Introduction

     Previous  Next    Contents  Open Index in new window  View as PDF - New Window  Get Adobe Reader - New Window
Content starts here

Introduction and Roadmap

Audience and Scope

Guide to This Document

Related Information

Overview of BEA WebLogic Enterprise Security

What Is BEA AquaLogic Enterprise Security?

Key Features

What is the Problem?

What is the Solution?

Distributed Computing Security Infrastructure

How Our Solution Benefits You

Application Developers

Server and Application Administrators

Security Developers

Security Architects

Standards

Examples

Architecture Overview

Administration Server

Service Control Manager

Security Service Modules

WebLogic Server 8.1 Security Service Module

WebLogic Server 9.x Security Service Module

Web Server Security Service Module

Web Services Security Service Module

Java Security Service Module

Security Services

Authentication and Identity

Authentication Service

Types of Authentication

Username and Password Authentication

Perimeter Authentication

How is Perimeter Authentication Accomplished?

Identity Assertion

Identity Assertion Service

Role Mapping

Role Mapping Service

Authorization

Authorization Service

User Directories

Resources

Authorization Policies and Role Mapping Policies

ContextHandlers

Adjudication

Adjudication Service

Auditing

Auditing Service

Performance Statistics

Credential Mapping

Credential Mapping Service

Security Service Providers

Security Administration

Managing Security

Security Configuration

Resources

Resource Attribute

Privilege

Privilege Group

Identity

Users

Groups

Identity Attributes

Roles

Policy

Role Mapping Policies

Authorization Policies

Role Mapping Policy Reports

Authorization Policy Reports

Declarations

Deployment


  Back to Top       Previous  Next