View This Realm Collection
/management/weblogic/{version}/edit/securityConfiguration/realms
View this realm collection.
Request
-
version(required): string
The version of the WebLogic REST interface.
-
excludeFields: string
The 'excludeFields' query parameter is used to restrict which fields are returned in the response. It is a comma separated list of field names. If present, only fields whose name is not on the list will be returned. If not present, all fields are returned (unless the 'fields' query parameter is specified). Note: 'fields' must not be specified if 'excludeFields' is specified.
-
excludeLinks: string
The 'excludeLinks' query parameter is used to restrict which links are returned in the response. It is a comma separated list of link relationship names. If present, only links whose relationship name is not on the list will be returned. If not present, all links are returned (unless the 'links' query parameter is specified). Note: 'links' must not be specified if 'excludeLinks' is specified.
-
fields: string
The 'fields' query parameter is used to restrict which fields are returned in the response. It is a comma separated list of field names. If present, only fields with matching names are returned. If not present, all fields are returned (unless the 'excludeFields' query parameter is specified). Note: 'excludeFields' must not be specified if 'fields' is specified.
-
links: string
The 'links' query parameter is used to restrict which links are returned in the response. It is a comma separated list of link relationship names. If present, only links with matching relationship names are returned. If not present, all links are returned (unless the 'excludeLinks' query parameter is specified). Note: 'excludeLinks' must not be specified if 'links' is specified.
-
Admin: basic
Type:
basicDescription:A user in the Admin security role. -
Deployer: basic
Type:
basicDescription:A user in the Deployer security role. -
Monitor: basic
Type:
basicDescription:A user in the Monitor security role. -
Operator: basic
Type:
basicDescription:A user in the Operator security role.
Response
- application/json
200 Response
Returns a list of realm entities.
This method can return the following links:
- rel=create-form uri=/management/weblogic/{version}/edit/securityConfiguration/realmCreateForm
The create form resource for this collection resource.
object-
adjudicatorTypes:
array Items
Title:
ItemsRead Only:trueReturns the types of Adjudication providers that may be created in this security realm, for example,
weblogic.security.providers.authorization.DefaultAdjudicator. Use this method to find the available types to pass tocreateAdjudicator -
auditorTypes:
array Items
Title:
ItemsRead Only:trueReturns the types of Auditing providers that may be created in this security realm, for example,
weblogic.security.providers.audit.DefaultAuditor. Use this method to find the available types to pass tocreateAuditor -
authenticationProviderTypes:
array Items
Title:
ItemsRead Only:trueReturns the types of Authentication providers that may be created in this security realm, for example,
weblogic.security.providers.authentication.DefaultAuthenticator. Use this method to find the available types to pass tocreateAuthenticationProvider -
authMethods:
string
Returns a comma separated string of authentication methods that should be used when the Web application specifies "REALM" as its auth-method. The authentication methods will be applied in order in which they appear in the list.
-
authorizerTypes:
array Items
Title:
ItemsRead Only:trueReturns the types of Authorization providers that may be created in this security realm, for example,
weblogic.security.providers.authorization.DefaultAuthorizer. Use this method to find the available types to pass tocreateAuthorizer -
autoRestartOnNonDynamicChanges:
boolean
Specifies whether the Realm will be auto-restarted if non-dynamic changes are made to the realm or providers within the realm.
-
certPathBuilder:
array Cert Path Builder Reference
Title:
Cert Path Builder ReferenceContains the cert path builder reference.Returns the CertPath Builder provider in this security realm that will be used by the security system to build certification paths. Returns null if none has been selected. The provider will be one of this security realm's
CertPathProvidersConstraints
- restart required
-
certPathProviderTypes:
array Items
Title:
ItemsRead Only:trueReturns the types of Certification Path providers that may be created in this security realm, for example,
weblogic.security.providers.pk.WebLogicCertPathProvider. Use this method to find the available types to pass tocreateCertPathProvider -
combinedRoleMappingEnabled:
boolean
Default Value:
trueDetermines how the role mappings in the Enterprise Application, Web application, and EJB containers interact. This setting is valid only for Web applications and EJBs that use the Advanced security model and that initialize roles from deployment descriptors.
When enabled:
Application role mappings are combined with EJB and Web application mappings so that all principal mappings are included. The Security Service combines the role mappings with a logical
ORoperator.If one or more policies in the
web.xmlfile specify a role for which no mapping exists in theweblogic.xmlfile, the Web application container creates an empty map for the undefined role (that is, the role is explicitly defined as containing no principal). Therefore, no one can access URL patterns that are secured by such policies.If one or more policies in the
ejb-jar.xmlfile specify a role for which no mapping exists in theweblogic-ejb-jar.xmlfile, the EJB container creates an empty map for the undefined role (that is, the role is explicitly defined as containing no principal). Therefore, no one can access methods that are secured by such policies.
