> Understanding WebLogic
Security
Understanding WebLogic
Security
JAAS LoginModules
JAAS Control Flags
Username/Password Authentication
Certificate Authentication
Digest Authentication
Perimeter Authentication
How is Perimeter Authentication Accomplished?
How Does WebLogic Server Support Perimeter Authentication?
The Java Secure Socket Extension (JSSE)
Java Authentication and Authorization Services (JAAS)
The Java Security Manager
Java Cryptography Architecture and Java Cryptography Extensions (JCE)
Java Authorization Contract for Containers (JACC)
What Is a Security Provider Database?
Security Realms and Security Provider Databases
Embedded LDAP Server
Authentication Providers
Identity Assertion Providers
Principal Validation Providers
Authorization Providers
Adjudication Providers
Role Mapping Providers
Auditing Providers
Credential Mapping Providers
Certificate Lookup and Validation Providers
Keystore Providers
Realm Adapter Providers
Security Provider Summary
POST Profile
Artifact Profile
POST Profile
Artifact Profile