Index
A B C D E F G H I J K L M N O P R S T U V W X
Symbols
- <as-context> element, 15.6.2
- <confidentiality> element, 15.6.1
- <default-method-access> element, 14.2.2.5
- <establish-trust-in-client> element, 15.6.1
- <establish-trust-in-target> element, 15.6.1
- <integrity> element, 15.6.1
- <jazn> element
- and <password-manager> element, 5.1.2
- <jazn-loginconfig>, 8.6.1
- <login-module> entity
- options, 8.1
- <method-permission> element, 14.2.2.1, 14.2.2.1
- <password-manager> element, 5.1.2
- <role-link> element, 14.2.2.1, 14.2.2.1
- <role-name> element, 14.2.2.1
- <run-as> element, 14.2.2.3
- <sas-context> element, 15.6.3
- <security-identity> element, 14.2.2.3
- <security-role> element, 14.2.2.1
- <security-role-mapping> element, 14.2.2.4
- <security-role-ref> element, 14.2.2.1, 14.2.2.1
- <session-tracking> element, 11.3
- <ssl-config> element, 11.3
- <transport-config> element, 15.6.1
- <unchecked/> element, 14.2.2.2
- <use-caller-identity/> element, 14.2.2.3
- <web-app> element, 11.3
A
- access control context (AccessControlContext), 1.4.4
- access control lists
- definition, 1.2.2
- settings for 9.0.4 infrastructure, 6.3.2
- access controller (AccessController), 1.4.4
- Access Manager, COREid
- introduction, 10.1.1
- running, 10.1.5
- Access SDK, COREid, 10.4.2, 10.4.3
- AccessGate vs. WebGate (COREid), 10.1.1
- accounts, OC4J
- accounts created in OID, 6.4.1.3
- predefined and required, 3.6.1
- predefined for file-based provider, 7.3.4
- activating users, file-based provider, 3.6.1
- add command, C.3.3.1
- adding and removing realms, C.4.1
- adding and removing roles, C.4.3
- adding and removing users, C.4.4
- -addloginmodule option to JAZN Admintool, 8.5
- -addperm option to JAZN Admintool, C.4.1
- -addrealm option to JAZN Admintool, C.4.2
- -addrole option to JAZN Admintool, C.4.3
- -adduser option to JAZN Admintool, C.4.4
- admin account
- activate in Admintool, C.4.6
- oc4jadmin account, 3.6.2
- specifying new admin account, 3.6.3
- administering
- JAAS provider, 3.2
- administration
- JSR-77 support, 3.1
- MBean browser, 3.2.1
- MBeans, definition, 3.1
- specifying new admin account, 3.6.3
- AdminPermission class
- definition, 2.3.3, 2.3.3
- Admintool
- invoking, 3.2.2
- overview, 3.2.2
- anonymous lookup, EJBs, 14.2.4
- anonymous user
- create in Oracle Internet Directory, 6.4.1.5.2
- map to user in Oracle Internet Directory, 6.4.1.5.1
- Application Server Control
- console, introduction, 3.2.1
- overview, 3.2.1
- specifying security provider, 5.6.3
- specifying security role mappings, 5.6.4.2
- authentication, 1.2.1
- BASIC, 13.1.1
- CLIENT-CERT, 13.1.5, 13.1.5
- DIGEST, 13.1.1
- DIGEST (using OID), 13.1.3
- failure, specify default realm, A.2.5.2
- FORM, 13.1.4
- J2EE, 2.2
- SSO, 13.1.2
- supported authentication methods, 2.2
- using login modules, 1.5
- using OracleAS Single Sign-On, 2.1.2
- using RealmLoginModule class, 2.1.2
- with OracleAS Single Sign-on, 2.1.2
- with SSL, 11.2
- with SSO, 6.2.3
- authorization
- coarse-grained vs. fine-grained, 1.2.3
- defined, 1.2.1
- JAAS model vs. J2EE model, 1.2.3
- to any authenticated user (PUBLIC role), 5.6.4.4
B
- BASIC authentication, 13.1.1
- basic authentication, in COREid, 10.3.2
- bootstrap accounts, 3.6.1
- bootstrap jazn.xml file, 3.4.5
C
- cache properties, 6.5.3
- caching, 6.5.3
- disabling, 6.5.3
- caching properties, 6.5.3
- callback handler, 1.5
- capability model
- definition, 1.2.2, 1.2.2
- case-sensitivity for roles
- custom login modules, 8
- external LDAP providers, 9.1
- file-based provider, 7
- LDAP-based provider, 6
- certificate authorities, 1.7.3
- certificates (SSL), 1.7.3
- checking
- passwords, C.4.5
- -checkpasswd option to JAZN Admintool, C.4.5
- cipher suites
- supported by Oracle HTTPS, 12.2.1.2, 12.2.1.3
- class names
- definition, 1.4.1
