Details
-
Type:
Improvement Request
-
Status:
Resolved
-
Priority:
Major
-
Resolution: Fixed
-
Affects Version/s: 4.1.0
-
Fix Version/s: 4.2.0
-
Component/s: Administration
-
Security Level: Public
-
- Environment:
- -
Issue Links
| Depends | |||
|---|---|---|---|
|
|
|
||
Activity
| Field | Original Value | New Value |
|---|---|---|
| Status | New [ 10000 ] | Open [ 10002 ] |
| Priority | Major [ 3 ] |
| Link |
This issue blocks |
| Status | Open [ 10002 ] | In Progress [ 10003 ] |
| Status | In Progress [ 10003 ] | Resolved [ 10004 ] |
| Fix Version/s | 4.2.0 [ 10356 ] | |
| Resolution | Fixed [ 1 ] |
| Transition | Status Change Time | Execution Times | Last Executer | Last Execution Date | |||||||||
|
|
|
|
|
|||||||||
|
|
|
|
|
|||||||||
|
|
|
|
|

The security can be increased introducing a passphrase at container level. To get the JMX credentials of other containers of the topology through the JMX API, the passphrase is required and MUST match the one of the container on which the client is connected. Otherwise, only other information are returned.
The passphrase is configured in the file 'server.properties' using the property 'petals.topology.passphrase'. If the property is not set or is empty, we consider that no passphrase is set, and the critical information could not be returned.