Layered Security Scheme for Server Resources
Security Policies for Server Resources
MBean Protections
How the WebLogic Security Service Verifies Layered Protections
Example of Layered Protection for a Server Resource
Maintaining a Consistent Security Scheme
Permissions for Starting and Shutting Down Servers
Permissions for Using the weblogic.Server Command
Permissions for Using the Node Manager
Shutting Down a WebLogic Server Instance
Techniques for Securing URL and EJB Resources
Using the WebLogic Server Administration Console
Using Deployment Descriptors
Using the Administration Console and Deployment Descriptors
Prerequisites for Securing URL and EJB Resources
Understanding How to Check Security Roles and Security Policies
Understanding What to Do on Future Redeploys of the WebLogic Resource
How to Change the Check Roles and Policies and Future Redeploys Settings
Understanding How These Settings Interact
Using the Combined Technique to Secure Your URL and EJB Resources
Copying Security Configurations
Reinitializing Security Configurations
Protected MBean Attributes and Operations
Creating Global Roles
Modifying Global Roles
Deleting Global Roles
Creating Scoped Roles
Step 1: Select the WebLogic Resource
Step 2: Create the Scoped Role
Step 3: Create the Role Conditions
Modifying Scoped Roles
Deleting Scoped Roles
Creating Security Policies
Step 1: Select the WebLogic Resource
Step 2: Create the Policy Conditions
Modifying Security Policies
Deleting Security Policies