Upgrading WebLogic Application Environments
WebLogic Server 10.3 Compatibility with Previous Releases
This section describes important compatibility information that you should consider before upgrading to WebLogic Server 10.3.
Also see Compatibility Statement for Oracle WebLogic Server 10g Release 3 (10.3).
Compatibility considerations are provided in the following categories:
- JMX 1.2 Implementation
- Dynamic Configuration Management
- Modular Configuration and Deployment of JDBC Resources
- JDBC Feature Changes
- Modular Configuration and Deployment of JMS Resources
- JMS Message ID Format
- Improved Message Paging
- Thread Management
- JTA Transaction Log Migration
- Security
- Web Services
- Web Applications, JSPs, and Servlets
- XML Implementation
- XMLBeans and XQuery Implementation
- WebLogic Administration and Configuration Scripts
- Deployment Descriptor Validation and Conversion
- Deprecated Startup and Shutdown Classes
- Administration Console
- Resource Adapters
- WLEC
- SNMP MIB Refresh Interval and Server Status Check Interval No Longer Used
- Backward Compatibility Flags
- Deprecated and Removed APIs
JMX 1.2 Implementation
As of WebLogic Server 9.0, WebLogic Server uses the Java Management Extensions (JMX) 1.2 implementation that is included in JDK 5.0. Prior to 9.0, WebLogic Server used its own JMX implementation based on the JMX 1.0 specification.
The JMX 1.2 reference implementation introduces serialization incompatibilities. Despite these incompatibilities in the reference implementation, JMX clients created for WebLogic Server 8.1 can be used with 9.2 and 10.3 as follows:
- If your JMX client accesses only WebLogic Server MBeans and uses only weblogic.management.MBeanHome, it can be run in a WebLogic Server 9.2, 10.0, or 10.3 instance without being upgraded.
- A JMX client in which WebLogic Server 8.1 classes are used can interact with 9.2, 10.0, or 10.3 JMX agents if all of the following are true:
- The client accesses only WebLogic Server MBeans.
- The client uses only weblogic.management.MBeanHome; it does not use the JDK MBeanServer interface.
- The WebLogic Server classes are from 8.1 SP4 or 7.0 SP6 with any appropriate patches applied.
- If the standard JMX MBeanServer interface is used in your JMX client, either to interact with WebLogic Server MBeans or to create and access custom MBeans, include the following JDK startup option for the WebLogic Server 9.2, 10.0, or 10.3 instance: -Djmx.serial.form=1.0
This startup option causes the JVM to use JMX 1.0 class descriptions when it is serializing objects. The option is required when JMX 1.0 clients communicate with JMX 1.2 agents using the standard JDK classes.
- If your JMX client interacts with security provider MBeans, see Security MBeans.
Oracle recommends that you update your JMX clients to be compliant with WebLogic Server 10.3. Prior to 9.0, WebLogic Server supported a typed API layer over its JMX layer. It was possible for your JMX application classes to import type-safe interfaces for WebLogic Server MBeans, retrieve a reference to the MBeans through the weblogic.management.MBeanHome interface, and invoke the MBean methods directly.
As of 9.0, the MBeanHome interface is deprecated. Instead of using this API-like programming model, all JMX applications should use the standard JMX programming model, in which clients use the javax.management.MBeanServerConnection interface to discover MBeans, attributes, and attribute types at runtime. In this JMX model, clients interact indirectly with MBeans through the MBeanServerConnection interface.
If any of your classes import the type-safe interfaces (available under weblogic.management), Oracle recommends that you update them to use the standard JMX programming model. For more information, see “Understanding WebLogic Server MBeans” in Developing Custom Management Utilities with JMX.
Dynamic Configuration Management
Configuration attributes are classified as dynamic or non-dynamic.
- Changes to dynamic configuration attributes are available as soon as they are activated, without restarting the affected server or system resource. These changes are made available to the server and runtime hierarchies once they are activated.
- Changes to non-dynamic configuration attributes are not immediately available. When a non-dynamic configuration attribute is changed, the server or system resource must be restarted to make the change effective.
WebLogic Server 9.0 introduced a change management process to provide a secure, predictable means for applying configuration changes in a domain. A batch change mechanism changes the way dynamic changes are applied when they are mixed with non-dynamic changes. Specifically, when a configured server or system resource is affected by a change to a non-dynamic attribute, no other changes (even dynamic changes) will take effect, in current or future batches, until after the server or system resource is restarted. In this case, Oracle recommends that you restart the entity as soon as possible after the batch change is completed to ensure the system is in a consistent state and to allow future changes to be accepted.
You should test your configuration scripts to determine whether a non-dynamic change has been applied, and if so, restart the server. To determine whether a change is non-dynamic and requires a server restart:
- Prior to activating a change you can:
- View the change listed in the Change Center in the Administration Console, as described in “Dynamic and Non-Dynamic Changes” in “Using the Change Center” in Introduction to WebLogic Server.
- Use the following WLST commands: isRestartRequired or showChanges. For more information, see “WLST Command and Variable Reference” in WebLogic Scripting Tool.
- After you activate a change you can:
- Review the server log to identify whether the change is categorized as non-dynamic.
- Check the value of the RestartRequired or PendingRestartSystemResources attribute that is associated with the changed object, if applicable.
To determine which security attributes are dynamic or non-dynamic, see “Security Configuration MBeans” in Securing WebLogic Server.
For more information, see “Managing Configuration Changes” in Understanding Domain Configuration.
Modular Configuration and Deployment of JDBC Resources
As of WebLogic Server 9.0, the number of JDBC resource types was reduced to simplify JDBC configuration and to reduce the likelihood of configuration errors. Now, instead of configuring a JDBC connection pool and then configuring a data source or tx data source to point to the connection pool and bind to the JNDI tree, you can configure a data source that encompasses a connection pool. For more information about simplified JDBC resource configuration introduced in WebLogic Server 9.0, see “Simplified JDBC Resource Configuration” in Configure WebLogic JDBC.
