Securing Oracle Coherence
Table of Contents
Show All | Collapse- Title and Copyright Information
- Preface
- What's New in This Guide
- 1 Introduction to Oracle Coherence Security
- 2 Enabling General Security Measures
- 3 Using an Access Controller
- 4 Securing Extend Client Connections
- 4.1 Using Identity Tokens to Restrict Client Connections
- 4.1.1 Overview of Using Identity Tokens
- 4.1.2 Creating a Custom Identity Transformer
- 4.1.3 Enabling a Custom Identity Transformer
- 4.1.4 Creating a Custom Identity Asserter
- 4.1.5 Enabling a Custom Identity Asserter
- 4.1.6 Using Custom Security Types
- 4.1.7 Understanding Custom Identity Token Interoperability
- 4.2 Associating Identities with Extend Services
- 4.3 Implementing Extend Client Authorization
- 4.1 Using Identity Tokens to Restrict Client Connections
- 5 Using SSL to Secure Communication
- 6 Securing Oracle Coherence in Oracle WebLogic Server
- 7 Securing Oracle Coherence REST