[[_hawtio]] ===== Securing the Hawtio Administration Console To secure the Hawtio Administration Console with {project_name}, complete the following steps: . Add these properties to the `$FUSE_HOME/etc/system.properties` file: + [source] ---- hawtio.keycloakEnabled=true hawtio.realm=keycloak hawtio.keycloakClientConfig=file://${karaf.base}/etc/keycloak-hawtio-client.json hawtio.rolePrincipalClasses=org.keycloak.adapters.jaas.RolePrincipal,org.apache.karaf.jaas.boot.principal.RolePrincipal ---- . Create a client in the {project_name} administration console in your realm. For example, in the {project_name} `demo` realm, create a client `hawtio-client`, specify `public` as the Access Type, and specify a redirect URI pointing to Hawtio: \http://localhost:8181/hawtio/*. You must also have a corresponding Web Origin configured (in this case, \http://localhost:8181). . Create the `keycloak-hawtio-client.json` file in the `$FUSE_HOME/etc` directory using content similar to that shown in the example below. Change the `realm`, `resource`, and `auth-server-url` properties according to your {project_name} environment. The `resource` property must point to the client created in the previous step. This file is used by the client (Hawtio Javascript application) side. + [source,json] ---- { "realm" : "demo", "resource" : "hawtio-client", "auth-server-url" : "http://localhost:8080/auth", "ssl-required" : "external", "public-client" : true } ---- . Create the `keycloak-hawtio.json` file in the `$FUSE_HOME/etc` dicrectory using content similar to that shown in the example below. Change the `realm` and `auth-server-url` properties according to your {project_name} environment. This file is used by the adapters on the server (JAAS Login module) side. + [source,json] ---- { "realm" : "demo", "resource" : "jaas", "bearer-only" : true, "auth-server-url" : "http://localhost:8080/auth", "ssl-required" : "external", "use-resource-role-mappings": false, "principal-attribute": "preferred_username" } ---- . Start {fuseVersion} and install the keycloak feature if you have not already done so. The commands in Karaf terminal are similar to this example: + [source, subs="attributes"] ---- features:addurl mvn:org.keycloak/keycloak-osgi-features/{project_versionMvn}/xml/features features:install keycloak ---- . Go to http://localhost:8181/hawtio and log in as a user from your {project_name} realm. + Note that the user needs to have the proper realm role to successfully authenticate to Hawtio. The available roles are configured in the `$FUSE_HOME/etc/system.properties` file in `hawtio.roles`. ====== Securing Hawtio on {fuseHawtioEAPVersion} To run Hawtio on the {fuseHawtioEAPVersion} server, complete the following steps: . Set up {project_name} as described in the previous section, Securing the Hawtio Administration Console. It is assumed that: * you have a {project_name} realm `demo` and client `hawtio-client` * your {project_name} is running on `localhost:8080` * the {fuseHawtioEAPVersion} server with deployed Hawtio will be running on `localhost:8181`. The directory with this server is referred in next steps as `$EAP_HOME`. . Copy the `{fuseHawtioWARVersion}` archive to the `$EAP_HOME/standalone/configuration` directory. For more details about deploying Hawtio see the https://access.redhat.com/documentation/en-us/red_hat_jboss_fuse/6.3/html-single/deploying_into_a_web_server/[Fuse Hawtio documentation]. . Copy the `keycloak-hawtio.json` and `keycloak-hawtio-client.json` files with the above content to the `$EAP_HOME/standalone/configuration` directory. . Install the {project_name} adapter subsystem to your {fuseHawtioEAPVersion} server as described in the <<_jboss_adapter,JBoss adapter documentation>>. . In the `$EAP_HOME/standalone/configuration/standalone.xml` file configure the system properties as in this example: + [source,xml,options="nowrap",subs="attributes+"] ---- ... ---- . Add the Hawtio realm to the same file in the `security-domains` section: + [source,xml,options="nowrap",subs="attributes+"] ---- ---- . Add the `secure-deployment` section `hawtio` to the adapter subsystem. This ensures that the Hawtio WAR is able to find the JAAS login module classes. + [source,xml,options="nowrap",subs="attributes+"] ---- ---- . Restart the {fuseHawtioEAPVersion} server with Hawtio: + [source,bash] ---- cd $EAP_HOME/bin ./standalone.sh -Djboss.socket.binding.port-offset=101 ---- . Access Hawtio at http://localhost:8181/hawtio. It is secured by {project_name}.