The WebLogic Upgrade Wizard automatically converts JDBC data sources, connection pools, MultiPools, and data source factories to their new counterparts in WebLogic Server 10.3, as described in the following sections:
Each upgraded JDBC module contains an internal properties section. WebLogic Server uses internal properties to manage the data sources for backward compatibility. Also, some legacy attributes are preserved as properties in the Properties attribute of the JDBC data source file. Do not manually edit any internal properties.
For information about JDBC features, methods, interfaces, and MBeans that were deprecated as of WebLogic Server 9.0, see “Deprecated JDBC Features, Methods, Interfaces, and MBeans” in the Release Notes.
JDBC Data Sources and Connection Pools
The Upgrade Wizard converts legacy JDBC data source/connection pool pairs to two data source system resource modules, one for the data source and one for the connection pool:
- The data source that replaces the existing data source or tx data source defines the data source parameters and refers to the second data source for its connection pool and related attributes.
- The data source that replaces the connection pool contains the JDBC driver parameters, the connection pool parameters, and the XA parameters.
Only data sources that are converted as part of a domain upgrade can refer to another data source for its connection pool. In all other cases, each data source contains its own pool of database connections.
During an upgrade, the Upgrade Wizard sets the GlobalTransactionsProtocol parameter for a data source based on the type of data source being converted (tx or non-tx) and the type of driver used in the related connection pool, as noted in Table B-1.
Table B-1 Parameter Settings for Global Transaction Protocol Parameter Setting Legacy Data Source Type Driver Type Emulate Two-Phase Commit GlobalTransactionProtocol Tx Data Source XA N/A TwoPhaseCommit Tx Data Source Non-XA False OnePhaseCommit (by default; not explicitly set) Tx Data Source Non-XA True EmulateTwoPhaseCommit1 Data Source Non-XA N/A None
1Depending on your environment, you may want to consider using the LoggingLastResource (LLR) transaction protocol in place of the EmulateTwoPhaseCommit protocol for transaction processing because of its performance benefits. For more information see “Understanding the Logging Last Resource Transaction Option” in Configure WebLogic JDBC.
MultiPools
The Upgrade Wizard converts a MultiPool to a multi-data source, which is another instance of a data source object that provides load balancing and/or failover between data sources.
Data Source Factories
Data source factories are deprecated as of WebLogic Server 9.0 and are included for backward compatibility only. No conversion of data source factories is required.
JDBC Feature Changes
The following sections describe changes to JDBC support:
- JDBC 4.0 Support
- Updated WebLogic Type 4 JDBC Drivers
- Oracle 11g RAC Support
- JDBC Debugging Enhancements
JDBC 4.0 Support
As of 10.3, WebLogic Server is compliant with the JDBC 4.0 specification, with the enhancements and exceptions described in “JDBC 4.0 Support” in the Release Notes.
The WebLogic Type 4 JDBC driver for Oracle has been deprecated in WebLogic Server 10.3. It will be removed in the next release of WebLogic Server. Instead of this deprecated driver, you should use the Oracle Thin Driver that is also provided with WebLogic Server. For details about the Oracle Thin Driver, see “Using Third-Party JDBC Drivers with WebLogic Server” in Configure WebLogic JDBC.
Updated WebLogic Type 4 JDBC Drivers
The WebLogic Type 4 JDBC drivers included with WebLogic Server are provided from DataDirect. As of 10.3, the drivers have been updated to DataDirect Version 3.7. For information about changes to these drivers, including to support JDBC 4.0, see “Updated WebLogic Type 4 JDBC Drivers” in the Release Notes.
Oracle 11g RAC Support
WebLogic Server 10.3 includes support for Oracle 11g and 11g RAC (Real Application Clusters).
See “Using WebLogic Server with Oracle RAC” in Configure WebLogic JDBC.
JDBC Debugging Enhancements
The JDBC subsystem uses the new system-wide WebLogic Diagnostic Service for centralized debugging access and logging.
See Using the WebLogic Diagnostic Framework Console Extension.
Modular Configuration and Deployment of JMS Resources
As of WebLogic Server 9.0, JMS configurations are stored as modules, defined by XML documents that conform to the new weblogic-jmsmd.xsd schema. With modular deployment of JMS resources, you can promote your application and the JMS configuration from one environment to another. For example, you can promote your application and the required JMS configuration from a testing environment to a production environment, without opening an EAR file and without extensive manual JMS re-configuration.
For more information, see:
- “New and Changed JMS Features in This Release” in Configure WebLogic JMS (published for WebLogic Server 9.0).
- “Understanding JMS Resource Configuration” in Configure WebLogic JMS.
- “Deploying JDBC, JMS, and WLDF Application Modules” in Deploying Applications to WebLogic Server.
The WebLogic Upgrade Wizard automatically converts pre-9.0 JMS resources to a JMS Interop module file named interop-jms.xml, which is copied to the domain's config\jms directory. For more information, see “JMS Interop Modules” in Configure WebLogic JMS.
Please note the following JMS configuration changes:
- When generating new JMS resources, define all attributes in the JMS module (that is, not using the pre-9.0 configuration file).
- The Allow Persistent Downgrade option enables you to specify whether JMS clients receive an exception when they send persistent messages to a destination targeted to a JMS server that does not have a persistent store configured. This option is provided for backward compatibility with previous releases.
By default, the option is set to false specifying that clients will receive an exception when they send persistent messages to a JMS server for which no store is configured. When the option is set to true, persistent messages are downgraded to non-persistent, but, the send operations are allowed to continue. This parameter is effective only when the Store Enabled parameter is disabled (that is, when it is set to false).
For more information, see “AllowsPersistentDowngrade” in “JMSServerBean” in WebLogic Server MBean Reference.
