Before you begin
Understand the requirements for upgrading an existing domain to use the RDBMS security store. See Managing the RDBMS Security Store.
For a list of the specific RDBMS systems supported in this release of WebLogic Server that can be used for the RDBMS security store, see Oracle Fusion Middleware Supported System Configurations.
WebLogic Server provides the option of using an external RDBMS as a datastore for the following security providers:
The RDBMS security store is required to use SAML 2.0 services in two or more WebLogic Server instances in a domain, such as in a cluster.
To upgrade an existing domain to use the RDBMS security store:
Note: Once the RDBMS security store is configured and enabled in a domain, any of the security providers identified in this help topic that are created in the security realm will use the RDBMS security store only, and not the embedded LDAP server. WebLogic Server does not support the ability to override this behavior.
The complete set of steps for upgrading an existing domain to use the RDBMS security store is provided in Managing the RDBMS Security Store. These steps are summarized on this page for convenience.
For information on configuring the RDBMS security store using WLST, see Configuring the RDBMS Security Store in Administering Security for Oracle WebLogic Server.
Typically this step is performed by the database administrator. See Managing the RDBMS Security Store for a description of the scripts, their locations, and instructions for running them.
For information about importing security provider data into a domain, see Import data into a security provider.
Note: Security data for any provider that is not among those identified in this help topic is automatically imported into the persistent store normally used by that provider. For example, the security data for the WebLogic Authentication provider is automatically imported into the embedded LDAP server.
The domain is now configured so that any of the providers identified in this help topic that are created in the security realm will use the RDBMS security store.
After you finish
From the Administration Console, you can configure the RDBMS security store as described in Configure the RDBMS security store.