Key words:IT-Security, Security Challenges, OPSS Architecture, WebLogic Server, JAAS, JAAS LoginModules, Authentication, Basic Authentication, Certificate Authentication, Digest Authentication, perimeter Authentication and Identity Assertion Until now I have published five parts of a series of articles on IT-Security and Oracle Fusion Middleware: https://thecattlecrew.net/2014/02/17/it-security-weblogic-server_1/ https://thecattlecrew.net/2014/03/05/it-security-part-2-weblogic-server-and-oracle-platform-security-services-opss-2/ https://thecattlecrew.net/2014/03/14/it-security-part-3-weblogic-server-and-java-security-features/ https://thecattlecrew.net/2014/06/05/it-security-weblogic-server-and-authentication-part-4/ https://thecattlecrew.net/2014/06/22/it-security-part-5-weblogic-server-perimeter-authentication-and-identity-assertion/ I“™m going to continue the IT-Security“™s articles and you can access to complete first five parts as PDF-file here: WebLogic-Server_IT_Security_1til5
When doing development for the OSB I usually don“™t do this with the sbconsole, I use eclipse instead. There are…
I tried to discuss about „perimeter authentication“ in one extra part of IT-Security“™s blogs, because this authentication“™s process is an…
Okay so controlling our lights now works automatically based on entering and leaving the building, thats great! But what did…
This prototype started off as a personal project. So it’s not a big surprise why the 433mhz plugs were chosen…
In our prototype we used an Oracle CEP Embedded application running on a separate Raspberry Pi to scan the network…
With our prototype we had a few goals: learn about the technologies that are involved in the IoT space Follow…
In the last few months, there has been so much talk about IoT it must have been hard not to stumble across…