Introduction

     Previous  Next    Contents    View as PDF - New Window  Get Adobe Reader - New Window
Content starts here

Introduction and Roadmap

Audience and Scope

Guide to This Document

Related Information

Overview of BEA AquaLogic Enterprise Security

What Is BEA AquaLogic Enterprise Security?

Key Features

What is the Problem?

What is the Solution?

Distributed Computing Security Infrastructure

How Our Solution Benefits You

Application Developers

Server and Application Administrators

Security Developers

Security Architects

Standards

Examples

Architecture Overview

Administration Server

Service Control Manager

Security Service Modules

WebLogic Server 8.1 Security Service Module

WebLogic Server 9.x/10.0 Security Service Module

Web Server Security Service Module

Web Server Environmental Binding

Web Single Sign-on Capabilities

What is Web Single Sign-On?

Single Sign-On Use Cases

Single Sign-On with ALES Identity Assertion

Authentication Service Features

Authorization Service Features

Auditing Service Features

Role Mapping Features

Credential Mapping Features

Administration Features

Session Management Features

Configuration Features

Web Server Constraints and Limitations

Web Services Security Service Module

ssmWorkshop

ssmNET

javaWebServiceClient

XACMLClient

Web Services Security Service APIs

Authentication Service

Authorization Service

Auditing Service

Role Mapping Service

Credential Service

Java Security Service Module

Security Services

Authentication and Identity

Authentication Service

Types of Authentication

Username and Password Authentication

Perimeter Authentication

How is Perimeter Authentication Accomplished?

Identity Assertion

Identity Assertion Service

Role Mapping

Role Mapping Service

Authorization

Authorization Service

User Directories

Resources

Authorization Policies and Role Mapping Policies

Built-In Attribute Retrievers

RDBMS Attribute Retrievers

LDAP Attribute Retrievers

Service Data Objects (SDO) Attribute Retrievers

ALES Identity Attribute Retrievers

Custom Attribute Retrievers

Upgrade of Metadirectory and Existing Attribute Retrievers at Installation

Configuration of Attribute Retriever on WLS 9.1/10.0 SSM is Through WebLogic Server

ContextHandlers

Adjudication

Adjudication Service

Auditing

Auditing Service

Performance Statistics

Credential Mapping

Credential Mapping Service

Security Service Providers

Security Administration

Managing Security

Security Configuration

Resources

Resource Attribute

Privilege

Privilege Group

Identity

Users

Groups

Identity Attributes

Roles

Policy

Role Mapping Policies

Authorization Policies

Role Mapping Policy Reports

Authorization Policy Reports

Declarations

Deployment


  Back to Top       Previous  Next