BEA Logo BEA WebLogic Enterprise Release 5.0

  Corporate Info  |  News  |  Solutions  |  Products  |  Partners  |  Services  |  Events  |  Download  |  How To Buy

 

   WLE Doc Home   |   Security & Related Topics   |   Previous   |   Next   |   Contents   |   Index

Using Security

Using Security provides an introduction to the concepts associated with the WLE security features, a description of how to secure your WLE applications using the security features, and a guide to the use of the APIs in the WLE Security Service.

 

Overview of WLE Security

WLE Security Features

Link-Level Encryption

   How LLE Works

   Development Process

Username/Password Authentication

   How Username/Password Authentication Works

   Development Process for Username/Password Authentication

The SSL Protocol

   How the SSL Protocol Works

   Requirements for Using the SSL Protocol

   Development Process for the SSL Protocol

Certificate-Based Authentication

   How Certificate-based Authentication Works

   Requirements for Using Certificate-Based Authentication

   Development Process for Certificate-Based Authentication

Commonly Asked Questions about WLE Security

   Do I have to Change the Security in an Existing WLE Application?

   Can I Use the SSL Protocol in an Existing WLE Application?

   When Should I Use Mutual Certificate-Based Authentication?

 

Managing Certificates and Keys

Installing the WLE Security Pack

Using the LDAP Directory Service with Your WLE Application

Editing the LDAP Search Filter File

Publishing a Certificate for the Certificate Authority

Obtaining Digital Certificates and Private Keys for Principals

Storing the Private Keys in a Common Location

Defining the Trusted Certificate Authorities

Creating a Peer Rules File

 

Configuring the WLE Environment for the SSL Protocol

Setting Parameters for the SSL Protocol

Defining a Port for SSL Communications

Enabling Certificate-based Authentication

Enabling Host Matching

Setting the Encryption Strength

Setting the Interval for Session Renegotiation

Defining Security Parameters for the IIOP Listener/Handler

Example of Setting Parameters on the ISL System Process

Example of Setting Command Line Options on the CORBA C++ ORB

Example of Setting System Properties on the CORBA Java ORB

 

Defining Security for a WLE CORBA Application

Setting Parameters for Security in the UBBCONFIG File

   Configuring the Authentication Server

   Defining a Security Level

   Setting the Level of Encryption

   Sample UBBCONFIG File for Username/Password Authentication

   Sample UBBCONFIG File for Certificate-Based Authentication

Defining Authorized Users

 

Writing a WLE CORBA Application That Implements Security

Understanding the Address Formats of the Bootstrap Object

   Using the Host and Port Address Format

   Using the corbaloc URL Address Format

   Using the corbalocs URL Address Format

Using Username/Password Authentication

   The Security Sample Application

   Writing the Client Application

Using Certificate-based Authentication

   The Secure Simpapp Sample Application

   Writing the Client Application

Using the Invocations_Options_Required() Method

 

Building and Running the CORBA Sample Applications

Building and Running the Security Sample Application

   Step 1: Copy the files for the Security sample application into a work directory.

   Step 2: Verify the settings of the environment variables.

   Step 3:Change the Protection on the Files for the Security Sample Application.

   Step 4: Set the Environment Variables

   Step 5: Initialize the Database

   Step 6: Load the UBBCONFIG File

   Step 7: Compile the Security Sample Application

   Step 8: Start the server application

   Step 8: Start the C++ client application

   Step 9: Start the Java client application.

Building and Running the Secure Simpapp Sample Application

   Step 1: Copy the Files for the Secure Simpapp Sample Application into a Work Directory

   Step 2: Change the protection attribute on the files for the Secure Simpapp sample application.

   Step 3: Verify the settings of the environment variables.

   Step 4: Execute the runme command.

   Using the Secure Simpapp Sample Application

 

Writing a WLE Enterprise JavaBean that Implements Security

Before You Begin

How Authentication Works with WLE EJBs

Development Steps

Step 1: Define security roles for the methods of the WLE EJB.

Step 2: Specify security roles in the Deployment Descriptor of the EJB.

Step 3: Define the JNDI environment properties.

   WLEContext.INITIAL_CONTEXT_FACTORY Property

   WLEContext.PROVIDER_URL Property

   WLEContext.SECURITY_AUTHENTICATION Property

Step 4: Establish the InitialContext.

Step 5: Use Home to get a WLE EJB.

Step 6: Use the getCallerPrincipal Method to authenticate a WLE EJB.

Limitations and Restrictions

Example of Using Security in a WLE EJB

 

Troubleshooting

Using ULOGS and ORB Tracing

CORBA::ORB_init Problems

Username/Password Authentication Problems

Certificate-Based Authentication Problems

Tobj::Bootstrap::
resolve_initial_references Problems

IIOP Listener/Handler Startup Problems

Configuration Problems

Problems with Using Callbacks Objects with the SSL Protocol

Troubleshooting Tips for Digital Certificates

 

WLE Security Service APIs

The WLE Security Model

   Authentication of Principals

   Controlling Access to Objects

   Administrative Control

Functional Components of the WLE Security Service

The Principal Authenticator Object

   Using the Principal Authenticator Object with Certificate-based Authentication

   WLE Extensions to the Principal Authenticator Object

The Credentials Object

The SecurityCurrent Object

 

Security Modules

   CORBA Module

   TimeBase Module

   Security Module

   Security Level 1 Module

   Security Level 2 Module

   Tobj Module

 

C++ Security Reference

   SecurityLevel2::Credentials

   SecurityLevel2::PrincipalAuthenticator

 

Java Security Reference

 

Automation Security Reference

Method Descriptions

   DISecurityLevel2_Current

   DITobj_PrincipalAuthenticator

   DISecurityLevel2_Credentials

Programming Example