Skip Headers
Oracle® Web Services Manager Administrator's Guide
10g (10.1.3.3.0)

Part Number E10299-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Feedback page
Contact Us

Go to previous page
Previous
View PDF

Index

A  C  D  E  G  H  I  J  L  M  N  O  P  R  S  T  V  W 

A

Application log files, 8.2
Authentication
support for keystores, 5.2.5.1

C

client access URLs, 4
Configuring logging for agents and gateways, 8.3.1
content routing
about, 4.1
an example, 4.1
based on designated dispatch rules, 4
based on XML content, 4
creating rules
attachment XPath content, 4.4
creating rules for, 4.3
for HTTP, 4
for JMS, 4
for MQ, 4
how to access the Web service, 4.2
how to create rules, 4.3
namespaces, 4.1.1
sample content routing rules, 4.1.3
sample SOAP message, 4.1.2
Credentials
Policy Management, 5.2.2

D

Discovering Web services
about WSIL, 3.1
how to import from the UDDI, 3.2.1
importing from the UDDI, 3.2
UDDI registries, 3
WSIL documents, 3

E

Enabling JSSO, 1.2.1
Establishing identity, 5.2.3

G

gateway
adding a service, 2.1.1
registering services, 2
registering Web services, 2
gateways
content routing, 4
using content routing rules
customizing messages, 4
Getting Started, 1

H

HTTPS, 2.4

I

Importing a service
HTTP proxy settings, 2.1
Importing a WSDL
enabling SSL, 2.1

J

Java Policy Enforcement Points
limitations of, 10.1
JMS failover
connection failover mechanism, 2.5
for TIBCO, 2.5
heartbeat failover mechanism, 2.5
JSSO enabled, 1.2.1

L

Log entries
changing maximum, 8.4
Log files, 8.2
about, 8.2
maximum size, 8.2
Log in
JSSO enabled Web Services Manager Control, 1.2.1
Web Services Manager Control, 1.2.1
Log levels
info, 8.2.2
severe, 8.2.2
warning, 8.2.2
Logging events, 8
Application log files, 8.2
changing maximum log entries, 8.4
configuring for agents and gateways, 8.3.1
for agents and gateways, 8.3.1
for policy steps, 8.3.1
log levels, 8.2.2
low-level event and state logs, 8.2
overview, 8.1
storing log data, 8.3.1

M

Menu options, 1.2.2

N

Nonsecurity policy steps, 5.2.7

O

Oracle Web Services Manager
accessing virtualized Web services, 2.1
adding a Web service to a gateway, 2.1.1
Backup and recovery, 9.1
gateways
content routing, 4
importing a service, 2.1
HTTP proxy settings, 2.1
logging events, 8
managing, 9
managing roles, 7
Policy Management, 5
registering Web services to a gateway, 2, 2
registering WSDLs from SSL-enabled Sites, 2.1
Setting password security, 9.2
specifying a WSDL URL, 2.1
transport protocols, 2.3

P

Passwords
password obfuscation, 7.4.2.1
setting security, 9.2
Performance metrics, 8.3
flow metrics, 8.3
invocation metrics, 8.3
Pipeline template
using in a policy, 5.6.1.1
Pipeline templates, 5.6
creating, 5.6.1
Policy Management
Authentication, 5.2.3
Authorization
authorized services, 5.2.4
example of message integrity, 5.2.5
managing credentials, 5.2.2
message confidentiality, 5.2.5
message encryption, 5.2.5
message integrity, 5.2.5
Overview, 5.1
Request Pipeline, 5.1
Response Pipeline, 5.1
Policy pipeline
templates, 5.6
Policy Steps
about, 5.2
configuring
Log Policy Step, 5.5
logging level for the Log Policy Step, 5.5
defining for agents, 5.4.1
enforce policies for gateway Web services, 5.3
for agents, 5.4
for Policy Enforcement Points, A
how to add to gateway Web services, 5.3
how to map to a Web service, 5.4.2
how to view, 5.2.1
Nonsecurity, 5.2.7
pre-packaged and custom, 5.1
to Web service URls for agents, 5.4.2
Types of
Nonsecurity, 5.2
Security, 5.2
viewing, 5.2.1
providing a service ID, 2.2
publishing URLs, 9.6

R

Roles
adding or removing groups, 7.4.2.2
assigning groups to, 7.3
how to assign, 7.3
authenticating, 7.4
through the LDAP server, 7.4
using the database, 7.4
automatic mapping to a group at log in, 7.1
default users and groups, 7.4.1
manageUserGroup properties file, 7.4.2.1
manageUserGroups properties file settings, 7.4.2.1
managing, 7
managing access and permissions, 7.1
managing users and group commands, 7.4.2
command-line tool, 7.4.2
Super User, 7.2
Types of, 7.1
Types of default users and groups, 7.4.1

S

Securing connections using HTTPS, 2.4
See also Web Services Inspection Language, 3.1
service ID, 2.1
for HTTP Client requests, 2.2
for JMS Client requests, 2.2
for MQ Client requests, 2.2
message requests, 2.2
or Web service name, 2.2
using in client requests, 2.2
Setting up a HTTP Proxy, 2.1
Starting the Oracle WSM Server, 1.1
on UNIX, 1.1
on Windows, 1.1
Super User
assigning, 7.2

T

Test Page, B
Viewing the Web service WSDL, B.1
transport protocols
changing the protocol, 2.3.3
configuring the incoming protocol, 2.3.1
configuring the outgoing protocol, 2.3.2
HTTP and HTTPS, 2.3.2.1
JMS Messenger, 2.3.2.2
MQ series, 2.3.2.3
incoming and outgoing, 2.3
using HTTPS, 2.4
Troubleshooting, 10
Accessing WSDL, 10.6
Error testing Web service access, 10.7
Importing WSDLs, 10.4
Java Policy Enforcement Points, 10.1
log files provide incorrect level of information, 10.11
log levels do not reset, 10.12
performance issues, 10.13
Policy Management menu, 10.8
Report engine display, 10.3
SSL on OC4J, 10.2
UDDI Registry, 10.5
Web Service Manager Control
Metrics data, 10.10
Web Services Manager Control
timing out, 10.9

V

Verification, 5.2.4
Verifying a role, 5.2.4
Viewing the WSDL, B.1
virtualized Web services
service ID, 2.1
Web service name, 2.1

W

Web browser
changing session time out, 9.3
how to deactivate, 9.4
Web service
editing properties, 9.5
reasons to deactivate, 9.4
Web service name, 2.2
Web Service WSDL
viewing, B.1
Web services
publishing, 9.6
registering with a gateway, 2
testing, B.2
Web services discovery, 3
Web Services Inspection Language, 3.1
Web Services Manager Control
accessing, 1.2.1
functionality and operations, 1.2
logging in, 1.2.1
menu options, 1.2.2
WSDL
viewing, B.1
WSIL
decentralizing Web services discovery, 3.1
defining format for Web service descriptions, 3.1
defining rules for WSIL availability, 3.1