Developing Security Providers

     Previous  Next    Open TOC in new window    View as PDF - New Window  Get Adobe Reader - New Window
Content starts here

Introduction and Roadmap

The following sections describe the content and organization of this document:

 


Scope

This book is designed for security and application developers who want to write their own security providers for use with BEA AquaLogic Enterprise Security. It is assumed that those using this document are application developers who have a solid understanding of security concepts, and that no basic security concepts require explanation. It is also assumed that security and application developers are familiar with BEA AquaLogic Enterprise Security and with Java programming.

 


Prerequisites for This Document

Prior to reading this guide, you should read the Introduction to BEA AquaLogic Enterprise Security. This document describes how the product works and provides conceptual information that is helpful to understanding the necessary installation components.

Additionally, BEA AquaLogic Enterprise Security includes many unique terms and concepts that you need to understand. These terms and concepts—which you will encounter throughout the documentation—are defined in the Glossary.

 


Documentation Audience

This document is intended for the following audiences:

 


Guide to this Document

This document provides application developers with the information needed to develop custom security providers for use with BEA AquaLogic Enterprise Security™ Security Service Modules. This document is organized as follows:

 


Related Information

Additional documents include:


  Back to Top       Previous  Next