SlideShare una empresa de Scribd logo
1 de 15
Descargar para leer sin conexión
Vibrant Technologies
& Computers
weblogic COURSE
Make Career With Us!!
B2/6/2 Vashi ,Navi Mumbai,
B2/6/2 Vashi ,Navi Mumbai,
Contact:09892900103/9892900173
weblogictraining.vibranttechnologies.co.in
weblogictraining.vibranttechnologies.co.in
Security Realm
 A security realm comprises mechanisms for protecting WebLogic
resources.
 Each security realm consists of a set of:
 Users
 Groups
 Security roles
 Security policies
 Configured security providers
 A user must be defined in a security realm in order to access any
WebLogic resource belonging to that realm.
 When a user attempts to access a particular WebLogic resource,
WebLogic Server tries to authenticate and authorize the user by
checking the security role assigned to the user in the relevant security
realm and the security policy of the particular WebLogic resource.
B2/6/2 Vashi ,Navi Mumbai,
Contact:09892900103/9892900173
weblogictraining.vibranttechnologies.co.in
weblogictraining.vibranttechnologies.co.in
WebLogic Server Security
Realm
Default Group,
Security Roles,
Security Policies
Security
Providers
Defined users,
Groups,
Security Roles
W ebLogic
Resources
Defined Scoped
Security Roles
and
Security Policies
Security
P rovider
Databases
B2/6/2 Vashi ,Navi Mumbai,
Contact:09892900103/9892900173
weblogictraining.vibranttechnologies.co.in
weblogictraining.vibranttechnologies.co.in
Users
 Users are entities that can be authenticated in a security realm.
 A user can be:
 A person (application end user)
 A software entity (a client application)
 Other instance of WebLogic Server.
 Authentication a user is assigned an identity
(principal)
each user is given a unique identity within the security realm!
 If WebLogic can verify the identity of the user (based on the username
and credential), WebLogic Server associates the principal with a thread
that executes code on behalf of the user.
 Users (or groups) are associated with security roles.
 Authorization: before the thread begins executing code, WebLogic Server
checks the security policy of the WebLogic resource and the principal to make
sure that the user has required permissions to continue.
B2/6/2 Vashi ,Navi Mumbai,
Contact:09892900103/9892900173
weblogictraining.vibranttechnologies.co.in
weblogictraining.vibranttechnologies.co.in
Groups
 Groups are logically ordered sets of users.
 Groups are used to provide different levels of access to WebLogic
resources to different users, depending on their functions.
 Managing groups is more efficient than managing large numbers of
users individually.
 All user names and groups must be unique within a security realm.
B2/6/2 Vashi ,Navi Mumbai,
Contact:09892900103/9892900173
weblogictraining.vibranttechnologies.co.in
weblogictraining.vibranttechnologies.co.in
Security Roles
 A security role is a privilege granted to users (groups) based on specific
conditions.
 Like groups, security roles allow to restrict access to WebLogic resource for
several users at once.
 Unlike groups, security roles:
 Are computed and granted dynamically, based on conditions (user name, group
membership, time of the day).
 Can be scoped to specific WebLogic resources within a single application in a
WebLogic Server domain (groups are always scoped to an entire WebLogic
Server domain).
 Granting a security role to a user (group) confers the defined access privileges
to that user (group), as long as the user is “in” the security role.
Multiple users or groups can be granted a single security role.
B2/6/2 Vashi ,Navi Mumbai,
Contact:09892900103/9892900173
weblogictraining.vibranttechnologies.co.in
weblogictraining.vibranttechnologies.co.in
Security policies
 A security policy is an association between a WebLogic resource and one
or more users, groups, or security roles.
