Technical data

x WebLogic Server Administration Guide
Failover, Cookies, and HTTP Sessions..................................................13-13
Failover Behavior When Using Firewalls and Load Directors ....................13-15
Sample obj.conf File (Not Using a WebLogic Cluster) ................................13-16
Sample obj.conf File (Using a WebLogic Cluster) .......................................13-18
14.Managing Security
Steps for Configuring Security........................................................................14-2
Changing the System Password.......................................................................14-3
Specifying a Security Realm ...........................................................................14-5
Configuring the File Realm......................................................................14-5
Configuring the Caching Realm...............................................................14-7
Configuring the LDAP Security Realm .................................................14-12
Restrictions When Using the LDAP Security Realm......................14-14
Locating Users and Groups in the LDAP Directory .......................14-15
Configuring an LDAP Realm V1....................................................14-15
Configuring an LDAP Realm V2....................................................14-20
Supported LDAP Server Templates................................................14-22
Using Microsoft Active Directory with WebLogic Server.............14-25
Configuring the Windows NT Security Realm ......................................14-26
Configuring the UNIX Security Realm..................................................14-30
Configuring the RDBMS Security Realm..............................................14-33
Installing a Custom Security Realm.......................................................14-37
Migrating Security Realms.....................................................................14-38
Defining Users...............................................................................................14-39
Defining Groups ............................................................................................14-42
Defining ACLs ..............................................................................................14-43
Configuring the SSL Protocol .......................................................................14-46
Obtaining a Private Key and Digital Certificate.....................................14-47
Storing Private Keys and Digital Certificates ........................................14-50
Defining Trusted Certificate Authorities................................................14-51
Defining Attributes for the SSL Protocol...............................................14-52
Using PKCS#7 Files...............................................................................14-57
Modifying Parameters for SSL Session Caching...................................14-58
Configuring Mutual Authentication ..............................................................14-59
Configuring RMI over IIOP with SSL ..........................................................14-59