Introduction to Securing WebLogic Resources
Overview of Securing WebLogic Resources
Audience for This Guide
Terms and Concepts
Securing WebLogic Resources: Main Steps
Types of WebLogic Resources
Overview of WebLogic Resource Types
Administrative Resources
Application Resources
Enterprise Information Systems (EIS) Resources
COM Resources
Java DataBase Connectivity Resources
Java Messaging Service Resources
Java Naming and Directory Interface (JNDI) Resources
Server Resources
Layered Security Scheme for Server Resources
Security Policies for Server Resources
MBean Protections
How the WebLogic Security Service Verifies Layered Protections
Example of Layered Protection for a Server Resource
Maintaining a Consistent Security Scheme
Permissions for Starting and Shutting Down Servers
Permissions for Using the weblogic.Server Command
Permissions for Using the Node Manager
Shutting Down a WebLogic Server Instance
URL (Web) and EJB (Enterprise JavaBean) Resources
Techniques for Securing URL and EJB Resources
Using the WebLogic Server Administration Console
Using Deployment Descriptors
Using the Administration Console and Deployment Descriptors
Prerequisites for Securing URL and EJB Resources
Understanding How to Check Security Roles and Security Policies
Understanding What to Do on Future Redeploys of the WebLogic Resource
How to Change the Check Roles and Policies and Future Redeploys Settings
Understanding How These Settings Interact
Using the Combined Technique to Secure Your URL and EJB Resources
Copying Security Configurations
Reinitializing Security Configurations
Web Service Resources
Users and Groups
Overview of Users and Groups
Creating Users
Adding Users to Groups
Modifying Users
Deleting Users
Default Groups
Creating Groups
Nesting Groups
Modifying Groups
Deleting Groups
Security Roles
Overview of Security Roles
Dynamic Role Mapping
Types of Security Roles: Global Roles and Scoped Roles
Using the Administration Console to Create Security Roles
Default Global Roles
Protected MBean Attributes and Operations
Default Group Associations
Components of a Security Role: Role Conditions, Expressions, and Role Statements
Working with Global Roles
Creating Global Roles
Modifying Global Roles
Deleting Global Roles
Working with Scoped Roles
Creating Scoped Roles
Step 1: Select the WebLogic Resource
Step 2: Create the Scoped Role
Step 3: Create the Role Conditions
Modifying Scoped Roles
Deleting Scoped Roles
Security Policies
Overview of Security Policies
Security Policy Granularity and Inheritance
Security Policy Storage and Prerequisites for Use
Default Security Policies
Protected Public Interfaces
Components of a Security Policy: Policy Conditions, Expressions, and Policy Statements
Working with Security Policies
Creating Security Policies
Step 1: Select the WebLogic Resource
Step 2: Create the Policy Conditions
Modifying Security Policies
Deleting Security Policies