Menu Search

4.10. Other Services

The Broker can also have Access Control Providers, Group Providers, Keystores, Trustores and [Management] Plugins configured.

4.10.1. Access Control Providers

Access Control Providers are used to authorize various operations relating to Broker objects.

Access Control Provider configuration and management details are covered in Section 8.3, “Access Control Lists”.

4.10.2. Group Providers

Group Providers are used to aggregate authenticated user principals into groups which can be then be used in Access Control rules applicable to the whole group.

Group Provider configuration and management is covered in Section 8.2, “Group Providers”.

4.10.3. Keystores

Keystores are used to configure SSL private and public keys and certificates for the SSL transports on Ports.

Keystore configuration and management is covered in Section 7.12, “Keystores”.

4.10.4. Truststores

Truststores are used to configure SSL certificates for trusting Client Certificate on SSL ports or making SSL connections to other external services like LDAP, etc.

Truststore configuration and management is covered in Section 7.13, “Truststores”.

4.10.5. Loggers

Loggers are responsible for producing a log of events from either the Broker as a whole, or an individual Virtualhost. These are described in Section 9.1, “Logging”.