Securing WebLogic Server
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
The following sections provide information about customizing the default security configuration and creating a new security realm:
For information about configuring security providers, see Configuring WebLogic Security Providers, and Configuring Authentication Providers.
For information about migrating security data to a new security realm, see Migrating Security Data.
To simplify the configuration and management of security, WebLogic Server provides a default security configuration. In the default security configuration, myrealm
is set as the default (active) security realm, and the WebLogic Adjudication, Authentication, Identity Assertion, Authorization, Credential Mapping, Role Mapping, and CertPath providers are defined as the security providers.
Customize the default security configuration if you want to:
For information about configuring different types of security providers in a security realm, see see Configuring WebLogic Security Providers, and Configuring Authentication Providers.
The easiest way to customize the default security configuration is to add the security providers you want to the default security realm (myrealm
). However, BEA recommends the following procedure to customize the default security configuration:
The remainder of this section explains describes the configuration decisions that need to be made when creating a new security realm and the main steps used to create a new security realm. Configuring a security realm is only one step in creating a new security configuration; you also need to configure security providers in that realm before in order for the security realm to be valid. For information about configuring different types of security providers in a security realm, see Configuring WebLogic Security Providers, and Configuring Authentication Providers.
Before creating a new security realm, you need to make decisions about how the WebLogic Security service will use security information defined in deployment descriptors (DDs), the method for securing URLs and EJBs, and how credential maps will be managed.
When creating a new security realm, consider the following:
The Check Roles and Security Policies option determines how the WebLogic Security Service uses the security information defined in DDs. The option can be set as follows:
Ignore Roles and Policies From DD
(Deployment Descriptors) option.ejb-jar.xml
, weblogic-ejb-jar.xml
, web.xml
, and weblogic.xml
files), select Initialize roles and policies from DD
option.weblogic-ra.xml
) into the embedded LDAP server and then use the WebLogic Administration Console to create new credential maps, or directly modify credential maps defined in the deployment descriptor.Once information from a weblogic-ra.xml
deployment descriptor file is loaded into the embedded LDAP server, the original resource adapter remains unchanged. Therefore, if you redeploy the original resource adapter (which will happen if you redeploy it through the WebLogic Administration Console, modify it on disk, or restart WebLogic Server), the data will once again be imported from the weblogic-ra.xml
deployment descriptor file and new credential mapping information may be lost.
The Web resource is deprecated in this release of WebLogic Server. If you are configuring a custom Authorization provider that uses the Web resource (instead of the URL resource) in the new security realm, enable Use Deprecated Web Resource on the new security realm. This option changes the runtime behavior of the Servlet container to use a Web resource rather than a URL resource when performing authorization.
Note: When creating a new security realm, at least one of the configured Authentication providers must return asserted LoginModules. Otherwise, run-as
tags defined in deployment descriptors will not work.
For more information, see Configure new security realms in the Administration Console online help.
To create a new security realm:
Note that you can also use the WebLogic Scripting Tool or Java Management Extensions (JMX) APIs to create a new security configuration. For information more information, see WebLogic Scripting Tool.
![]() ![]() |
![]() |
![]() |