Summary

In this chapter we covered security, starting with the J2SE model based on where code comes from and how code can be trusted with digital certificates. Then we discussed the J2EE security model for authentication as well as access control that defines roles and access rights to restricted resources. We continued with an overview of JAAS and the Pluggable Authorization Model (PAM). We then talked about the WebLogic Server security framework and the features within it, including security realms and providers.

In the next chapter, we will discuss and demonstrate additional steps necessary for implementing security in WebLogic Server applications. We will discuss how to create WebLogic Server users, groups, roles, and security policies, and ...

Get BEA WebLogic Server™ 8.1 Unleashed now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.