 Security policies protect the WebLogic resource against unauthorized
access.
 A policy condition – a condition under which a security policy will be
created.
 WebLogic Server provides a set of default policy conditions. WebLogic
Server includes policy conditions that access
◦ HTTP Servlet Request
◦ Session attributes
◦ EJB method parameters.
 Date and Time policy conditions are included in the Policy Editor.
B2/6/2 Vashi ,Navi Mumbai,
Contact:09892900103/9892900173
weblogictraining.vibranttechnologies.co.in
weblogictraining.vibranttechnologies.co.in
Security providers
 Security providers are modules that provide security
services to application to protect WebLogic resources.
 You can:
◦ Use the security providers that are provided as part of the
WebLogic Server product.
◦ Purchase custom security providers from third-party security
vendors.
◦ Develop your own custom security providers.
B2/6/2 Vashi ,Navi Mumbai,
Contact:09892900103/9892900173
weblogictraining.vibranttechnologies.co.in
weblogictraining.vibranttechnologies.co.in
Security Provider Databases
 Contains
◦ Users
◦ Groups
◦ Security roles
◦ Security policies
◦ Credentials
 The security provider database can be:
◦ The embedded LDAP server
◦ An external LDAP server
◦ A properties file
◦ A production-quality, customer-supplied database.
 The security provider database should be initialized the first time
security providers are used.
◦ When a WebLogic Server instance boots.
◦ When a call is made to one of the security provider’s MBeans.
B2/6/2 Vashi ,Navi Mumbai,
Contact:09892900103/9892900173
weblogictraining.vibranttechnologies.co.in
weblogictraining.vibranttechnologies.co.in
Types of security providers
 Authentication Providers
 Assertion Providers
 Principal Validation Providers
 Authorization Providers
 Adjudication Providers
 Role Mapping Providers
 Auditing Providers
 Credential Mapping Providers
 CerthPath Providers
 Keystore Providers
 WebLogic Realm Adapter Providers
B2/6/2 Vashi ,Navi Mumbai,
Contact:09892900103/9892900173
weblogictraining.vibranttechnologies.co.in
weblogictraining.vibranttechnologies.co.in
The Authentication process
Client
Application
W ebLogic
Server
LoginM odules
Principal
Validation
Provider
Username/Passw ord
Su b ject
Sign
JAAS Login
B2/6/2 Vashi ,Navi Mumbai,
Contact:09892900103/9892900173
weblogictraining.vibranttechnologies.co.in
weblogictraining.vibranttechnologies.co.in
Authentication Providers
 Allow WebLogic Server to establish trust by validating a user.
 The default (active) security realm for WebLogic Server includes a
WebLogic Authentication Provider.
◦ It supports:
 Delegated username/password authentication.
 WebLogic server security digest and certificate authentication.
 HTTP certificate authentication proxied through an external Web server.
◦ Allows to edit, list and manage users and group membership.
 WebLogic Server provides additional Authentication Providers:
◦ A set of LDAP Authentication providers
◦ A set of Database Base Management System (DBMS) Authentication
Providers
 SQL Authentication Provider
 Read-only SQL Authentication Provider
 Custom DBMS Authentication Provider
B2/6/2 Vashi ,Navi Mumbai,
Contact:09892900103/9892900173
weblogictraining.vibranttechnologies.co.in
weblogictraining.vibranttechnologies.co.in
The Authorization Process
B2/6/2 Vashi ,Navi Mumbai,
Contact:09892900103/9892900173
weblogictraining.vibranttechnologies.co.in
weblogictraining.vibranttechnologies.co.in
The Auditing Process
Where to Get More Information
B2/6/2 Vashi ,Navi Mumbai,
Contact:09892900103/9892900173
weblogictraining.vibranttechnologies.co.in
weblogictraining.vibranttechnologies.co.in
Vibrant Group:
www.vibrantgroup.co.in
Vibrant Technologies & Computers
www.vibranttechnologies.co.in/technologies.vibrantgroup
.co.in
Vibrant HR Team
www.hr.vibrangroup.co.in

