Securing Web Services and Managing Policies with Oracle Web Services Manager
Table of Contents
Show All | Collapse- Title and Copyright Information
- Preface
- What's New in This Guide
- Part I Introducing OWSM
- 1 Overview
- 2 Using OWSM with WebLogic Server
- 3 Determining Which Predefined Policies to Use
- 3.1 Security Policy Questionnaire
- 3.2 Summary of Predefined Security Policies
- 3.3 Which OWSM Policies Are Supported for Java EE Web Services?
- 3.4 Which OWSM Policies Are Supported for RESTful Web Services?
- 3.5 Which Policies Require You to Configure SSL?
- 3.6 Which OWSM Policies Are Supported for Identity Context?
- 3.7 Which Policies Support WS-SecureConversation?
- Part II Attaching and Managing Policies
- 4 Attaching Policies
- 4.1 Overview of Policy Attachment
- 4.2 Attaching Policies to Web Services and Clients at Design Time
- 4.3 Attaching Policies to Web Services and Clients Using Fusion Middleware Control
- 4.4 Attaching Policies to Web Services and Clients Using WLST
- 4.5 Attaching Policies to Servlet Applications
- 4.6 Specifying Run-time Constraints in Policy Sets
- 4.7 Defining the Type and Scope of Resources for Globally Attached Policies
- 4.8 Migrating Direct Policy Attachments to Global Policy Attachments
- 4.9 Disabling a Globally Attached Policy
- 4.10 Specifying the Priority of a Policy Attachment
- 4.11 Determining the Secure Status of an Endpoint
- 4.12 How the Effective Set of Policies is Calculated
- 5 Overriding Policy Configuration Properties
- 5.1 Overview of Policy Configuration Overrides
- 5.2 Scope of Predefined Configuration Properties
- 5.3 Overriding Client Policy Configuration Properties at Design Time
- 5.4 Overriding Policy Configuration Properties Using Fusion Middleware Control
- 5.4.1 Overriding Configuration Properties at the Domain Level (Defining the Default Value)
- 5.4.2 Overriding Configuration Properties for Directly Attached Service Policies Using Fusion Middleware Control
- 5.4.3 Overriding Configuration Properties at the Web Service Client Application Level Using Fusion Middleware Control
- 5.4.4 Overriding Configuration Properties for Globally Attached Policies Using Fusion Middleware Control
- 5.5 Overriding Policy Configuration Properties Using WLST
- 5.6 Configuring User-Defined Properties for Web Service and Client Policies Using Fusion Middleware Control
- 6 Managing Web Service Policies with Fusion Middleware Control
- 6.1 Overview of Web Services Policy Management
- 6.2 Managing Web Service Policies
- 6.2.1 Navigating to the WSM Policies Page
- 6.2.2 Searching for Policies in the WSM Policies Page
- 6.2.3 Viewing the Details of a Web Service Policy
- 6.2.4 Creating and Editing Web Service Policies
- 6.2.5 Generating Client Policies from a WSDL
- 6.2.6 Adding Assertions to a Policy
- 6.2.7 Adding an OR Group to a Policy
- 6.2.8 Importing Web Service Policies
- 6.2.9 Exporting Web Service Policies
- 6.2.10 Versioning Web Service Policies
- 6.2.11 Deleting a Web Service Policy
- 6.3 Validating Web Service Policies
- 6.4 Managing Policy Assertion Templates
- 6.4.1 Navigating to the Assertion Templates Page
- 6.4.2 Searching for an Assertion Template in the Assertion Templates Page
- 6.4.3 Viewing the Details of an Assertion Template
- 6.4.4 Naming Conventions for Assertion Templates
- 6.4.5 Cloning an Assertion Template
- 6.4.6 Editing an Assertion Template
- 6.4.7 Editing the Configuration Properties in an Assertion Template
- 6.4.8 Exporting an Assertion Template
- 6.4.9 Importing an Assertion Template
- 6.4.10 Deleting an Assertion Template
- 6.5 Enabling or Disabling Policies and Assertions
- 6.6 Analyzing Policy Usage
- 6.7 Advertising WS-Policy and WS-SecurityPolicy Versions
- 4 Attaching Policies
- Part III Securing Web Services
- 7 Configuring Message Protection
- 8 Configuring Transport-Level Security (SSL)
- 9 Configuring Authentication
- 9.1 Overview of Authentication Configuration
- 9.2 Configuring an Authentication Provider in WebLogic Server
- 9.3 Configuring Digest Authentication
- 9.4 Configuring SAML
- 9.4.1 How the SAML Token is Validated
- 9.4.2 How to Configure SAML Web Service Client at Design Time
- 9.4.3 Including User Attributes in the Assertion
- 9.4.4 Including User Roles in the Assertion
- 9.4.5 How to Configure Oracle Platform Security Services (OPSS) for SAML Policies
- 9.4.6 Adding an Additional SAML Assertion Issuer Name
- 9.4.7 Configuring SAML Web Service Clients for Identity Switching
- 9.4.8 Defining Trusted Issuers and Trusted Distinguished Names List for SAML Signing Certificates
- 9.4.9 Using Anonymous Users with SAML Policies
- 9.5 Propagating Identity Context with OWSM
- 9.6 Configuring Kerberos Tokens
- 9.6.1 Using MIT Kerberos
- 9.6.2 Using Microsoft Active Directory with Key Distribution Center
- 9.6.3 Setting the Service Principal Name In the Web Service Client
- 9.6.4 Configuring the Web Service to Use the Correct KDC
- 9.6.5 Using the Correct Keytab File in Enterprise Manager
- 9.6.6 Authenticating the User Corresponding to the Service Principal
- 9.6.7 Creating a Ticket Cache for the Web Service Client
- 9.6.8 Configuring Kerberos Over SSL
- 9.6.9 Configuring Kerberos With SPNEGO Negotiation
- 9.6.10 Configuring Credential Delegation
- 9.7 Configuring WS-Trust
- 9.7.1 Overview of Web Services WS-Trust
- 9.7.2 Supported STS Servers
- 9.7.3 Token Lifetime and Token Caching
- 9.7.4 Setting Up Automatic Policy Configuration for STS
- 9.7.5 Configuring Web Services Federation
- 9.7.6 SAML Holder of Key and SAML Bearer as Issued Tokens
- 9.7.7 SAML Sender Vouches as Issued Tokens
- 9.7.8 On Behalf Of Use Cases
- 9.7.9 Programmatically Overriding Policy Configuration for WS-Trust Client Policies
- 10 Configuring Authorization
- 11 Configuring Secure Conversation
- 12 Integrating Hardware with Oracle Web Services Manager
- 12.1 Using Hardware Security Modules With OWSM
- 12.2 Configuring OWSM for Oracle SPARC T5 and SPARC T4 Cryptographic Acceleration
- 12.2.1 Terms You Need to Understand
- 12.2.2 Overview of Oracle SPARC T5 and SPARC T4 Hardware Assisted Cryptographic Acceleration
- 12.2.3 Configuring Transport-Level Security for Cryptographic Acceleration
- 12.2.4 Configuring Message-level Security for Cryptographic Acceleration
- 12.2.5 Additional Reading
- 13 SAML Message Protection Use Case
- 14 WS-Trust Use Cases
- Part IV Managing and Troubleshooting OWSM
- 15 Managing OWSM Domain Configuration
- 15.1 Understanding OWSM Domain Configuration
- 15.2 Navigating to the WSM Domain Configuration Page
- 15.3 Viewing General OWSM Domain Configuration Using Fusion Middleware Control
- 15.4 Configuring Domain-Level Authentication Using Fusion Middleware Control