- A Temporary Template is created, by default, for JMS Servers. In previous releases, no default template was provided. You can also configure a temporary template, using the JMS server's Temporary Template attribute.
You can control whether the JMS Server can host a temporary destination by setting the Hosts Temporary Destinations attribute. In previous releases, a JMS Server was enabled to host temporary destinations if and only if the TemporaryTemplate attribute was set.
- JMS templates specified for distributed destinations are no longer supported as of WebLogic Server 9.0, and they will be ignored. As of WebLogic Server 9.0, this functionality is replaced by uniform distributed destinations. For more information, see “Creating Uniform Distributed Destinations” in “Configuring Distributed Destinations” in Configure WebLogic JMS.
- The AllowCloseInOnMessage attribute for JMS Connection Factories is enabled by default. For more information, see ClientParamsBean in WebLogic Server MBean Reference.
- The getExpirationLoggingPolicy attribute in the DeliveryFailureParamsBean has been deprecated. Oracle recommends that you update your applications to use the Message Life Cycle Logging feature described in “Message Life Cycle Logging” in Configure WebLogic JMS. It should also be noted that the getExpirationLoggingPolicy attribute now removes any leading and trailing white space that may have been embedded in an application.
JMS Message ID Format
As of WebLogic Server 9.0, the format of the JMS message ID has changed. Oracle will continue to support the pre-9.0 format for existing consumers, producers, and servers. For example, existing JMS consumers may continue to view messages in the pre-9.0 format, even when received from a new JMS producer and JMS server.
Improved Message Paging
The message paging feature for freeing up virtual memory during peak message load situations is always enabled on JMS servers. Additionally, administrators no longer need to create a dedicated message paging store since paged out messages can be stored in a directory on your file system. However, for the best performance you should specify that messages be paged to a directory other than the one used by the JMS server's persistent store.
See “Paging Out Messages To Free Up Memory” in WebLogic Server Performance and Tuning.
Thread Management
Oracle recommends using Work Manager concepts to manage threads, as execute queues are no longer the default method used as of WebLogic Server 9.0. You define the rules and constraints for your application by defining a Work Manager and applying it either globally to a WebLogic Server domain or specifically to an application component. For more information, see “Using Work Managers to Optimize Scheduled Work” in Configuring Server Environments.
In WebLogic Server 8.1, processing was performed in multiple execute queues. If you had been using execute queues to improve performance in 8.1, you may continue to use them after you upgrade your application domains. Oracle provides a use81-style-execute-queues flag that enables you to disable the self-tuning execute pool and provide backward compatibility for upgraded applications to continue to use user-defined execute queues. For information about enabling the backward compatibility flag, and configuring and monitoring execute queues, see “How to Enable the WebLogic 8.1 Thread Pool Model” in WebLogic Server Performance and Tuning.
JTA Transaction Log Migration
All JTA domain configuration options are persisted from the legacy configuration file. The only changes are at the server level. As of WebLogic Server 9.0, the Transaction Manager uses the default WebLogic persistent store to store transaction log records. During the upgrade, the Upgrade Wizard copies transaction log records to the default store. The transaction log file prefix from the existing server configuration is used only to locate the transaction log (.tlog) files during an upgrade; it is not preserved after the upgrade.
If the entire domain resides on a single machine, the Upgrade Wizard handles the upgrade (and copies transaction log records to the default store) for all Managed Servers during the initial domain upgrade. If Managed Servers reside on separate machines, upgrade each Managed Server individually, as described in Upgrade Your Application Environment.
Please note the following:
- When an explicit upgrade is performed (see Upgrading a Domain), transaction recovery does not run during the upgrade process, but it starts running when you start the server(s).
- When an implicit upgrade is performed (see Upgrading a Domain at Administration Server Startup (Implicit Mode)), transaction recovery runs during the server boot process.
If you have put your transaction log files in network storage in preparation for Transaction Recovery Service migration, the log file location is not preserved after the upgrade. In this release, the WebLogic Server Transaction Manager uses the WebLogic default persistent store to store transaction log files. You can achieve the same result by moving the location of the WebLogic default persistent store to a network location. Note that manually copy the DAT file from the default location of the current default store to the new location of the default store.
If transactions will span multiple domains, configure your domain to enable inter-domain transactions. For more information, see “Configuring Domains for Inter-Domain Transactions” in Programming WebLogic JTA.
Security
The following sections identify changes to security.
- Windows NT Authentication Provider Deprecated
- XACML security providers
- SAML V2 Providers
- SAML 2.0 Providers
- RDBMS Security Store
- Password Validation Provider
- Security MBeans
- Password Encryption
- Security for HTTP Requests
- Secure Access to MBeanHome
- Message-Level Security in Web Services
Windows NT Authentication Provider Deprecated
The Windows NT Authentication provider is deprecated as of WebLogic Server 10.0. Use one or more of the other supported Authentication providers instead.
XACML security providers
As of 9.2, WebLogic Server includes two new security providers, the XACML Authorization provider and the XACML Role Mapping provider. Previous releases of WebLogic Server used an authorization provider and a role mapping provider based on a proprietary security policy language. These XACML security providers support the eXtensible Access Control Markup Language (XACML) 2.0 standard from OASIS. These providers can import, export, persist, and execute policy expressed using all standard XACML 2.0 functions, attributes, and schema elements.
WebLogic domains created using WebLogic Server 10.3 include the XACML providers by default. The new XACML providers are fully compatible with policies and roles created using the WebLogic Authorization provider (DefaultAuthorizer) and WebLogic Role Mapping provider (DefaultRoleMapper). Existing WebLogic domains that you upgrade to 10.3 will continue to use the authorization and role mapping providers currently specified, such as third-party partner providers or the original WebLogic Authorization and Role Mapping providers. If you wish, you can migrate existing domains from using WebLogic Server proprietary providers to the XACML providers, including performing bulk imports of existing policies. For more information, see the Security for Oracle WebLogic Server 10g Release 3 page.
