Before you begin
Understand the requirements for creating a new domain configured to use the RDBMS security store. See Managing the RDBMS Security Store.
For a list of the specific RDBMS systems supported in this release of WebLogic Server for use as an RDBMS security store, see Oracle Fusion Middleware Supported System Configurations.
WebLogic Server provides the option of using an external RDBMS as a datastore for the following security providers:
The RDBMS security store is required to use SAML 2.0 services in two or more WebLogic Server instances in a domain, such as in a cluster.
To have a new domain that uses the RDBMS security store, you must configure the RDBMS security store at the time you create the domain. The Configuration Wizard provides a convenient way to do this, as described in "Creating a WebLogic Domain" in Creating WebLogic Domains Using the Configuration Wizard. However, prior to booting the new domain, your database administrator needs to run a script provided in the WebLogic Server installation directory that creates the appropriate RDBMS tables in the datastore.
Once the RDBMS security store is configured and enabled in a domain, any of the security providers identified in this help topic that are created in the security realm will use the RDBMS security store only, and not the embedded LDAP server. WebLogic Server does not support the ability to override this behavior.
The complete procedure for creating a domain with the RDBMS security store is described in Managing the RDBMS Security Store. For convenience, this procedure is summarized on this page.
Note: If the new domain is not created and configured as described in Managing the RDBMS Security Store, the security providers identified in this help topic might not be able to access the policy data required to boot the domain.
In the Configuration Wizard, this option is available from the Customize Environment and Services Settings page. See "Creating a WebLogic Domain" in Creating WebLogic Domains Using the Configuration Wizard.
Typically this step is performed by the database administrator. See Managing the RDBMS Security Store for a description of the scripts, their locations in the product installation directory, and instructions for running them.
You now have a domain in which any of the security providers identified in this help topic that are created in the security realm will use the RDBMS security store. Note that configuring the RDBMS security store has no effect on any security provider not identified in this help topic.