- clear command, C.3.3.3
- CLIENT-CERT authentication, 13.1.5
- CN (common name), 6.1.2
- coarse-grained authorization, 1.2.3
- common name (CN), 6.1.2
- Common Secure Interoperability version 2--see CSIv2
- configuring
- external LDAP providers, 9
- file-based provider, 7
- LoginModules, 8.6
- connection properties, 6.5.2, 6.5.2
- connector-factory element, 8.6.3
- cookie domain, 11.3
- cookie-domain attribute, 11.3
- COREid
- Access Manager, introduction, 10.1.1
- Access Manager, running, 10.1.5
- Access SDK, 10.4.2, 10.4.3
- action URL, protecting, 10.3.4
- application, protecting, 10.5.4
- architecture, 10.1.3
- auth-method setting, 10.5.3
- basic authentication, 10.3.2
- credential_mapping plug-in, 10.3.1.3, 10.3.2.2
- EJB application, use case, 10.6.3
- form-based authentication, 10.3.1
- login module configuration, 10.5.5
- overview, 10.1.1
- plug-ins, overview, 10.2.2
- prerequisites, 10.1.2
- resource types, configuration, 10.3.3
- resource types, overview, 10.2.1
- single sign-on cookie, 10.2.3
- validate_password plug-in, 10.3.1.4
- Web app using HTTP header variables, use case, 10.6.1
- Web app using SSO cookie, use case, 10.6.2
- Web service with SAML token, use case, 10.7.3
- Web service with username token, use case, 10.7.1
- Web service with X.509 token, use case, 10.7.2
- credential_mapping plug-in, COREid, 10.3.1.3, 10.3.2.2
- credentials, 5.1.3
- CSIv2
- and EJBs, 15.4
- internal-settings.xml, 15.4
- introduction, 15.3
- properties in orion-ejb-jar.xml, 15.6
- security properties, 15.6
- custom Loginmodules
- troubleshooting, A.2.2
- custom security providers (custom login modules), 2.1.3
D
- DAS (Delegated Administration Services for OID), 3.2.3.1
- data storage
- in LDAP-based environments, 6.1.3
- DataSourceUserManager
- configuring application to use it, 5.8.2
- initialization parameters, 5.8.1
- overview, 2.1.4
- deactivated users, file-based provider, 3.6.1
- debugging
- general SSL debugging, 11.6.2
- logging, A.3
- PrintingSecurityManager, 4.2.2
- default realm, 5.2.1
- file-based provider, 7.3.1
- Delegated Administration Services (DAS for OID), 3.2.3.1
- deploying
- LoginModule, 8.3
- deployment
- deployment plan, 3.1
- deployment plan editor, 3.2.1
- JSR-88 support, 3.1
- deployment descriptors
- security, 14.2.2.1
- DER, 12.1.2
- DIGEST authentication, 13.1.1
- DIGEST authentication (using OID), 13.1.3
- digital certificates, 1.7.2
- directory information tree (DIT)
- Java Authorization Service, 6.1.3.1
- directory information tree Identity Management Realm, 6.1.1
- disabling caching, 6.5.3
- Distinguished Encoding Rules, 12.1.2
- distinguished name (DN), 6.1.2
- DN (distinguished name), 6.1.2
- DTDs
- internal-settings.xml, 15.1
E
- EIS connections
- JCA, 16
- EJB
- anonymous lookup, 14.2.4
- CSIv2, 15.4
- interoperability, 15
- server security properties, 15.1
- ejb_sec.properties, 15.2
- Enterprise Manager, overview, 3.2.1
- exit command, C.3.3.4
- external LDAP provider, 2.1.3
- external.synchronization (no longer supported), Preface
F
- file-based provider
- configuring, 7
- file-based provider type, 2.1.3
- fine-grained authorization, 1.2.3
- FORM authentication, 13.1.4
- form-based authentication, in COREid, 10.3.1
G
- granting permissions, C.4.7
- -grantperm option to JAZN Admintool, C.4.7
H
- help command, C.3.3.5
- HTTPClient.HttpUrlConnection, 12.2.4
- HTTPConnection, 12.1.1
- HTTPS tunneling, 11.3
I
- identify propagation--see subject propagation
- Identity Management Realm
- role management, 6.1.1
- sample LDAP directory information tree, 6.1.1
- user management, 6.1.1
- impliesAll attribute, 14.2.2.5
- instance-level jazn.xml file, 3.4.5
- instance-level security
- administering, 7.2.6
- provider, 7.2.6
- integrating
- custom LoginModule, 8.2
- internal-settings.xml file, 15.1
- CSIv2 entities, 15.4
- DTD, 15.1
- <sep-property> element, 15.1, 15.4
- interoperability, 15
- invoking Admintool, 3.2.2
- invoking JAZN Admintool, C.2
- isCallerInRole method, 14.2.2.1
J
- JAAS
- login modules, 1.5
- JAAS mode
- introduction, 2.3.2
- JAAS Provider
- integration with SSL-enabled applications, 11.2
- integration with SSO-enabled applications, 6.2.3
- locations for jazn.xml, 3.4.5, A.2.1
- overview, 2.1.1
- permission classes, 2.3.3
- security role, 13.2.3
- JAAS. See Java Authentication and Authorization Service (JAAS)
- jaas.username.simple (omit realm name from principals), 5.2.6
- Java 2 Platform, Enterprise Edition (J2EE), 1.1
- Oracle component responsibilities in SSL-enabled environments, 11.2
- Java 2 Platform, Standard Edition (J2SE)
- creating applications using the Java 2 Security Model, 1.1
- Java 2 Security Model, 1.1
- definition, 1.1
- using access control capability model, 1.2.2
- using with J2EE applications, 1.1
- using with J2SE applications, 1.1
- Java Authentication and Authorization Service (JAAS)
- definition, 2.1.1
- principals, 1.3
- subjects, 1.3
- Java Authorization Contract for Containers
- introduction, 2.3.4
- Java Key Store (JKS), 15.1
- Java Platform, Enterprise Edition (J2EE)
- security role, 2.4
- java.net.URL framework, 12.2.4
- java.security.policy system property, 4.2
- java.security.Principal, 2.1.2, 5.6.4.1
- java.security.Principal interface
- using with principals, 1.3
- javax.net.ssl.KeyStore, 12.3.1
- javax.net.ssl.KeyStorePassword, 12.3.2
- JAZN Admintool
- adding and removing login modules, 8.5
- adding and removing permissions, C.4.1
- adding realms, C.4.2
- adding roles, C.4.3
- adding users, C.4.4
- checking passwords, C.4.5
- command options, C.2
- granting and revoking permissions, C.4.7
- granting roles, C.4.8
- invoking, C.2
- listing login modules, 8.5
- listing permissions, C.4.10
- listing roles, C.4.12
- listing users, C.4.13
- migrating principals, 7.5, C.4.14
- navigating shell, C.3.3
- revoking roles, C.4.8
- setting passwords, C.4.15
- shell commands, C.3
- starting shell, C.3
- JAZN Admintool shell commands
- add, C.3.3.1
- clear, C.3.3.3
- exit, C.3.3.4
- help, C.3.3.5
- man, C.3.3.7
- mk, C.3.3.1
- pwd, C.3.3.8
- rm, C.3.3.9
- set, C.3.3.10
- JAZN term, 2.1.1
- JAZNAdminUser, JAZNAdminGroup, 6.1.3.2
- jazn-data.xml
- deploying LoginModules, 8.7.3
- persistence mode, 3.4.3
- JAZNPermission class
- definition, 2.3.3, 2.3.3
- JAZNUserManager
- definition, 2.1.2
- jazn.xml
- file location, 3.4.5, A.2.1
- JCA
- component-managed vs. container-managed sign-on, 16.1.2
- EIS connections, 16
- security contract, 16.1.1
- JNDI connection pool, 6.5.2
- JSR-77 support, 3.1
- JSR-88 support, 3.1
- JVM, 4.1
K
- keys (SSL), 1.7.3
- keystore
- definition, 15.1
- keystores, 1.7.3
L
- LDAP
- caching properties, 6.5.3
- configuring external providers, 9
- connection properties, 6.5.2, 6.5.2
- Oracle Internet Directory used as provider type, 2.1.3
- SSL properties, 6.5.1
- LDAP provider
- creating users with OID DAS, 6.5
- Sun Java System Directory Server, 9.5
- LDAP-based provider (Oracle Identity Management with Oracle Internet Directory), 2.1.3
- LDAPLoginModule, 2.1.3, 9.3
- ldapmodify
- create anonymous user in Oracle Internet Directory, 6.4.1.5.2
- for ACL settings, 9.0.4 infrastructure, 6.3.2
- ldap.password property name, 6.5.1
- ldap.protocol, 6.5.1
- ldapsearch to retrieve realm names from OID, A.2.3.2
- ldap.user property name, 6.5.1
- LDIF (lightweight directory interchange format), 6.4.1.5.2
- Lightweight Directory Access Protocol (LDAP)-based, 6.1.3
- Lightweight Directory Access Protocol (LDAP)-based environments
- realm contents, 6.1.1
- realm management, 6.1
- sample Identity Management Realm directory information tree, 6.1.1
- Lightweight Directory Access Protocol. See LDAP.