Más contenido relacionado

Más de VibrantGroup

Netbackup training-course-navi-mumbai-netbackup-course-provider-navi-mumbai
Netbackup training-course-navi-mumbai-netbackup-course-provider-navi-mumbaiNetbackup training-course-navi-mumbai-netbackup-course-provider-navi-mumbai
Netbackup training-course-navi-mumbai-netbackup-course-provider-navi-mumbaiVibrantGroup
 
Mainframe training-course-navi-mumbai-mainframe-course-provider-navi-mumbai
Mainframe training-course-navi-mumbai-mainframe-course-provider-navi-mumbaiMainframe training-course-navi-mumbai-mainframe-course-provider-navi-mumbai
Mainframe training-course-navi-mumbai-mainframe-course-provider-navi-mumbaiVibrantGroup
 
Jboss Application Server training-course-navi-mumbai-jboss-course-provider-na...
Jboss Application Server training-course-navi-mumbai-jboss-course-provider-na...Jboss Application Server training-course-navi-mumbai-jboss-course-provider-na...
Jboss Application Server training-course-navi-mumbai-jboss-course-provider-na...VibrantGroup
 
Datastage training-course-navi-mumbai-datastage-course-provider-navi-mumbai
Datastage training-course-navi-mumbai-datastage-course-provider-navi-mumbaiDatastage training-course-navi-mumbai-datastage-course-provider-navi-mumbai
Datastage training-course-navi-mumbai-datastage-course-provider-navi-mumbaiVibrantGroup
 
Aix admin-course-provider-navi-mumbai | Aix admin course provider Navi Mumbai...
Aix admin-course-provider-navi-mumbai | Aix admin course provider Navi Mumbai...Aix admin-course-provider-navi-mumbai | Aix admin course provider Navi Mumbai...
Aix admin-course-provider-navi-mumbai | Aix admin course provider Navi Mumbai...VibrantGroup
 
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...VibrantGroup
 

Más de VibrantGroup (6)

Netbackup training-course-navi-mumbai-netbackup-course-provider-navi-mumbai
Netbackup training-course-navi-mumbai-netbackup-course-provider-navi-mumbaiNetbackup training-course-navi-mumbai-netbackup-course-provider-navi-mumbai
Netbackup training-course-navi-mumbai-netbackup-course-provider-navi-mumbai
 
Mainframe training-course-navi-mumbai-mainframe-course-provider-navi-mumbai
Mainframe training-course-navi-mumbai-mainframe-course-provider-navi-mumbaiMainframe training-course-navi-mumbai-mainframe-course-provider-navi-mumbai
Mainframe training-course-navi-mumbai-mainframe-course-provider-navi-mumbai
 
Jboss Application Server training-course-navi-mumbai-jboss-course-provider-na...
Jboss Application Server training-course-navi-mumbai-jboss-course-provider-na...Jboss Application Server training-course-navi-mumbai-jboss-course-provider-na...
Jboss Application Server training-course-navi-mumbai-jboss-course-provider-na...
 
Datastage training-course-navi-mumbai-datastage-course-provider-navi-mumbai
Datastage training-course-navi-mumbai-datastage-course-provider-navi-mumbaiDatastage training-course-navi-mumbai-datastage-course-provider-navi-mumbai
Datastage training-course-navi-mumbai-datastage-course-provider-navi-mumbai
 
Aix admin-course-provider-navi-mumbai | Aix admin course provider Navi Mumbai...
Aix admin-course-provider-navi-mumbai | Aix admin course provider Navi Mumbai...Aix admin-course-provider-navi-mumbai | Aix admin course provider Navi Mumbai...
Aix admin-course-provider-navi-mumbai | Aix admin course provider Navi Mumbai...
 
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
Aix admin course provider Navi Mumbai | AIX Admin Course Training Navi Mumbai...
 

Último

THYROID HORMONE.pptx by Subham Panja,Asst. Professor, Department of B.Sc MLT,...
THYROID HORMONE.pptx by Subham Panja,Asst. Professor, Department of B.Sc MLT,...THYROID HORMONE.pptx by Subham Panja,Asst. Professor, Department of B.Sc MLT,...
THYROID HORMONE.pptx by Subham Panja,Asst. Professor, Department of B.Sc MLT,...Subham Panja
 
2024.03.16 How to write better quality materials for your learners ELTABB San...
2024.03.16 How to write better quality materials for your learners ELTABB San...2024.03.16 How to write better quality materials for your learners ELTABB San...
2024.03.16 How to write better quality materials for your learners ELTABB San...Sandy Millin
 
Plant Tissue culture., Plasticity, Totipotency, pptx
Plant Tissue culture., Plasticity, Totipotency, pptxPlant Tissue culture., Plasticity, Totipotency, pptx
Plant Tissue culture., Plasticity, Totipotency, pptxHimansu10
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...Nguyen Thanh Tu Collection
 
POST ENCEPHALITIS case study Jitendra bhargav
POST ENCEPHALITIS case study  Jitendra bhargavPOST ENCEPHALITIS case study  Jitendra bhargav
POST ENCEPHALITIS case study Jitendra bhargavJitendra Bhargav
 
