|
|
| |
Programming WebLogic Security
Introduction to WebLogic Security
WebLogic Security Architecture
Connections with Servlets, JSPs, EJBs, RMI Objects and Java Applications
Connections with Administration Servers
Using WebLogic Server as a Client to BEA Tuxedo
Supported Public Key Algorithms
Supported Symmetric Key Algorithms
Supported Message Digest Algorithms
Securing a WebLogic Server Deployment
Why Is Security Important for WebLogic Server?
Determine the Security Needs of Your WebLogic Server Deployment
Secure the Machine on Which WebLogic Server Runs
Accessing Protected Ports on UNIX
Design Network Connections Carefully
Manage the WebLogic Server Development and Production Environments
Prevent Man-in-the-Middle Attacks
Prevent Denial of Service Attacks
Secure the HTTP Response Header
Replace HTML Special Characters in User-Supplied Data
Use Protected EJBs to Limit Access to Business Logic
Use the Appropriate Security Realm
Control Access to Multiple Domains
Programming with the WebLogic Security SPI
Communicating Securely with SSL-Enabled Web Browsers
Mutual Authentication with JNDI
Mapping a Digital Certificate to a WebLogic Server User
Using Mutual Authentication with Other WebLogic Servers
Using Mutual Authentication with Servlets
Using a Custom Host Name Verifier
Writing a Custom Security Realm
Define Enumeration Classes for Users and Groups
Define a Class for the Custom Security Realm
Using Authorization in a Custom Security Realm
|
Copyright © 2001 BEA Systems, Inc. All rights reserved.
|