O'Reilly logo

ActiveMQ in Action by Rob Davies, Dejan Bosanac, Bruce Snyder

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Securing ActiveMQ

 

This chapter covers
  • How to use authentication in ActiveMQ
  • How to use authorization in ActiveMQ
  • How to create a custom security plug-in for ActiveMQ
  • Using certificate-based security with ActiveMQ

 

Securing access to the message broker and its destinations is a common concern. For this reason, ActiveMQ provides a flexible and customizable security model that can be adapted to the security mechanisms used in your environment.

Before we begin our discussion about security with ActiveMQ, a brief review of some basic terms related to security and how they fit into the ActiveMQ security model is in order.

Authentication is the process used to verify the integrity of an entity or a user that’s requesting access ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required