Skip navigation.

Administration Console Online Help

PreviousNextvertical dots separating previous/next from contents/index/pdfContents

Manage security providers

Before you begin

The WebLogic Security Service supports a wide variety of security architectures, including multiple possible security providers.

Before you configure security providers for your WebLogic security realm, you should have a good understanding of how the WebLogic Security Service works and what sort of security architecture you want for your WebLogic environment. See:


Your security architecture can include the default security providers included in WebLogic Server, security providers developed by third parties, or custom security providers you develop yourself. Types of security providers include:

The main steps for configuring and managing security providers are:

  1. Design your security architecture.
  2. Configure Authentication and Identity Assertion providers
  3. Configure Authorization providers
  4. Configure the WebLogic Adjudication provider
  5. Configure Role Mapping providers
  6. Configure Auditing Providers
  7. Configure Credential Mapping Providers
  8. Configure Certification Path Providers
  9. Configure a custom user name mapper
  10. Configure custom security providers
  11. Set the JAAS control flag
  12. Export data from a security provider
  13. Import data into a security provider

Related Tasks

 

Skip navigation bar   Back to Top