
Oracle Fusion Middleware 12c (12.1.2)
Oracle WebLogic Server - Tasks
Secure
Learn About WebLogic Server Security
- Understand security fundamentals
- Understand WebLogic Server security
- Understand WebLogic security management
- Glossary
Configure Security for the Environment
- Configure security for a WebLogic domain
- Secure a production environment
- Manage the embedded LDAP server
- Manage the RDBMS security store
- Configure security for a cluster environment
- Configure security providers
Configure Authentication
- Choose an authentication provider
- Authenticate against an RDBMS system
- Authenticate against an LDAP server
- Authenticate against a Windows NT domain
- Authenticate a remote user
- Configure Kerberos
- Configure SAML
- Manage users and groups
Configure Authorization
Secure Applications and Resources
- Secure resources using roles and policies
- Secure JDBC resources
- Secure WLST
- Secure Web services
- Secure resource adapters
- Integrate WebLogic security with Spring security
- Secure transaction communications
- Secure Node Manager
Configure SSL
- Configure keys, certificates, and trusted certificate authorities
- Set up SSL: main steps
- Configure two-way SSL
- Configure a host name verifier
- Configure X.509 certificate revocation checking
- Configure the OPSS Keystore Service
Customize Security
Program Security
- Understand WebLogic security programming
- Program security for Web applications
- Program security for EJBs
- Program security-aware clients
- Program JAAS authentication in Java clients
- Program SSL authentication in Java clients
- Program JMX applications to manage security realms
- Program network connection filters
- Program CertPath building and validation
- Use Java EE Security