IT-Security (Part 5): WebLogic Server, perimeter Authentication and Identity Assertion

I tried to discuss about “perimeter authentication” in one extra part of IT-Security’s blogs, because this authentication’s process is an essential approach in a heterogonous world of systems, applications and technologies that they need to trust and communicate to each other.  Generally, we discussed about perimeter authentication, if a remote user requires an asserted identity […]

IT-Security: WebLogic Server and Authentication – Part 4

As I mentioned, JAAS is able for two important tasks: authentication and authorization of users. Now, let us see more about them. Authentication: Who are you? Authentication verifies that the user is who she/he claims to be. But user is also an entity and could be a person, a software entity or other instances of […]

Mit der Oracle Mobile Security Suite die BYOD-Risiken beherrschen

Derzeit nutzen viele Mitarbeiter ihre privaten Geräte im Unternehmensumfeld und speichern Unternehmensdaten darauf. Der als „Bring Your Own Device“(BYOD) bezeichnete Trend birgt für Unternehmen viele Gefahren, welche die Oracle Mobile Security Suite zu beherrschen versucht. Die Oracle Mobile Security Suite wurde von dem Start-Up Bitzer Mobile entwickelt, später von Oracle gekauft und in die Produktpalette […]

Orchestrierung der IT-Sicherheit: Wie sieht es mit der Oracle Fusion Middleware aus?

Es gab am 06. März 2014 in Hochschule für angewandte Wissenschaften München den DOAG Regionaltreffen München/Südbayern. Ich habe dort einen Vortrag über „Orchestrierung der IT-Sicherheit: Wie sieht es mit der Oracle Fusion Middleware aus?“ gehalten. Hier finden Sie mein Abstract und meine Präsentation: Orchestrierung ist eine riesige Symphonie verschiedenster Komponenten im IT-Bereich. Die Orchestrierung der […]

IT-Security (Part 3): WebLogic Server and Java Security Features

WebLogic Server and Java Security Features [1] WebLogic Server supports the Java SE and Java EE Security to protect the resources of whole system. The resources could be Web applications, Uniform Resource Locator (URL), Enterprise JavaBeans (EJBs), and Connector components. Java SE capabilities: Security APIs Java uses APIs to access security features and functionality and […]

IT-Security: WebLogic Server and Oracle Platform Security Services (OPSS)

IT security is popular in a way never known before! I love it! If I discussed e.g. in a WebLogic Server workshop about that, I heard normally form administrators: That’s not my thing, forget it! But newly, everybody wants to know “how can we secure our data and our information?!”  To be honest, you need […]

Did you forget your WebLogic Server password? No problem!

It is a frequently question that I receive from time to time: “I’ve lost my password, how can I change the AdminServer Password in WebLogic Server?”  In addition, normally administrators want to change the WLS password regularly, because of the security policy. I try to make it easy, but please try it first in a […]

weblogic.server.ServerLifecycleException: Cannot get to the relevant ServerRuntimeMBean for server MGSRV

Lately, I got the following error: weblogic.server.ServerLifecycleException: Can not get to the relevant ServerRuntimeMBean for server MGSRV. … Error occured while performing shutdown : Error shutting down the server : Can not get to the relevant ServerRuntimeMBean for server MGSRV. Use dumpStack() to view the full stacktrace It’s happened, when I wanted to shutdown […]

BEA-003108: Unicast receive error:

Technology, KeyWords: WebLogic Server 10.3, Cluster, Unicast, Exception;JAVA.IO.EOFEXCEPTION Error Message: <BEA-003108> <Unicast receive error :“ > Problem: If I restart one Managed Server in a Cluster, I get the following error: <Error> <Cluster> <BEA-003108> <Unicast receive error : at at at$BlockDataInputStream.readLong( at at weblogic.cluster.HeartbeatMessage.readExternal( Truncated. see log file […]