Understanding WebLogic Security
JAAS LoginModules
JAAS Control Flags
Username/Password Authentication
Certificate Authentication
Digest Authentication
Perimeter Authentication
How is Perimeter Authentication Accomplished?
How Does WebLogic Server Support Perimeter Authentication?
SAML Security Providers
Single Sign-On Services
Web Services support for SAML Token Profile 1.1
The Java Secure Socket Extension (JSSE)
Java Authentication and Authorization Services (JAAS)
The Java Security Manager
Java Cryptography Architecture and Java Cryptography Extensions (JCE)
Java Authorization Contract for Containers (JACC)
What Is a Security Provider Database?
Security Realms and Security Provider Databases
Embedded LDAP Server
RDBMS Security Store
Authentication Providers
Identity Assertion Providers
Principal Validation Providers
Authorization Providers
Adjudication Providers
Role Mapping Providers
Auditing Providers
Credential Mapping Providers
Certificate Lookup and Validation Providers
Keystore Providers
Realm Adapter Providers
Security Provider Summary
WebLogic Server Acting a SAML 1.1 Source Site
POST Profile
Artifact Profile
Weblogic Server Acting as SAML 1.1 Destination Site
POST Profile
Artifact Profile
Service Provider Initiated Single Sign-On
Identity Provider Initiated Single Sign-On