4 Developing a WebLogic Full Client

The following sections provide information about developing WebLogic full clients:

Understanding the WebLogic Full Client

For WebLogic Server 10.0 and later releases, client applications need to use the wlfullclient.jar file instead of the weblogic.jar. A WebLogic full client is a Java RMI client that uses Oracle's proprietary T3 protocol to communicate with WebLogic Server, thereby leveraging the Java-to-Java model of distributed computing. For more information about WebLogic T3 communication, see "Using WebLogic RMI with T3 Protocol" in Programming RMI for Oracle WebLogic Server.


Although the WebLogic full client requires the largest JAR file among the various clients, it has the most features and is faster and more scalable than IIOP clients. The same JAR that provides the T3 protocol support also provides IIOP support.

A WebLogic full client:

  • Requires the wlfullclient.jar in your classpath.

  • Uses an URL in the form of t3://ip address:port for the initial context.

  • Is faster and more scalable than IIOP clients.

  • Supports most WebLogic Server-specific features.

  • Supports WebLogic Server clustering.

  • Supports most JavaEE features.

  • Supports WebLogic JMS, JMS SAF clients, and JMS C clients.


Not all functionality available with weblogic.jar is available with the wlfullclient.jar. For example, wlfullclient.jar does not support Web services, which require the wseeclient.jar. Nor does wlfullclient.jar support operations necessary for development purposes, such as ejbc, or support administrative operations, such as deployment, which still require using the weblogic.jar.

Developing a WebLogic Full Client

Creating a basic WebLogic full client consists of the following steps:

  1. Generate the wlfullclient.jar file for client applications using the JarBuilder tool. See Appendix B, "Using the WebLogic JarBuilder Tool."

  2. Obtain a reference to the remote object.

    1. Get the initial context of the server that hosts the service using a T3 URL.

    2. Obtain an instance of the service object by performing a lookup using the initial context. This instance can then be used just like a local object reference.

  3. Call the remote objects methods.

Sample code to for a simple WebLogic full client is provided in Example 4-1.

Example 4-1 Simple WebLogic Full hello Client

package examples.rmi.hello;

import java.io.PrintStream;
import weblogic.utils.Debug;
import javax.naming.*;
import java.util.Hashtable;

* This client uses the remote HelloServer methods.
* @author Copyright (c) Oracle. All Rights Reserved.
public class HelloClient {

private final static boolean debug = true;

* Defines the JNDI context factory.
public final static String JNDI_FACTORY="weblogic.jndi.WLInitialContextFactory";

int port;
String host;

   private static void usage() {
   System.err.println("Usage: java examples.rmi.hello.HelloClient " +
      "<hostname> <port number>");

   public HelloClient() {}
   public static void main(String[] argv) throws Exception {
      if (argv.length < 2) {
   String host = argv[0];
   int port = 0;
   try {
      port = Integer.parseInt(argv[1]);
   catch (NumberFormatException nfe) {
   try {

    InitialContext ic = getInitialContext("t3://" + host + ":" + port);

      Hello obj = 
        (Hello) ic.lookup("HelloServer");
      System.out.println("Successfully connected to HelloServer on " +
        host + " at port " +
        port + ": " + obj.sayHello() );
   catch (Throwable t) {


   private static InitialContext getInitialContext(String url)
     throws NamingException
   Hashtable env = new Hashtable();
   env.put(Context.PROVIDER_URL, url);
   return new InitialContext(env);

Distributing the WebLogic Full Client

When you distribute the WebLogic full client for a JDK 1.6 client application, you must also distribute the RSA Crypto-J library, which is used for SSL cryptographic functions. The Crypto-J library is located in WL_HOME/server/lib/cryptoj.jar and is referenced in the Class-Path header field of the wlfullclient.jar manifest.

Due to the requirements of the self-integrity check that is automatically performed when the RSA Crypto-J library is loaded (see Running the WebLogic Full Client in a Non-Forked VM), cryptoj.jar cannot be included in the wlfullclient.jar file that you generate. Therefore, when distributing the WebLogic full client, you must provide the two JAR files separately. Note that this is a change from previous releases of WebLogic Server.

On the machine to which the WebLogic full client has been distributed, cryptoj.jar must be placed in the same directory as wlfullclient.jar.

For more information about generating the WebLogic full client, see Appendix B, "Using the WebLogic JarBuilder Tool."

Communicating with a Server in Admin Mode

To communicate with a server instance that is in admin mode, you must configure a communication channel by setting the following flag on your client:


Running the WebLogic Full Client in a Non-Forked VM

If the WebLogic Full Client is running in a non-forked VM, for example by means of a <java> task invoked from an Ant script without the fork=true attribute, the following error might be generated:

java.lang.SecurityException: The provider self-integrity check failed.

This error is caused by the self-integrity check that is automatically performed when the RSA Crypto-J library is loaded. (The Crypto-J library, cryptoj.jar, is referenced in the wlfullclient.jar manifest classpath.)

This self-integrity check failure occurs when the client is started in a non-forked VM and it uses the Crypto-J API, either directly or indirectly, as in the following situations:

  • The client invokes the Crypto-J library directly.

  • The client attempts to make a T3S connection, which triggers the underlying client SSL implementation to invoke the Crypto-J API.

When the self-integrity check fails, further invocations of the Crypto-J API fail. To prevent this error from occurring, always set the fork attribute to true when running the full client in a <java> task that is invoked from an Ant script.

For more information about the self-integrity check, see "How a Provider Can Do Self-Integrity Checking" in How to Implement a Provider in the Java™ Cryptography Architecture, available at the following URL: