Hi Shirley,

you can use certificates in place of passwords to authenticate a web
console user by adding TextFileCertificateLoginModule to your login.config,
for further details see
https://activemq.apache.org/components/artemis/documentation/latest/security.html#securing-the-console

Alternatively, you can use keycloak to authenticate a web console user and
configure Azure Entra ID as an identity provider of keycloak, for further
details on using keycloak to authenticate a web console user see
https://github.com/apache/activemq-artemis-examples/tree/2.39.0/examples/features/standard/security-keycloak

The new web console version based on Hawtio 4 should natively
support OpenID Connect identity providers as Azure Entra ID, see the in
progress PR https://github.com/apache/activemq-artemis/pull/5467

Regards,
Domenico

On Mon, 24 Feb 2025 at 11:40, Shirley Mwombe <smwo...@gmail.com> wrote:

> Hi @All/Justin,
>
> I have deployed ActiveMQ Artemis 2.34.0 in my prod environment, but this
> has been flagged by auditors for exposing web console credentials (mostly
> concerned with password) when the web browser request payload is captured
> by burpsuite or browser developer tools. See sample screenshot below.
>
> [image: amqscreenshot.png]
>
> Is there a way I can set up artemis web application to encrypt the
> credentials before placing them in the request payload and sending in
> plain-text?
> Alternatively is there a way to configure Artemis to use federated
> identity like Azure Entra ID or authentication redirect to Azure? Instead
> of using basic authentication of username and password?
>
> Kindly note ssl is already configured but this is only encrypting the
> traffic in transit, but at web browser the traffic is visible.
>
> Regards,
> Shirley
> Platform Engineer
>
>

Reply via email to