BEA Logo BEA WLI Release 2.1

  BEA Home  |  Events  |  Solutions  |  Partners  |  Products  |  Services  |  Download  |  Developer Center  |  WebSUPPORT

 

   WLI Doc Home   |   Deploying Solutions   |   Previous Topic   |   Next Topic   |   Contents   |   Index   |   View as PDF

Using WebLogic Integration Security

 

The following sections describe how to set up and manage security for WebLogic Integration solution deployments:

 


Overview of WebLogic Integration Security

The following sections describe the key features of WebLogic Integration security:

Every secure deployment of a WebLogic Integration solution uses the WebLogic Server security features as the foundation. If BPM, B2B integration, and application integration functionality is used in a WebLogic Integration solution, the security features associated with these functional areas are used as well.

Note: For a secure deployment, avoid running WebLogic Integration in the same WebLogic Server instance as any applications for which security is not provided. Internal WebLogic Integration API calls are not protected from collocated applications.

WebLogic Server Security

WebLogic Server provides the foundation for WebLogic Integration security. WebLogic Integration deployments can use a full range of security features that WebLogic Server provides, including security realms, users and groups, Access Control Lists (ACLs) and permissions, the Secure Sockets Layer (SSL) protocol, authentication mechanisms, digital certificates, controlled access to resources, and so on. For a comprehensive discussion of WebLogic Server security features, see "Programming WebLogic Security" at the following URL:

http://download.oracle.com/docs/cd/E13222_01/wls/docs61/security/index.html

Business Process Management Security

WebLogic Integration uses WebLogic Server security realms to protect access to workflows and other resources. User access is determined by the roles to which the user is assigned. The WebLogic Integration Studio is used to define users, organizations, and roles, and also to map roles to groups in WebLogic Server security realms.

For more information about BPM security, see the following topics:

B2B Integration Security

WebLogic Integration solutions that involve the exchange of messages between trading partners across firewalls have specialized security requirements, including trading partner authentication and authorization, as well as nonrepudiation. Specific security administration tasks depend on the type of protocol used. For more information about B2B integration security, see Implementing Security with B2B Integration.

In addition:

Application Integration Security

WebLogic Integration provides the following security mechanisms for those parts of an integration solution that are created and maintained with application integration functionality:

 


WebLogic Server Security Principals Used in WebLogic Integration

The following diagram provides an overview of the WebLogic Server security principals used in WebLogic Integration.

Figure 3-1 WebLogic Server Security Principals Used in WebLogic Integration


 

 

back to top previous page next page