SAML V2 Providers
For SAML 1.1 support, new versions of the SAML credential mapping provider and SAML identity assertion provider were added in WebLogic Server 9.2. The SAML credential mapping V1 provider and SAML Identity Assertion V1 provider are deprecated; you should use the V2 versions of the SAML credential mapping and SAML identity assertion providers.
Although the version number of the providers has been incremented to V2, the new SAML security providers implement the SAML 1.1 standard, as did the V1 providers.
For web single sign-on, the SAML 1.1 providers described in this section are not compatible with a WebLogic Server instance that has been configured with SAML 2.0 services.
SAML 2.0 Providers
For SAML 2.0 support, the SAML 2.0 credential mapping provider and SAML 2.0 identity assertion provider were added in WebLogic Server 10.3. These new providers can be used, respectively, to generate and consume SAML 2.0 assertions in the following use cases:
- SAML 2.0 Web Single Sign-On (SSO) Profile
- WS-Security SAML Token Profile version 1.1
For SAML 2.0 Web SSO, the assertions generated by the SAML 2.0 credential mapping provider may be consumed only by the SAML 2.0 identity assertion provider. They are not compatible with SAML 1.1 assertions.
WebLogic Server 10.3 Web Services now supports SAML Token Profile 1.1. This feature includes support for SAML 2.0 and SAML 1.1 assertions, and is backwards compatible with SAML Token Profile 1.0 SAML tokens are configured for a Web Service through use of the appropriate WS-SecurityPolicy assertions.
SAML Token Profile 1.1 is supported only through WS-SecurityPolicy. The earlier “WLS 9.2 Security Policy” supports SAML Token Profile 1.0/SAML 1.1 only.
RDBMS Security Store
WebLogic Server 10.3 provides the option of using an external RDBMS as a datastore that is used by the following security providers:
- XACML Authorization provider
- XACML Role Mapping provider
- The following providers for SAML 1.1:
- SAML identity assertion provider V2
- SAML credential mapping provider V2
- The following providers for SAML 2.0:
- SAML 2.0 identity assertion provider
- SAML 2.0 credential mapping provider
- WebLogic credential mapping provider
- PKI credential mapping provider
- Certificate Registry
This datastore, called the RDBMS security store, is strongly recommended for the use of SAML 2.0 services in two or more WebLogic Server instances in that domain, such as in a cluster. When the RDBMS security store is configured in a domain, an instance of any of the preceding security providers that has been created in the security realm automatically uses only the RDBMS security store as a datastore, and not the embedded LDAP server. WebLogic security providers configured in the domain that are not among those in the preceding list continue to use their respective default stores; for example, the WebLogic Authentication provider continues to use the embedded LDAP server.
In order to use the RDBMS security store, the preferred approach is first to create a domain in which the external RDBMS server is configured. Prior to booting the domain, you create the tables in the datastore that are required by the RDBMS security store. The WebLogic Server installation directory contains a set of SQL scripts that create these tables for each supported database.
If you have an existing domain in which you want to use the RDBMS security store, you should create the new domain, then migrate your security realm to it. Oracle does not recommend “retrofitting” the RDBMS security store to an existing domain. For more information, see “Managing the RDBMS Security Store” in Securing WebLogic Server.
Password Validation Provider
WebLogic Server 10.3 includes a Password Validation provider, which can be configured with one of the following authentication providers to enforce a set of configurable password composition rules:
- WebLogic Authentication provider
- SQL Authenticator provider
- LDAP Authentication provider
- Active Directory Authentication provider
- iPlanet Authentication provider
- Novell Authentication provider
- Open LDAP Authentication provider
When a password is created or modified using an authentication provider that has been configured with the Password Validation provider, the password is automatically validated against a set of composition rules. The password composition rules are configurable and can govern the minimum length of passwords, minimum number of alphabetic or numeric characters that are required, the number of non-alphanumeric characters that are required, and more.
Security MBeans
Table B-2 lists the changes to security MBeans as of WebLogic Server 9.0.
Table B-2 Changes to Security MBeans as of WebLogic Server 9.0 Type of Security MBean Description All security MBeans In WebLogic Server 8.1, when you updated a security MBean attribute, the values were available to the security configuration and management hierarchy immediately, and to the security runtime hierarchy following a server reboot. As of WebLogic Server 9.0, whether a security MBean attribute change is effective and available to the configuration, management, and runtime hierarchies immediately or upon server reboot is controlled by setting that attribute as dynamic or non-dynamic. For more information, see Dynamic Configuration Management. RealmMBean, UserLockoutManagerMBean, and all security provider MBeans For security provider MBeans (only):
- The wls_getDisplay method is deprecated. In its place, you should use the new getName method. In addition, the following security methods have been removed:
wls_getAttributeTag
wls_getConstructorTag
wls_getMBeanTag
wls_getNotificationTag
wls_getOperationTag- The weblogic.Admin tools and pre-9.2 JMX security APIs can no longer be used to configure security MBeans. These utilities and APIs can still be used, however, to view and invoke methods on the security MBeans.
- When adding or removing a security provider, reboot the server before any changes will take effect.
- When modifying an existing security provider, if you modify any non-dynamic attributes, the server must be rebooted before any (that is, non-dynamic or dynamic) changes will take effect. For more information, see Dynamic Configuration Management.
All custom security provider MBeans
- By default, all custom security provider MBeans attributes are non-dynamic. For more information, see Dynamic Configuration Management.
- You can set an MBean attribute to be dynamic by setting Dynamic="true" for the attribute within the MDF file. For example:
<MBeanAttribute
Name of = "Foo"
Type = "java.lang.String"
Dynamic = "true"
Description = "Specifies that this attribute is a dummy."
