Securing WebLogic Server
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
![]() |
The following sections provide information about customizing the default security configuration by creating a new security realm:
For information about configuring security providers, see Configuring WebLogic Security Providers, and Configuring Authentication Providers.
For information about migrating security data to a new security realm, see Migrating Security Data.
To simplify the configuration and management of security, WebLogic Server provides a default security configuration. In the default security configuration, myrealm
is set as the default (active) security realm, and the WebLogic Adjudication, Authentication, Identity Assertion, Credential Mapping, CertPath, XACML Authorization and XACML Role Mapping providers are defined as the security providers in the security realm.
Customize the default security configuration if you want to do any of the following:
For information about configuring different types of security providers in a security realm, see Configuring WebLogic Security Providers and Configuring Authentication Providers.
The easiest way to customize the default security configuration is to add the security providers you want to the default security realm (myrealm
). However, BEA recommends instead that you customize the default security configuration by creating an entirely new security realm. This preserves your ability to revert more easily to the default security configuration. You configure security providers for the new realm; migrate any security data, such as users as groups, from the existing default realm; and then set the new security realm as the default realm. See Creating and Configuring a New Security Realm: Main Steps.
Before creating a new security realm, you need to decide:
weblogic-ra.xml
) into the embedded LDAP server and then use the Administration Console to create new credential maps, or directly modify credential maps defined in the deployment descriptor.Once information from a weblogic-ra.xml
deployment descriptor file is loaded into the embedded LDAP server, the original resource adapter remains unchanged. Therefore, if you redeploy the original resource adapter (which will happen if you redeploy it through the WebLogic Administration Console, modify it on disk, or restart WebLogic Server), the data will once again be imported from the weblogic-ra.xml
deployment descriptor file and new credential mapping information may be lost.
The Web resource is deprecated. If you are configuring a custom Authorization provider that uses the Web resource (instead of the URL resource) in the new security realm, enable Use Deprecated Web Resource on the new security realm. This option changes the runtime behavior of the Servlet container to use a Web resource rather than a URL resource when performing authorization.
Note: When you create a new security realm, you must configure at least one of the Authentication providers to return asserted LoginModules. Otherwise, run-as
tags defined in deployment descriptors will not work.
For more information, see Configure new security realms in the Administration Console online help.
To create a new security realm:
Note: You can also use the WebLogic Scripting Tool or Java Management Extensions (JMX) APIs to create a new security configuration. See WebLogic Scripting Tool.
![]() ![]() |
![]() |
![]() |