|
Programming WebLogic Security
Contents
1. Introduction to WebLogic Security
WebLogic Security Architecture
Connections with Servlets, JSPs, EJBs, RMI Objects and Java Applications
Connections with Administration Servers
Using WebLogic Server as a Client to WebLogic Enterprise
Supported Public Key Algorithms
Supported Symmetric Key Algorithms
Supported Message Digest Algorithms
3. Securing a WebLogic Server Deployment
Why is Security Important for WebLogic Server?
Determine the Security Needs of Your WebLogic Server Deployment
Secure the Machine on Which WebLogic Server Runs
Design Network Connections Carefully
Manage the WebLogic Server Development and Deployment Environments
Prevent Denial of Service Attacks
Use Protected EJBs to Limit Access to Business Logic
Use the Appropriate Security Realm
4. Programming with the WebLogic Security SPI
Mapping a Digital Certificate to a WebLogic Server User
Using Mutual Authentication with Other WebLogic Servers
Using Mutual Authentication with Applets
Using Mutual Authentication with Servlets
Writing a Custom Security Realm
Define Enumeration Classes for Users and Groups
Define a Class for the Custom Security Realm
Using Authorization in a Custom Security Realm
|
Copyright © 2000 BEA Systems, Inc. All rights reserved.
|