- 15.4.1 Configuring SAML Trusted Issuers and DN Lists Using Fusion Middleware Control
- 15.4.2 Configuring Token Attribute Rules for Trusted Issuers Using Fusion Middleware Control
- 15.4.3 Configuring the Lifetime for the Issued Token Using Fusion Middleware Control
- 15.4.4 Configuring the SAML and SAML2 Login Modules Using Fusion Middleware Control
- 15.4.5 Configuring the Kerberos Login Module
- 15.4.6 Configuring Subject Properties Using Fusion Middleware Control
- 15.4.7 Configuring the X509 Login Module Using Fusion Middleware Control
- 15.4.8 Creating Custom Login Modules
- 15.5 Configuring Domain-Level Message Security Using Fusion Middleware Control
- 15.5.1 Configuring the OWSM Keystore Using Fusion Middleware Control
- 15.5.2 Configuring Security Policy Enforcement Using Fusion Middleware Control
- 15.5.3 Configuring Identity Extension Properties Using Fusion Middleware Control
- 15.5.4 Configuring Secure Conversation for the Domain Using Fusion Middleware Control
- 15.6 Configuring OWSM Policy Access Using Fusion Middleware Control
- 15.7 Managing OWSM Domain Configuration Using WLST
- 15.8 Configuring Domain-Level Authentication Using WLST
- 15.8.1 Configuring SAML Trusted Issuers, DN Lists, and Token Attribute Rules Using WLST
- 15.8.2 Deleting a Token Issuer Trust Document Using WLST
- 15.8.3 Configuring the Lifetime for the Issued Token Using WLST
- 15.8.4 Configuring Subject Properties Using WLST
- 15.8.5 Configuring the SAML and SAML2 Login Modules Using WLST
- 15.8.6 Configuring the Kerberos Login Module Using WLST
- 15.8.7 Configuring the X509 Login Module Using WLST
- 15.8.8 Configuring Custom Login Modules Using WLST
- 15.9 Configuring Domain-Level Message Security Using WLST
- 15.10 Configuring Policy Access Using WLST
- 15.11 Configuring the Connection to a Remote Policy Manager
- 16 Managing the OWSM Repository
- 16.1 About the OWSM Repository
- 16.2 Registering an OWSM Repository
- 16.3 Understanding the Different Mechanisms for Importing and Exporting Policies
- 16.4 Importing and Exporting Documents in the Repository
- 16.5 Exporting Policies from the OWSM Repository for Use in JDeveloper
- 16.6 Patching Policies in the Repository
- 16.7 Backing Up and Restoring the OWSM Repository
- 16.8 Upgrading the Repository to 12c
- 16.9 Rebuilding the OWSM Repository
- 17 Diagnosing Problems with OWSM
- 17.1 Diagnosing Problems with OWSM Policy Manager
- 17.2 Diagnosing Common Problems with OWSM
- 17.2.1 Unable to Connect to the Policy Manager
- 17.2.2 Key or Credential Store Error After an Application Invokes Web Service
- 17.2.3 Trust Certificate Error After Application Invokes Web Service
- 17.2.4 SAML Assertion Error Appears During Identity Propagation
- 17.2.5 Policy Access Error After an Application Invokes Web Service
- 17.2.6 Unable to Access User in Credential Store
- 17.2.7 Authorization Error After an Application Invokes Web Service
- 17.2.8 Timestamp Error After an Application Invokes Web Service
- 17.2.9 Multiple Authentication Security Policy Error After an Application Invokes a Web Service
- 17.3 Diagnosing Policy Attachment Issues Using WLST
- 17.4 Diagnosing Problems With a Domain Configuration using WLST
- 15 Managing OWSM Domain Configuration
- Part V Predefined Policies and Assertions
- 18 Predefined Policies
- 18.1 Addressing Policies