/>
Password Encryption
To prevent unauthorized access to sensitive data such as passwords, some attributes in configuration MBeans are encrypted. The attributes persist their values in the domain configuration files as an encrypted string. For further security, the in-memory value is stored in the form of an encrypted byte array to help reduce the risk of the password being snooped from memory.
In pre-9.0 releases, you could edit the config.xml file to specify an encrypted attribute, such as a password, in clear-text or encrypted format. In this case, when booted, the WebLogic Server will encrypt the information the next time it writes to the file.
As of WebLogic Server 9.0, when operating in production mode, the password of an encrypted attribute must be encrypted in the configuration files. In development mode, the password of an encrypted attribute can be either encrypted or clear-text.
You can use the weblogic.security.Encrypt command-line utility to encrypt the passwords, as follows:
java weblogic.security.EncryptYou are prompted to enter a password, and the command returns the encrypted version. Then, copy the encrypted password returned into the appropriate file.
This utility is not just used for passwords in the configuration files. It can also be used to encrypt passwords in descriptor files (for example, a JDBC or JMS descriptor) and in deployment plans. For more information, see “encrypt” in “Using the WebLogic Server Java Utilities” in Oracle WebLogic Server Command Reference.
Security for HTTP Requests
By default, when an instance of WebLogic Server 10.3 responds to an HTTP request, its HTTP response header does not include the WebLogic Server name and version number. This behavior is different from releases prior to WebLogic Server 9.0.
For more information about ensuring security, see “Securing the WebLogic Security Service” in “Ensuring the Security of Your Production Environment” in Securing a Production Environment.
Secure Access to MBeanHome
In pre-9.0 releases of WebLogic Server, anonymous access to MBeanHome was enabled by default. With the security enhancements delivered as of WebLogic Server 9.0, anonymous access to MBeanHome is no longer allowed.
Although doing so is not recommended, you can re-enable anonymous access by specifying the following flag when starting the server:
-Dweblogic.management.anonymousAdminLookupEnabled
Message-Level Security in Web Services
As of WebLogic Server 9.0, message-level security in Web Services was enhanced to use the standards-based Web Services Policy Framework (WS-Policy). WS-Policy provides a flexible and extensible grammar for expressing the capabilities, requirements, and general characteristics of entities in an XML Web Services-based system. For more information about WS-Policy, see “Using WS-SecurityPolicy 1.2 Policy Files” in Securing WebLogic Web Services.
In 8.1, the implementation was based on an OASIS implementation of the Web Services Security (WSS) standard. This implementation is supported for backward compatibility, but is deprecated as of 9.0. For more information, see http://www.oasis-open.org/committees/tc_home.php?wg_abbrev=wss.
Web Services
WebLogic Server 8.1 Web Services can be run in 10.3, although the 8.1 Web Services run-time engine has been deprecated as of 9.0.
No web service upgrade is required going from 9.2 to 10.0, or from 10.0 to 10.3.
The WebLogic Server 7.0 Web Services need to be upgraded to at least 8.1 in order to run in 10.3. For more information, see “Upgrading WebLogic Web Services” in Programming WebLogic Web Services.
Oracle strongly recommends that you upgrade, to 10.3, all of your 8.1 Web Services, including any 7.0 Web Services that have been upgraded to 8.1:
For information about upgrading your existing 8.1 Web Services to 10.3, see “Upgrading WebLogic Web Services From Previous Releases to 10g Release 3” in Getting Started With WebLogic Web Services Using JAX-RPC.
See also Message-Level Security in Web Services.
Web Applications, JSPs, and Servlets
The following sections provide important compatibility information for Web applications, JSPs, and Servlets in WebLogic Server 10.3:
Deprecated and Obsolete Web Application Features
For a list of Web application features that are deprecated or are not supported as of WebLogic Server 10.3, see “Deprecated Functionality” in the Release Notes.
BASIC Authentication with Unsecured Resources
For WebLogic Server versions 9.2 and later, client requests that use HTTP BASIC authentication must pass WebLogic Server authentication, even if access control is not enabled on the target resource.
The setting of the Security Configuration MBean flag enforce-valid-basic-auth-credentials determines this behavior. (The DomainMBean can return the new Security Configuration MBean for the domain.) It specifies whether or not the system should allow requests with invalid HTTP BASIC authentication credentials to access unsecured resources.
The Security Configuration MBean provides domain-wide security configuration information. The enforce-valid-basic-auth-credentials flag effects the entire domain.
The enforce-valid-basic-auth-credentials flag is true by default, and WebLogic Server authentication is performed. If authentication fails, the request is rejected. WebLogic Server must therefore have knowledge of the user and password.
See “Understanding BASIC Authentication with Unsecured Resources” in Programming WebLogic Security for complete information.
Backwards Compatibility Flags
For WebLogic Server 10.3, backward compatibility for WebLogic Server 9.2 or earlier is supported via the backward-compatible element within the jsp-descriptor element, as described in this section and in jsp-descriptor in Developing Web Applications, Servlets, and JSPs for Oracle WebLogic Server.
JSP 2.1 Support and Compatibility With JSP 2.0 Web Applications
JSP 2.1 is supported as of WebLogic Server 10.0. Depending on the version of the Web application (version 2.4 or 2.5) and the setting of the backward-compatible element, Weblogic Server 10.3 also supports JSP 2.0.
See Backwards Compatibility Flags in Developing Web Applications, Servlets, and JSPs for Oracle WebLogic Server for important information about the buffer suffix setting and implicit servlet 2.5 package imports.
Support for JSP 2.0
JSP 2.0 was supported as of WebLogic Server 9.0, and continues to be supported as described in Backwards Compatibility Flags. Please note the following changes to the JSP behavior as required in support of JSP 2.0:
- If a JSP does not participate in a session (or if the session in which a JSP participates is invalid), an IllegalStateException is thrown when the following command is executed:
PageContext.getAttribute(name, PageContext.SESSION_SCOPE)If you are not concerned about this type of error, you can catch and ignore it.
