List of Figures
- 1-1 Oracle Tuxedo ATMI Plug-in Security Architecture
- 1-2 ATMI Delegated Trust Authentication Model
- 1-3 Control Flow in the ATMI Environment
- 1-4 Server Permission Upgrade Example
- 1-5 Authorization Plug-in Architecture
- 1-6 Auditing Plug-in Architecture
- 1-7 How the TLS Protocol Works in a Tuxedo Application
- 1-8 ATMI PKCS-7 End-to-End Digital Signing
- 1-9 PKI Process Flow
- 1-10 ATMI PKCS-7 End-to-End Encryption
- 1-11 Default User, Group, and ACL Files
- 1-12 Inter-Domain Interoperability
- 1-13 Intra-Domain Interoperability
- 1-14 Enforcing Intra-Domain Interoperability Rules for Public Key Security
- 1-15 Communication Between ATMI Applications
- 2-1 Administering ATMI Security
- 2-2 Mutual Authentication in the Delegated Trust Authentication Model
- 2-3 Acquiring Credentials and Tokens During Application Booting
- 2-4 WSH Operating with Older Workstation Client
- 2-5 Older WSH Operating with Workstation Client
- 2-6 Server Interoperating with Older ATMI Application
- 2-7 Server Interoperating with Older Oracle Tuxedo Systems
- 2-8 Obtaining Authorization and Auditing Tokens for an Older Client
- 2-9 Establishing a Link Between Domains Using Default Authentication
- 2-10 Establishing a Local ACL Policy
- 2-11 Establishing a Global ACL Policy
- 2-12 Establishing a One-way Local and One-way Global ACL Policy
- 2-13 Configuration for Using the TLS Protocol in a Tuxedo Application
- 2-14 How a Decryption Key Is Initialized Example
- 2-15 tpusr Sample Entry
- 2-16 tpgrp Sample Entry
- 2-17 tpacl Sample Entry
- 3-1 Programming Oracle Tuxedo Security
- 3-2 Transferring Data from the TPINIT Buffer for a Workstation Client
- 3-3 Procedure for Sending Signed Messages
- 3-4 SignedData Content Type
- 3-5 Procedure for Sending Encrypted Messages
- 3-6 EnvelopedData Content Type
- 3-7 Forwarding a Signed and Encrypted Message Example
- 5-1 WebLogic Administration Console Select Users
- 5-2 WebLogic Administration Console Create Users
- 6-1 Oracle Tuxedo Audit Flow with OPSS