2024 March 11, Telehealth Billing- Current Telehealth CPT Codes & Telehealth ...
2024 March 11, Telehealth Billing- Current Telehealth CPT Codes & Telehealth ...2024 March 11, Telehealth Billing- Current Telehealth CPT Codes & Telehealth ...
2024 March 11, Telehealth Billing- Current Telehealth CPT Codes & Telehealth ...Marlene Maheu
 
DNA and RNA , Structure, Functions, Types, difference, Similarities, Protein ...
DNA and RNA , Structure, Functions, Types, difference, Similarities, Protein ...DNA and RNA , Structure, Functions, Types, difference, Similarities, Protein ...
DNA and RNA , Structure, Functions, Types, difference, Similarities, Protein ...AKSHAYMAGAR17
 
ASTRINGENTS.pdf Pharmacognosy chapter 5 diploma in Pharmacy
ASTRINGENTS.pdf Pharmacognosy chapter 5 diploma in PharmacyASTRINGENTS.pdf Pharmacognosy chapter 5 diploma in Pharmacy
ASTRINGENTS.pdf Pharmacognosy chapter 5 diploma in PharmacySumit Tiwari
 
Certification Study Group - Professional ML Engineer Session 3 (Machine Learn...
Certification Study Group - Professional ML Engineer Session 3 (Machine Learn...Certification Study Group - Professional ML Engineer Session 3 (Machine Learn...
Certification Study Group - Professional ML Engineer Session 3 (Machine Learn...gdgsurrey
 
The basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptxThe basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptxheathfieldcps1
 
The First National K12 TUG March 6 2024.pdf
The First National K12 TUG March 6 2024.pdfThe First National K12 TUG March 6 2024.pdf
The First National K12 TUG March 6 2024.pdfdogden2
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...Nguyen Thanh Tu Collection
 
30-de-thi-vao-lop-10-mon-tieng-anh-co-dap-an.doc
30-de-thi-vao-lop-10-mon-tieng-anh-co-dap-an.doc30-de-thi-vao-lop-10-mon-tieng-anh-co-dap-an.doc
30-de-thi-vao-lop-10-mon-tieng-anh-co-dap-an.docdieu18
 
Dhavni Theory by Anandvardhana Indian Poetics
Dhavni Theory by Anandvardhana Indian PoeticsDhavni Theory by Anandvardhana Indian Poetics
Dhavni Theory by Anandvardhana Indian PoeticsDhatriParmar
 
Auchitya Theory by Kshemendra Indian Poetics
Auchitya Theory by Kshemendra Indian PoeticsAuchitya Theory by Kshemendra Indian Poetics
Auchitya Theory by Kshemendra Indian PoeticsDhatriParmar
 
Research Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchResearch Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchRushdi Shams
 
Riti theory by Vamana Indian poetics.pptx
Riti theory by Vamana Indian poetics.pptxRiti theory by Vamana Indian poetics.pptx
Riti theory by Vamana Indian poetics.pptxDhatriParmar
 
25 CHUYÊN ĐỀ ÔN THI TỐT NGHIỆP THPT 2023 – BÀI TẬP PHÁT TRIỂN TỪ ĐỀ MINH HỌA...
25 CHUYÊN ĐỀ ÔN THI TỐT NGHIỆP THPT 2023 – BÀI TẬP PHÁT TRIỂN TỪ ĐỀ MINH HỌA...25 CHUYÊN ĐỀ ÔN THI TỐT NGHIỆP THPT 2023 – BÀI TẬP PHÁT TRIỂN TỪ ĐỀ MINH HỌA...
25 CHUYÊN ĐỀ ÔN THI TỐT NGHIỆP THPT 2023 – BÀI TẬP PHÁT TRIỂN TỪ ĐỀ MINH HỌA...Nguyen Thanh Tu Collection
 
Quantitative research methodology and survey design
Quantitative research methodology and survey designQuantitative research methodology and survey design
Quantitative research methodology and survey designBalelaBoru
 
DLL Catch Up Friday March 22.docx CATCH UP FRIDAYS
DLL Catch Up Friday March 22.docx CATCH UP FRIDAYSDLL Catch Up Friday March 22.docx CATCH UP FRIDAYS
DLL Catch Up Friday March 22.docx CATCH UP FRIDAYSTeacherNicaPrintable
 

Último (20)

THYROID HORMONE.pptx by Subham Panja,Asst. Professor, Department of B.Sc MLT,...
THYROID HORMONE.pptx by Subham Panja,Asst. Professor, Department of B.Sc MLT,...THYROID HORMONE.pptx by Subham Panja,Asst. Professor, Department of B.Sc MLT,...
THYROID HORMONE.pptx by Subham Panja,Asst. Professor, Department of B.Sc MLT,...
 