When disabled:
Role mappings for each container are exclusive to other containers unless defined by the
descriptor element.If one or more policies in the
web.xmlfile specify a role for which no role mapping exists in theweblogic.xmlfile, the Web application container assumes that the undefined role is the name of a principal. It therefore maps the assumed principal to the role name. For example, if theweb.xmlfile contains the following stanza in one of its policies:
PrivilegedUser
but, if the
weblogic.xmlfile has no role mapping forPrivilegedUser, then the Web application container creates an in-memory mapping that is equivalent to the following stanza:
PrivilegedUser
PrivilegedUser
Role mappings for EJB methods must be defined in the
weblogic-ejb-jar.xmlfile. Role mappings defined in the other containers are not used unless defined by thedescriptor element.
- Note:
For all applications previously deployed in version 8.1 and upgraded to version 9.x, the combining role mapping is disabled by default.
-
credentialMapperTypes:
array Items
Title:
ItemsRead Only:trueReturns the types of Credential Mapping providers that may be created in this security realm, for example,
weblogic.security.providers.credentials.DefaultCredentialMapper. Use this method to find the available types to pass tocreateCredentialMapper -
delegateMBeanAuthorization:
boolean
Default Value:
falseConfigures the WebLogic Server MBean servers to use the security realm's Authorization providers to determine whether a JMX client has permission to access an MBean attribute or invoke an MBean operation.
You can continue to use WebLogic Server's default security settings or modify the defaults to suit your needs.
If you do not delegate authorization to the realm's Authorization providers, the WebLogic MBean servers allow access only to the four default security roles (Admin, Deployer, Operator, and Monitor) and only as specified by WebLogic Server's default security settings.
Constraints
- secure default : true
-
deployableProviderSynchronizationEnabled:
boolean
Default Value:
falseSpecifies whether synchronization for deployable Authorization and Role Mapping providers is enabled.
The Authorization and Role Mapping providers may or may not support parallel security policy and role modification, respectively, in the security provider database. If the security providers do not support parallel modification, the WebLogic Security Framework enforces a synchronization mechanism that results in each application and module being placed in a queue and deployed sequentially.
-
deployableProviderSynchronizationTimeout:
integer(int32)
Default Value:
60000Returns the timeout value, in milliseconds, for the deployable security provider synchronization operation. This value is only used if
DeployableProviderSynchronizationEnabledis set totrue -
enableWebLogicPrincipalValidatorCache:
boolean
Default Value:
trueReturns whether the WebLogic Principal Validator caching is enabled.
The Principal Validator is used by Oracle supplied authentication providers and may be used by custom authentication providers. If enabled, the default principal validator will cache WebLogic Principal signatures.
-
identityAssertionCacheEnabled:
boolean
Default Value:
trueReturns whether the Identity Assertion cache is enabled.
-
identityAssertionCacheTTL:
integer(int32)
Minimum Value:
0Default Value:300Returns the time-to-live (TTL), in seconds, of the Identity Assertion cache. This value is used only if
IdentityAssertionCacheEnabledis set totrue -
identityAssertionDoNotCacheContextElements:
array Items
Title:
ItemsReturns the names of the ContextElements that are not stored in the Identity Assertion cache because these elements are present in the ContextHandler of the requests. This value is used only if
IdentityAssertionCacheEnabledis set totrue -
identityAssertionHeaderNamePrecedence:
array Items
Title:
ItemsObtain an ordered list of token type names used for Identity Assertion with HTTP request headers.
The list determines the precedence order when multiple HTTP headers are present in an HTTP request based on the list of active token types maintained on the configured Authentication providers.
-
managementIdentityDomain:
string
Sets the Management Identity Domain value for the realm.
-
maxWebLogicPrincipalsInCache:
integer(int32)
Default Value:
500Returns the maximum size of the LRU cache for holding WebLogic Principal signatures. This value is only used if
EnableWebLogicPrincipalValidatorCacheis set totrue -
name:
string
Read Only:
trueDefault Value:RealmThe name of this configuration. WebLogic Server uses an MBean to implement and persist the configuration.
-
passwordValidatorTypes:
array Items
Title:
ItemsRead Only:trueReturns the types of Password Validator providers that may be created in this security realm, for example,
com.bea.security.providers.authentication.passwordvalidator.SystemPasswordValidator. Use this method to find the available types to pass tocreatePasswordValidator -
retireTimeoutSeconds:
integer(int32)
Minimum Value:
1Default Value:60Specifies the retire timeout for a realm that is restarted. The old realm will be shutdown after the specified timeout period has elapsed.
-
roleMapperTypes:
array Items
Title:
ItemsRead Only:trueReturns the types of Role Mapping providers that may be created in this security realm, for example,
weblogic.security.providers.authorization.DefaultRoleMapper. Use this method to find the available types to pass tocreateRoleMapper -
securityDDModel:
string
Default Value:
DDOnlyAllowed Values:[ "DDOnly", "CustomRoles", "CustomRolesAndPolicies", "Advanced" ]Specifies the default security model for Web applications or EJBs that are secured by this security realm. You can override this default during deployment.
