Skip navigation.

Introduction to WebLogic Enterprise Security

   Previous Next vertical dots separating previous/next from contents/index/pdf Contents Index View as PDF   Get Adobe Reader

Application Security Infrastructure

Introduction to BEA WebLogic Enterprise Security

Audience for This Guide

Securing Your Enterprise

What is BEA WebLogic Enterprise Security?

Key Features

What is the Problem?

What is the Solution?

Distributed Computing Security Infrastructure

How Our Solution Benefits You

Application Developers

Server and Application Administrators

Security Developers

Security Architects

Standards

BEA WebLogic Enterprise Security Architecture

Architectural Overview

Administration Server

Service Control Manager

Security Service Module

WebLogic Server 8.1 Security Service Module

Web Server Security Service Module

Web Services Security Service Module

Java Security Service Module

Security Services

Authentication and Identity

Authentication Service

Types of Authentication

Username and Password Authentication

Web Single Sign-On

Perimeter Authentication

Principal Validation

Principal Validation Service

Identity Assertion

Identity Assertion Service

Role Mapping

Role Mapping Service

Authorization

Authorization Service

User Directories

Resources

Authorization Policies and Role Mapping

ContextHandlers

Adjudication

Adjudication Service

Auditing

Auditing Service

Credential Mapping

Credential Mapping Service

Security Service Providers

Security Administration

Managing Security

Security Configuration

Resources

Resource Attribute

Privilege

Privilege Group

Identity

User

Group

Identity Attribute

Role

Role Policy

Policy

Policy Rule

Policy Inquiry

Policy Verification

Declarations

Deployment

What's Next?

 

Skip footer navigation  Back to Top Previous Next