JBoss Settings
1. Hide access to Directory
Jboss_home/server/default/deploy/jbossweb-tomcat55.sar/conf/web.xml
<param-name>listings</param-name> <param-value>false</param-value>
2. Set the Jmx-console console password
Because that is, using a firewall to shield the 8080 port, the malicious user can also access through the Http://your_domain/JMX-Console, modify the following
jboss_home/server/default/deploy/jmx-console.war/web-inf/
Web. XML Cancel <security-constraint> this comment
Jboss-web.xml Cancel <security-domain> This comment
Jboss_home/server/default/conf/props
Jmx-console-users.properties Modify Admin=admin Set user name = Set Password
Jmx-console-roles.properties change admin to the user name set above
3, set the Web-console console password:
jboss_home/server/default/deploy/management/console-mgr.sar/web-console.war/web-inf/
Web. XML Cancel <security-constraint> this comment
Jboss-web.xml Cancel <security-domain> This comment
Cd.. /class
Web-console-roles.properties change admin to the user name set above
Web-console-users.properties Modify Admin=admin Set user name = Set Password
Copy the above two files to Jboss_home/server/default/conf/props
VI Jboss_home/server/default/conf/login-config.xml
Found it
<application-policy name = "Web-console" > <authentication> <login-module code= "Org.jboss. Security.auth.spi.UsersRolesLoginModule "flag =" Required "> <module-option name=" Usersprop Erties ">props/web-console-users.properties</module-option>
<module-option name= "Rolesproperties" >props/web-console-roles.properties</module-option> </lo Gin-module> </authentication> </application-policy>
4. Modify Jboss_home/server/default/conf/jboss-service.xml
Will <!--A Flag to disable the scans-
<attribute name= "scanenabled" >true</attribute> change true to False
Here, complete the settings for the JBoss console password. This setting can improve performance on the one hand, and on the other hand, the JBoss application is modified, not immediately effective, both pros and cons.