Part II describes how to work with policies and policy sets using Fusion Middleware Control and with WLST. Topics such as viewing, attaching, detaching, editing and overriding policies and policy sets are included.
Part II contains the following chapters:
Chapter 4, "Attaching Policies," describes how to use Fusion Middleware Control to attach security policies to Web services.
Chapter 5, "Overriding Policy Configuration Properties," describes how to override security policy configuration properties by using Fusion Middleware Control and WLST.
Chapter 6, "Managing Web Service Policies with Fusion Middleware Control," describes how to work with Web service security policies. Topics include creating, generating, editing, importing, and exporting policies. It also describes how to work with assertion templates.