- 18.2 Atomic Transaction Policies
- 18.3 Configuration Policies
- 18.3.1 oracle/async_web_service_policy
- 18.3.2 oracle/cache_binary_content_policy
- 18.3.3 oracle/fast_infoset_client_policy
- 18.3.4 oracle/fast_infoset_service_policy
- 18.3.5 oracle/max_request_size_policy
- 18.3.6 oracle/mex_request_processing_service_policy
- 18.3.7 oracle/mtom_encode_fault_service_policy
- 18.3.8 oracle/no_async_web_service_policy
- 18.3.9 oracle/no_cache_binary_content_policy
- 18.3.10 oracle/no_fast_infoset_client_policy
- 18.3.11 oracle/no_fast_infoset_service_policy
- 18.3.12 oracle/no_max_request_size_policy
- 18.3.13 oracle/no_mex_request_processing_service_policy
- 18.3.14 oracle/no_mtom_encode_fault_service_policy
- 18.3.15 oracle/no_persistence_policy
- 18.3.16 oracle/no_pox_http_binding_service_policy
- 18.3.17 oracle/no_request_processing_service_policy
- 18.3.18 oracle/no_schema_validation_policy
- 18.3.19 oracle/no_soap_request_processing_service_policy
- 18.3.20 oracle/no_test_page_processing_service_policy
- 18.3.21 oracle/no_ws_logging_level_policy
- 18.3.22 oracle/no_wsdl_request_processing_service_policy
- 18.3.23 oracle/persistence_policy
- 18.3.24 oracle/pox_http_binding_service_policy
- 18.3.25 oracle/request_processing_service_policy
- 18.3.26 oracle/schema_validation_policy
- 18.3.27 oracle/soap_request_processing_service_policy
- 18.3.28 oracle/test_page_processing_policy
- 18.3.29 oracle/ws_logging_level_policy
- 18.3.30 oracle/wsdl_request_processing_service_policy
- 18.4 Management Policies
- 18.5 MTOM Policies
- 18.6 Reliable Messaging Policies
- 18.7 Security Policies—Authentication Only
- 18.7.1 oracle/http_basic_auth_over_ssl_client_policy
- 18.7.2 oracle/http_basic_auth_over_ssl_service_policy
- 18.7.3 oracle/http_oam_token_service_policy
- 18.7.4 oracle/http_saml20_token_bearer_client_policy
- 18.7.5 oracle/http_saml20_token_bearer_service_policy
- 18.7.6 oracle/http_saml20_token_bearer_over_ssl_client_policy
- 18.7.7 oracle/http_saml20_bearer_token_over_ssl_service_policy
- 18.7.8 oracle/multi_token_rest_service_policy
- 18.7.9 oracle/multi_token_over_ssl_rest_service_policy
- 18.7.10 oracle/no_authentication_client_policy
- 18.7.11 oracle/no_authentication_service_policy
- 18.7.12 oracle/wss_http_token_client_policy
- 18.7.13 oracle/wss_http_token_service_policy
- 18.7.14 oracle/wss_username_token_client_policy
- 18.7.15 oracle/wss_username_token_service_policy
- 18.7.16 oracle/wss10_saml_token_client_policy
- 18.7.17 oracle/wss10_saml_token_service_policy
- 18.7.18 oracle/wss10_saml20_token_client_policy
- 18.7.19 oracle/wss10_saml20_token_service_policy
- 18.7.20 oracle/wss11_kerberos_token_client_policy
- 18.7.21 oracle/wss11_kerberos_token_service_policy
- 18.8 Security Policies—Authorization Only
- 18.8.1 oracle/binding_authorization_denyall_policy
- 18.8.2 oracle/binding_authorization_permitall_policy
- 18.8.3 oracle/binding_permission_authorization_policy
- 18.8.4 oracle/component_authorization_denyall_policy
- 18.8.5 oracle/component_authorization_permitall_policy
- 18.8.6 oracle/component_permission_authorization_policy
- 18.8.7 oracle/no_authorization_component_policy
- 18.8.8 oracle/no_authorization_service_policy
- 18.8.9 oracle/whitelist_authorization_policy
- 18.9 Security Policies—Message Protection Only
- 18.9.1 oracle/no_messageprotection_client_policy
