Go to main content
1/17
Contents
List of Examples
List of Figures
List of Tables
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
What's New In This Guide
New and Changed Features for 12
c
(12.2.1.3.0)
New and Changed Features for 12
c
(12.2.1.2.0)
New and Changed Features for 12
c
(12.2.1.1.0)
1
Introduction to the Use Cases
2
Securing Inbound SOAP Requests Using SAML Message Protection
2.1
Use Case: Securing Inbound SOAP Requests Using SAML-based Authentication
2.2
Securing Inbound SOAP requests using SAML Message Protection
2.2.1
Message Protection Via Symmetric Keys
2.2.2
What Keys Must Be in the Keystore?
2.2.3
Multi-Domain Use Case (Keystore Hardening)
2.2.4
When to Override the SAML Issuer
2.3
Implementing SAML Message Protection
2.3.1
Implementing SAML Message Protection - Prerequisites
2.3.2
Creating a WebLogic Server User
2.3.3
Creating a Java Keystore
2.3.4
Configuring the OWSM Keystore for Securing Web Services
2.3.5
Storing the Password for the Decryption Key in the Credential Store
2.3.6
Attaching the Policy to Your Web Service
2.3.7
Attaching the Policy to Your Web Service Client
3
Securing RESTful Web Services Using Basic Authentication
3.1
Use Case: Secure a RESTful Web Service Using Basic Authentication
3.2
Implementing the Use Case: RESTful Web Service Using Basic Authentication
3.2.1
Implementing RESTful Web Service Using Basic Authentication- Prerequisites
3.2.2
Securing All RESTful Resources by Default
3.2.3
Creating a RESTful Web Service
3.2.4
Authenticating the User Using SecurityContext
3.2.5
Packaging With an Application Subclass
3.2.6
Deploying the RESTful Web Service
3.3
Verifying the Use Case: RESTful Web Service
3.4
Additional Resources for RESTful Web Services Use Case
4
Propagating Security Identity with RESTful Web Services
4.1
Use Case: Propagate Security Identity with RESTful Web Services
4.2
Implementing Use Case: Propagating Security Identity with RESTful Web Services
4.2.1
Propagating Security Identity with RESTful Web Services - Prerequisites
4.2.2
Create, Secure, and Deploy a RESTful Web Service
4.2.2.1
Creating a RESTful Web Service
4.2.2.2
Authenticating the User Using SecurityContext
4.2.2.3
Modifying the Servlet Name for the Web Project
4.2.2.4
Securing the RESTful Web Service
4.2.2.5
Deploying the RESTful Web Service
4.2.2.6
Testing the RESTful Web Service Using Fusion Middleware Control
4.2.3
Create, Secure, and Deploy a RESTful Client
4.2.3.1
Creating a RESTful Client
4.2.3.2
Modifying the HTTP Servlet to Call the RESTful Client
4.2.3.3
Securing the Servlet Web Application
4.2.3.4
Creating a weblogic.xml Deployment Descriptor
4.2.3.5
Deploying the RESTful Client
4.2.3.6
Testing Access to the RESTful Client
4.2.4
Set Up the Keystore Service (KSS)
4.2.4.1
Why Use KSS?
4.2.4.2
Setting Up the Keystore Services
4.2.5
Creating a Test User
4.3
Verifying the Use Case: Propagating Security Identity with RESTful Web Services
5
Configuring Federation with Microsoft ADFS 2.0 STS as the IP-STS and OWSM as the RP-STS
5.1
Use Case: Implementing Web Services federation with Microsoft ADFS 2.0 STS as IP-STS and OWSM as RP-STS
5.1.1
Generating Federation Metadata Document for the RP-STS
5.1.2
Configuring the Web Service
5.1.3
Configuring Microsoft ADFS 2.0 STS as the IP-STS
5.1.4
Configuring the Web Service Client
6
Configuring Federation with Microsoft ADFS 2.0 STS as the IP-STS and Oracle STS as the RP-STS
6.1
Use Case: Implementing Web Services federation with Microsoft ADFS2.0 STS
6.1.1
Configuring the Web Service
6.1.2
Configuring Oracle STS as the RP-STS
6.1.3
Configuring Microsoft ADFS 2.0 STS as the IP-STS
6.1.4
Configuring the Web Service Client
7
Configuring Federation with Oracle STS as the IP-STS and Microsoft ADFS 2.0 STS as the RP-STS
7.1
Use Case: Implementing Oracle STS as IP-STS and Microsoft ADFS 2.0 STS as RP-STS
7.1.1
Configuring the Web Service
7.1.2
Configuring Microsoft ADFS 2.0 STS as the RP-STS
7.1.3
Configuring Oracle STS as the IP-STS
7.1.4
Configuring the Web Service Client
8
Configuring SAML HOK Using WS-Trust with OpenSSO STS
8.1
Configuring SAML HOK Using WS-Trust with OpenSSO STS
8.1.1
Configuring OpenSSO STS to Implement SAML HOK
8.1.2
Configuring SAML Holder-of-Key With Message Protection Using WS-Trust with OpenSSO STS
9
Configuring SAML Sender Vouches Using WS-Trust with OpenSSO STS
9.1
Use Case: Implementing SAML Sender Vouches Using WS-Trust with OpenSSO STS
9.1.1
Configuring OpenSSO STS to Implement SAML Sender Vouches
9.1.2
Configuring SAML Sender Vouches With Message Protection Using WS-Trust with OpenSSO STS
10
Configuring SAML Bearer Using WS-Trust with OpenSSO STS
10.1
Use Case: Implementing SAML Bearer Using WS-Trust with OpenSSO STS
10.1.1
Configuring OpenSSO STS to Implement SAML Bearer
10.1.2
Configuring SAML Bearer With Message Protection Using WS-Trust with OpenSSO STS
Scripting on this page enhances content navigation, but does not change the content in any way.