bea.com | products | dev2dev | support | askBEA
 Download Docs   Site Map   Glossary 
Search

B2B Security

 Previous Next Contents Index View as PDF  

Introducing WebLogic Integration B2B Security

WebLogic Integration B2B Security Model

Principals, Users, and Groups

About Configuring Trading Partners

About Configuring the WebLogic Integration B2B System User

Digital Certificates

Certificate Authority

SSL Protocol

Configuration Restrictions to Ensure a Secure Environment

Authenticating and Authorizing Trading Partners

Trading Partner Authentication in WebLogic Integration

Trading Partner Certificate Verification

Benefits of Certificate Verification

Certificate Verification Process

Implementing a Certificate Verification Provider

Authentication of the Trading Partner Message

Trading Partner Authorization in WebLogic Integration B2B

Trading Partner Authorization

Conversation Authorization

Configuring the Keystore

About the Keystore

Keystores You Create

Steps for Creating and Configuring Keystores

Creating the Domain

Creating the Keystores and Inserting the Server Certificates

Configuring the WebLogic Keystore Provider

Adding Trading Partner Certificates to the Keystore

Adding the Certificates and Private Keys for a Local Trading Partner

Adding the Certificates for a Remote Trading Partner

Bulk Loading and Importing Certificates into the Keystore

Removing Certificates and Private Keys from the Keystore

Configuring the Domain to Use the Keystore

Using the Keystore in a Multinode Cluster

Configuring Security

Configuring the SSL Protocol and Mutual Authentication

Configuring Access Control Lists for WebLogic Integration

Configuring Security for the WebLogic Integration B2B Engine

Configuring Trading Partner Security

Configuring Trading Partner Certificates

Configuring a Secure Transport

Configuring a Secure Delivery Channel

Configuring a Secure Document Exchange

Configuring Message Encryption

How WebLogic Integration Message Encryption Works

Configuring Message Encryption

Configuring Digital Signatures for Nonrepudiation

Customizing the WLCCertAuthenticator Class

Configuring a Certificate Verification Provider Interface

Configuring WebLogic Integration B2B to Use an Outbound HTTP Proxy Server

Configuring WebLogic Integration with a Web Server and a WebLogic Proxy Plug-In

Configuring the Web Server

WebLogic Server User Identity for the Trading Partner

Configuring Business Process Management Access to the WebLogic Integration Repository

Configuring Server-Side Authentication

Implementing Nonrepudiation

Overview of Nonrepudiation

Digital Signature Support

Business Protocols with Which You May Use Digital Signature Support

Configuring Digital Signature Support

Secure Timestamp Service

Configuring the Secure Timestamp Service

Secure Audit Log Service

Writing to the Audit Log Directly

Configuring the Secure Audit Log

Using the Service Provider Interfaces (SPIs) for Nonrepudiation

Using the SPI for the Secure Timestamp Service

Using the SPI for the Secure Audit Log

Audit Log Messages

Audit Log DTD

 

Back to Top Previous Next