Skip Headers
Oracle® Fusion Middleware Administrator's Guide for Oracle Entitlements Server
11g Release 1 (11.1.1)

Part Number E14096-05
Go to Documentation Home
Home
Go to Table of Contents
Contents
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
PDF · Mobi · ePub

Index

A  C  D  E  F  G  H  I  J  L  M  N  O  P  R  S  U  W  X 

A

ABAC, 1.5, 1.5.2
access control
and Oracle Entitlements Server, 1.2
supported standards, 1.5
understanding, 1.1
Admin Policy
Administration Role
Admin Policy, 9.3.1
Administration Console
authorization management, 3.4.1.1
customize, 10.1
Home area, 3.4.3
log in, 3.3.1
Navigation Panel, 3.4.2
online help, 3.4.4
overview, 3.2
searches, 5.1
sign out, 3.3.2
system configuration, 3.4.1.2
using, 3.4
Administrator Roles
managing, 9.6
SystemAdmin, 3.2.1
administrators, 3.2.1
advanced search, 5.3
Application
administration, 9.3
defined, 4.1
managing, 4.5.1
Application Roles
managing, 4.5.5, 4.5.6
application roles, 5.3.4
applications, 5.3.2
architecture
authorization process flow, 1.4
Policy Administration Point, 1.3.1
Policy Decision Point, 1.3.2
Policy Enforcement Point, 1.3.2
Policy Information Point, 1.3.3
security modules, 1.3.2.3
Attribute
managing, 4.5.9
Attribute Retrievers
predefined, 6.1
attribute retrievers, 1.3.3, 6
attribute-based access control
see ABAC, 1.5.2
attributes, 5.3.9
auditing, 11.2
configuration, 11.2.2
more information, 11.2.3
authorization
process flow, 1.4
authorization management, 3.4.1.1
authorization policies, 5.3.8
Authorization Policy, 2.1.1
and Obligations, 4.5.5.1
defined, 2.1
managing, 4.5.5
Authorization Policy Manager
as console, 1.2.2
see Administration Console, 3.2
Az API, 1.5, 1.5.5

C

cache
configuring, 11.4
cinfiguration
debugging, 11.5.1
coarse grained authorization, 1.1
Condition
managing, 4.6
configuration
logging, 11.5.1
console
and Authorization Policy Manager, 1.2.2
customizations
Administration Console, 10.1

D

datastore
access, 6.4
debugging, 11.5
Java Security Module, 11.5.1.1
policy distribution, 11.5.3
seaching logs, 11.5.2
WebLogic Server Security Module, 11.5.1.2
delegating administration, 9, 9.3, 9.4, 9.5
documentation
additional, Preface

E

elements
of policies, 4.3
Entitlements
managing, 4.5.4
entitlements, 5.3.7
Extensions
managing, 4.5.9
external roles, 5.3.1

F

fine grained authorization, 1.1
Function
managing, 4.5.9
functions, 5.3.10

G

Global
defined, 4.1
Security Modules, 8.2
system administrators, 9.6
glossary, 2.3
Application, 2.3
Application Role, 2.3
Attributes, 2.3
Authorization Policy, 2.3
Condition, 2.3
Entitlement, 2.3
External Role, 2.3
Functions, 2.3
Obligation, 2.3
Policy Domain, 2.3
policy store, 2.3
Principal, 2.3
Resource, 2.3
Resource Type, 2.3
Role Category, 2.3
Role Mapping Policy, 2.3

H

hierarchical resource types, 4.5.2.1
Home area, 3.4.3

I

identity store
LDAP configuration, 3.1
installation, 3.1

J

Java 2 permissions, 1.5
Java permissions, 1.5.3
jps-config.xml, A

L

log in, 3.3.1
log out, 3.3.2
logging
debug configuring, 11.5.1
searching logs, 11.5.2

M

migrating policies, 11.3
Database to XML, 11.3.4
LDAP to XML, 11.3.2
XML to Database, 11.3.3
XML to LDAP, 11.3.1

