Skip Headers
Oracle® Fusion Middleware Administrator's Guide for Oracle Entitlements Server
11g Release 2 (11.1.2)

Part Number E27153-03
Go to Documentation Home
Home
Go to Table of Contents
Contents
Go to Feedback page
Contact Us

Go to previous page
Previous
PDF · Mobi · ePub

Index

A  C  D  E  F  G  H  I  J  L  M  N  O  P  R  S  T  U  W  X 

A

ABAC, 1.5, 1.5.2
access control
and Oracle Entitlements Server, 1.2
supported standards, 1.5
understanding, 1.1
Admin Policy
Administration Role
Admin Policy, 11.3.1
Administration Console
authorization management, 3.4.1.1
customize, 12.1
Home area, 3.4.3
log in, 3.3.1
Navigation Panel, 3.4.2
online help, 3.4.4
overview, 3.2
searches, 5.1
sign out, 3.3.2
system configuration, 3.4.1.2
using, 3.4
Administrator Roles
managing, 11.6
SystemAdmin, 3.2.1
administrators, 3.2.1
advanced
policy simulation, 13.2
advanced search, 5.3
anonymous role, 4.5.5.1
Application
administration, 11.3
defined, 4.1
managing, 4.5.1
Application Roles
managing, 4.5.5, 4.5.6
application roles, 5.3.4
applications, 5.3.2
architecture
authorization process flow, 1.4
Policy Administration Point, 1.3.1
Policy Decision Point, 1.3.2
Policy Enforcement Point, 1.3.2
Policy Information Point, 1.3.3
security modules, 1.3.2.3
Attribute
managing, 4.5.9
Attribute Retrievers
predefined, B.1
attribute retrievers, 1.3.3, B
attribute-based access control
see ABAC, 1.5.2
attributes, 5.3.9
auditing, 13.4
configuration, 13.4.2
more information, 13.4.4
authenticated role, 4.5.5.1
authorization
process flow, 1.4
authorization management, 3.4.1.1
authorization policies, 5.3.8
Authorization Policy, 2.1.1
and Obligations, 4.5.5.1
defined, 2.1
managing, 4.5.5
Authorization Policy Manager
as console, 1.2.2
see Administration Console, 3.2
Az API, 1.5, 1.5.5

C

cache
configuring, 13.6
case sensitivity, 5.4
cinfiguration
debugging, 13.8.1.1
coarse grained authorization, 1.1
Condition
managing, 4.6
configuration
debugging, 13.8.1, 13.8.2
logging, 13.8.1.1
console
and Authorization Policy Manager, 1.2.2
customizations
Administration Console, 12.1

D

datastore
access, B.4
debug parameters, 13.8.1
debugging, 13.8
configuration, 13.8.1
Java Security Module, 13.8.1.1.1
policy distribution, 13.8.3
seaching logs, 13.8.1.2
WebLogic Server Security Module, 13.8.1.1.2
with methods, 13.8.2
delegating administration, 11, 11.3, 11.4, 11.5
Discovery Mode
WebLogic Server, 9.4, 9.4.2
documentation
additional, Preface

E

elements
of policies, 4.3
Entitlements
managing, 4.5.4
entitlements, 5.3.7
Extensions
managing, 4.5.9
external roles, 5.3.1

F

fine grained authorization, 1.1
FIPS, 13.3
Function
managing, 4.5.9
functions, 5.3.10

G

Global
defined, 4.1
Security Modules, 10.2
system administrators, 11.6
glossary, 2.3
Application, 2.3
Application Role, 2.3
Attributes, 2.3
Authorization Policy, 2.3
Condition, 2.3
Entitlement, 2.3
External Role, 2.3
Functions, 2.3
Obligation, 2.3
Policy Domain, 2.3
policy store, 2.3
Principal, 2.3
Resource, 2.3
Resource Type, 2.3
Role Category, 2.3
Role Mapping Policy, 2.3
grants
OPSS, 3.2.4, 4.5.5.2, 5.3.8

H

hierarchical resource types, 4.5.2.1
Home area, 3.4.3

I

identity store
LDAP configuration, 3.1
installation, 3.1

J

Java 2 permissions, 1.5
Java permissions, 1.5.3
JCE providers, 13.3
jps-config.xml, A

L

log in, 3.3.1
log out, 3.3.2
logging, 13.7
debug configuring, 13.8.1.1
searching logs, 13.8.1.2

M

methods
debugging, 13.8.2
migrating policies, 13.5
Database to XML, 13.5.4
LDAP to XML, 13.5.2
XML to Database, 13.5.3
XML to LDAP, 13.5.1

N

Navigation Panel, 3.4.2

O

object names, 5.4
Obligations
creating, 4.5.5.1
online help, 3.4.4
OpenAz framework, 1.5.5
OPSS
system grants, 3.2.4, 4.5.5.2, 5.3.8
Oracle Entitlements Server, 1.2
architecture, 1.3
features, 1.2.3
install, 3.1
previous releases, 1.2.1

