BEA Logo BEA WLCS Release 3.5

  Corporate Info  |  News  |  Solutions  |  Products  |  Partners  |  Services  |  Events  |  Download  |  How To Buy

 

   WLCS Doc Home   |   Security Guide   |   Previous Topic   |   Next Topic   |   Contents   |   Index

Introduction

 

The BEA Campaign Manager for WebLogic, WebLogic Commerce Server, and WebLogic Personalization Server are applications that may store personal information about customers or display Web site content based on a customer's identity. However, the level of sensitivity for such data varies. For example, a customer's credit card information is highly sensitive data that must be protected; a customer's color preferences may be considered by some as less sensitive.

Regardless of the perceived sensitivity of these activities, the Campaign Manager for WebLogic, WebLogic Commerce Server, and WebLogic Personalization Server applications provide you with ways to protect the confidentiality and integrity of customer data, customer preferences, and the overall integrity of customer transactions. This Security Guide was designed to help you understand how the Campaign Manager for WebLogic, WebLogic Commerce Server, and WebLogic Personalization Server leverage the security features of the JavaTM 2 Platform Enterprise Edition (J2EE) specification and the J2EE-compliant security features of the WebLogic Server platform, as well as understand any additional security measures that have been established for application components. This guide also describes ways that you can modify security settings within the Campaign Manager for WebLogic, WebLogic Commerce Server, and WebLogic Personalization Server to inspire customer confidendence and solidify your e-business' online relationships.

As the introduction to this Security Guide, this topic includes the following sections:

 


Determining Your Application Security Needs

Security is a critical component of developing e-commerce applications that no organization can afford to ignore. Malicious users who gain access to your computer systems can temporarily interrupt business, but those who gain access to your customers' personal data can cause long-term damage to your reputation. Even if you have not had any security mishaps, customers are often hesitant to provide personal information over the Web, which could affect your abilitiy to tailor products and services to customer preferences. Therefore, your organization must develop e-commerce applications that protect customer data and communicate a sense of privacy and purpose through the user interface. At the same time, however, the application must not be difficult to navigate or perform slowly because of technical security requirements.

As the previous discussion suggests, determining your application security needs can be a difficult balancing act. BEA recommends that you ask yourself the following questions when attempting to define your application security requirements:

As you read the rest of this Security Guide, keep the answers to these questions in mind. By thinking up-front about your security requirements, you will be more likely to design security-aware Web applications, and will be better prepared for deployment.

 


Development Roles

This Security Guide is intended mainly for individuals in the following roles:

Note: The roles described above are from the Java 2 Platform Enterprise Edition Specification v1.3, which you may consult for more information. For a quick reference, see the "Development Roles" section of the J2EE Tutorial.

 


Important Security Features

The important aspects of the Campaign Manager for WebLogic, WebLogic Commerce Server, and WebLogic Personalization Server security mechanisms are described in the following paragraphs.

Reliance on J2EE Standards and Platform Security

Security implementations in the Campaign Manager for WebLogic, WebLogic Commerce Server, and WebLogic Personalization Server applications rely upon the security definitions in the Java 2 Enterprise Edition (J2EE) specification and security measures implemented in the WebLogic Server platform.

This dependancy has two important implications. First, the applications you build using the Campaign Manager for WebLogic, WebLogic Commerce Server, and WebLogic Personalization Server products as a base will also leverage the security mechanisms implemented by the container, instead of requiring you to embed security code within your Enterprise JavaBeans (EJBs) routines or their clients. This architectural structure not only reduces debugging/maintenance issues and the likelihood of security holes due to programming errors, but it also avoids the requirement of tying security roles to individual applications. Second, because of the reliance on J2EE and the J2EE-compliant WebLogic Server, you can be certain that your Web applications will conform to the latest security standards in the industry.

For more information about J2EE security, see the Java 2 Platform Enterprise Edition Specification, v1.3. For more information about how the BEA WebLogic Server implements J2EE security, see Programming WebLogic Security.

Declarative Security with Deployment Descriptors

Because of the reliance on J2EE security and the WebLogic Server implementation of these techniques, security in the Campaign Manager for WebLogic, WebLogic Commerce Server, and WebLogic Personalization Server applications is declarative. In other words, protections on resources are defined in a central configuration document called a deployment descriptor, which is then used by the WebLogic Server platform to enforce security restrictions. Access to protected resources is granted based on whether the requesting user's security role matches the role declared in the deployment descriptor for that resource.

Note: For more information about deployment descriptors and security roles, see Deployment Descriptors and Security Roles.

A declarative approach to security enforcement has three major advantages. First, this type of security is fine-grained, meaning that access can be restricted all the way down to a specific method on a JavaBean. Second, the administrator of the WebLogic Server (or other J2EE-compliant server) can customize the security attributes for a particular production environment at deployment time. Third, because deployment descriptor information is declarative, it can be changed without modifying any JavaBean source code. At run time, the WebLogic Server simply reads the deployment descriptor and acts upon the component accordingly.

Note: For more information about declarative security, see the Enterprise JavaBeans 1.1 Specification, or the Java 2 Platform Enterprise Edition Specification, v1.3.

 


Next Steps

As the topics in this introduction show, the Security Guide assumes a certain level of familiarity with standard J2EE security implementations and with the security mechanisms of the BEA WebLogic Server. If you have no prior or recent experience with J2EE or WebLogic Server, you may want to spend some time learning about these technologies before proceeding.

For more information about J2EE security, consult the following documents:

For more information about BEA WebLogic Server security, consult the following documents:

Lastly, the Deployment Guide (which is part of the same Campaign Manager for WebLogic, WebLogic Commerce Server, and WebLogic Personalization Server documentation set) may also be helpful in understanding the contents of this Security Guide.

If you feel comfortable with J2EE and WebLogic Server security topics, proceed through this guide — either sequentially or selectively — to answer your questions about Campaign Manager for WebLogic, WebLogic Commerce Server, and WebLogic Personalization Server security.

 

back to top previous page next page