Understanding WebLogic Security

      

Introduction and Roadmap

Document Scope

Document Audience

Guide to this Document

Related Information

Security Samples and Tutorials

 

Security Examples in the WebLogic Server Distribution

Overview of the WebLogic Security Service

Introduction to the WebLogic Security Service

Features of the WebLogic Security Service

Balancing Ease of Use and Customizability

New and Changed Features in This Release

Security Fundamentals

Auditing

Authentication

 

Subjects and Principals

 

Java Authentication and Authorization Service (JAAS)

JAAS LoginModules

JAAS Control Flags

 

CallbackHandlers

 

Mutual Authentication

 

Identity Assertion Providers and LoginModules

 

Identity Assertion and Tokens

 

Challenge Identity Assertion

 

Servlet Authentication Filters

 

Types of Authentication

Username/Password Authentication

Certificate Authentication

Digest Authentication

Perimeter Authentication

How is Perimeter Authentication Accomplished?

How Does WebLogic Server Support Perimeter Authentication?

Security Assertion Markup Language (SAML)

 

SAML Framework Concepts

 

SAML Components Provided in WebLogic Server

SAML security providers

Single Sign-On Services

Web Services support for SAML Token Profile 1.1

Single Sign-On (SSO)

 

Web Browsers and HTTP Clients via SAML

 

Desktop Clients

Authorization

 

WebLogic Resources

 

Security Policies

 

ContextHandlers

 

Access Decisions

 

Adjudication

Identity and Trust

 

Private Keys

 

Digital Certificates

 

Certificate Authorities

 

Certificate Lookup and Validation

Secure Sockets Layer (SSL)

 

SSL Features

 

SSL Tunneling

 

One-way/Two-way SSL Authentication

 

Host Name Verification

 

Trust Managers

 

Asymmetric Key Algorithms

 

Symmetric Key Algorithms

 

Message Digest Algorithms

 

Cipher Suites

Firewalls

 

Connection Filters

 

Perimeter Authentication

J2EE and WebLogic Security

 

J2SE 5.0 Security Packages

The Java Secure Socket Extension (JSSE)

Java Authentication and Authorization Services (JAAS)

The Java Security Manager

Java Cryptography Architecture and Java Cryptography Extensions (JCE)

Java Authorization Contract for Containers (JACC)

 

Common Secure Interoperability Version 2 (CSIv2)

Security Realms

Introduction to Security Realms

Users

Groups

Security Roles

Security Policies

security providers

 

Security Provider Databases

What Is a Security Provider Database?

Security Realms and Security Provider Databases

Embedded LDAP Server

RDBMS Security Store

 

Types of security providers

Authentication Providers

Identity Assertion Providers

Principal Validation Providers

Authorization Providers

Adjudication Providers

Role Mapping Providers

Auditing Providers

credential mapping Providers

Certificate Lookup and Validation Providers

Keystore Providers

Realm Adapter Providers

Security Provider Summary

 

security providers and Security Realms

WebLogic Security Service Architecture

WebLogic Security Framework

 

The Authentication Process

 

The Identity Assertion Process

 

The Principal Validation Process

 

The Authorization Process

 

The Adjudication Process

 

The Role Mapping Process

 

The Auditing Process

 

The credential mapping Process

 

The Certificate Lookup and Validation Process

Single Sign-On with the WebLogic Security Framework

 

Single Sign-On with SAML 1.1

WebLogic Server Acting a SAML 1.1 Source Site

POST Profile

Artifact Profile

Weblogic Server Acting as SAML 1.1 Destination Site

POST Profile

Artifact Profile

 

Single Sign-On and SAML 2.0

service provider Initiated Single Sign-On

identity provider Initiated Single Sign-On

 

Desktop SSO Process

SAML Token Profile Support in WebLogic Web Services

 

Sender-Vouches Assertions

 

Holder-of-Key Assertion

The Security service provider Interfaces (SSPIs)

Weblogic security providers

 

WebLogic Authentication Provider

 

Alternative Authentication Providers

 

Password Validation Provider

 

WebLogic Identity Assertion Provider

 

SAML Identity Assertion Provider for SAML 1.1

 

SAML 2.0 Identity Assertion Provider

 

Negotiate Identity Assertion Provider

 

WebLogic Principal Validation Provider

 

WebLogic Authorization Provider

 

WebLogic Adjudication Provider

 

WebLogic Role Mapping Provider

 

WebLogic Auditing Provider

 

WebLogic credential mapping Provider

 

SAML credential mapping Provider for SAML 1.1

 

SAML 2.0 credential mapping Provider f

 

PKI credential mapping Provider

 

WebLogic CertPath Provider

 

Certificate Registry

 

Versionable Application Provider

 

WebLogic Keystore Provider

 

WebLogic Realm Adapter Providers

Terminology


  Back to Top       Previous