Note: If you deploy a module by modifying the domain's
config.xmlfile and restarting the server, and if you do not specify a security model value for the module inconfig.xml, the module is secured with the default value of theAppDeploymentMBean SecurityDDModelattribute (see weblogic.management.configuration.AppDeploymentMBean#getSecurityDDModel() getSecurityDDModel).Choose one of these security models:
Deployment Descriptors Only (DDOnly)For EJBs and URL patterns, this model uses only the roles and policies in the J2EE deployment descriptors (DD); the Administration Console allows only read access for this data. With this model, EJBs and URL patterns are not protected by roles and policies of a broader scope (such as a policy scoped to an entire Web application). If an EJB or URL pattern is not protected by a role or policy in the DD, then it is unprotected: anyone can access it.
For application-scoped roles in an EAR, this model uses only the roles defined in the WebLogic Server DD; the Administration Console allows only read access for this data. If the WebLogic Server DD does not define roles, then there will be no such scoped roles defined for this EAR.
For all other types of resources, you can use the Administration Console to create roles or policies. For example, with this model, you can use the Administration Console to create application-scoped policies for an EAR.
Applies for the life of the deployment. If you want to use a different model, you must delete the deployment and reinstall it.
Customize Roles Only (CustomRoles)For EJBs and URL patterns, this model uses only the policies in the J2EE deployment descriptors (DD). EJBs and URL patterns are not protected by policies of a broader scope (such as a policy scoped to an entire Web application). This model ignores any roles defined in the DDs; an administrator completes the role mappings using the Administration Console.
For all other types of resources, you can use the Administration Console to create roles or policies. For example, with this model, you can use the Administration Console to create application-scoped policies or roles for an EAR.
Applies for the life of the deployment. If you want to use a different model, you must delete the deployment and reinstall it.
Customize Roles and Policies (CustomRolesAndPolicies)Ignores any roles and policies defined in deployment descriptors. An administrator uses the Administration Console to secure the resources.
Performs security checks for all URLs or EJB methods in the module.
Applies for the life of the deployment. If you want to use a different model, you must delete the deployment and reinstall it.
Advanced (Advanced)You configure how this model behaves by setting values for the following options:
When Deploying Web Applications or EJBsNote: When using the WebLogic Scripting Tool or JMX APIs, there is no single MBean attribute for this setting. Instead, you must set the values for the
DeployPolicyIgnoredandDeployRoleIgnoredattributes ofRealmMBeanCheck Roles and Policies (FullyDelegateAuthorization)Combined Role Mapping Enabled (CombinedRoleMappingEnabled)
You can change the configuration of this model. Any changes immediately apply to all modules that use the Advanced model. For example, you can specify that all modules using this model will copy roles and policies from their deployment descriptors into the appropriate provider databases upon deployment. After you deploy all of your modules, you can change this behavior to ignore roles and policies in deployment descriptors so that when you redeploy modules they will not re-copy roles and policies.
Note: Prior to WebLogic Server version 9.0 the Advanced model was the only security model available. Use this model if you want to continue to secure EJBs and Web Applications as in releases prior to 9.0.
-
validateDDSecurityData:
boolean
Default Value:
falseNot used in this release.
arrayItemstrueReturns the types of Adjudication providers that may be created in this security realm, for example, weblogic.security.providers.authorization.DefaultAdjudicator. Use this method to find the available types to pass to createAdjudicator
arrayItemstrueReturns the types of Auditing providers that may be created in this security realm, for example, weblogic.security.providers.audit.DefaultAuditor. Use this method to find the available types to pass to createAuditor
arrayItemstrueReturns the types of Authentication providers that may be created in this security realm, for example, weblogic.security.providers.authentication.DefaultAuthenticator. Use this method to find the available types to pass to createAuthenticationProvider
arrayCert Path Builder ReferenceReturns the CertPath Builder provider in this security realm that will be used by the security system to build certification paths. Returns null if none has been selected. The provider will be one of this security realm's CertPathProviders
Constraints
- restart required
arrayItemstrueReturns the types of Certification Path providers that may be created in this security realm, for example, weblogic.security.providers.pk.WebLogicCertPathProvider. Use this method to find the available types to pass to createCertPathProvider
arrayItemstrueReturns the types of Credential Mapping providers that may be created in this security realm, for example, weblogic.security.providers.credentials.DefaultCredentialMapper. Use this method to find the available types to pass to createCredentialMapper
arrayItemsReturns the names of the ContextElements that are not stored in the Identity Assertion cache because these elements are present in the ContextHandler of the requests. This value is used only if IdentityAssertionCacheEnabled is set to true
arrayItemsObtain an ordered list of token type names used for Identity Assertion with HTTP request headers.
The list determines the precedence order when multiple HTTP headers are present in an HTTP request based on the list of active token types maintained on the configured Authentication providers.
oracle.doceng.json.BetterJsonNull@58f7544carrayItemstrueReturns the types of Password Validator providers that may be created in this security realm, for example, com.bea.security.providers.authentication.passwordvalidator.SystemPasswordValidator. Use this method to find the available types to pass to createPasswordValidator
arrayItemstrueReturns the types of Role Mapping providers that may be created in this security realm, for example, weblogic.security.providers.authorization.DefaultRoleMapper. Use this method to find the available types to pass to createRoleMapper