Go to main content
1/11
Contents
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
What's New in This Guide
New and Changed Features for 12
c
(12.1.3)
Other Significant Changes in This Document for 12
c
(12.1.3)
New and Changed Features for 12
c
(12.1.2)
Other Significant Changes in This Document for 12
c
(12.1.2)
1
Introduction to Oracle Coherence Security
1.1
Conceptual Overview of Oracle Coherence Security
1.2
Coherence Security Quick Start
1.3
Overview of Security Configuration
2
Enabling General Security Measures
2.1
Using the Java Security Manager
2.1.1
Enable the Java Security Manager
2.1.2
Specify Permissions
2.2
Using Host-Based Authorization
2.2.1
Overview of Host-Based Authorization
2.2.2
Specify Cluster Member Authorized Hosts
2.2.3
Specify Extend Client Authorized Hosts
2.2.4
Use a Filter Class to Determine Authorization
2.3
Managing Rogue Clients
3
Using an Access Controller
3.1
Overview of Using an Access Controller
3.2
Using the Default Access Controller Implementation
3.2.1
Enable the Access Controller
3.2.2
Create a Keystore
3.2.3
Include the Login Module
3.2.4
Create a Permissions File
3.2.5
Create an Authentication Callback Handler
3.3
Using a Custom Access Controller Implementation
4
Securing Extend Client Connections
4.1
Using Identity Tokens to Restrict Client Connections
4.1.1
Overview of Using Identity Tokens
4.1.2
Creating a Custom Identity Transformer
4.1.3
Enabling a Custom Identity Transformer
4.1.4
Creating a Custom Identity Asserter
4.1.5
Enabling a Custom Identity Asserter
4.1.6
Using Custom Security Types
4.1.7
Understanding Custom Identity Token Interoperability
4.2
Associating Identities with Extend Services
4.3
Implementing Extend Client Authorization
4.3.1
Overview of Extend Client Authorization
4.3.2
Create Authorization Interceptor Classes
4.3.3
Enable Authorization Interceptor Classes
5
Using SSL to Secure Communication
5.1
Overview of SSL
5.2
Using SSL to Secure TCMP Communication
5.2.1
Overview of Using SSL to Secure TCMP Communication
5.2.2
Define an SSL Socket Provider
5.2.3
Using the Predefined SSL Socket Provider
5.3
Using SSL to Secure Extend Client Communication
5.3.1
Overview of Using SSL to Secure Extend Client Communication
5.3.2
Configuring a Cluster-Side SSL Socket Provider
5.3.2.1
Configure an SSL Socket Provider per Proxy Service
5.3.2.2
Configure an SSL Socket Provider for All Proxy Services
5.3.3
Configuring a Java Client-Side SSL Socket Provider
5.3.3.1
Configure an SSL Socket Provider per Remote Service
5.3.3.2
Configure an SSL Socket Provider for All Remote Services
5.3.4
Configuring a .NET Client-Side Stream Provider
5.4
Controlling Cipher Suite and Protocol Version Usage
6
Securing Oracle Coherence in Oracle WebLogic Server
6.1
Overview of Securing Oracle Coherence in Oracle WebLogic Server
6.2
Securing Oracle Coherence Cluster Membership
6.2.1
Enabling the Oracle Coherence Security Framework
6.2.2
Specifying an Identity for Use by the Security Framework
6.3
Authorizing Oracle Coherence Caches and Services
6.3.1
Specifying Cache Authorization
6.3.2
Specifying Service Authorization
6.4
Securing Extend Client Access with Identity Tokens
6.4.1
Enabling Identity Transformers for Use in Oracle WebLogic Server
6.4.2
Enabling Identity Asserters for Use in Oracle WebLogic Server
7
Securing Oracle Coherence REST
7.1
Overview of Securing Oracle Coherence REST
7.2
Using HTTP Basic Authentication with Oracle Coherence REST
7.2.1
Specify a Login Module
7.3
Using SSL Authentication With Oracle Coherence REST
7.3.1
Configure an HTTP Acceptor SSL Socket Provider
7.3.2
Access Secured REST Services
7.4
Using SSL and HTTP Basic Authentication with Oracle Coherence REST
7.5
Implementing Authorization For Oracle Coherence REST
Scripting on this page enhances content navigation, but does not change the content in any way.