N

Navigation Panel, 3.4.2

O

Obligations
creating, 4.5.5.1
online help, 3.4.4
OpenAz framework, 1.5.5
Oracle Entitlements Server, 1.2
architecture, 1.3
features, 1.2.3
install, 3.1
previous releases, 1.2.1

P

PAP, 1.3.1
parameters
configuration, A
installation, A
PDP Proxy, A.3
policy distribution, A.1
policy store, A.4
Security Modules, A.2
PDP, 1.3.2
PDP Proxy parameters, A.3
PEP, 1.3.2
permissions
Java, 1.5.3
PIP, 1.3.3
see Attribute Retrievers, 6.1
PIP credentials, 6.4
policy
creation
additional elements, 4.3
defining procedure, 4.2
definition procedure
additional elements, 4.3
migrating, 11.3
Policy Administration Point, 1.3.1
policy creation, 4.2
Policy Decision Point, 1.3.2
policy distribution
debugging, 11.5.3
overview, 7.1
parameters, A.1
procedure, 7.3
Policy Domain
administration, 9.5
overview, 9.4
Policy Enforcement Point, 1.3.2
policy evaluation, 2.2
Policy Information Point, 1.3.3
policy objects
Application, 4.5.1
Application Roles, 4.5.5, 4.5.6
Attribute, 4.5.9
Authorization Policy, 4.5.5
Condition, 4.6
defined, 2.3
Application, 2.3
Application Role, 2.3
Attributes, 2.3
Authorization Policy, 2.3
Condition, 2.3
Entitlement, 2.3
External Role, 2.3
Functions, 2.3
Obligation, 2.3
Policy Domain, 2.3
policy store, 2.3
Principal, 2.3
Resource, 2.3
Resource Type, 2.3
Role Category, 2.3
Role Mapping Policy, 2.3
definitions, 2.3
Entitlements, 4.5.4
Extensions, 4.5.9
Function, 4.5.9
management, 4.1
Resource, 4.5.3
Resurce Types, 4.5.2
Role Catalog, 4.5.5, 4.5.6
Role Category, 4.5.8
Role Mapping Policy, 4.5.7
search, 5.3, 5.3.1, 5.3.2, 5.3.3, 5.3.4, 5.3.5, 5.3.6, 5.3.7, 5.3.8, 5.3.9, 5.3.10
policy store
parameters, A.4
policy types, 2.1
Authorization Policy, 2.1.1
evaluating, 2.2
Role Mapping Policy, 2.1.2
policy use case, 2.4
pop-up search box, 5.1

R

RBAC, 1.5, 1.5.1
Resource
managing, 4.5.3
Resource Types
managing, 4.5.2
resource types, 5.3.3
hierarchical, 4.5.2.1
resources, 5.3.6
Role Catalog, 4.5.5, 4.5.6
Role Category
defined, 2.3
managing, 4.5.8
role mapping policies, 5.3.5
Role Mapping Policy, 2.1.2
defined, 2.1
managing, 4.5.7
role-based access control
see RBAC, 1.5.1
roles
assigning, 2.1.2

S

search
Administration Console, 5.1
advanced, 5.3
application roles, 5.3.4
applications, 5.3.2
attributes, 5.3.9
authorization policies, 5.3.8
entitlements, 5.3.7
external roles, 5.3.1
functions, 5.3.10
pop-up search, 5.1
resource types, 5.3.3
resources, 5.3.6
role mapping policies, 5.3.5
simple, 5.2
searching logs, 11.5.2
Security Modules
configuring, 8.2
Java
debug, 11.5.1.1
parameters, A.2
WebLogic Server
debug, 11.5.1.2
security modules
and WebLogic Server, 11.1
architecture, 1.3.2.3
as PDP, 1.3.2.1
as PDP / PEP, 1.3.2.2
types, 1.3.2.3
simple search, 5.2
system administrators, 9.6
system configuration, 3.4.1.2
system requirements, 3.1
SystemAdmin, 3.2.1

U

use case, 2.4

W

WebLogic Server
integration, 11.1
weblogic user, 3.2.1

X

XACML, 1.5, 1.5.4