Security Technology Overview
WebLogic Server relies on a number of standards-based technologies for its security services. The following sections discuss each technology and its place in the WebLogic Server security infrastructure.
Users and Groups
Users and groups are required in a security system for authentication (who are you?) and authorization (what are you allowed to do?). A user is the application end user's account name. WebLogic Server represents each user with a user name, such as “John Doe,” and some information (sometimes called proof material) for verifying the user's identity during the login process. The verification information is usually a password, but other authentication methods such as digital certificates are described ...
Get J2EE™ Applications and BEA™ WebLogic Server™ now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.