2024.03.16 How to write better quality materials for your learners ELTABB San...
2024.03.16 How to write better quality materials for your learners ELTABB San...2024.03.16 How to write better quality materials for your learners ELTABB San...
2024.03.16 How to write better quality materials for your learners ELTABB San...
 
Plant Tissue culture., Plasticity, Totipotency, pptx
Plant Tissue culture., Plasticity, Totipotency, pptxPlant Tissue culture., Plasticity, Totipotency, pptx
Plant Tissue culture., Plasticity, Totipotency, pptx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (GLOB...
 
POST ENCEPHALITIS case study Jitendra bhargav
POST ENCEPHALITIS case study  Jitendra bhargavPOST ENCEPHALITIS case study  Jitendra bhargav
POST ENCEPHALITIS case study Jitendra bhargav
 
2024 March 11, Telehealth Billing- Current Telehealth CPT Codes & Telehealth ...
2024 March 11, Telehealth Billing- Current Telehealth CPT Codes & Telehealth ...2024 March 11, Telehealth Billing- Current Telehealth CPT Codes & Telehealth ...
2024 March 11, Telehealth Billing- Current Telehealth CPT Codes & Telehealth ...
 
DNA and RNA , Structure, Functions, Types, difference, Similarities, Protein ...
DNA and RNA , Structure, Functions, Types, difference, Similarities, Protein ...DNA and RNA , Structure, Functions, Types, difference, Similarities, Protein ...
DNA and RNA , Structure, Functions, Types, difference, Similarities, Protein ...
 
ASTRINGENTS.pdf Pharmacognosy chapter 5 diploma in Pharmacy
ASTRINGENTS.pdf Pharmacognosy chapter 5 diploma in PharmacyASTRINGENTS.pdf Pharmacognosy chapter 5 diploma in Pharmacy
ASTRINGENTS.pdf Pharmacognosy chapter 5 diploma in Pharmacy
 
Certification Study Group - Professional ML Engineer Session 3 (Machine Learn...
Certification Study Group - Professional ML Engineer Session 3 (Machine Learn...Certification Study Group - Professional ML Engineer Session 3 (Machine Learn...
Certification Study Group - Professional ML Engineer Session 3 (Machine Learn...
 
The basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptxThe basics of sentences session 8pptx.pptx
The basics of sentences session 8pptx.pptx
 
The First National K12 TUG March 6 2024.pdf
The First National K12 TUG March 6 2024.pdfThe First National K12 TUG March 6 2024.pdf
The First National K12 TUG March 6 2024.pdf
 
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
BÀI TẬP BỔ TRỢ TIẾNG ANH 11 THEO ĐƠN VỊ BÀI HỌC - CẢ NĂM - CÓ FILE NGHE (FRIE...
 
30-de-thi-vao-lop-10-mon-tieng-anh-co-dap-an.doc
30-de-thi-vao-lop-10-mon-tieng-anh-co-dap-an.doc30-de-thi-vao-lop-10-mon-tieng-anh-co-dap-an.doc
30-de-thi-vao-lop-10-mon-tieng-anh-co-dap-an.doc
 
Dhavni Theory by Anandvardhana Indian Poetics
Dhavni Theory by Anandvardhana Indian PoeticsDhavni Theory by Anandvardhana Indian Poetics
Dhavni Theory by Anandvardhana Indian Poetics
 
Auchitya Theory by Kshemendra Indian Poetics
Auchitya Theory by Kshemendra Indian PoeticsAuchitya Theory by Kshemendra Indian Poetics
Auchitya Theory by Kshemendra Indian Poetics
 
Research Methodology and Tips on Better Research
Research Methodology and Tips on Better ResearchResearch Methodology and Tips on Better Research
Research Methodology and Tips on Better Research
 
Riti theory by Vamana Indian poetics.pptx
Riti theory by Vamana Indian poetics.pptxRiti theory by Vamana Indian poetics.pptx
Riti theory by Vamana Indian poetics.pptx
 
