![]() |
![]() |
e-docs > WebLogic Server > Introduction to WebLogic Security |
Introduction to WebLogic Security
|
Overview of the WebLogic Security Service
Introduction to the WebLogic Security Service
Features of the WebLogic Security Service
Balancing Ease of Use and Customizability
What Changed in WebLogic Security
Java Authentication and Authorization Service (JAAS)
Identity Assertion Providers and LoginModules
Username/Password Authentication
One-way/Two-way SSL Authentication
Domestic SSL and Exportable SSL
The Java Secure Socket Extension (JSSE)
Java Authentication and Authorization Services (JAAS)
Java Cryptography Architecture and Java Cryptography Extensions (JCE)
Common Secure Interoperability Version 2 (CSIv2)
Introduction to Security Realms
What Is a Security Provider Database?
Security Realms and Security Provider Databases
Principal Validation Providers
Security Providers and Security Realms
WebLogic Security Service Architecture
The Identity Assertion Process
The Principal Validation Process
The Credential Mapping Process
The Security Service Provider Interfaces (SSPIs)
The WebLogic Security Providers
WebLogic Authentication Provider
WebLogic Identity Assertion Provider
WebLogic Principal Validation Provider
WebLogic Authorization Provider
WebLogic Adjudication Provider
WebLogic Role Mapping Provider
WebLogic Credential Mapping Provider
WebLogic Realm Adapter Providers
How the Architecture Benefits Users
Server/Application Administrators
Third-Party Security Service Providers
![]() |
![]() |
![]() |
![]() |
||
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |