bekwam courses

WildFly Basic Auth with Elytron

December 13, 2020

This article shows how to configure Basic Authentication with WildFly Elytron. Elytron is the modern WildFly security framework that allows you to secure different profiles of the app server with the same configuration. This configuration is different that what you might have used in previous versions, now called "Legacy".

The JavaEE code described this article is on GitHub.

Basic Authentication is an old Internet standard for securing access to protected resources. Users provide credentials through a header in an HTTP. While the credentials aren't protected by Basic Authentication in transit, this deficiency in the protocol has been mitigated through the widespread adoption of TLS which encrypts all traffic. This is a link to the specification if you'd like more details.

If you'd like to see how to implement Basic Authentication, check out this article. While the Legacy scheme is a little simpler -- there's more configuration ready out-of-the-box -- I would use Elytron in any new projects.

The demo application has a pair of RESTful web services, PublicResource and ProtectedResource. PublicResource has open access. There are no constraints on it. ProtectedResource is subject to a constraint. This constraint requires that the request accessing ProtectedResource has a credential given the role "user".

The credentials will be stored in .properties files using a Properties Realm. The Realm is a pair of files containing hashed credentials (application-2-users.propertes) and roles (

This diagram is a roadmap for the configuration.

UML Class Diagram
Elytron Basic Auth Configuration

There are three parts to the configuration:

  1. Elytron,
  2. Undertow, and
  3. App code.


The Elytron part of the configuration will involve creating a Realm and a Security Domain. The Realm in this article is a Properties Realm which is a pair of files containing hashed credentials and role assignments. The Security Domain references this Realm and sets a few defaults.

First, create a pair of .properties files in the /configuration folder. The roles file -- called -- is a username, an equals sign, and a list of roles. In this case, there's just a single role "user". This role will be referenced in the web.xml file presented in App Code.

	# contents of

Next, create the users properties file ( An entry in the file is a username, and equals sign, and a hash of username, realm, and password separated by commas. The documentation refers to a utility "add-user" for working with the out-of-the-box properties. I use openssl like this to form an entry.

$ echo -n 'cwalker:MyRealm:abc123' | openssl dgst -md5

This gives me (stdin)= 22cd267575fea1f370242fec7c7740b8.

With both files properly formed, create a Properties Realm in the Management Console next.

  1. Logon to the Console.
  2. Navigate to Configuration > Subsystems > Security > Security Realms > View.
  3. Select Security Realms > Properties Realms.
  4. Press the Add button.
  5. Specify Realm Name, Path, and Relative To.
  6. Press Add.
  7. Select the newly-added Realm.
  8. Select the Groups Properties tab and press Edit.
  9. Add the path info for the role .properties file. Save
  10. Select the User Properties tab and press Edit.
  11. Specify a Digest Realm Name using the same name. (In case you want DIGEST later)

This is a screenshot of the Realm configuration used in the demo.

Screenshot of Realm
Elytron Realm Configuration

With the Realm in place, we'll create an Elytron Security Domain. The Security Domain object that we're working with in this article is an Elytron Security Domain. This is in the elytron section and not the (Legacy) security section. Another point of confusion is that you'll navigate into an SSL menu even though this demo does not use SSL.

  1. Navigate to Configuration > Subsystems > Security > Other Settings > View.
  2. Select SSL > Security Domain.
  3. Press Add
  4. Specify a Name and a Realm.
  5. Select the newly-added Realm and press Edit.
  6. Under Permission Mapper, select default-permission-mapper. Save.
  7. With the new Realm selected, press the Realms button.
  8. Select the Realm and press Edit.
  9. Under "Role Decoder", select groups-to-roles. Save.

This is a screenshot of the Security Domain configuration used in the demo.

Screenshot of Security Domain
Elytron Security Domain Configuration

This concludes the Elytron configuration. The next step is to link the security structures to the HTTP handler Undertow.


The Undertow configuration will link the security structures defined in the Elytron section with the App Code. To do this, add an Application Security Domain.

  1. Navigate to Configuration > Subsystems > Web / Undertow > Application Security Domain
  2. Press the Add button.
  3. Specify a Name and the Security Domain added in the Elytron section.
  4. Save.
Screenshot of App Security Domain
Undertow Application Security Domain Configuration

The Application Security Domain is the name that will be used in the jboss-web.xml file as described below.

App Code

In the web.xml file, use a security-constraint to define the protected URLs.

        <web-resource-name>Protected page</web-resource-name>

Next, define the role that is referenced in the auth-constraint.


Specify BASIC in the auth-method. I also specify a realm-name. For BASIC, this is informational and can be echoed back in a browser's credentials dialog to tell the users where they're logging in to.

    <realm-name>Basic Auth 2 Web Site</realm-name>

Next, specify a security-domain in the WildFly-specific deployment descriptor, jboss-web.xml.


The value in the security-domain tag was defined in the Undertow section.

While there are more steps in configuration Elytron Basic Authentication versus what comes out-of-the-box, it's worthwhile learning this technique. As your deployments become more complex, you may start working with Domain Mode and you'll be able to leverage what you learned in this article across the app server.

Headshot of Carl Walker

By Carl Walker

President and Principal Consultant of Bekwam, Inc