- listing
- permissions, C.4.10
- roles, C.4.12
- users, C.4.13
- listing realms, C.4.11
- -listloginmodules option to JAZN Admintool, 8.5
- -listperm option to JAZN Admintool, C.4.10
- -listrealms option to Admintool, C.4.11
- -listroles option to JAZN Admintool, C.4.12
- -listusers option to JAZN Admintool, C.4.13
- logging, A.3
- login modules
- adding and removing in JAZN Admintool, 8.5
- deployed as optional packages, 8.3.2
- listing in JAZN Admintool, 8.5
- login-config element, 13.1.1
- LoginContext class, 1.5
- authenticating subjects, 1.5
- login-module element
- and third-party LDAP provider, 9.3
- LoginModules, 8, 9.3
- configuring, 8.6
- configuring with different applications, 1.5
- COREid login module, 10.5.5
- definition, 1.5
- deploying, 8.7.3
- integrating, 8.7
- integration with OC4J, 8.2
- LDAPLoginModule, 2.1.3, 9.3
- packaging and deployment, 8.3
- RealmLoginModule, 8.1
- troubleshooting custom, A.2.2
M
- man command, C.3.3.7
- MBeans
- definition, 3.1
- MBean browser, 3.2.1
- -migrate option to JAZN Admintool, 7.5, C.4.14
- migrating
- principals, 7.5
- mk command, C.3.3.1
N
- navigating
- JAZN Admintool shell, C.3.3
O
- obfuscation, 5.1.3
- LDAP password, 6.5.1
- ObSSOCookie, COREid SSO cookie, 10.2.3
- OC4J
- interoperability, 15
- oc4j-ra.xml, 8.6.3
- oidadmin (Oracle Directory Manager), 3.2.3.2
- OID--see Oracle Internet Directory
- omitting realm names from principals, 5.2.6
- OPMN (Oracle Process Manager and Notification Server), 11.7.2
- optional packages, used for login modules, 8.3.2
- Oracle COREid Access and Identity--see COREid
- Oracle Directory Manager (oidadmin), 3.2.3.2
- Oracle Enterprise Manager, overview, 3.2.1
- Oracle HTTPS, 12
- default system properties, 12.3
- example, 12.4
- feature overview, 12.2
- supported cipher suites, 12.2.1.2, 12.2.1.3
- Oracle Identity Management
- (with Oracle Internet Directory)--the LDAP-based provider, 2.1.3
- Oracle Internet Directory
- (with Oracle Identity Management)--the LDAP-based provider, 2.1.3
- Delegated Administration Services (DAS), 3.2.3.1
- Oracle Directory Manager (oidadmin), 3.2.3.2
- overview, 6.2.1
- retrieving realm names using ldapsearch, A.2.3.2
- supported versions, 6.3.1
- OracleAS Single Sign-On, 2.1.2
- overview, 6.2.2
- servlet session synchronization, 6.4.3.4
- supported versions, 6.3.1
- oracle.home system property, 4.2.1
- oracle.security.jazn.realm package
- use of, 2.1.2
- OracleSSLCredential, 12.1.2
- Oracle.ssl.defaultCipherSuites, 12.3.3
- orion-application.xml
- and LoginModule, 8.6.2
- deploying LoginModules, 8.7.3
- mapping security roles to JAAS Provider users and roles, 13.2.4
- orion-ejb.jar file
- <establish-trust-in-target> element, 15.6.1
- <sas-context> element, 15.6.3
- <transport-config> element, 15.6.1
- orion-ejb-jar.xml, 15.6
- <as-context> element, 15.6.2
- <establish-trust-in-client> element, 15.6.1
- <integrity> element, 15.6.1
- security properties, 15.6
- orion-ejb-jar.xml file
- <confidentiality> element, 15.6.1
- ORMIS
- configuring access restrictions, 11.7.3
- configuring clients to use ORMIS, 11.7.4
- configuring for OC4J in OAS, 11.7.2
- configuring for standalone OC4J, 11.7.1
P
- password indirection
- definition, 5.1
- password obfuscation
- definition, 5.1
- passwords, 5.1.3
- checking, C.4.5
- checking in JAZN Admintool, C.4.5
- obfuscating, 5.1.3
