more than just an EAR file.
    [Show full text]
  • Dialogic® Powermedia™ XMS JSR 309 Connector Software Installation
    Dialogic® PowerMedia™ XMS JSR 309 Connector Software Release 3.2 Installation and Configuration Guide with TeleStax JBoss Application Server February 2017 Rev 3.1 www.dialogic.com Copyright and Legal Notice Copyright © 2016-2017 Dialogic Corporation. All Rights Reserved. You may not reproduce this document in whole or in part without permission in writing from Dialogic Corporation at the address provided below. All contents of this document are furnished for informational use only and are subject to change without notice and do not represent a commitment on the part of Dialogic Corporation and its affiliates or subsidiaries ("Dialogic"). Reasonable effort is made to ensure the accuracy of the information contained in the document. However, Dialogic does not warrant the accuracy of this information and cannot accept responsibility for errors, inaccuracies or omissions that may be contained in this document. INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH DIALOGIC® PRODUCTS. NO LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN A SIGNED AGREEMENT BETWEEN YOU AND DIALOGIC, DIALOGIC ASSUMES NO LIABILITY WHATSOEVER, AND DIALOGIC DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF DIALOGIC PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY INTELLECTUAL PROPERTY RIGHT OF A THIRD PARTY. Dialogic products are not intended for use in certain safety-affecting situations. Please see http://www.dialogic.com/company/terms-of-use.aspx for more details. Due to differing national regulations and approval requirements, certain Dialogic products may be suitable for use only in specific countries, and thus may not function properly in other countries.
    [Show full text]
  • Release Notes for Fedora 20
    Fedora 20 Release Notes Release Notes for Fedora 20 Edited by The Fedora Docs Team Copyright © 2013 Fedora Project Contributors. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. The original authors of this document, and Red Hat, designate the Fedora Project as the "Attribution Party" for purposes of CC-BY-SA. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. For guidelines on the permitted uses of the Fedora trademarks, refer to https:// fedoraproject.org/wiki/Legal:Trademark_guidelines. Linux® is the registered trademark of Linus Torvalds in the United States and other countries. Java® is a registered trademark of Oracle and/or its affiliates. XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries. All other trademarks are the property of their respective owners.
    [Show full text]
  • Oracle to Openjdk Migrations
    DATASHEET Make the Move from Oracle Java to Supported OpenJDK Oracle License Changes Cost of Cost of Number Number Oracle Java OpenJDK OpenLogic of Core of The new licensing requirements for Oracle Java SE Annual Annual Support Users Servers SE subscriptions have prompted many appli- Subscription Subscription cation development teams to reevaluate their 512 32 $92,160 $0 $30,880 options. 992 62 $179,280 $0 $56,080 Many teams are following analysts’ advice and adopting OpenJDK with supported and certified COST COMPARISON OF ORACLE JAVA VERSUS OPENJDK WITH OPENLOGIC SUPPORT builds from other vendors. the free OpenJDK license with OpenLogic support. Whether you have a OpenLogic can help organizations make the small or large core user base, the savings are substantial. move from Oracle Java to a supported OpenJDK The above comparison assumes the following: model with the following: • Most servers have dual, octa-core CPUs for a total • Free, certified and supported builds of of 16 cores. OpenJDK available at openlogic.com/ • The average user is in the 500 – 999 core tier priced openjdk-downloads. at $20/core/month (based on most recent Oracle Java • Enterprise support for any Java, including SE Subscription Global Price List). builds from other vendors. • The average customer has negotiated a 25% discount • Migration services to help you move seam- from Oracle. lessly from Oracle to OpenJDK. Java Support from OpenLogic Achieve Cost-Savings with Supported OpenJDK OpenLogic offers commercial support for all Java distributions, includ- ing Adopt OpenJDK, IBM, and Oracle’s Java. Based on the price of an Oracle Java SE subscription, which includes licensing and support, we’ve put Java support from OpenLogic includes security patches and bug fixes, together a conservative estimate of the annual in addition to guidance for the usage and administration of Java and the cost savings you can expect when migrating to JVM.