- JspWriterImpl now replaces \n with System.getProperty("line.separator") for each printline function. This replacement causes problems with JSPs that:
- Contain multiple page directives that appear on new lines. For example:
<%@ page import="com.foo.bar.*" %>
<%@ page import="com.foo.xyz.*" %>
...- Generate output in XML format.
- Generate an XML declaration following the page directives.
- Are served by Windows systems. In this case, \r\n is output for each page directive.
- Are viewed using Internet Explorer.
When viewed in Internet Explorer, each page directive outputs an empty \r\n and the XML declaration (<?xml version="1.0" encoding="iso-8859-1"?>) appears after every new line. Internet Explorer displays an error message indicating that it cannot locate the declaration and that the page cannot be viewed, even though it can be compiled.
To work around any issues caused by changes to JspWriterImpl, you can perform one or both of the following tasks:
- Define the XML declaration at the top of the page.
- Group the page directives into a single declaration, for example:
<%@ page import="com.foo.bar.*, com.foo.baz.*"
contentType="text/html" pageEncoding="UTF-8" errorPage="Error.jsp" %>- The JSP <param name> tag no longer allows run-time expression values. For example:
<jsp:param name="<%= AdminActions.RETURN_LINK %>" value="<%= returnlink %>" />You can continue to support this feature by disabling the Do not set backwards compatibility flags upgrade option during the domain upgrade, as described in Select Upgrade Options, or enabling the backwardCompatible flag in the weblogic.xml file, as follows:
<jsp-descriptor>
<jsp-param>
<param-name>backwardCompatible</param-name>
<param-value>true</param-value>
</jsp-param>
</jsp-descriptor>
Servlet Path Mapping
As of the Servlet 2.3 Specification from Sun Microsystems, which is downloadable at http://java.sun.com/products/servlet/download.html#specs, the following syntax is used to define mappings:
- A servlet path string that contains only the / (forward slash) character indicates the default servlet of the application. The servlet path resolves to the request URI minus the context path; in this case, the path resolves to null.
- A String that begins with an * (asterisk) specifies an extension mapping.
These changes introduce a change in behavior with the following HttpServletRequest methods:
- getPathInfo
- getServletPath
To better illustrate the change in behavior, consider a request /abc/def.html that resolves to ServletA:
- If / maps to ServletA, then servletPath="abc/def.html" and pathInfo=null.
- If /* maps to ServletA, then servletPath="" and pathInfo="abc/def.html".
To ensure that the path info returned is non-null, replace all occurrences of the / (forward slash) servlet mapping string with /*.
XML Implementation
Please note the following changes to XML support as of WebLogic Server 9.0:
- The default XML parser is the XML parser shipped with the Sun Java 2 JDK. The previous default XML parser, the Apache Xerces parser (weblogic.apache.xerces.*), is deprecated as of 9.0.
You can modify the XML parser that is used by default using the Administration Console. For information about configuring the XML parser, see “Difference In Default Parsers Between Versions 8.1 and 9.0 of WebLogic Server” in Programming WebLogic XML.
- As of 9.0, WebLogic Server supports Streaming API for XML (StAX), a standard specification from the Java Community Process that provides an easy and intuitive means of parsing and generating XML documents. StAX gives you more control over XML parsing than the WebLogic XML Streaming API, which is deprecated as of 9.0. For information about using StAX, see “Using the Streaming API for XML (StAX)” in Programming WebLogic XML.
- You can no longer parse XML documents from within a servlet using the setAttribute and getAttribute methods without some preliminary setup. Specifically, as of 9.0, configure a WebLogic Server servlet filter called weblogic.servlet.XMLParsingHelper (deployed, by default, on all WebLogic Server instances) as part of your Web application. For more information, see “Parsing XML Documents in a Servlet” in Programming WebLogic XML.
XMLBeans and XQuery Implementation
As of 9.0, the XMLBean implementation in WebLogic Server has been moved from an internal library (com.bea.xml) to the Apache open source project (org.apache.xmlbeans).
If you used XMLBeans in your WebLogic Server 8.1 applications, perform the following steps:
- Update the package name used by XMLBeans from com.bea.xml to org.apache.xmlbeans.
- Recompile your XMLBean schemas to update the schema metadata (.xsb) files and generated code.
As of 9.0, the XMLQuery (XQuery) implementation conforms to the following specifications:
- XQuery 1.0 and XPath 2.0 Data Model—W3C Working Draft 23 July 2004 available from the W3C Web site at http://www.w3.org/TR/2004/WD-xpath-datamodel-20040723.
- XQuery 1.0: An XML Query Language—W3C Working Draft 23 July 2004 available from the W3C Web site at http://www.w3.org/TR/2004/WD-xquery-20040723.
In WebLogic Server 8.1, the XQuery implementation conformed to XQuery 1.0 and XPath 2.0 Functions and Operators—W3C Working Draft 16 August 2002, available from the W3C Web site at http://www.w3.org/TR/2002/WD-xquery-operators-20020816. The 2002 XQuery implementation is deprecated as of 9.0.
In most cases, simple XQuery and XPath operations in pre-9.0 code will behave the same in 10.0. To ensure that the XQuery and XPath operations produce the expected results, you can review and/or update the existing XMLObject.selectPath() and XMLObject.execQuery() method calls using one of the following methods:
- To guarantee 8.1-style behavior, update the existing method calls to include a new parameter that specifies that the 2002 XQuery engine will be used instead of the new 2004 XQuery engine. For example:
import org.apache.xmlbeans.impl.store.Path;
XmlObject xo = ?
xo.selectPath(".//c", (new XmlOptions()).put(Path._forceXqr12002ForXpathXQuery));
The 2002 XQuery engine is deprecated as of WebLogic Server 9.0, and is available for backward compatibility. It is only used if you specify this parameter. Otherwise, the 2004 XQuery engine is used, by default.
