BEA Logo BEA WebLogic Enterprise Release 5.1

  Corporate Info  |  News  |  Solutions  |  Products  |  Partners  |  Services  |  Events  |  Download  |  How To Buy

 

   WebLogic Enterprise Doc Home   |   Security   |   Previous Topic   |   Next Topic   |   Contents   |   Index

Configuring Security Plug-Ins

 

This topic includes the Registering the Security Plug-Ins (SPIs) section.

 


Registering the Security Plug-Ins (SPIs)

Most BEA middleware products use a common transaction processing (TP) infrastructure that consists of a set of core services, such as security. The TP infrastructure is available to WebLogic Enterprise applications through well defined interfaces. These interfaces allow system administrators to change the default behavior of the TP infrastructure by loading and linking their own service code modules, referred to as security plug-ins.

In order to use a security plug-in, you need to register the security plug-in with the WebLogic Enterprise system. The registry of the WebLogic Enterprise system is a disk-based repository for storing information related to the security plug-ins. Initially, this registry holds information about the default security plug-ins. Additional entries are made to the registry as custom security plug-ins are added to the WebLogic Enterprise system. The registry entry for a security plug-in is a set of binary files that stores information about the plug-in. There is one registry per WebLogic Enterprise installation. Every client application, server application, and server machine in a particular WebLogic Enterprise application must use the same set of security plug-ins.

The registry is located in the following directory:

Windows NT

$TUXDIR/udataobj

UNIX

$TUXDIR/udataobj

The system administrator of a WebLogic Enterprise application in which custom security plug-ins are used is responsible for registering those plug-ins. A system administer can register security plug-ins in the registry of the WebLogic Enterprise system only from the local machine. That is, a system administrator cannot register security plug-ins while logged on to the host machine from a remote location.

The following commands are available for managing security plug-ins:

Instructions for using these commands are available in Guide to Providing Security Services for BEA Products. (This document contains the specifications for the Security SPIs, and describes the WebLogic Enterprise plug-in framework feature that makes the dynamic loading and linking of security plug-ins possible.) To obtain this document, see your BEA account executive.

When installing custom security plug-ins, the security vendor that provided the plug-in should provide instructions for using the commands to set up the registry for the WebLogic Enterprise system in order to access the customer security plug-ins.