BEA Logo BEA WLI Release 2.1

  BEA Home  |  Events  |  Solutions  |  Partners  |  Products  |  Services  |  Download  |  Developer Center  |  WebSUPPORT

 

   WLI Doc Home   |   B2B Topics   |   B2B Security   |   Previous Topic   |   Next Topic   |   Contents   |   Index   |   View as PDF

B2B Security

 

 

Introducing WebLogic Integration B2B Security

WebLogic Integration B2B Security Model

Principals, Users, and Groups

About Configuring Trading Partners

About Configuring the WebLogic Integration B2B System User

Digital Certificates

Certificate Authority

SSL Protocol

Configuration Restrictions to Ensure a Secure Environment

 

Authenticating and Authorizing Trading Partners

Trading Partner Authentication in WebLogic Integration

Trading Partner Certificate Verification

Benefits of Certificate Verification

Certificate Verification Process

Implementing a Certificate Verification Provider

Authentication of the Trading Partner Message

Trading Partner Authorization in WebLogic Integration B2B

Trading Partner Authorization

Conversation Authorization

 

Configuring Security

Configuring the SSL Protocol and Mutual Authentication

Configuring Access Control Lists for WebLogic Integration B2B

Configuring Security for the WebLogic Integration B2B Engine

Configuring Trading Partner Security

Configuring Trading Partner Certificates

Configuring a Secure Transport

Configuring a Secure Delivery Channel

Configuring a Secure Document Exchange

Configuring Message Encryption

How WebLogic Integration B2B Message Encryption Works

Configuring Message Encryption

Configuring Digital Signatures for Nonrepudiation

Customizing the WLCCertAuthenticator Class

Configuring a Certificate Verification Provider Interface

Configuring WebLogic Integration B2B to Use an Outbound HTTP Proxy Server

Configuring WebLogic Integration with a Webserver and a WebLogic Proxy Plug-In

Configuring the Webserver

WebLogic Server User Identity for the Trading Partner

Configuring Business Process Management Access to the WebLogic Integration Repository

 

Implementing Nonrepudiation

Overview of Nonrepudiation

Digital Signature Support

Business Protocols with Which You May Use Digital Signature Support

Configuring Digital Signature Support

Secure Timestamp Service

Configuring the Secure Timestamp Service

Secure Audit Log Service

Writing to the Audit Log Directly

Configuring the Secure Audit Log

Using the Service Provider Interfaces (SPIs) for Nonrepudiation

Using the SPI for the Secure Timestamp Service

Using the SPI for the Secure Audit Log

Audit Log Messages

Audit Log DTD

 

back to top   next page