- setting in JAZN Admintool, C.4.15
- permissions, 14.2.1
- actions, 1.4.1
- adding and removing in JAZN Admintool, C.4.1
- class definitions, 2.3.3
- class name, 1.4.1
- defined, 1.4.1
- granting and revoking in JAZN Admintool, C.4.7
- in Java 2 Security Model, 1.4.1
- JAAS Provider, 2.3.3
- Java permission instance contents, 1.4.1
- listing in JAZN Admintool, C.4.10
- listing with the JAZN Admintool, C.4.10
- target, 1.4.1
- persistence mode, 3.4.3, 5.1.3
- Pluggable Authentication Module (PAM), 1.1
- plug-ins (COREid)
- credential_mapping, 10.3.1.3, 10.3.2.2
- overview, 10.2.2
- validate_password, 10.3.1.4
- policy
- definition, 1.4.2
- policy cache, 6.5.3
- policy file
- creating, 4.2.1
- specifying, 4.2
- ports
- LDAP with or without SSL, 6.4.1.1, 6.5.1
- principals
- definition, 1.3
- migrating, 7.5
- migrating in JAZN Admintool, 7.5, C.4.14
- with JAAS, 1.3
- principals.xml file
- converting from, 7.5
- PrintingSecurityManager, 4.2.2
- private keys (SSL), 1.7.3
- privileges, 1.6
- properties
- connection, 6.5.2
- JNDI connection pool, 6.5.2
- LDAP caching, 6.5.3
- LDAP SSL, 6.5.1
- property names
- ldap.password, 6.5.1
- ldap.user, 6.5.1
- PropertyPermission, 14.2.1
- protection domain
- in Java 2 Security Model, 1.4.3
- provider types
- retrieving permissions from, 1.2.2
- public keys (SSL), 1.7.3
- PUBLIC role (for access by any authenticated user), 5.6.4.4
- pwd command, C.3.3.8
R
- RBAC (role-based access control), 1.6
- realm cache, 6.5.3
- RealmLoginModule class, 2.1.2, 2.2, 8.1
- RealmPermission class
- definition, 2.3.3, 2.3.3
- RealmPrincipal interface, 2.1.2
- realms
- adding and removing with the JAZN Admintool, C.4.1
- adding in JAZN Admintool, C.4.2
- creation of realm container in LDAP-based environments, 6.1.3
- data storage in LDAP-based environments, 6.1.3
- default realm, 5.2.1
- definition, 1.4.5, 2.1.2
- JAAS Provider support, 2.1.2
- listing in Admintool, C.4.11
- managing in LDAP-based environments, 6.1
- managing in XML-based provider type, 7.3.2
- omitting realm name from principals, 5.2.6
- overview, 1.4.5
- realm contents in LDAP-based environments, 6.1.1
- retrieving realm names from OID using ldapsearch, A.2.3.2
- retrieving realm names using Admintool, C.4.11
- tasks and guidelines in OC4J, 5.2
- troubleshooting issues, A.2.5
- using multiple realms, 5.2.5
- using nondefault realm, 5.2.4
- -remloginmodule option to JAZN Admintool, 8.5
- -remperm option to JAZN Admintool, C.4.1
- -remrealm option to JAZN Admintool, C.4.2
- -remrole option to JAZN Admintool, C.4.3
- -remuser option to JAZN Admintool, C.4.4
- resource types (COREid)
- configuration, 10.3.3
- overview, 10.2.1
- -revokeperm option to JAZN Admintool, C.4.7
- revoking
- roles in JAZN Admintool, C.4.8
- revoking permissions, C.4.7
- rm command, C.3.3.9
- RMI/IIOP, 15
- role management, 6.1.1
- role manager, 6.1.1
- role mapping to JAAS Provider users and roles, 13.2.4
- RoleAdminPermission class
- definition, 2.3.3, 2.3.3
- roles
- adding and removing with the JAZN Admintool, C.4.3
- adding in JAZN Admintool, C.4.3
- case-sensitivity, custom login modules, 8
- case-sensitivity, external LDAP providers, 9.1
- case-sensitivity, file-based provider, 7
- case-sensitivity, LDAP-based provider, 6
- creating, editing, deleting (file-based provider), 7.2.5
- definition, 1.6
