bea.com | products | dev2dev | support | askBEA |
|
e-docs > WebLogic Platform > WebLogic Integration > B2B Topics > B2B Security |
B2B Security |
Introducing WebLogic Integration B2B Security
WebLogic Integration B2B Security Model
About Configuring Trading Partners
About Configuring the WebLogic Integration B2B System User
Configuration Restrictions to Ensure a Secure Environment
Authenticating and Authorizing Trading Partners
Trading Partner Authentication in WebLogic Integration
Trading Partner Certificate Verification
Benefits of Certificate Verification
Certificate Verification Process
Implementing a Certificate Verification Provider
Authentication of the Trading Partner Message
Trading Partner Authorization in WebLogic Integration B2B
Steps for Creating and Configuring Keystores
Creating the Keystores and Inserting the Server Certificates
Configuring the WebLogic Keystore Provider
Adding Trading Partner Certificates to the Keystore
Adding the Certificates and Private Keys for a Local Trading Partner
Adding the Certificates for a Remote Trading Partner
Bulk Loading and Importing Certificates into the Keystore
Removing Certificates and Private Keys from the Keystore
Configuring the Domain to Use the Keystore
Using the Keystore in a Multinode Cluster
Configuring the SSL Protocol and Mutual Authentication
Configuring Access Control Lists for WebLogic Integration
Configuring Security for the WebLogic Integration B2B Engine
Configuring Trading Partner Security
Configuring Trading Partner Certificates
Configuring a Secure Transport
Configuring a Secure Delivery Channel
Configuring a Secure Document Exchange
Configuring Message Encryption
How WebLogic Integration Message Encryption Works
Configuring Message Encryption
Configuring Digital Signatures for Nonrepudiation
Customizing the WLCCertAuthenticator Class
Configuring a Certificate Verification Provider Interface
Configuring WebLogic Integration B2B to Use an Outbound HTTP Proxy Server
Configuring WebLogic Integration with a Web Server and a WebLogic Proxy Plug-In
WebLogic Server User Identity for the Trading Partner
Configuring Business Process Management Access to the WebLogic Integration Repository
Configuring Server-Side Authentication
Business Protocols with Which You May Use Digital Signature Support
Configuring Digital Signature Support
Configuring the Secure Timestamp Service
Writing to the Audit Log Directly
Configuring the Secure Audit Log
Using the Service Provider Interfaces (SPIs) for Nonrepudiation
Using the SPI for the Secure Timestamp Service
Using the SPI for the Secure Audit Log