O'Reilly logo

J2EE™ Applications and BEA™ WebLogic Server™ by Sandra L. Emerson, Rob Woollen, Michael Girdley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

WebLogic Server Security Best Practices

Follow these best practices to ensure a successful deployment of your security configuration and application.

Review the Documentation for Securing Your WebLogic Server Deployment.

The WebLogic Server documentation includes a section entitled “Securing Your WebLogic Server Deployment.” This helpful document steps through all of the considerations for creating a secure deployment of WebLogic Server. The best practice is to consult it and follow instructions there before deployment.

Have Your Deployment and Code Reviewed

It is very helpful to have reviews of both deployment architecture and application code for security holes. For large enterprises, it might be beneficial to engage an outside firm to do a ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required