- granting in JAZN Admintool, C.4.8
- listing in JAZN Admintool, C.4.12
- listing with the JAZN Admintool, C.4.12
- management in Identity Management Realms, 6.1.1
- revoking in JAZN Admintool, C.4.8
- role-based access control, 1.6
- using the J2EE security roles, 2.4
- run-as
- example, 14.2.2.3
- run-as security identity, 14.2.2.3
- RuntimePermission, 14.2.1
S
- Secure Sockets Layer. See SSL
- security
- keys and certificates, 1.7.3
- permissions, 14.2.1
- requesting client authentication, 11.5
- SSL common problems and solutions, 11.6.1
- SSL debugging, 11.6.2
- using certificates with OC4J and OHS, 11.1
- security managers
- overview, SecurityManager class, 1.4.4
- PrintingSecurityManager, 4.2.2
- specifying, enabling, 4.2
- security provider
- definition, 1.2.1
- supported providers, 2.1.3
- security role
- using in the web.xml file, 2.4
- <sep-property> element, 15.1, 15.4
- servlet session synchronization (with SSO), 6.4.3.4
- session cache, 6.5.3
- session synchronization for servlets (with SSO), 6.4.3.4
- set command, C.3.3.10
- -setpasswd option to JAZN Admintool, C.4.15
- -shell option to JAZN Admintool, C.3
- signon
- component-managed vs. container-managed, 16.1.2
- single sign-on, 2.2
- COREid SSO cookie, 10.2.3
- COREid SSO, configure Web apps, 10.5.3
- integration with JAAS Provider, 6.2.3
- OracleAS Single Sign-On overview, 6.2.2
- SocketPermission, 14.2.1
- SSL, 1.7.1
- common problems, 11.6
- enabling SSL in OC4J, 11.3
- integration with JAAS Provider, 11.2
- LDAP properties, 6.5.1
- ORMI over SSL, 11.7
- port for LDAP with SSL, 6.4.1.1, 6.5.1
- SSO authentication, 13.1.2
- starting
- Admintool, 3.2.2
- JAZN Admintool, C.2
- subject propagation
- enabling, 14.4.2
- introduction, 1.7.4
- overview in OC4J, 14.4.1
- removing/configuring restrictions, 14.4.4
- sharing principal classes, 14.4.3
- Subject.doAs method
- associating a subject with AccessControlContext, 1.3
- invoking, 1.5
- subjects, 1.3
- definition, 1.3
- with JAAS, 1.3
- Sun Java System Directory Server
- as LDAP provider, 9.5
- system application
- associating with Oracle Internet Directory, 6.4.1.5
- overview, 3.5
- system properties
- java.security.manager, 4.2
- java.security.policy, 4.2
- oracle.home, 4.2.1
- system-jazn-data.xml
- and Admintool, 3.2.2
- and LoginModule, 8.6.1
- for policy data, 7.3.3
- persistence mode, 3.4.3
T
- target names
- definition, 1.4.1
- third-party LDAP provider, login-module element options, 9.3
- <transport-config> element, 15.6.1
- troubleshooting
- custom LoginModules, A.2.2
- trustpoint, 1.7.2
- truststore
- definition, 15.1
- tunneling, HTTPS, 11.3
U
- user repository
- definition, 1.2.1
- users
- activating/deactivating, file-based provider, 3.6.1
- adding and removing with the JAZN Admintool, C.4.4
- adding in JAZN Admintool, C.4.4
- creating, editing, deleting (file-based provider), 7.2.4
- creating, with OID DAS for LDAP provider, 6.5
- listing in JAZN Admintool, C.4.13
- listing with the JAZN Admintool, C.4.13
- management in Identity Management Realms, 6.1.1
V
- validate_password plug-in, COREid, 10.3.1.4
W
- Web services, use cases with COREid, 10.7
- WebGate vs. AccessGate (COREid), 10.1.1
- web.xml
- using the J2EE security role, 2.4
X
- XML-based provider, 2.1.3
- XML-based provider type, 2.1.3
- realm management, 7.3.2
- XML-based provider--see file-based provider