|
|
Using Security provides an introduction to the concepts associated with the WLE security features, a description of how to secure your WLE applications using the security features, and a guide to the use of the APIs in the WLE Security Service.
Username/Password Authentication
How Username/Password Authentication Works
Development Process for Username/Password Authentication
Requirements for Using the SSL Protocol
Development Process for the SSL Protocol
Certificate-Based Authentication
How Certificate-based Authentication Works
Requirements for Using Certificate-Based Authentication
Development Process for Certificate-Based Authentication
Commonly Asked Questions about WLE Security
Do I have to Change the Security in an Existing WLE Application?
Can I Use the SSL Protocol in an Existing WLE Application?
When Should I Use Mutual Certificate-Based Authentication?
Installing the WLE Security Pack
Using the LDAP Directory Service with Your WLE Application
Editing the LDAP Search Filter File
Publishing a Certificate for the Certificate Authority
Obtaining Digital Certificates and Private Keys for Principals
Storing the Private Keys in a Common Location
Defining the Trusted Certificate Authorities
Setting Parameters for the SSL Protocol
Defining a Port for SSL Communications
Enabling Certificate-based Authentication
Setting the Encryption Strength
Setting the Interval for Session Renegotiation
Defining Security Parameters for the IIOP Listener/Handler
Example of Setting Parameters on the ISL System Process
Example of Setting Command Line Options on the CORBA C++ ORB
Example of Setting System Properties on the CORBA Java ORB
Setting Parameters for Security in the UBBCONFIG File
Configuring the Authentication Server
Setting the Level of Encryption
Sample UBBCONFIG File for Username/Password Authentication
Sample UBBCONFIG File for Certificate-Based Authentication
Understanding the Address Formats of the Bootstrap Object
Using the Host and Port Address Format
Using the corbaloc URL Address Format
Using the corbalocs URL Address Format
Using Username/Password Authentication
The Security Sample Application
Writing the Client Application
Using Certificate-based Authentication
The Secure Simpapp Sample Application
Writing the Client Application
Using the Invocations_Options_Required() Method
Building and Running the Security Sample Application
Step 1: Copy the files for the Security sample application into a work directory.
Step 2: Verify the settings of the environment variables.
Step 3:Change the Protection on the Files for the Security Sample Application.
Step 4: Set the Environment Variables
Step 5: Initialize the Database
Step 6: Load the UBBCONFIG File
Step 7: Compile the Security Sample Application
Step 8: Start the server application
Step 8: Start the C++ client application
Step 9: Start the Java client application.
Building and Running the Secure Simpapp Sample Application
Step 1: Copy the Files for the Secure Simpapp Sample Application into a Work Directory
Step 2: Change the protection attribute on the files for the Secure Simpapp sample application.
Step 3: Verify the settings of the environment variables.
Step 4: Execute the runme command.
Using the Secure Simpapp Sample Application
How Authentication Works with WLE EJBs
Step 1: Define security roles for the methods of the WLE EJB.
Step 2: Specify security roles in the Deployment Descriptor of the EJB.
Step 3: Define the JNDI environment properties.
WLEContext.INITIAL_CONTEXT_FACTORY Property
WLEContext.PROVIDER_URL Property
WLEContext.SECURITY_AUTHENTICATION Property
Step 4: Establish the InitialContext.
Step 5: Use Home to get a WLE EJB.
Step 6: Use the getCallerPrincipal Method to authenticate a WLE EJB.
Example of Using Security in a WLE EJB
Username/Password Authentication Problems
Certificate-Based Authentication Problems
Tobj::Bootstrap::
resolve_initial_references Problems
IIOP Listener/Handler Startup Problems
Problems with Using Callbacks Objects with the SSL Protocol
Troubleshooting Tips for Digital Certificates
Functional Components of the WLE Security Service
The Principal Authenticator Object
Using the Principal Authenticator Object with Certificate-based Authentication
WLE Extensions to the Principal Authenticator Object
SecurityLevel2::PrincipalAuthenticator
|
Copyright © 1999 BEA Systems, Inc. All rights reserved.
|