    [Show full text]
  • A Post-Apocalyptic Sun.Misc.Unsafe World
    A Post-Apocalyptic sun.misc.Unsafe World http://www.superbwallpapers.com/fantasy/post-apocalyptic-tower-bridge-london-26546/ Chris Engelbert Twitter: @noctarius2k Jatumba! 2014, 2015, 2016, … Disclaimer This talk is not going to be negative! Disclaimer But certain things are highly speculative and APIs or ideas might change by tomorrow! sun.misc.Scissors http://www.underwhelmedcomic.com/wp-content/uploads/2012/03/runningdude.jpg sun.misc.Unsafe - What you (don’t) know sun.misc.Unsafe - What you (don’t) know • Internal class (sun.misc Package) sun.misc.Unsafe - What you (don’t) know • Internal class (sun.misc Package) sun.misc.Unsafe - What you (don’t) know • Internal class (sun.misc Package) • Used inside the JVM / JRE sun.misc.Unsafe - What you (don’t) know • Internal class (sun.misc Package) • Used inside the JVM / JRE // Unsafe mechanics private static final sun.misc.Unsafe U; private static final long QBASE; private static final long QLOCK; private static final int ABASE; private static final int ASHIFT; static { try { U = sun.misc.Unsafe.getUnsafe(); Class<?> k = WorkQueue.class; Class<?> ak = ForkJoinTask[].class; example: QBASE = U.objectFieldOffset (k.getDeclaredField("base")); java.util.concurrent.ForkJoinPool QLOCK = U.objectFieldOffset (k.getDeclaredField("qlock")); ABASE = U.arrayBaseOffset(ak); int scale = U.arrayIndexScale(ak); if ((scale & (scale - 1)) != 0) throw new Error("data type scale not a power of two"); ASHIFT = 31 - Integer.numberOfLeadingZeros(scale); } catch (Exception e) { throw new Error(e); } } } sun.misc.Unsafe
    [Show full text]
  • 6.3 Release Notes
    JBoss Enterprise Application Platform 6.3 6.3 Notable features and fixes for this release. Released August 4, 2014. Last Updated: 2017-10-16 JBoss Enterprise Application Platform 6.3 6.3 Notable features and fixes for this release. Released August 4, 2014. Nidhi Chaudhary Lucas Costi Russell Dickenson Sande Gilda Vikram Goyal Eamon Logue Darrin Mison Scott Mumford David Ryan Nidhi Srinivas Misty Stanley-Jones Keerat Verma Tom Wells Legal Notice Copyright © 2014 Red Hat, Inc.. This document is licensed by Red Hat under the Creative Commons Attribution-ShareAlike 3.0 Unported License. If you distribute this document, or a modified version of it, you must provide attribution to Red Hat, Inc. and provide a link to the original. If the document is modified, all Red Hat trademarks must be removed. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent.
    [Show full text]
  • Red Hat Decision Manager 7.4 Running and Modifying the Employee Roster Starter Application for Red Hat Business Optimizer Using an IDE
    Red Hat Decision Manager 7.4 Running and modifying the employee roster starter application for Red Hat Business Optimizer using an IDE Last Updated: 2020-05-26 Red Hat Decision Manager 7.4 Running and modifying the employee roster starter application for Red Hat Business Optimizer using an IDE Red Hat Customer Content Services [email protected] Legal Notice Copyright © 2020 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Red Hat Jboss Enterprise Application Platform 7.1
    Red Hat JBoss Enterprise Application Platform 7.1 Introduction to JBoss EAP For Use with Red Hat JBoss Enterprise Application Platform 7.1 Last Updated: 2018-10-11 Red Hat JBoss Enterprise Application Platform 7.1 Introduction to JBoss EAP For Use with Red Hat JBoss Enterprise Application Platform 7.1 Legal Notice Copyright © 2018 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js ® is an official trademark of Joyent.