P

PAP, 1.3.1
parameters
configuration, A
installation, A
PDP Proxy Client, A.3
policy distribution, A.1
policy store, A.4
Security Modules, A.2
PDP, 1.3.2
PDP Proxy Client, 8.5
parameters, A.3
PEP, 1.3.2
permissions
Java, 1.5.3
PIP, 1.3.3
see Attribute Retrievers, B.1
PIP credentials, B.4
policies
simulation, 13.2
policy
creation
additional elements, 4.3
defining procedure, 4.2
definition procedure
additional elements, 4.3
migrating, 13.5
Policy Administration Point, 1.3.1
policy creation, 4.2
Policy Decision Point, 1.3.2
policy distribution
debugging, 13.8.3
overview, 6.2
parameters, A.1
procedure, 6.3
Policy Domain
administration, 11.5
overview, 11.4
Policy Enforcement Point, 1.3.2
policy evaluation, 2.2
Policy Information Point, 1.3.3
policy objects
Application, 4.5.1
Application Roles, 4.5.5, 4.5.6
Attribute, 4.5.9
Authorization Policy, 4.5.5
Condition, 4.6
defined, 2.3
Application, 2.3
Application Role, 2.3
Attributes, 2.3
Authorization Policy, 2.3
Condition, 2.3
Entitlement, 2.3
External Role, 2.3
Functions, 2.3
Obligation, 2.3
Policy Domain, 2.3
policy store, 2.3
Principal, 2.3
Resource, 2.3
Resource Type, 2.3
Role Category, 2.3
Role Mapping Policy, 2.3
definitions, 2.3
Entitlements, 4.5.4
Extensions, 4.5.9
Function, 4.5.9
management, 4.1
Resource, 4.5.3
Resurce Types, 4.5.2
Role Catalog, 4.5.5, 4.5.6
Role Category, 4.5.8
Role Mapping Policy, 4.5.7
search, 5.3, 5.3.1, 5.3.2, 5.3.3, 5.3.4, 5.3.5, 5.3.6, 5.3.7, 5.3.8, 5.3.9, 5.3.10, 5.3.11
policy simulator, 13.2
policy store
parameters, A.4
policy types, 2.1
Authorization Policy, 2.1.1
evaluating, 2.2
Role Mapping Policy, 2.1.2
policy use case, 2.4
pop-up search box, 5.1

R

RBAC, 1.5, 1.5.1
Resource
managing, 4.5.3
Resource Types
managing, 4.5.2
resource types, 5.3.3
hierarchical, 4.5.2.1
resources, 5.3.6
SharePoint, 9.2
WebLogic Server, 9.4
Role Catalog, 4.5.5, 4.5.6
Role Category
defined, 2.3
managing, 4.5.8
role mapping policies, 5.3.5
Role Mapping Policy, 2.1.2
defined, 2.1
managing, 4.5.7
role-based access control
see RBAC, 1.5.1
roles
assigning, 2.1.2

S

search
Administration Console, 5.1
advanced, 5.3
application roles, 5.3.4
applications, 5.3.2
attributes, 5.3.9
authorization policies, 5.3.8
entitlements, 5.3.7
external roles, 5.3.1
functions, 5.3.10
pop-up search, 5.1
resource types, 5.3.3
resources, 5.3.6
role mapping policies, 5.3.5
simple, 5.2
users, 5.3.11
searching logs, 13.8.1.2
Security Modules
configuring, 10.2
Java
debug, 13.8.1.1.1
parameters, A.2
WebLogic Server
debug, 13.8.1.1.2
security modules
and WebLogic Server, 9.4.1
architecture, 1.3.2.3
as PDP, 1.3.2.1
as PDP / PEP, 1.3.2.2
deploying, 9.1
java configuration, 8.4.1
PDP Proxy Client, 8.5
start SMConfig UI, 8.2
types, 1.3.2.3, 9.1, 9.1
security providers, 13.3
SharePoint resources, 9.2
simple
policy simulation, 13.2
simple search, 5.2
simulation
policies, 13.2
SMConfig UI
starting, 8.2
system administrators, 11.6
system configuration, 3.4.1.2
system grants, 3.2.4, 4.5.5.2, 5.3.8
system policies, 3.2.4, 4.5.5.2, 5.3.8
system requirements, 3.1
SystemAdmin, 3.2.1

T

T2P, 13.1
test-to-production, 13.1

U

use case, 2.4
users, 5.3.11

W

WebLogic Server
Discovery Mode, 9.4, 9.4.2
integration, 9.4.1
WebLogic Server resources, 9.4
weblogic user, 3.2.1
WLST
commands, C.2
sample script, C.3
using, C.1, C.1

X

XACML, 1.5, 1.5.4