Index
A C D E G H I J L M N O P R S T V W
A
- Application log files, 8.2
- Authentication
-
- support for keystores, 5.2.5.1
C
- client access URLs, 4
- Configuring logging for agents and gateways, 8.3.1
- content routing
-
- about, 4.1
- an example, 4.1
- based on designated dispatch rules, 4
- based on XML content, 4
- creating rules
-
- attachment XPath content, 4.4
- creating rules for, 4.3
- for HTTP, 4
- for JMS, 4
- for MQ, 4
- how to access the Web service, 4.2
- how to create rules, 4.3
- namespaces, 4.1.1
- sample content routing rules, 4.1.3
- sample SOAP message, 4.1.2
- Credentials
-
- Policy Management, 5.2.2
D
- Discovering Web services
-
- about WSIL, 3.1
- how to import from the UDDI, 3.2.1
- importing from the UDDI, 3.2
- UDDI registries, 3
- WSIL documents, 3
E
- Enabling JSSO, 1.2.1
- Establishing identity, 5.2.3
G
- gateway
-
- adding a service, 2.1.1
- registering services, 2
- registering Web services, 2
- gateways
-
- content routing, 4
- using content routing rules
-
- customizing messages, 4
- Getting Started, 1
H
- HTTPS, 2.4
I
- Importing a service
-
- HTTP proxy settings, 2.1
- Importing a WSDL
-
- enabling SSL, 2.1
J
- Java Policy Enforcement Points
-
- limitations of, 10.1
- JMS failover
-
- connection failover mechanism, 2.5
- for TIBCO, 2.5
- heartbeat failover mechanism, 2.5
- JSSO enabled, 1.2.1
L
- Log entries
-
- changing maximum, 8.4
- Log files, 8.2
-
- about, 8.2
- maximum size, 8.2
- Log in
-
- JSSO enabled Web Services Manager Control, 1.2.1
- Web Services Manager Control, 1.2.1
- Log levels
-
- info, 8.2.2
- severe, 8.2.2
- warning, 8.2.2
- Logging events, 8
-
- Application log files, 8.2
- changing maximum log entries, 8.4
- configuring for agents and gateways, 8.3.1
- for agents and gateways, 8.3.1
- for policy steps, 8.3.1
- log levels, 8.2.2
- low-level event and state logs, 8.2
- overview, 8.1
- storing log data, 8.3.1
M
- Menu options, 1.2.2
N
- Nonsecurity policy steps, 5.2.7
O
- Oracle Web Services Manager
-
- accessing virtualized Web services, 2.1
- adding a Web service to a gateway, 2.1.1
- Backup and recovery, 9.1
- gateways
-
- content routing, 4
- importing a service, 2.1
-
- HTTP proxy settings, 2.1
- logging events, 8
- managing, 9
- managing roles, 7
- Policy Management, 5
- registering Web services to a gateway, 2, 2
- registering WSDLs from SSL-enabled Sites, 2.1
- Setting password security, 9.2
- specifying a WSDL URL, 2.1
- transport protocols, 2.3
P
- Passwords
-
- password obfuscation, 7.4.2.1
- setting security, 9.2
- Performance metrics, 8.3
-
- flow metrics, 8.3
- invocation metrics, 8.3
- Pipeline template
-
- using in a policy, 5.6.1.1
- Pipeline templates, 5.6
-
- creating, 5.6.1
- Policy Management
-
- Authentication, 5.2.3
- Authorization
-
- authorized services, 5.2.4
- example of message integrity, 5.2.5
- managing credentials, 5.2.2
- message confidentiality, 5.2.5
- message encryption, 5.2.5
- message integrity, 5.2.5
- Overview, 5.1
- Request Pipeline, 5.1
- Response Pipeline, 5.1
- Policy pipeline
-
- templates, 5.6
- Policy Steps
-
- about, 5.2
- configuring
-
- Log Policy Step, 5.5
- logging level for the Log Policy Step, 5.5
- defining for agents, 5.4.1
- enforce policies for gateway Web services, 5.3
- for agents, 5.4
- for Policy Enforcement Points, A
- how to add to gateway Web services, 5.3
- how to map to a Web service, 5.4.2
- how to view, 5.2.1
- Nonsecurity, 5.2.7
- pre-packaged and custom, 5.1
- to Web service URls for agents, 5.4.2
- Types of
-
- Nonsecurity, 5.2
- Security, 5.2
- viewing, 5.2.1
- providing a service ID, 2.2
- publishing URLs, 9.6
R
- Roles
-
- adding or removing groups, 7.4.2.2
- assigning groups to, 7.3
-
- how to assign, 7.3
- authenticating, 7.4
-
- through the LDAP server, 7.4
- using the database, 7.4
- automatic mapping to a group at log in, 7.1
- default users and groups, 7.4.1
- manageUserGroup properties file, 7.4.2.1
- manageUserGroups properties file settings, 7.4.2.1
- managing, 7
- managing access and permissions, 7.1
- managing users and group commands, 7.4.2
-
- command-line tool, 7.4.2
- Super User, 7.2
- Types of, 7.1
- Types of default users and groups, 7.4.1
S
- Securing connections using HTTPS, 2.4
- See also Web Services Inspection Language, 3.1
- service ID, 2.1
-
- for HTTP Client requests, 2.2
- for JMS Client requests, 2.2
- for MQ Client requests, 2.2
- message requests, 2.2
- or Web service name, 2.2
- using in client requests, 2.2
- Setting up a HTTP Proxy, 2.1
- Starting the Oracle WSM Server, 1.1
-
- on UNIX, 1.1
- on Windows, 1.1
- Super User
-
- assigning, 7.2
T
- Test Page, B
-
- Viewing the Web service WSDL, B.1
- transport protocols
-
- changing the protocol, 2.3.3
- configuring the incoming protocol, 2.3.1
- configuring the outgoing protocol, 2.3.2
-
- HTTP and HTTPS, 2.3.2.1
- JMS Messenger, 2.3.2.2
- MQ series, 2.3.2.3
- incoming and outgoing, 2.3
- using HTTPS, 2.4
- Troubleshooting, 10
-
- Accessing WSDL, 10.6
- Error testing Web service access, 10.7
- Importing WSDLs, 10.4
- Java Policy Enforcement Points, 10.1
- log files provide incorrect level of information, 10.11
- log levels do not reset, 10.12
- performance issues, 10.13
- Policy Management menu, 10.8
- Report engine display, 10.3
- SSL on OC4J, 10.2
- UDDI Registry, 10.5
- Web Service Manager Control
-
- Metrics data, 10.10
- Web Services Manager Control
-
- timing out, 10.9
V
- Verification, 5.2.4
- Verifying a role, 5.2.4
- Viewing the WSDL, B.1
- virtualized Web services
-
- service ID, 2.1
- Web service name, 2.1
W
- Web browser
-
- changing session time out, 9.3
- how to deactivate, 9.4
- Web service
-
- editing properties, 9.5
- reasons to deactivate, 9.4
- Web service name, 2.2
- Web Service WSDL
-
- viewing, B.1
- Web services
-
- publishing, 9.6
- registering with a gateway, 2
- testing, B.2
- Web services discovery, 3
- Web Services Inspection Language, 3.1
- Web Services Manager Control
-
- accessing, 1.2.1
- functionality and operations, 1.2
- logging in, 1.2.1
- menu options, 1.2.2
- WSDL
-
- viewing, B.1
- WSIL
-
- decentralizing Web services discovery, 3.1
- defining format for Web service descriptions, 3.1
- defining rules for WSIL availability, 3.1