- 18.9.2 oracle/no_messageprotection_service_policy
- 18.9.3 oracle/wss10_message_protection_client_policy
- 18.9.4 oracle/wss10_message_protection_service_policy
- 18.9.5 oracle/wss11_message_protection_client_policy
- 18.9.6 oracle/wss11_message_protection_service_policy
- 18.10 Security Policies—Messages Protection and Authentication
- 18.10.1 oracle/pii_security_policy
- 18.10.2 oracle/sts_trust_config_client_policy
- 18.10.3 oracle/sts_trust_config_service_policy
- 18.10.4 oracle/wss_saml_bearer_or_username_token_service_policy
- 18.10.5 oracle/wss_saml_or_username_token_service_policy
- 18.10.6 oracle/wss_saml_or_username_token_over_ssl_service_policy
- 18.10.7 oracle/wss_saml_token_bearer_client_policy
- 18.10.8 oracle/wss_saml_token_bearer_over_ssl_client_policy
- 18.10.9 oracle/wss_saml_token_bearer_over_ssl_service_policy
- 18.10.10 oracle/wss_http_token_over_ssl_client_policy
- 18.10.11 oracle/wss_http_token_over_ssl_service_policy
- 18.10.12 oracle/wss_saml_token_over_ssl_client_policy
- 18.10.13 oracle/wss_saml_token_over_ssl_service_policy
- 18.10.14 oracle/wss_saml20_token_bearer_over_ssl_client_policy
- 18.10.15 oracle/wss_saml20_token_bearer_over_ssl_service_policy
- 18.10.16 oracle/wss_saml20_token_over_ssl_client_policy
- 18.10.17 oracle/wss_saml20_token_over_ssl_service_policy
- 18.10.18 oracle/wss_sts_issued_saml_bearer_token_over_ssl_client_policy
- 18.10.19 oracle/wss_sts_issued_saml_bearer_token_over_ssl_service_policy
- 18.10.20 oracle/wss_username_token_over_ssl_client_policy
- 18.10.21 oracle/wss_username_token_over_ssl_service_policy
- 18.10.22 oracle/wss_username_token_over_ssl_wssc_client_policy
- 18.10.23 oracle/wss_username_token_over_ssl_wssc_service_policy
- 18.10.24 oracle/wss10_saml_hok_token_with_message_protection_client_policy
- 18.10.25 oracle/wss10_saml_hok_token_with_message_protection_service_policy
- 18.10.26 oracle/wss10_saml_token_with_message_integrity_client_policy
- 18.10.27 oracle/wss10_saml_token_with_message_integrity_service_policy
- 18.10.28 oracle/wss10_saml_token_with_message_protection_client_policy
- 18.10.29 oracle/wss10_saml_token_with_message_protection_service_policy
- 18.10.30 oracle/wss10_saml_token_with_message_protection_ski_basic256_client_policy
- 18.10.31 oracle/wss10_saml_token_with_message_protection_ski_basic256_service_policy
- 18.10.32 oracle/wss10_saml20_token_with_message_protection_client_policy
- 18.10.33 oracle/wss10_saml20_token_with_message_protection_service_policy
- 18.10.34 oracle/wss10_username_id_propagation_with_msg_protection_client_policy
- 18.10.35 oracle/wss10_username_id_propagation_with_msg_protection_service_policy
- 18.10.36 oracle/wss10_username_token_with_message_protection_client_policy
- 18.10.37 oracle/wss10_username_token_with_message_protection_service_policy
- 18.10.38 oracle/wss10_username_token_with_message_protection_ski_basic256_client_policy
- 18.10.39 oracle/wss10_username_token_with_message_protection_ski_basic256_service_policy
- 18.10.40 oracle/wss10_x509_token_with_message_protection_client_policy
- 18.10.41 oracle/wss10_x509_token_with_message_protection_service_policy
- 18.10.42 oracle/wss11_kerberos_token_with_message_protection_client_policy
- 18.10.43 oracle/wss11_kerberos_token_with_message_protection_service_policy
