Skip navigation.

Securing WebLogic Resources

   Previous Next vertical dots separating previous/next from contents/index/pdf Contents Index View as PDF   Get Adobe Reader

Introduction to Securing WebLogic Resources

Overview of Securing WebLogic Resources

Audience for This Guide

Terms and Concepts

Securing WebLogic Resources: Main Steps

Best Practices: Configure Entitlements Caching When Using WebLogic Providers

Types of WebLogic Resources

Overview of WebLogic Resource Types

Administrative Resources

Application Resources

Enterprise Information Systems (EIS) Resources

COM Resources

Java DataBase Connectivity (JDBC) Resources

Java Messaging Service (JMS) Resources

Java Naming and Directory Interface (JNDI) Resources

Server Resources

Layered Security Scheme for Server Resources

Security Policies for Server Resources

MBean Protections

How the WebLogic Security Service Verifies Layered Protections

Example of Layered Protection for a Server Resource

Maintaining a Consistent Security Scheme

Permissions for Starting and Shutting Down Servers

Permissions for Using the weblogic.Server Command

Permissions for Using the Node Manager

Shutting Down a WebLogic Server Instance

URL (Web) and EJB (Enterprise JavaBean) Resources

Techniques for Securing URL and EJB Resources

Using the WebLogic Server Administration Console

Using Deployment Descriptors

Using the Administration Console and Deployment Descriptors

Prerequisites for Securing URL and EJB Resources

Understanding How to Check Security Roles and Security Policies

Understanding What to Do on Future Redeploys of the WebLogic Resource

How to Change the Check Roles and Policies and Future Redeploys Settings

Understanding How These Settings Interact

Using the Combined Technique to Secure Your URL and EJB Resources

Copying Security Configurations

Reinitializing Security Configurations

Web Service Resources

Users and Groups

Overview of Users and Groups

Creating Users

Adding Users to Groups

Modifying Users

Deleting Users

Default Groups

Creating Groups

Nesting Groups

Modifying Groups

Deleting Groups

Security Roles

Overview of Security Roles

Dynamic Role Mapping

Types of Security Roles: Global Roles and Scoped Roles

Using the Administration Console to Create Security Roles

Default Global Roles

Protected MBean Attributes and Operations

Default Group Associations

Components of a Security Role: Role Conditions, Expressions, and Role Statements

Working with Global Roles

Creating Global Roles

Modifying Global Roles

Deleting Global Roles

Working with Scoped Roles

Creating Scoped Roles

Step 1: Select the WebLogic Resource

Step 2: Create the Scoped Role

Step 3: Create the Role Conditions

Modifying Scoped Roles

Deleting Scoped Roles

Security Policies

Overview of Security Policies

Security Policy Granularity and Inheritance

Security Policy Storage and Prerequisites for Use

Default Security Policies

Protected Public Interfaces

Components of a Security Policy: Policy Conditions, Expressions, and Policy Statements

Working with Security Policies

Creating Security Policies

Step 1: Select the WebLogic Resource

Step 2: Create the Policy Conditions

Modifying Security Policies

Deleting Security Policies


Skip footer navigation  Back to Top Previous Next