WildFly

Security and management improvements in Red Hat JBoss Enterprise Application Platform 7.4 Beta

Security and management improvements in Red Hat JBoss Enterprise Application Platform 7.4 Beta

The Beta release of Red Hat JBoss Enterprise Application Platform 7.4 is now available. This release has been made in preparation for the general availability (GA) release later in 2021, and contains a number of new features and enhancements. This article offers a summary of the most important improvements and illustrates an easy way to get started with JBoss EAP.

Continue reading Security and management improvements in Red Hat JBoss Enterprise Application Platform 7.4 Beta

Share
WildFly server configuration with Ansible collection for JCliff, Part 3

WildFly server configuration with Ansible collection for JCliff, Part 3

Welcome to the final installment in this three-part series about using Ansible Collection for JCliff to manage WildFly or Red Hat JBoss Enterprise Application Platform (JBoss EAP) instances. Previously, we’ve discussed installing and configuring the JCliff Ansible collection and using its basic features. In this article, we discuss advanced options available with the project’s latest release. Without further ado, let’s dive in!

Continue reading WildFly server configuration with Ansible collection for JCliff, Part 3

Share
WildFly server configuration with Ansible collection for JCliff, Part 2

WildFly server configuration with Ansible collection for JCliff, Part 2

Welcome to the second part of this series introducing Ansible collection for JCliff. This new extension is designed for fine-tuning WildFly or Red Hat JBoss Enterprise Application Platform (JBoss EAP) configurations using Ansible. In Part 1, we installed JCliff and its Ansible collection and prepared our environment. We set up a minimal, working playbook for installing JCliff on the target system. In this article, we will focus on configuring a few of our WildFly server’s subsystems.

Continue reading WildFly server configuration with Ansible collection for JCliff, Part 2

Share
Jakarta EE: Multitenancy with JPA on WildFly, Part 2

Jakarta EE: Multitenancy with JPA on WildFly, Part 2

This is the second half of a two-part article about multitenancy with the Jakarta Persistence API (JPA) on WildFly. In Part 1, I showed you how to implement multitenancy using a database. In Part 2, I’ll show you how to implement multitenancy using a schema and the Jakarta Persistence API (JPA) on WildFly. You’ll learn how to implement JPA’s CurrentTenantIdentifierResolver and MultiTenantConnectionProvider interfaces, and how to use JPA’s persistence.xml file to configure the required classes based on these interfaces.

Continue reading Jakarta EE: Multitenancy with JPA on WildFly, Part 2

Share
WildFly server configuration with Ansible collection for JCliff, Part 1

WildFly server configuration with Ansible collection for JCliff, Part 1

This three-part series guides you through using Ansible to fine-tune a WildFly or Red Hat JBoss Enterprise Application Platform (JBoss EAP) server configuration. We will use the most recently released version of the Ansible collection for JCliff to extend Ansible’s capabilities. The JCliff collection supports configuring several of the application server subsystems directly from Ansible.

In Part 1, we will mostly focus on the groundwork and discuss all the steps required to be able to use JCliff within Ansible. Once properly installed, we’ll use JCliff to configure WildFly’s system_props subsystem, which lets us declare system variables in WildFly’s server configuration. Once we have that foundation in place, we’ll begin exploring more interesting configurations in Part 2 and Part 3.

Note: See the Ansible documentation for more about Ansible collections.

Continue reading “WildFly server configuration with Ansible collection for JCliff, Part 1”

Share
Quarkus and Jakarta EE: Together, or not?

Quarkus and Jakarta EE: Together, or not?

In this article, I answer a question that I have seen asked on various forums: Will Quarkus be compatible with Jakarta EE? To understand our answer to that question, it is helpful to know the history of Quarkus and what we’re trying to achieve with it. So, please indulge me while I lay that groundwork.

A short history of Quarkus and Java EE

When Emmanuel Bernard, Jason Greene, Bob McWhirter, and I first discussed kicking off the ThornFly.x proof of concept, which would later become Quarkus, we had conversations about where Java EE (now Jakarta EE) would eventually fit. I think we all agreed that we already had the best open source implementation of Java EE in the form of WildFly and Red Hat JBoss Enterprise Application Platform (JBoss EAP). Creating yet another addition to this space seemed confusing at best. At worst, we feared that it would split our engineering and open source community efforts.

