13 Configuring RDBMS Authentication Providers

In Oracle WebLogic Server, an RDBMS Authentication provider is a username/password-based Authentication provider that uses a relational database, rather than an LDAP system, as an identity store for user, password, and group information.

This chapter includes the following sections:

About Configuring the RDBMS Authentication Providers

WebLogic Server includes RDBMS Authentication providers for SQL database and relational databases. These providers include the following:
  • SQL Authenticator—Uses a SQL database and allows both read and write access to the database. This Authentication provider is configured by default with a typical SQL database schema, which you can configure to match your database's schema. See Configuring the SQL Authentication Provider.

  • Read-only SQL Authenticator—Uses a SQL database and allows only read access to the database. For write access, you use the SQL database's own interface, not the WebLogic security provider. See Configuring the Read-Only SQL Authenticator.

  • Custom RDBMS Authenticator—Requires you to write a plug-in class. This may be a better choice if you want to use a relational database for your authentication data store, but the SQL Authenticator's schema configuration is not a good match for your existing database schema. See Configuring the Custom DBMS Authenticator.

For information about adding an RDBMS Authentication provider to your security realm, see Configure an Authentication or Identity Assertion Provider in Oracle WebLogic Remote Console Online Help.

Common RDBMS Authentication Provider Attributes

All three RDBMS Authentication providers included with WebLogic Server have configuration options for setting the data source name, the Group Membership Searching and Max Group Membership Search Level attributes, and the group caching attributes. These configuration options are described in the following topics:

Data Source Attribute

The Data Source Name specifies the WebLogic Server data source to use to connect to the database.

Group Searching Attributes

The Group Membership Searching and Max Group Membership Search Level attributes specify whether recursive group membership searching is unlimited or limited, and if limited, how many levels of group membership can be searched. For example, if you specify that Group Membership Searching is LIMITED, and the Max Group Membership Search Level is 0, then the RDBMS Authentication providers will find only groups that the user is a direct member of. Specifying a maximum group membership search level can greatly increase authentication performance in certain scenarios, since it may reduce the number of DBMS queries executed during authentication. However, you should only limit group membership search if you can be certain that the group memberships you require are within the search level limits you specify.

Note:

If the RDBMS contains cyclic groups, or groups that are defined to contain themselves, the RDBMS Authentication provider may be unable to complete the authentication process. Setting the Group Membership Searching and Max Group Membership Search Level attributes can help limit recursive group name lookups. However, the use of RDBMS Authentication providers with cyclic groups is not supported and must be avoided.

Group Caching Attributes

You can improve the performance of RDBMS Authentication providers by caching the results of group hierarchy lookups. Use of this cache can reduce the frequency with which the RDBMS Authentication provider needs to access the database. You can configure the use, size, and duration of the cache.

Configuring the SQL Authentication Provider

If you are using the SQL Authentication provider, you configure how the provider and its associated database handle user passwords, and you configure the SQL statement attributes needed for accessing user information in the database. Configuring these attributes is described in the following sections:

Password Attributes

WebLogic Server uses the following attributes to govern how the SQL Authentication provider and its underlying database handle user passwords.

Plaintext Passwords Enabled

Use the Plaintext Passwords Enabled attribute to specify whether you can use plain text passwords.

Password Style Retained

Use the Password Style Retained attribute to control how a password is stored in the database when updating an existing user's password. If enabled, the default, the password style and algorithm used for the original password in the database are used for the new password. If disabled, the provider uses the settings specified for the Password Algorithm and Password Style attributes for the new password.

Password Style

Use the Password Style attribute to specify the password style to use when storing passwords for new users, and for updating the password of existing users if the Password Style Retained attribute is disabled. Valid options are PLAINTEXT, HASHED, or SALTEDHASHED. SALTEDHASHED is selected by default.

Password Algorithm

Use the Password Algorithm attribute to set the message digest algorithm used to hash passwords for storage.

Note:

The SQL authenticator uses the following formula for the SALTEDHASHED password:

{SCRYPT-BSC} + plain text salt + base64Encode(scrypt{salt + plain text password})

The formula shown uses the default value of SCRYPT-BSC. If you specify a value other than SCRYPT-BSC for the password algorithm, then the formula will change to use that value instead. Because the SQL Authenticator uses a string type to hold the hashed password value, this formula uses base64 encoding so that the bytes produced by the password algorithm can be stored as strings in the RDBMS tables.