- 18.10.44 oracle/wss11_kerberos_token_with_message_protection_basic128_client_policy
- 18.10.45 oracle/wss11_kerberos_token_with_message_protection_basic128_service_policy
- 18.10.46 oracle/wss11_saml_or_username_token_with_message_protection_service_policy
- 18.10.47 oracle/wss11_saml_token_identity_switch_with_message_protection_client_policy
- 18.10.48 oracle/wss11_saml_token_with_message_protection_client_policy
- 18.10.49 oracle/wss11_saml_token_with_message_protection_service_policy
- 18.10.50 oracle/wss11_saml_token_with_message_protection_wssc_client_policy
- 18.10.51 oracle/wss11_saml_token_with_message_protection_wssc_service_policy
- 18.10.52 oracle/wss11_saml_token_with_message_protection_wssc_reauthn_client_policy
- 18.10.53 oracle/wss11_saml_token_with_message_protection_wssc_reauthn_service_policy
- 18.10.54 oracle/wss11_saml20_token_with_message_protection_client_policy
- 18.10.55 oracle/wss11_saml20_token_with_message_protection_service_policy
- 18.10.56 oracle/wss11_sts_issued_saml_hok_with_message_protection_client_policy
- 18.10.57 oracle/wss11_sts_issued_saml_hok_with_message_protection_service_policy
- 18.10.58 oracle/wss11_sts_issued_saml_hok_with_message_protection_client_policy
- 18.10.59 oracle/wss11_sts_issued_saml_hok_with_message_protection_service_policy
- 18.10.60 oracle/wss11_sts_issued_saml_with_message_protection_client_policy
- 18.10.61 oracle/wss11_username_token_with_message_protection_client_policy
- 18.10.62 oracle/wss11_username_token_with_message_protection_service_policy
- 18.10.63 oracle/wss11_username_token_with_message_protection_wssc_client_policy
- 18.10.64 oracle/wss11_username_token_with_message_protection_wssc_service_policy
- 18.10.65 oracle/wss11_x509_token_with_message_protection_client_policy
- 18.10.66 oracle/wss11_x509_token_with_message_protection_service_policy
- 18.10.67 oracle/wss11_x509_token_with_message_protection_wssc_client_policy
- 18.10.68 oracle/wss11_x509_token_with_message_protection_wssc_service_policy
- 18.11 Security Policies—OES
- 18.12 SOAP Over JMS Transport Policies
- 19 Predefined Assertion Templates
- 19.1 Security Assertion Templates
- 19.1.1 Authentication Only Assertion Templates
- 19.1.2 Message-Protection Only Assertion Templates
- 19.1.3 Message Protection and Authentication Assertion Templates
- 19.1.4 Oracle Entitlements Server (OES) Integration Templates
- 19.1.5 PII Assertion Templates
- 19.1.6 WS-Trust Assertion Templates
- 19.1.7 Authorization Assertion Templates
- 19.1.8 Supported Algorithm Suites
- 19.1.9 Message Signing and Encryption Settings for Request, Response, and Fault Messages
- 19.2 Management Assertion Templates
- 19.3 Assertion Template Settings Reference
- 19.3.1 Action Match
- 19.3.2 Algorithm Suite
- 19.3.3 Authentication Header—Header Name
- 19.3.4 Authentication Header—Mechanism
- 19.3.5 Body Elements
- 19.3.6 Bootstrap Message Security
- 19.3.7 Client Entropy
- 19.3.8 Client Policy URI
- 19.3.9 Confirm Signature
- 19.3.10 Confirmation Type
- 19.3.11 Constraint Match
- 19.3.12 Creation Time Required
- 19.3.13 Derived Keys
- 19.3.14 Enabled
- 19.3.15 Encrypt Signature
- 19.3.16 Encryption Key Reference Mechanism
- 19.3.17 Fault Message Settings
- 19.3.18 Header Elements
- 19.3.19 Include Entire Body
- 19.3.20 Include MIME Headers
- 19.3.21 Include SwA Attachment
- 19.3.22 Include Timestamp
