Go to main content
1/12
Contents
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
What's New in This Guide
New and Changed Features for 12
c
(12.2.1)
Other Significant Changes in This Document for 12
c
(12.2.1)
1
Introduction to Oracle Coherence Security
Conceptual Overview of Oracle Coherence Security
Coherence Security Quick Start
Overview of Security Configuration
2
Enabling General Security Measures
Using the Java Security Manager
Enable the Java Security Manager
Specify Permissions
Programmatically Specifying Local Permissions
Using Host-Based Authorization
Overview of Host-Based Authorization
Specify Cluster Member Authorized Hosts
Specify Extend Client Authorized Hosts
Use a Filter Class to Determine Authorization
Managing Rogue Clients
3
Using an Access Controller
Overview of Using an Access Controller
Using the Default Access Controller Implementation
Enable the Access Controller
Create a Keystore
Include the Login Module
Create a Permissions File
Create an Authentication Callback Handler
Enable Security Audit Logs
Using a Custom Access Controller Implementation
4
Authorizing Access to Server-Side Operations
Overview of Access Control Authorization
Creating Access Control Authorization Implementations
Declaring Access Control Authorization Implementations
Enabling Access Control Authorization on a Partitioned Cache
5
Securing Extend Client Connections
Using Identity Tokens to Restrict Client Connections
Overview of Using Identity Tokens
Creating a Custom Identity Transformer
Enabling a Custom Identity Transformer
Creating a Custom Identity Asserter
Enabling a Custom Identity Asserter
Using Custom Security Types
Understanding Custom Identity Token Interoperability
Associating Identities with Extend Services
Implementing Extend Client Authorization
Overview of Extend Client Authorization
Create Authorization Interceptor Classes
Enable Authorization Interceptor Classes
6
Using SSL to Secure Communication
Overview of SSL
Using SSL to Secure TCMP Communication
Overview of Using SSL to Secure TCMP Communication
Define an SSL Socket Provider
Using the Predefined SSL Socket Provider
Using SSL to Secure Extend Client Communication
Overview of Using SSL to Secure Extend Client Communication
Configuring a Cluster-Side SSL Socket Provider
Configure an SSL Socket Provider per Proxy Service
Configure an SSL Socket Provider for All Proxy Services
Configuring a Java Client-Side SSL Socket Provider
Configure an SSL Socket Provider per Remote Service
Configure an SSL Socket Provider for All Remote Services
Configuring a .NET Client-Side Stream Provider
Using SSL to Secure Federation Communication
Controlling Cipher Suite and Protocol Version Usage
7
Securing Oracle Coherence in Oracle WebLogic Server
Overview of Securing Oracle Coherence in Oracle WebLogic Server
Securing Oracle Coherence Cluster Membership
Enabling the Oracle Coherence Security Framework
Specifying an Identity for Use by the Security Framework
Authorizing Oracle Coherence Caches and Services
Specifying Cache Authorization
Specifying Service Authorization
Securing Extend Client Access with Identity Tokens
Enabling Identity Transformers for Use in Oracle WebLogic Server
Enabling Identity Asserters for Use in Oracle WebLogic Server
8
Securing Oracle Coherence REST
Overview of Securing Oracle Coherence REST
Using HTTP Basic Authentication with Oracle Coherence REST
Specify a Login Module
Using SSL Authentication With Oracle Coherence REST
Configure an HTTP Acceptor SSL Socket Provider
Access Secured REST Services
Using SSL and HTTP Basic Authentication with Oracle Coherence REST
Implementing Authorization For Oracle Coherence REST
Scripting on this page enhances content navigation, but does not change the content in any way.