- To guarantee conformance with the 2004 XQuery engine, review your pre-9.0 scripts to identify any changes that may be required with the syntax and/or semantics of the XQuery strings that are passed to the method calls and update methods accordingly.
As of 9.0, the behavior of XMLCursor.moveXML() has changed. In 8.1, a cursor that was inside a moved fragment remained on the original document. As of 9.0, cursors move with fragments.
WebLogic Administration and Configuration Scripts
Due to changes with the MBean hierarchy, Oracle does not guarantee that pre-9.2 configuration and administration scripts (such as WLST, wlconfig, weblogic.Admin, Ant, and so on) will run in 10.3. Oracle recommends that you update your scripts to take advantage of the new features provided as of WebLogic Server 10.3. For more information about new features and changes in the MBean hierarchy, see “What's New in WebLogic Server” in the Release Notes.
For additional information about upgrading your application infrastructure and the scripting tools that have been deprecated, see Step 1: Upgrade Your Application Infrastructure.
Deployment Descriptor Validation and Conversion
This section describes changes in the use of deployment descriptors in a WebLogic Server environment, as of release 9.0:
- Deployment descriptor validation is more strict as of the 9.0 release of the EJBGen and ejbc tools. For example, an error is returned if a cmr-field is defined in @ejbgen:relation, but there are no methods tagged with @ejbgen:cmr-field in the Bean class.
ejbc is deprecated as of WebLogic Server 9.0; you should use appc instead. For more information, see “appc Reference” in Programming WebLogic Enterprise JavaBeans.
- In pre-9.0 versions of WebLogic Server, applications that define multiple modules, as illustrated in the following excerpt from a configuration file, are deployed successfully regardless of whether a META-INF\application.xml deployment descriptor is defined as part of the application:
<Application Deployed="true" Name="SessionBeanLifeCycleBean"
Path="C:\bea\weblogic70\tools\deployment\ejb" TwoPhase="false">
<EJBComponent Name="CMFinderTestBean" Targets="myserver" URI="CMFinderTestBean.jar"/>
<EJBComponent Name="SessionBeanLifeCycleBean" Targets="myserver"
URI="SessionBeanLifeCycleBean.jar"/>
</Application>As of 9.0, the META-INF\application.xml deployment descriptor is required if a deployed application defines multiple modules. If this type of deployment descriptor is not provided, the upgrade fails with an error similar to the following:
[J2EE Deployment SPI:260089]Unable to determine type of application at path 'C:\bea\weblogic70\tools\deployment\ejb' and upgrade will not succeed.When upgrading a domain, make sure that the deployed applications adhere to the proper Java EE application format. For example, if required by the application, make sure that the applications define the META-INF\application.xml and/or META-INF\weblogic-application.xml deployment descriptors.
For more information about the deployment descriptors, see “Enterprise Application Deployment Descriptor Elements” in Developing Applications with WebLogic Server.
- So that your applications can take advantage of the features in the current Java EE specification and release of WebLogic Server, Oracle recommends that you upgrade deployment descriptors when you upgrade applications to a new release of WebLogic Server. For more information, see “Upgrading Deployment Descriptors From Previous Releases of J2EE and WebLogic Server” in Developing Applications with WebLogic Server.
Deprecated Startup and Shutdown Classes
As of 9.0, application-scoped startup and shutdown classes were deprecated in WebLogic Server, in favor of applications that respond to application lifecycle events. Oracle recommends that you update your application environment to use the lifecycle events in place of application-scoped and domain-level startup and shutdown classes. For more information, see “Programming Application Life Cycle Events” in Developing Applications with WebLogic Server.
Administration Console
The following sections describe changes to the Administration Console:
Console Configuration Features
WebLogic Server 10.3 introduces new options that have been added for configuring Console behavior, including the ability to do the following:
- Lock a domain configuration so you can make changes to the configuration while preventing other accounts from making changes during your edit session
- Whether to deploy internal applications such as the Administration Console, UDDI, and the UDDI Explorer on demand (upon first access) instead of during server startup
- Locate any WebLogic Server Configuration MBean that contains the string specified in its name, using a new search feature added to the banner toolbar region
- Use additional capabilities for automatically migrating failed servers and services from one server to another
- Deploy and control Service Component Architecture (SCA) deployments
- Inspect Spring applications
For more information, see “What's New in WebLogic Server” in the Release Notes.
Administration Console Extension Architecture
In WebLogic Server version 9.0, the Administration Console was built on the WebLogic Portal Framework, which makes it more open and more readily extensible. The architecture necessitated new procedures for extending the Administration Console. WebLogic Administration Console extensions built for releases of WebLogic Server prior to 9.0 will not function with the new Console infrastructure. For more information about extending the Administration Console, see Extending the Administration Console.
Important Console-Extension Information for Version 9.2
Version 9.2 of WebLogic Server introduced the following changes to console extensions:
- Prior to this release, Administration Console extensions could import a set of third-party JSP tag libraries by specifying a pathname to the tag library file. For example,
<%@ taglib uri="/WEB-INF/beehive-netui-tags-template.tld" prefix="beehive-template" %>As of 10.0, Administration Console extensions that use these third-party JSP tag libraries from the WebLogic Server installation must use pre-defined, absolute URIs to specify the tag libraries. For example:
<%@ taglib uri="http://beehive.apache.org/netui/tags-template-1.0" prefix="beehive-template" %>The Administration Console's web.xml file maps these URIs to tag libraries within the WebLogic Server installation. This mapping facility enables Oracle to reorganize its installation directory without requiring you to change your JSPs.
Any Administration Console extensions that use the old pathname syntax to import Apache Struts, Apache Beehive, or the JSTL tag libraries must update all pathnames to the new URIs.
