|
WebLogic Server 6.0.0 Code Examples, BEA Systems, Inc. |
Security Examples Summary | |
acl | Demonstrates how to restrict access to a WebLogic resource (in this case a RMI object) with an ACL. You define an ACL in the fileRealm security realm and include code to check the permission for the RMI object before allowing a user to execute it. |
audit | Demonstrates writing an audit provider using the weblogic.security.audit package. Audit providers allow you to log security events that occur in the WebLogic Server environment. |
cert | Demonstrates how to set up a class that translates the digital certificate for a client authenticated via mutual authentication into an authenticated WebLogic User. The SimpleCertAuthenticator example extracts the email name found in the digital certificate and returns it as an authenticated WebLogic User. |
jaas | Demonstrates using the Java Authentication and Authorization Service (JAAS) to authenticate a client based on a supplied username and password. |
net | Demonstrates writing a connection filter that implements the weblogic.security.net.ConnectionFilter interface. Connection filters allow you to reject or accept client connections to the WebLogic Server environment based on the client's origin and protocol. |
proxy | A graphical implementation of the weblogic.common.ProxyAuthenticator interface. The interface allows an application to provide the authentication data required when tunneling WebLogic HTTP and SSL protocols through a proxy server that requires user authentication. |
rdbmsrealm | Demonstrates how to write a custom security realm that stores Users, Groups, and ACLs in a relational database. |
See the individual example pages for instruction on how to build, configure, and run the code examples.
Read more about WebLogic Security in Programming WebLogic Security and Managing Security.
|
Documentation is available at http://e-docs.bea.com/wls/docs60/ |