25 CHUYÊN ĐỀ ÔN THI TỐT NGHIỆP THPT 2023 – BÀI TẬP PHÁT TRIỂN TỪ ĐỀ MINH HỌA...
25 CHUYÊN ĐỀ ÔN THI TỐT NGHIỆP THPT 2023 – BÀI TẬP PHÁT TRIỂN TỪ ĐỀ MINH HỌA...25 CHUYÊN ĐỀ ÔN THI TỐT NGHIỆP THPT 2023 – BÀI TẬP PHÁT TRIỂN TỪ ĐỀ MINH HỌA...
25 CHUYÊN ĐỀ ÔN THI TỐT NGHIỆP THPT 2023 – BÀI TẬP PHÁT TRIỂN TỪ ĐỀ MINH HỌA...
 
Quantitative research methodology and survey design
Quantitative research methodology and survey designQuantitative research methodology and survey design
Quantitative research methodology and survey design
 
DLL Catch Up Friday March 22.docx CATCH UP FRIDAYS
DLL Catch Up Friday March 22.docx CATCH UP FRIDAYSDLL Catch Up Friday March 22.docx CATCH UP FRIDAYS
DLL Catch Up Friday March 22.docx CATCH UP FRIDAYS
 

Weblogic training-course-navi-mumbai-weblogic-course-provider-navi-mumbai

  • 1. Vibrant Technologies & Computers weblogic COURSE Make Career With Us!! B2/6/2 Vashi ,Navi Mumbai,
  • 2. B2/6/2 Vashi ,Navi Mumbai, Contact:09892900103/9892900173 weblogictraining.vibranttechnologies.co.in weblogictraining.vibranttechnologies.co.in Security Realm  A security realm comprises mechanisms for protecting WebLogic resources.  Each security realm consists of a set of:  Users  Groups  Security roles  Security policies  Configured security providers  A user must be defined in a security realm in order to access any WebLogic resource belonging to that realm.  When a user attempts to access a particular WebLogic resource, WebLogic Server tries to authenticate and authorize the user by checking the security role assigned to the user in the relevant security realm and the security policy of the particular WebLogic resource.
  • 3. B2/6/2 Vashi ,Navi Mumbai, Contact:09892900103/9892900173 weblogictraining.vibranttechnologies.co.in weblogictraining.vibranttechnologies.co.in WebLogic Server Security Realm Default Group, Security Roles, Security Policies Security Providers Defined users, Groups, Security Roles W ebLogic Resources Defined Scoped Security Roles and Security Policies Security P rovider Databases
  • 4. B2/6/2 Vashi ,Navi Mumbai, Contact:09892900103/9892900173 weblogictraining.vibranttechnologies.co.in weblogictraining.vibranttechnologies.co.in Users  Users are entities that can be authenticated in a security realm.  A user can be:  A person (application end user)  A software entity (a client application)  Other instance of WebLogic Server.  Authentication a user is assigned an identity (principal) each user is given a unique identity within the security realm!  If WebLogic can verify the identity of the user (based on the username and credential), WebLogic Server associates the principal with a thread that executes code on behalf of the user.  Users (or groups) are associated with security roles.  Authorization: before the thread begins executing code, WebLogic Server checks the security policy of the WebLogic resource and the principal to make sure that the user has required permissions to continue.
  • 5. B2/6/2 Vashi ,Navi Mumbai, Contact:09892900103/9892900173 weblogictraining.vibranttechnologies.co.in weblogictraining.vibranttechnologies.co.in Groups  Groups are logically ordered sets of users.  Groups are used to provide different levels of access to WebLogic resources to different users, depending on their functions.  Managing groups is more efficient than managing large numbers of users individually.  All user names and groups must be unique within a security realm.
  • 6. B2/6/2 Vashi ,Navi Mumbai, Contact:09892900103/9892900173 weblogictraining.vibranttechnologies.co.in weblogictraining.vibranttechnologies.co.in Security Roles  A security role is a privilege granted to users (groups) based on specific conditions.  Like groups, security roles allow to restrict access to WebLogic resource for several users at once.  Unlike groups, security roles:  Are computed and granted dynamically, based on conditions (user name, group membership, time of the day).  Can be scoped to specific WebLogic resources within a single application in a WebLogic Server domain (groups are always scoped to an entire WebLogic Server domain).  Granting a security role to a user (group) confers the defined access privileges to that user (group), as long as the user is “in” the security role. Multiple users or groups can be granted a single security role.
