Securing WebLogic
Resources Using Roles
and Policies
Introduction and Roadmap
The WebLogic Security Service combines several layers of security features to prevent unauthorized access to your WebLogic Server® domains. This document describes using roles and policies to determine who can access resources in a domain. The roles and policies feature fulfills the same function as the familiar Access Control List (ACL), but offers an improvement over ACLs: an ACL is static while roles and policies specify conditions under which users can access resources, and these conditions are evaluated at runtime.
The following sections describe the content and organization of this document:
This document contains information that is useful for security architects and security administrators who are designing a security strategy for resources within a WebLogic Server domain. It includes information about resource types, options for securing Web applications and EJBs, different types of security roles and policies, and the components of a role and policy.
It is assumed that the reader is familiar with Java EE security and the other features of the WebLogic Security Service.
The information in this document is relevant during the design and development phases of a software project. This document does not address production phase administration topics. For links to WebLogic Server documentation and resources related to these topics, see Related Information.
Users, Groups, And Security Roles, describes users and groups who access WebLogic resources, including WebLogic Server default groups. Also describes scoped security roles and global security roles, including WebLogic Server default global roles. A final section describes the components of a security role.
Security Policies, describes security policies, including WebLogic Server default security policies. Also describes the components of a security policy.
Related Information
Other WebLogic Server documents that may be of interest to security administrators wanting to secure WebLogic resources are:
Understanding WebLogic Security—Summarizes the features of the WebLogic Security Service, including an overview of its architecture and capabilities. It is the starting point for understanding WebLogic security.
Securing WebLogic Server—Describes how to ensure that security is comprehensively configured for a WebLogic Server® installation, including information about security providers, identity and trust and SSL.
Secure WebLogic Resourcesin Administration Console Online Help—Provides step-by-step instructions for using the WebLogic Server Administration Console to complete the tasks that this document describes.
These documents provide additional information about specific resource types: