Introduction and Roadmap
Audience and Scope
Guide to This Document
Related Information
Overview of BEA AquaLogic Enterprise Security
What Is BEA AquaLogic Enterprise Security?
Key Features
What is the Problem?
What is the Solution?
Distributed Computing Security Infrastructure
How Our Solution Benefits You
Application Developers
Server and Application Administrators
Security Developers
Security Architects
Standards
Examples
Architecture Overview
Administration Server
Service Control Manager
Security Service Modules
WebLogic Server 8.1 Security Service Module
WebLogic Server 9.x/10.0 Security Service Module
Web Server Security Service Module
Web Server Environmental Binding
Web Single Sign-on Capabilities
Single Sign-On with ALES Identity Assertion
Authentication Service Features
Authorization Service Features
Web Server Constraints and Limitations
Web Services Security Service Module
Web Services Security Service APIs
Java Security Service Module
Security Services
Authentication and Identity
Authentication Service
Types of Authentication
Username and Password Authentication
How is Perimeter Authentication Accomplished?
Identity Assertion
Role Mapping
Role Mapping Service
Authorization
Authorization Service
User Directories
Resources
Authorization Policies and Role Mapping Policies
Service Data Objects (SDO) Attribute Retrievers
ALES Identity Attribute Retrievers
Upgrade of Metadirectory and Existing Attribute Retrievers at Installation
Configuration of Attribute Retriever on WLS 9.1/10.0 SSM is Through WebLogic Server
ContextHandlers
Adjudication
Adjudication Service
Auditing
Auditing Service
Performance Statistics
Credential Mapping
Credential Mapping Service
Security Service Providers
Security Administration
Managing Security
Security Configuration
Resources
Resource Attribute
Privilege
Privilege Group
Identity
Users
Groups
Identity Attributes
Roles
Policy
Role Mapping Policies
Authorization Policies
Role Mapping Policy Reports
Authorization Policy Reports
Declarations
Deployment