  • 7. B2/6/2 Vashi ,Navi Mumbai, Contact:09892900103/9892900173 weblogictraining.vibranttechnologies.co.in weblogictraining.vibranttechnologies.co.in Security policies  A security policy is an association between a WebLogic resource and one or more users, groups, or security roles.  Security policies protect the WebLogic resource against unauthorized access.  A policy condition – a condition under which a security policy will be created.  WebLogic Server provides a set of default policy conditions. WebLogic Server includes policy conditions that access ◦ HTTP Servlet Request ◦ Session attributes ◦ EJB method parameters.  Date and Time policy conditions are included in the Policy Editor.
  • 8. B2/6/2 Vashi ,Navi Mumbai, Contact:09892900103/9892900173 weblogictraining.vibranttechnologies.co.in weblogictraining.vibranttechnologies.co.in Security providers  Security providers are modules that provide security services to application to protect WebLogic resources.  You can: ◦ Use the security providers that are provided as part of the WebLogic Server product. ◦ Purchase custom security providers from third-party security vendors. ◦ Develop your own custom security providers.
  • 9. B2/6/2 Vashi ,Navi Mumbai, Contact:09892900103/9892900173 weblogictraining.vibranttechnologies.co.in weblogictraining.vibranttechnologies.co.in Security Provider Databases  Contains ◦ Users ◦ Groups ◦ Security roles ◦ Security policies ◦ Credentials  The security provider database can be: ◦ The embedded LDAP server ◦ An external LDAP server ◦ A properties file ◦ A production-quality, customer-supplied database.  The security provider database should be initialized the first time security providers are used. ◦ When a WebLogic Server instance boots. ◦ When a call is made to one of the security provider’s MBeans.
  • 10. B2/6/2 Vashi ,Navi Mumbai, Contact:09892900103/9892900173 weblogictraining.vibranttechnologies.co.in weblogictraining.vibranttechnologies.co.in Types of security providers  Authentication Providers  Assertion Providers  Principal Validation Providers  Authorization Providers  Adjudication Providers  Role Mapping Providers  Auditing Providers  Credential Mapping Providers  CerthPath Providers  Keystore Providers  WebLogic Realm Adapter Providers
  • 11. B2/6/2 Vashi ,Navi Mumbai, Contact:09892900103/9892900173 weblogictraining.vibranttechnologies.co.in weblogictraining.vibranttechnologies.co.in The Authentication process Client Application W ebLogic Server LoginM odules Principal Validation Provider Username/Passw ord Su b ject Sign JAAS Login
  • 12. B2/6/2 Vashi ,Navi Mumbai, Contact:09892900103/9892900173 weblogictraining.vibranttechnologies.co.in weblogictraining.vibranttechnologies.co.in Authentication Providers  Allow WebLogic Server to establish trust by validating a user.  The default (active) security realm for WebLogic Server includes a WebLogic Authentication Provider. ◦ It supports:  Delegated username/password authentication.  WebLogic server security digest and certificate authentication.  HTTP certificate authentication proxied through an external Web server. ◦ Allows to edit, list and manage users and group membership.  WebLogic Server provides additional Authentication Providers: ◦ A set of LDAP Authentication providers ◦ A set of Database Base Management System (DBMS) Authentication Providers  SQL Authentication Provider  Read-only SQL Authentication Provider  Custom DBMS Authentication Provider
  • 13. B2/6/2 Vashi ,Navi Mumbai, Contact:09892900103/9892900173 weblogictraining.vibranttechnologies.co.in weblogictraining.vibranttechnologies.co.in The Authorization Process
  • 14. B2/6/2 Vashi ,Navi Mumbai, Contact:09892900103/9892900173 weblogictraining.vibranttechnologies.co.in weblogictraining.vibranttechnologies.co.in The Auditing Process
  • 15. Where to Get More Information B2/6/2 Vashi ,Navi Mumbai, Contact:09892900103/9892900173 weblogictraining.vibranttechnologies.co.in weblogictraining.vibranttechnologies.co.in Vibrant Group: www.vibrantgroup.co.in Vibrant Technologies & Computers www.vibranttechnologies.co.in/technologies.vibrantgroup .co.in Vibrant HR Team www.hr.vibrangroup.co.in