Key words:IT-Security, Security Challenges, OPSS Architecture, WebLogic Server, JAAS, JAAS LoginModules, Authentication, Basic Authentication, Certificate Authentication, Digest Authentication, perimeter Authentication and Identity Assertion Until now I have published five parts of a series of articles on IT-Security and Oracle Fusion Middleware: https://thecattlecrew.net/2014/02/17/it-security-weblogic-server_1/ https://thecattlecrew.net/2014/03/05/it-security-part-2-weblogic-server-and-oracle-platform-security-services-opss-2/ https://thecattlecrew.net/2014/03/14/it-security-part-3-weblogic-server-and-java-security-features/ https://thecattlecrew.net/2014/06/05/it-security-weblogic-server-and-authentication-part-4/ https://thecattlecrew.net/2014/06/22/it-security-part-5-weblogic-server-perimeter-authentication-and-identity-assertion/ I“™m going to continue the IT-Security“™s articles and you can access to complete first five parts as PDF-file here: WebLogic-Server_IT_Security_1til5
Getting started in 15 minutes! One of the challenges with previous releases was, that SOA & BPM composites couldn’t be…
When doing development for the OSB I usually don“™t do this with the sbconsole, I use eclipse instead. There are…
Dieser Blogeintrag ist der Anfang einer Serie von Blogeinträgen, in denen ich meine Erfahrungen mit der Organisation von Wartung…
I tried to discuss about „perimeter authentication“ in one extra part of IT-Security“™s blogs, because this authentication“™s process is an…
Okay so controlling our lights now works automatically based on entering and leaving the building, thats great! But what did…
This prototype started off as a personal project. So it’s not a big surprise why the 433mhz plugs were chosen…
In our prototype we used an Oracle CEP Embedded application running on a separate Raspberry Pi to scan the network…