52 lines
2.8 KiB
HTML
52 lines
2.8 KiB
HTML
|
<!--
|
||
|
Licensed to the Apache Software Foundation (ASF) under one
|
||
|
or more contributor license agreements. See the NOTICE file
|
||
|
distributed with this work for additional information
|
||
|
regarding copyright ownership. The ASF licenses this file
|
||
|
to you under the Apache License, Version 2.0 (the
|
||
|
"License"); you may not use this file except in compliance
|
||
|
with the License. You may obtain a copy of the License at
|
||
|
|
||
|
http://www.apache.org/licenses/LICENSE-2.0
|
||
|
|
||
|
Unless required by applicable law or agreed to in writing,
|
||
|
software distributed under the License is distributed on an
|
||
|
"AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
|
||
|
KIND, either express or implied. See the License for the
|
||
|
specific language governing permissions and limitations
|
||
|
under the License.
|
||
|
-->
|
||
|
|
||
|
<html>
|
||
|
<head>
|
||
|
<title>ActiveMQ Artemis Stomp Example</title>
|
||
|
<link rel="stylesheet" type="text/css" href="../../../common/common.css" />
|
||
|
<link rel="stylesheet" type="text/css" href="../../../common/prettify.css" />
|
||
|
<script type="text/javascript" src="../../../common/prettify.js"></script>
|
||
|
</head>
|
||
|
<body onload="prettyPrint()">
|
||
|
<h1>Stomp Dual Authentication Example</h1>
|
||
|
|
||
|
<pre>To run the example, simply type <b>mvn verify</b> from this directory, <br>or <b>mvn -PnoServer verify</b> if you want to start and create the server manually.</pre>
|
||
|
|
||
|
<p>This example shows you how to configure 2-way SSL along with 2 different authentications mechanisms so that SSL and non-SSL clients can send and consume messages to/from ActiveMQ Artemis.
|
||
|
The non-SSL authentication mechanism simply uses username and password. The SSL authentication mechanism uses the client's certificate. The Stomp client uses SSL socket directly to send
|
||
|
a message. Then a JMS client will use a non-SSL connection to consume it.</p>
|
||
|
|
||
|
<p>The various keystore files are generated using the following commands:</p>
|
||
|
|
||
|
<p>
|
||
|
<pre class="prettyprint">
|
||
|
<code>
|
||
|
keytool -genkey -keystore server-side-keystore.jks -storepass secureexample -keypass secureexample -dname "CN=ActiveMQ Artemis Server, OU=Artemis, O=ActiveMQ, L=AMQ, S=AMQ, C=AMQ" -keyalg RSA
|
||
|
keytool -export -keystore server-side-keystore.jks -file server-side-cert.cer -storepass secureexample
|
||
|
keytool -import -keystore client-side-truststore.jks -file server-side-cert.cer -storepass secureexample -keypass secureexample -noprompt
|
||
|
keytool -genkey -keystore client-side-keystore.jks -storepass secureexample -keypass secureexample -dname "CN=ActiveMQ Artemis Client, OU=Artemis, O=ActiveMQ, L=AMQ, S=AMQ, C=AMQ" -keyalg RSA
|
||
|
keytool -export -keystore client-side-keystore.jks -file client-side-cert.cer -storepass secureexample
|
||
|
keytool -import -keystore server-side-truststore.jks -file client-side-cert.cer -storepass secureexample -keypass secureexample -noprompt
|
||
|
</code>
|
||
|
</pre>
|
||
|
</p>
|
||
|
</body>
|
||
|
</html>
|