    [Show full text]
  • Hitachi Ops Center V.10.2.0
    Hitachi Ops Center V. 10.2.0 Open Source Software Packages Contact Information: Hitachi Ops Center Project Manager Hitachi Vantara LLC 2535 Augustine Drive Santa Clara, California 95054 Name of Product/Product Version License Component aesh 2.4 Apache License, Version 2.0 aesh Extensions 1.8 Apache License, Version 2.0 aesh Readline 2.0 Apache License, Version 2.0 aesh Terminal API 2.0 Apache License, Version 2.0 "Java Concurrency in Practice" 1.0-redhat- Creative Commons Attribution 2.5 Generic book annotations 4 @angular-builders/custom- 8.0.0-RC.0 The MIT License webpack @angular-devkit/build-angular 0.800.0-rc.2 The MIT License @angular-devkit/build-angular 0.803.25 The MIT License @angular-devkit/core 7.3.8 The MIT License @angular-devkit/schematics 7.3.8 The MIT License @angular/animations 7.2.15 The MIT License @angular/animations 8.2.14 The MIT License Name of Product/Product Version License Component @angular/cdk 7.3.7 The MIT License @angular/cli 8.0.0 The MIT License @angular/cli 8.3.25 The MIT License @angular/common 7.2.15 The MIT License @angular/common 8.2.14 The MIT License @angular/compiler 7.2.15 The MIT License @angular/compiler 8.2.14 The MIT License @angular/compiler-cli 8.2.14 The MIT License @angular/core 7.2.15 The MIT License @angular/forms 7.2.13 The MIT License @angular/forms 7.2.15 The MIT License @angular/forms 8.2.14 The MIT License @angular/forms 8.2.7 The MIT License @angular/language-service 8.2.14 The MIT License @angular/platform-browser 7.2.15 The MIT License Name of Product/Product Version License
    [Show full text]
  • Pwning Your Java Messaging with Deserialization Vulnerabilities Matthias Kaiser About Me
    Pwning Your Java Messaging With Deserialization Vulnerabilities Matthias Kaiser About me . Head of Vulnerability Research at Code White in Ulm, Germany . Software Dev/Architect in the past, enjoying technical security for 7 years now . Specialized on Java Security . Found bugs in products of Oracle, IBM, VMware, SAP, Redhat, Symantec, Apache, Adobe, etc. Recently looking more into the Windows world and client-side stuff @matthias_kaiser 08/03/2016 2 1 Motivation Introduction to Java‘s 2 Native Serialization 3 The Java Message Service 4 Attacking JMS 5 Introducing JMET 6 JMET in Action 7 Conclusion 08/03/2016 3 Motivation . During my research time I looked at all kinds of products running on Java . Several Java core technologies rely heavily on serialization (RMI, JMX) . Furthermore the Java Message Service (JMS) requires the use of Java’s Serialization . Previous security research on Java Message Service (JMS): . “A Pentesters Guide to Hacking ActiveMQ Based JMS Applications” + JMSDigger Tool by Gursev Singh Kalra of McAfee Foundstone Professional Services (2014) . “Your Q is my Q” by G. Geshev of MWR InfoSecurity (2014) . I haven’t found any research on attacking Java Messaging Service using (de)-serialization . That’s the reason why I’m here 08/03/2016 4 Disclaimer . This talk continues my research on Java Deserialization Vulnerabilities . Therefore I won‘t cover all the technical details about finding and exploiting deserialization vulnerabilities which I have shown in my other talks . If you want to dig deeper, you should look at: . “Deserialize My Shorts: Or How I Learned To Start Worrying and Hate Java Object Deserialization” by Chis Frohoff (OWASP-SD 2016) .
    [Show full text]
  • Deploy Anywhere with Red Hat Jboss Enterprise Application Platform
    DEPLOY ANYWHERE WITH RED HAT JBOSS ENTERPRISE APPLICATION PLATFORM DATASHEET FEATURES OVERVIEW • Fully certified Red Hat® JBoss® Enterprise Application Platform (JBoss EAP) is the market-leading open source Java EE 6 container platform for next-generation Java™ applications.1 JBoss EAP supports a wide range of Java applications, from HTML5 mobile applications to highly transactional applications that use the • Full web services stack Java Enterprise Edition (Java EE) programming approach. • Modular architecture optimized for cloud and virtualized environments RED HAT JBOSS ENTERPRISE • Enterprise capabilities APPLICATION PLATFORM such as failover, caching, intelligent load balancing Red Hat JBoss Developer Studio and distributed deployment Red Hat JBoss Web • Rich developer and management functionality Framework Kit and tooling Red Hat JBoss Enterprise BENEFITS Application Server (Full Java EE) • Deploy new business value, Embedded Tomcat, clustering, cache, transactions, messaging, faster with accelerated REST & full web services stack time-to-market • Boosted developer productivity Management Administration, configuration, management, • Flexible manageability and monitoring • Fully supported Java EE JB0065 development and deployment in the cloud Red Hat JBoss EAP is a fully certified Java EE 6 container and includes everything needed to build, run, and manage Java-based services on-premise or in Platform-as-a-Service (PaaS) environ- • Agility to quickly reinvent ments. JBoss EAP is based on the leading open source Wildfly project (formerly known as the JBoss and update your systems Application Server project) and adds enterprise features for clustering, caching, messaging, of engagement transactions, and a full web services stack. A subscription to JBoss EAP also includes entitlements to Red Hat JBoss Developer Studio and Red Hat JBoss Web Framework Kit, which can improve developer productivity and choice.
    [Show full text]