Continue reading “Quarkus and Jakarta EE: Together, or not?”

Share
Jakarta EE: Multitenancy with JPA on WildFly, Part 1

Jakarta EE: Multitenancy with JPA on WildFly, Part 1

In this two-part series, I demonstrate two approaches to multitenancy with the Jakarta Persistence API (JPA) running on WildFly. In the first half of this series, you will learn how to implement multitenancy using a database. In the second half, I will introduce you to multitenancy using a schema. I based both examples on JPA and Hibernate.

Continue reading Jakarta EE: Multitenancy with JPA on WildFly, Part 1

Share
New features in Red Hat CodeReady Studio 12.15.0.GA and JBoss Tools 4.15.0.Final for Eclipse 2020-03

New features in Red Hat CodeReady Studio 12.15.0.GA and JBoss Tools 4.15.0.Final for Eclipse 2020-03

JBoss Tools 4.15.0 and Red Hat CodeReady Studio 12.15 for Eclipse 4.15 (2020-03) are now available. For this release, we focused on improving Quarkus and container-based development and fixing bugs. We also updated the Hibernate Tools runtime provider and Java Developer Tools (JDT) extensions, which are now compatible with Java 14. Additionally, we made many UI changes to platform views, dialogs, and toolbars.

Installation

First, let’s look at how to install these updates. CodeReady Studio (previously Red Hat Developer Studio) comes with everything pre-bundled in its installer. Simply download the installer from the Red Hat CodeReady Studio product page and run it as follows:

Continue reading “New features in Red Hat CodeReady Studio 12.15.0.GA and JBoss Tools 4.15.0.Final for Eclipse 2020-03”

Share
Deploying projects to Apache Felix, Tomcat, and Karaf in VS Code

Deploying projects to Apache Felix, Tomcat, and Karaf in VS Code

We’re expanding tooling support for containers and servers in different development environments. Our existing VS Code extension, Red Hat Server Connector, only provides functionality for Red Hat servers and runtimes like WildFly, Minishift, Red Hat JBoss Enterprise Application Platform (JBoss EAP), and Red Hat Container Development Kit. In this article, we introduce Red Hat Community Server Connector, the newest addition to our Visual Studio Code (VS Code) extensions.

Community Server Connector makes it easier than ever to deploy, run, debug, and test Open Service Gateway initiative (OSGi), Java EE and Jakarta EE, and other projects targeting diverse servers and runtimes. This new VS Code extension allows you to control Apache Felix, Apache Karaf, and Apache Tomcat with the same user interface (UI) and flexibility that you have in Server Connector. And don’t worry, we’ll continue to enhance Red Hat Server Connector as well.

This article offers a general introduction to Red Hat Server Connector. For a more detailed introduction, see my video demonstration, which includes use cases for Apache Felix, Apache Karaf, and Apache Tomcat.

Continue reading “Deploying projects to Apache Felix, Tomcat, and Karaf in VS Code”

Share
Using Keycloak instead of Picketlink for SAML-based authentication

Using Keycloak instead of Picketlink for SAML-based authentication

The Picketlink project is now a deprecated module in Red Hat JBoss Enterprise Application Platform (EAP), so there’s a chance that Picketlink will no longer ship with the next release of EAP/Wildfly and that there will not be any fixes in the near future for the picketlink module.

Picketlink, however, is now merged with Keycloak, an open source identity and access management solution developed by Red Hat’s JBoss Community. In this article, we’ll present an alternative solution to the picketlink module. Some organizations use picketlink as the service provider to enable SAML-based authentication with a third-party identity provider (i.e., Active Directory Federated Services (AD FS), OKTA, PingFederate, etc.). In this, article, we’ll see how the keycloak-saml adapter can be configured in the place of Picketlink to enable SAML-based authentication with a third-party identity provider.

Continue reading “Using Keycloak instead of Picketlink for SAML-based authentication”

Share