Skip Headers
Oracle® Containers for J2EE Security Guide
10
g
(10.1.3.5.0)
Part Number E13977-01
Home
Book List
Contents
Index
Contact Us
Previous
Next
View PDF
List of Figures
1-1 Access Control Approach Versus Capability Approach
1-2 Role-Based Access Control
2-1 Protection Domains
2-2 Login Modules
2-3 Code Stack for doAs() and doAsPrivileged() Methods
3-1 OC4J Security Architecture
7-1 Operation: Invoke
7-2 Search and Select: MBean
8-1 Oracle Single Sign-On and J2EE Environments
8-2 Global JAZNContext Subtree
8-3 Identity Management Realm JAZNContext Subtree
8-4 Simplified Directory Information Tree for the Identity Management Realm
11-1 Oracle Access Manager Architecture
12-1 User and Role API Framework Model
13-1 Identity Management Framework Data Flow
14-1 Java SSO Internal Logic Flow
14-2 Java SSO Runtime Operations
15-1 Oracle Component Integration in SSL-Enabled J2EE Environments
18-1 End-to-End Security Role Configuration
18-2 Security Role References
18-3 Subject Propagation
20-1 Flow Chart of Choices for OC4J Container-Managed Sign-On
20-2 Component-Managed Sign-On
20-3 Container-Managed Sign-On
21-1 Conceptual View and Flow of WNA
C-1 Admintool Shell Directory Structure
C-2 Sample Shell Directory Structure