The URI for the WebLogic Server Console Extension tag library (console-html.tld) remains unchanged: /WEB-INF/console-html.tld.
For more information, see “JSP Templates and Tag Libraries” in Extending the Administration Console.
- By convention, portal include files (.pinc) files are now called portal book files (.book).
WebLogic Portal Skeleton URI References Should be Fully Qualified
WebLogic Portal requires that any explicit Skeleton URI references be fully qualified relative to the webapp. However, the documentation and some of the console extension examples have sometimes used relative references to these skeletons. Consider the following incorrect example:
<netuix:singleLevelMenu markupType="Menu" markupName="singleLevelMenu" skeletonUri="singlelevelmenu_children2.jsp"/>This example should have been correctly specified as:
<netuix:singleLevelMenu markupType="Menu" markupName="singleLevelMenu" skeletonUri="/framework/skeletons/default/singlelevelmenu_children2.jsp"/>For this release, relative skeleton URI references will continue to work. However, any console extensions that you have written should be updated to use fully qualified skeleton URIs, as these relative references may no longer function correctly in a future release.
Resource Adapters
Table B-3 lists the configuration settings for resource adapters that are deprecated or no longer supported. For more information about new features and changes, see “What's New in WebLogic Server” in Release Notes.
Table B-3 Deprecated or Unsupported Resource Adapter Configuration Settings This element ... As of WebLogic Server 9.0 ... Link-Ref Mechanism This element has been deprecated and replaced by the new Java EE libraries feature. For more information about Java EE libraries, see “Creating Shared J2EE Libraries and Optional Packages” in Developing Applications with WebLogic Server. The Link-Ref mechanism is still supported in this release for resource adapters developed under the J2CA 1.0 Specification. For more information about using the Link-Ref mechanism with 1.0 resource adapters, see “(Deprecated) Configuring the Link-Ref Mechanism” in “Configuring the weblogic-ra.xml File” in Programming WebLogic Resource Adapters. <shrink-period-minutes> This element has been deprecated and replaced by <shrink-frequency-seconds>, which allows you to specify the shrink period in increments of seconds, instead of minutes. The <shrink-frequency-seconds> element overrides the <shrink-period-minutes> element if both are set. <connection-maxidle-time> This element has been deprecated and is replaced by <inactive-connection-timeout-seconds>, which allows you to specify the connection timeout in increments of seconds. The <inactive-connection-timeout-seconds> element overrides the <connection-maxidle-time> element if both are set. <security-principal-map> This element is no longer supported; the security principal map is configured using the Administration Console. You should remove the <security-principal-map> definition from the weblogic-ra.xml file. Otherwise, deployment of the resource adapter fails. <connection-cleanup-frequency> This element is no longer supported and is ignored during deployment. <connection-duration-time> This element is no longer supported and is ignored during deployment.
WLEC
WLEC was deprecated in WebLogic Server 8.1. WLEC users should move applications to the WebLogic Tuxedo Connector, as described in WLEC to Oracle WebLogic Tuxedo Connector Migration Guide.
SNMP MIB Refresh Interval and Server Status Check Interval No Longer Used
The SNMPAgentMBean MBean MibDataRefreshInterval and ServerStatusCheckIntervalFactor attributes were deprecated in WebLogic Server 10.0 and are ignored.
Backward Compatibility Flags
The configuration flags in Table B-4 are available to support backward compatibility when you upgrade a domain. By default, these flags are set to support backward compatibility, unless you disable them by selecting the Do not set backwards compatibility flags option during an upgrade, as described in Upgrading a Domain in Graphical Mode.
Table B-4 Backward Compatibility Flags Category Backward Compatibility Flag For More Information Security
- EnforceStrictURLPattern—Whether the server should enforce strict adherance of URL patterns to the Servlet 2.4 specification. During an upgrade, this flag is set to false for backward compatibility.
- WebAppFilesCaseInsensitive—Whether the URL-pattern matching behavior is case-insensitive for security constraints, servlets, filters, virtual hosts, and so on, in the Webapp container and external security policies. During an upgrade, this flag is set to os, which sets URL-pattern matching as case-sensitive on all platforms except Windows, for compatibility with pre-9.0 releases. As of WebLogic Server 9.0, URL-pattern matching is strictly enforced across operating systems
SecurityConfigurationMBean Web Application
- backward-compatible—Specifies which JSP version is supported. Depending on the version of the Web application (version 2.4 or 2.5) and the setting of the backward-compatible element, Weblogic Server 10.3 supports JSP 2.1 or JSP 2.0.
backward-compatible is located within the jsp-descriptor element, as described in Developing Web Applications, Servlets, and JSPs for Oracle WebLogic Server.
- AllowAllRoles—Specifies that a wildcard (*) character can be used to set the role name to enable all users/roles in the realm to have access to the resource collection. As of WebLogic Server 9.0, if you specify the wildcard (*) character as the role name, all users/roles in the Web application will have access to the resource collection.
- FilterDispatchedRequestsEnabled—Whether to apply filters to dispatched requests. As of WebLogic Server 9.0, the new Dispatcher element makes this behavior explicit.
- JSPCompilerBackwardsCompatible—Whether to allow JSPs that do not comply with the JSP 2.0 specification.
- ReloginEnabled—Whether to allow users multiple attempts to log in to a Web page if the original credentials were not supported. As of WebLogic Server 9.0, the FORM/BASIC authentication behavior has been modified to return the 403 (FORBIDDEN) Web page.
- RtexprvalueJspParamName—Whether to allow run-time expression values for the JSP <param name> tag. As of WebLogic Server 9.0, the JSP Compiler no longer allows run-time expression values.
WebAppContainerMBean
Deprecated and Removed APIs
For information about deprecated and removed APIs, see “Deprecated Functionality” in the Release Notes.