- 19.3.23 Is Encrypted
- 19.3.24 Is Signed
- 19.3.25 Kerberos Token Type
- 19.3.26 Key Type
- 19.3.27 Keystore Recipient Alias
- 19.3.28 Mutual Authentication Required
- 19.3.29 Name Identifier Format
- 19.3.30 Nonce Required
- 19.3.31 Password Type
- 19.3.32 Permissions
- 19.3.33 Permission Class
- 19.3.34 Port Endpoint
- 19.3.35 Port URI
- 19.3.36 Re-authenticate
- 19.3.37 Recipient Encryption Key Reference Mechanism
- 19.3.38 Recipient Sign Key Reference Mechanism
- 19.3.39 Request
- 19.3.40 Request Message Settings
- 19.3.41 Request XPaths
- 19.3.42 Request Namespaces
- 19.3.43 Require Applies To
- 19.3.44 Require Client Entropy
- 19.3.45 Require External Reference
- 19.3.46 Require Internal Reference
- 19.3.47 Require Server Entropy
- 19.3.48 Resource Match
- 19.3.49 Response
- 19.3.50 Response Message Settings
- 19.3.51 Response Namespaces
- 19.3.52 Response XPaths
- 19.3.53 Roles
- 19.3.54 Server Entropy
- 19.3.55 Sign Key Reference Mechanism
- 19.3.56 Sign Then Encrypt
- 19.3.57 Token Type
- 19.3.58 Transport Layer Security
- 19.3.59 Transport Layer Security—Include Timestamp
- 19.3.60 Transport Layer Security—Mutual Authentication Required
- 19.3.61 Version
- 19.3.62 Trust Version
- 19.3.63 Use Derived Keys
- 19.3.64 Use PKI Path
- 19.3.65 WSDL Exists
- 19.4 Assertion Template Configuration Properties Reference
- 19.4.1 algorithm
- 19.4.2 application.name
- 19.4.3 attesting.mapping.attribute
- 19.4.4 caller.principal.name
- 19.4.5 credential.delegation
- 19.4.6 csf-key
- 19.4.7 encryption-algorithm
- 19.4.8 execute.action
- 19.4.9 ignore.timestamp.in.response
- 19.4.10 issued.token.caching
- 19.4.11 issued.token.lifetime
- 19.4.12 iteration
- 19.4.13 keysize
- 19.4.14 keytab.location
- 19.4.15 keystore.enc.csf.key
- 19.4.16 keystore.recipient.alias
- 19.4.17 keystore.sig.csf.key
- 19.4.18 lookup.action
- 19.4.19 on.behalf.of
- 19.4.20 propagate.identity.context
- 19.4.21 realm
- 19.4.22 reference.priority
- 19.4.23 resource.mapping.model
- 19.4.24 resource.name
- 19.4.25 resource.type
- 19.4.26 rm.encrypt.body
- 19.4.27 role
- 19.4.28 salt
- 19.4.29 saml.assertion.filename
- 19.4.30 saml.audience.uri
- 19.4.31 saml.envelope.signature.required
- 19.4.32 saml.issuer.name
- 19.4.33 saml.trusted.issuers
- 19.4.34 sc.token.lifetime
- 19.4.35 service.principal.name
- 19.4.36 subject.precedence
- 19.4.37 sts.auth.caller.principal.name
- 19.4.38 sts.auth.keytab.location
- 19.4.39 sts.auth.on.behalf.of.csf.key
- 19.4.40 sts.auth.on.behalf.of.username.only
- 19.4.41 sts.auth.service.principal.name
- 19.4.42 sts.auth.user.csf.key
- 19.4.43 sts.auth.x509.csf.key
- 19.4.44 sts.in.order
- 19.4.45 sts.keystore.recipient.alias
- 19.4.46 use.single.step
- 19.4.47 user.attributes
- 19.4.48 user.roles.include
- 19.4.49 user.tenant.name
- 19.1 Security Assertion Templates
- A Security and Policy Annotation Reference
- A.1 @Addressing
- A.2 @AtomicTransaction
- A.3 @CacheBinaryContent
- A.4 @CallbackManagementPolicy
- A.5 @CallbackMtomPolicy
- A.6 @CallbackPolicySet
- A.7 @CallbackSecurityPolicy
- A.8 @FastInfosetCallbackClient
- A.9 @FastInfosetService
- A.10 @JMSTransportClient
- A.11 @JMSTransportService
- A.12 @ManagementPolicy
- A.13 @MaxRequestSize
- A.14 @MEXRequestProcessingService
- A.15 @MTOM
- A.16 @MTOMEncodeFaultService
- A.17 @MtomPolicy
- A.18 @Persistence
- A.19 @PolicyReference
