Table of Contents
- Title and Copyright Information
- Preface
- 1 Introduction
- 2 Understanding WebLogic Resource Security
-
3
Resource Types You Can Secure with Policies
- Administrative Resources
- Application Resources
- COM Resources
- EJB Resources
- Enterprise Information Systems (EIS) Resources
- Java DataBase Connectivity (JDBC) Resources
- Java Messaging Service (JMS) Resources
- Java Naming and Directory Interface (JNDI) Resources
- JMX Resources
- Server Resources
- URL Resources
- Web Service Resources
- Work Context Resources
- Coherence Resources
-
4
Options for Securing Web Application and EJB Resources
- Deployment Descriptors Not Required
- Comparison of Security Models for Web Applications and EJBs
- Understanding the Advanced Security Model
- Securing Web Applications and EJBs
- 5 Security Policies
- 6 Users, Groups, And Security Roles
-
7
Using XACML Documents to Secure WebLogic Resources
- Prerequisites
- Adding a XACML Role or Policy to a Realm: Main Steps
- Creating Roles and Polices for Custom MBeans
- Exporting Roles and Policies to XACML Documents
- A Reference for XACML on WebLogic Server