|
|
B2B Security
Introducing WebLogic Integration B2B Security
WebLogic Integration B2B Security Model
About Configuring Trading Partners
About Configuring the WebLogic Integration B2B System User
Configuration Restrictions to Ensure a Secure Environment
Authenticating and Authorizing Trading Partners
Trading Partner Authentication in WebLogic Integration
Trading Partner Certificate Verification
Benefits of Certificate Verification
Certificate Verification Process
Implementing a Certificate Verification Provider
Authentication of the Trading Partner Message
Trading Partner Authorization in WebLogic Integration B2B
Configuring the SSL Protocol and Mutual Authentication
Configuring Access Control Lists for WebLogic Integration B2B
Configuring Security for the WebLogic Integration B2B Engine
Configuring Trading Partner Security
Configuring Trading Partner Certificates
Configuring a Secure Transport
Configuring a Secure Delivery Channel
Configuring a Secure Document Exchange
Configuring Message Encryption
How WebLogic Integration B2B Message Encryption Works
Configuring Message Encryption
Configuring Digital Signatures for Nonrepudiation
Customizing the WLCCertAuthenticator Class
Configuring a Certificate Verification Provider Interface
Configuring WebLogic Integration B2B to Use an Outbound HTTP Proxy Server
Configuring WebLogic Integration with a Webserver and a WebLogic Proxy Plug-In
WebLogic Server User Identity for the Trading Partner
Configuring Business Process Management Access to the WebLogic Integration Repository
Business Protocols with Which You May Use Digital Signature Support
Configuring Digital Signature Support
Configuring the Secure Timestamp Service
Writing to the Audit Log Directly
Configuring the Secure Audit Log
Using the Service Provider Interfaces (SPIs) for Nonrepudiation
Using the SPI for the Secure Timestamp Service
Using the SPI for the Secure Audit Log
|
Copyright © 2001 BEA Systems, Inc. All rights reserved.
|