Table 13-1 describes the password algorithms that WebLogic Server supports. Some of the algorithms offer two settings: a standard configuration appended with -BSC and a hardened, more computationally expensive configuration appended with -ADV.

Table 13-1 Supported Password Algorithms

Password Algorithm Description
SCRYPT-BSC (Default)

SCRYPT-BSC is the default password algorithm.

  • 16,384 iterations
  • Block size of 16
  • Parallel factor of 1
  • 32-byte hash length
  • 16-byte salt length

The Password Style attribute must be set to SALTEDHASHED when this password algorithm is selected.

SCRYPT-ADV
  • 32,768 iterations
  • Block size of 16
  • Parallel factor of 2
  • 32-byte hash length
  • 16-byte salt length

The Password Style attribute must be set to SALTEDHASHED when this password algorithm is selected.

ARGON2-BSC

Specifically, Argon2ID.

  • 10 iterations
  • 47,104 KB memory size
  • Parallel factor of 1
  • 32-byte hash length
  • 16-byte salt length

The Password Style attribute must be set to SALTEDHASHED when this password algorithm is selected.

ARGON2-ADV

Specifically, Argon2ID.

  • 10 iterations
  • 94,208 KB memory size
  • Parallel factor of 2
  • 32-byte hash length
  • 16-byte salt length

The Password Style attribute must be set to SALTEDHASHED when this password algorithm is selected.

PBKDF2-BSC
  • 210,000 iterations
  • 512-bit key length
  • 128-bit salt length

This password algorithm is FIPS-140 compliant.

The Password Style attribute must be set to SALTEDHASHED when this password algorithm is selected.

PBKDF2-ADV
  • 400,000 iterations
  • 512-bit key length
  • 128-bit salt length

This password algorithm is FIPS-140 compliant.

The Password Style attribute must be set to SALTEDHASHED when this password algorithm is selected.

Standard Algorithms You can also specify any standard algorithm that is recognized by a Java Cryptography Extension (JCE) provider that is available at runtime. The Java Cryptography Architecture (JCA) defines the standard algorithm specifications, described at https://docs.oracle.com/en/java/javase/17/docs/specs/security/standard-names.html#algorithm-specifications.

Note:

While all standard algorithms are supported, for security purposes, Oracle recommends that you choose a password hashing algorithm with a work factor of at least 10,000 iterations. SHA-1 and MD based password algorithms are discouraged and should be updated where possible.

SQL Statement Attributes

SQL statement attributes specify the SQL statements used by the provider to access and edit the username, password, and group information in the database. With the default values in the SQL statement attributes, it is assumed that the database schema includes the following tables:

  • users (username, password, [description])

  • groupmembers (group name, group member)

  • groups (group name, group description)

    Note:

    The tables referenced by the SQL statements must exist in the database; the provider will not create them. You can modify these attributes as needed to match the schema of your database. However, if your database schema is radically different from this default schema, you may need to use a Custom DBMS Authentication provider instead.

Configuring the Read-Only SQL Authenticator

The Read-Only SQL Authentication provider's configurable attributes include those that specify the SQL statements used by the provider to list the username, password, and group information in the database. You can modify these attributes as needed to match the schema of your database.

Configuring the Custom DBMS Authenticator

The Custom DBMS Authentication provider, like the other RDBMS Authentication providers, uses a relational database as its data store for user, password, and group information. Use this provider if your database schema does not map well to the SQL schema expected by the SQL Authenticator. In addition to the attributes described in Common RDBMS Authentication Provider Attributes, the Custom DBMS Authentication provider's configurable attributes include those for the plug-in class.

Plug-In Class Attributes

A Custom DBMS Authentication provider requires that you write a plug-in class that implements the weblogic.security.providers.authentication.CustomDBMSAuthenticatorPlugin interface. The class must exist in the system classpath and must be specified in the Plug-in Class Name attribute for the Custom DBMS Authentication provider. Optionally, you can use the Plugin Properties attribute to specify values for properties defined by your plug-in class.