- A.20 @PolicySet
- A.21 @POXHttpBindingService
- A.22 @Property
- A.23 @ReliabilityPolicy
- A.24 @ReliableMessaging
- A.25 @RequestProcessingService
- A.26 @SchemaValidation
- A.27 @SecurityPolicies (Oracle Infrastructure Web Services)
- A.28 @SecurityPolicies (Java EE Web Services)
- A.29 @SecurityPolicy (Oracle Infrastructure Web Services)
- A.30 @SecurityPolicy (Java EE Web Services)
- A.31 @SOAPRequestProcessingService
- A.32 @TestPageProcessingService
- A.33 @WSDLRequestProcessingService
- A.34 @WSLoggingLevel
- B Schema Reference for Predefined Assertions
- B.1 Graphical Representation
- B.2 Element Descriptions
- B.2.1 wsp:Policy
- B.2.2 wsp:ExactlyOne
- B.2.3 orasp:Assertion
- B.2.4 orawsp:bindings
- B.2.5 orawsp:Config
- B.2.6 orawsp:PropertySet
- B.2.7 orawsp:Property
- B.2.8 orawsp:Description
- B.2.9 orawsp:Value
- B.2.10 orawsp:guard
- B.2.11 orawsp:resource-match
- B.2.12 orawsp:action-match
- B.2.13 orawsp:constraint-match
- B.2.14 oralgp:Logging
- B.2.15 orasp:binding-authorization
- B.2.16 orasp:binding-permission-authorization
- B.2.17 orasp:coreid-security
- B.2.18 orasp:http-security
- B.2.19 orasp:kerberos-security
- B.2.20 orasp:sca-component-authorization
- B.2.21 orasp:sca-component-permission-authorization
- B.2.22 orasp:sts-trust-config
- B.2.23 orasp:wss10-anonymous-with-certificates
- B.2.24 orasp:wss10-mutual-auth-with-certificates
- B.2.25 orasp:wss10-saml-hok-with-certificates
- B.2.26 orasp:wss10-saml-token
- B.2.27 orasp:wss10-saml-with-certificates
- B.2.28 orasp:wss10-username-with-certificates
- B.2.29 orasp:wss11-anonymous-with-certificates
- B.2.30 orasp:wss11-mutual-auth-with-certificates
- B.2.31 orasp:wss11-saml-with-certificates
- B.2.32 orasp:wss11-sts-issued-token-with-certificates
- B.2.33 orasp:wss11-username-with-certificates
- B.2.34 orasp:wss-saml-token-bearer-over-ssl
- B.2.35 orasp:wss-saml-token-over-ssl
- B.2.36 orasp:wss-sts-issued-token-over-ssl
- B.2.37 orasp:wss-username-token
- B.2.38 orasp:wss-username-token-over-ssl
- B.2.39 rm:RMAssertion
- B.2.40 wsaw:UsingAddressing
- B.2.41 wsoma:OptimizedMimeSerialization
- B.2.42 oralgp:fault
- B.2.43 oralgp:request
- B.2.44 oralgp:response
- B.2.45 oralgp:msg-log
- B.2.46 orasp:attachment
- B.2.47 orasp:auth-header
- B.2.48 orasp:body
- B.2.49 orasp:check-permission
- B.2.50 orasp:coreid-token
- B.2.51 orasp:denyAll
- B.2.52 orasp:element
- B.2.53 orasp:encrypted-elements
- B.2.54 orasp:encrypted-parts
- B.2.55 orasp:fault
- B.2.56 orasp:header
- B.2.57 orasp:issued-token
- B.2.58 orasp:kerberos-token
- B.2.59 orasp:msg-security
- B.2.60 orasp:permitAll
- B.2.61 orasp:request
- B.2.62 orasp:require-tls
- B.2.63 orasp:response
- B.2.64 orasp:role
- B.2.65 orasp:saml-token
- B.2.66 orasp:signed-elements
- B.2.67 orasp:signed-parts
- B.2.68 orasp:username-token
- B.2.69 orasp:x509-token
- B.2.70 orawsp:Description
- C Schema Reference for Policy Sets
- D OWSM Introspection Plug-in for Oracle Virtual Assembly Builder
- D.1 Overview of the OWSM Introspection Plug-in for Oracle Virtual Assembly Builder
- D.2 OWSM Introspection Plug-in Parameter
- D.3 Reference System Prerequisites
- D.4 OWSM Introspection Plug-in Usage Requirements
- D.5 Resulting Artifact Type
- D.6 Wiring
- D.7 Wiring Properties
- D.8 OWSM Appliance Properties
- D.9 Supported Template Types
- 18 Predefined Policies