Contents for Introduction to WebLogic Enterprise Security
Application Security Infrastructure
Introduction to BEA WebLogic Enterprise Security
Audience for This Guide
Securing Your Enterprise
What is BEA WebLogic Enterprise Security?
Key Features
What is the Problem?
What is the Solution?
Distributed Computing Security Infrastructure
How Our Solution Benefits You
Application Developers
Server and Application Administrators
Security Developers
Security Architects
Standards
BEA WebLogic Enterprise Security Architecture
Architectural Overview
Administration Server
Service Control Manager
Security Service Module
WebLogic Server 8.1 Security Service Module
Web Server Security Service Module
Web Services Security Service Module
Java Security Service Module
Security Services
Authentication and Identity
Authentication Service
Types of Authentication
Username and Password Authentication
Web Single Sign-On
Perimeter Authentication
Principal Validation
Principal Validation Service
Identity Assertion
Identity Assertion Service
Role Mapping
Role Mapping Service
Authorization
Authorization Service
User Directories
Resources
Authorization Policies and Role Mapping
ContextHandlers
Adjudication
Adjudication Service
Auditing
Auditing Service
Credential Mapping
Credential Mapping Service
Security Service Providers
Security Administration
Managing Security
Security Configuration
Resources
Resource Attribute
Privilege
Privilege Group
Identity
User
Group
Identity Attribute
Role
Role Policy
Policy
Policy Rule
Policy Inquiry
Policy Verification
Declarations
Deployment
What's Next?