Skip navigation.

Securing WebLogic Server

  Previous Next vertical dots separating previous/next from contents/index/pdf Contents Index View as PDF   Get Adobe Reader

Introduction and Roadmap

The following sections describe the contents and organization of this guide, Securing WebLogic Server, as well as new and changed security features in this release.

 


Document Scope

This document explains how to configure WebLogic Server® security, including settings for security realms, providers, identity and trust, SSL, and Compatibility security. See Related Information for a description of other WebLogic security documentation.

 


Document Audience

This document is intended for the following audiences:

 


Guide to This Document

This document is organized as follows:

 


Related Information

The following BEA WebLogic Server documents contain information that is relevant to the WebLogic Security Service:

 


Security Samples and Tutorials

In addition to the documents listed in Related Information, BEA Systems provides a variety of code samples for developers, some packaged with WebLogic Server and others available at http://dev2dev.bea.com .

Security Examples in the WebLogic Server Distribution

WebLogic Server optionally installs API code examples in WL_HOME\samples\server\examples\src\examples\security, where WL_HOME is the top-level directory of your WebLogic Server installation. You can start the examples server, and obtain information about the samples and how to run them from the WebLogic Server Start menu.

The following examples illustrate WebLogic security features:

Additional Examples Available for Download

Additional API examples are available for download at http://dev2dev.bea.com . These examples are distributed as .zip files that you can unzip into an existing WebLogic Server samples directory structure.

You build and run the downloadable examples in the same manner as you would an installed WebLogic Server example. See the download pages of individual examples for more information.

 


New and Changed Security Features in This Release

WebLogic Server 9.1 introduces several important changes to WebLogic Server security:

New XACML Security Providers

WebLogic Server includes two new security providers, the XACML Authorization provider and the XACML Role Mapping provider. Previous releases of WebLogic Server used an authorization provider and a role mapping provider based on a proprietary security policy language. These new XACML security providers support the eXtensible Access Control Markup Language (XACML) 2.0 standard from OASIS. These providers can import, export, persist and execute policy expressed using all standard XACML 2.0 functions, attributes, and schema elements.

WebLogic domains created using WebLogic Server 9.1 include the new XACML providers by default. The new XACML providers are fully compatible with policies and roles created using the WebLogic Authorization provider (DefaultAuthorizer) and WebLogic Role Mapping provider (DefaultRoleMapper). Existing WebLogic domains that you upgrade to WebLogic Server 9.1 will continue to use the authorization and role mapping providers currently specified, such as third-party partner providers or the original WLS Authorization and Role Mapping providers. If you wish, you can migrate existing domains from using WLS proprietary providers to the XACML providers. As part of this migration, you can perform bulk imports of existing policies.

For more information, see Configure Authorization providers and Configure Role Mapping providers in the Administration Console online help.

SAML Configuration

Configuration of SAML assertion generation and consumption has changed. WebLogic Server 9.1 includes two new versions of SAML security providers, the SAML Credential Mapping Provider V2 and the SAML Identity Assertion Provider V2. Whereas in WebLogic Server 9.0, configuration of a SAML source site was centralized in the SAML Credential Mapper and configuration of a SAML destination site was centralized in the SAML Identity Asserter, in WebLogic 9.1, SAML source and destination site configuration occurs in the FederationServicesMBean. The new SAML security providers offer enhanced configuration of SAML Asserting Parties and Relying Parties.

The SAML Credential Mapping Provider V1 and SAML Identity Assertion Provider V1 are deprecated; you should use the V2 versions of the SAML Credential Mapping and SAML Identity Assertion providers. Although the version number of the providers has been incremented to V2, the new SAML security providers implement the SAML 1.1 standard, as did the V1 providers.

For more information, see Enhanced SAML Features in What's New in WebLogic Server 9.1 in WebLogic Server Release Notes, as well as Configuring Single Sign-On with Web Browsers and HTTP Clients.

Note: If you are not familiar with the new features provided in version 9.0 of WebLogic Server, see the What's New in WebLogic Server 9.0 section of the WebLogic Server Release Notes.

 

Skip navigation bar  Back to Top Previous Next