This document is a resource for system administrators who create and deploy security policies using BEA AquaLogic Enterprise Security™. Typical tasks include writing security policies using the ALES Administration Console, writing security policies outside the console and importing them into ALES, and exporting security policies from ALES and importing them into other ALES installations.
The topics in this document are relevant during the staging, production deployment, and production use phases of a software project. For links to other AquaLogic Enterprise Security documentation and resources, see Related Documentation.
It is assumed that readers understand Web technologies and have a general understanding of the Microsoft Windows or UNIX operating system being used. Prior to using this document, you should be familiar with the policy model used by BEA AquaLogic Enterprise Security and described in the Introduction to BEA AquaLogic Enterprise Security.
Additionally, BEA AquaLogic Enterprise Security includes many terms and concepts that you need to understand. These terms and concepts, which you will encounter throughout the documentation, are defined in the Glossary.
Guide to this Document
This document describes tasks associated with deploying and managing AquaLogic Enterprise Security. It is organized as follows:
Security Policies Overview, describes the different types of policies, describes how to design policies and provides general information about the components of policies: effects, privileges, roles, resources, identities, delegation, and declarations.
Writing Policies, describes how to use the Administration Console to write policies.
Advanced Topics, describes how to write more advanced and complex policies and how to create policy data files.
Using the Entitlements Management Tool, described how to use the Entitlements Management Tool, a user interface based on a hierarchical role-based access control (RBAC) model, to manage roles, users and groups, permissions, and separation of duties constraints.
Installing the Administration Server—This document describes installing and configuring the AquaLogic Enterprise Security Administration Application.
Installing Security Service Modules—This document describes installing and configuring Security Service Modules for AquaLogic Enterprise Security.
Administration and Deployment Guide—This document provides an architectural overview of the product and includes step-by-step instructions on how to perform various post-installation administrative tasks.
Integrating ALES with Application Environments—This document describes post-installation integration tasks to configure ALES for use with BEA WebLogic Server, BEA WebLogic Portal, BEA AquaLogic Data Services Platform, BEA AquaLogic Service Bus, Apache Web Server, Microsoft IIS web server and Web Services.
Programming Security for Java Applications—This document describes how to implement security in Java applications. It includes descriptions of the security service Application Programming Interfaces and programming instructions.
Programming Security for Web Services—This document describes how to implement security in web servers. It includes descriptions of the Web Services Application Programming Interfaces.
Javadocs for Java API—This document provides reference documentation for the Java Application Programming Interfaces that are provided with and supported by this release of BEA AquaLogic Enterprise Security.
Wsdldocs for Web Services API—This document provides reference documentation for the Web Services Application Programming Interfaces that are provided with and supported by this release of BEA AquaLogic Enterprise Security.
Javadocs for Security Service Provider Interfaces—This document provides reference documentation for the Security Service Provider Interfaces that are provided with and supported by this release of BEA AquaLogic Enterprise Security.
Javadocs for BLM API—This document provides reference documentation for the Business Logic Manager (BLM) Application Programming Interfaces that are provided with and supported by this release of BEA AquaLogic Enterprise Security.
Contact Us!
Your feedback on BEA documentation is important to us. Send us e-mail at
docsupport@bea.com if you have questions or comments. Your comments will be reviewed directly by the BEA professionals who create and update the documentation.
In your e-mail message, please indicate the software name and version you are using, as well as the title and date of your documentation. If you have any questions about this version of BEA AquaLogic Enterprise Security, or if you have problems installing and running BEA AquaLogic Enterprise Security products, contact BEA Customer Support through BEA WebSupport at http://www.bea.com. You can also contact Customer Support by using the contact information provided on the Customer Support Card, which is included in the product package.
When contacting Customer Support, be prepared to provide the following information:
Your name, e-mail address, phone number, and fax number
Your company name and company address
Your machine type and authorization codes
The name and version of the product you are using
A description of the problem and the content of pertinent error messages.