> Understanding WebLogic 
Security
Understanding WebLogic 
Security
    
 
  
  
  
  
  
   
   
 
  
  
  
  
 
  
  
   
   
    JAAS LoginModules
    JAAS Control Flags
   
   
   
   
   
   
   
    Username/Password Authentication
    Certificate Authentication
    Digest Authentication
    Perimeter Authentication
     How is Perimeter Authentication Accomplished?
     How Does WebLogic Server Support Perimeter Authentication?
  
  
   
   
  
   
   
   
   
   
  
   
   
   
   
  
   
   
   
   
   
   
   
   
   
  
   
   
  
   
    The Java Secure Socket Extension (JSSE)
    Java Authentication and Authorization Services (JAAS)
    The Java Security Manager
    Java Cryptography Architecture and Java Cryptography Extensions (JCE)
    Java Authorization Contract for Containers (JACC)
   
 
  
  
  
  
  
  
   
    What Is a Security Provider Database?
    Security Realms and Security Provider Databases
    Embedded LDAP Server
   
    Authentication Providers
    Identity Assertion Providers
    Principal Validation Providers
    Authorization Providers
    Adjudication Providers
    Role Mapping Providers
    Auditing Providers
    Credential Mapping Providers
    Certificate Lookup and Validation Providers
    Keystore Providers
    Realm Adapter Providers
    Security Provider Summary
   
 
  
   
   
   
   
   
   
   
   
   
  
   
    POST Profile
    Artifact Profile
   
    POST Profile
    Artifact Profile