> Securing WebLogic
Resources Using Roles
and Policies
Securing WebLogic
Resources Using Roles
and Policies
Protecting Policies by Type
Protecting a Hierarchy of Resources
Permissions for Using the weblogic.Server Command
Permissions for Using the Node Manager
Deployment Descriptor Only Model
Custom Roles Model
Custom Roles and Policies Model
Advanced Model
Usage Examples
Example for EAR, WAR and EJB
Example for EAR and WAR
Basic Policy Conditions
Date and Time Policy Conditions
Context Element Policy Conditions
Basic Role Conditions
Date and Time Role Conditions
Context Element Role Conditions
Example: Defining Role Assignments
Example: Defining Authorization Policies