Key words: IT-Security, WebLogic Server, WebLogic Security Framework, Authorization, authorization process, Role Mapping, Roles, Adjudication Process, Security Service Provider Interfaces (SSPIs), Users, Groups, Principals and Subjects We discussed about Authentication in Part 4 and 5[1]; now let us focus on Authorization topic. Authorization is known as access control too and is used to clear main questions such as: „What can you access?“, „Who has access to a WebLogic resource?“, „Is access allowed?“ and in general…
In an integration project we are currently replacing an available integration platform using Oracle Service Bus 11g. Different incoming and…
JAX-WS works in a very simple and effective way if you have defined all objects in a XML Schema definition.…
Key words:IT-Security, Security Challenges, OPSS Architecture, WebLogic Server, JAAS, JAAS LoginModules, Authentication, Basic Authentication, Certificate Authentication, Digest Authentication, perimeter Authentication…
Getting started in 15 minutes! One of the challenges with previous releases was, that SOA & BPM composites couldn’t be…
I tried to discuss about „perimeter authentication“ in one extra part of IT-Security“™s blogs, because this authentication“™s process is an…
As I mentioned, JAAS is able for two important tasks: authentication and authorization of users. Now, let us see more…
Es gab am 06. März 2014 in Hochschule für angewandte Wissenschaften München den DOAG Regionaltreffen München/Südbayern. Ich habe dort einen…
WebLogic Server and Java Security Features [1] WebLogic Server supports the Java SE and Java EE Security to protect the…