-
Products
JBoss Enterprise Middleware
Red Hat JBoss Fuse Developer Studio Portfolio Edition Web Framework Kit Application Platform Web Server Data Grid Portal Platform Red Hat JBoss A-MQ SOA Platform Business Rules Management System (BRMS) Data Services Platform Messaging JBoss Operations Network JBoss Community or JBoss enterprise -
Solutions
Migration Center
Migrate to Red Hat Enterprise Linux Migration Center Systems management Upgrading to Red Hat Enterprise Linux JBoss Enterprise Middleware IBM AIX to Red Hat Enterprise Linux HP-UX to Red Hat Enterprise Linux Solaris to Red Hat Enterprise Linux UNIX to Red Hat Enterprise Linux Start a conversation with Red Hat Migration services -
Training
Courses and training paths
Popular and new courses JBoss Middleware Administration curriculum Core System Administration curriculum JBoss Middleware Development curriculum Advanced System Administration curriculum Linux Development curriculum Cloud Computing and Virtualization curriculum Cloud Computing, Virtualization, and Storage curriculum
Security: Access control
Control use of systems and data
Security support and updates
Granting access to a resource is contingent on authenticating the user requesting the access and determining whether they are authorized to make the kind of access that they are requesting.
SELinux and MAC
Some operating systems rely on password protection, course-grained permissions, or ad hoc application controls to implement access control. Red Hat® Enterprise Linux® offers Security-Enhanced Linux (SELinux), a revolutionary and more powerful approach, built directly into the Linux kernel. SELinux provides mandatory access control (MAC), a security feature crucial for a trusted operating system. And Red Hat Enterprise Linux 4 and 5 have both received Common Criteria validation as such.
JBoss Enterprise Data Services Platform
JBoss® Enterprise Data Services Platform provides operations that are consistent with the datacenter-wide view of identity and authentication. This lets applications apply fine-grained access controls directly to information processing business logic.
Learn more
-
SELinux: A strong access control architecture incorporated into the Linux kernel
-
JBoss Enterprise Business Rules Management System (BRMS) Platform: Business policy and rules development, access, and change management











