O'Reilly logo

J2EE™ Applications and BEA™ WebLogic Server™ by Sandra L. Emerson, Rob Woollen, Michael Girdley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Putting It All Together

In a typical WebLogic Server application, all of these technologies fit together to create a secure deployment:

  • A WebLogic Server realm is used to store all of the security information for an application. It includes a given set of resources, rules to protect resources (ACLs), users, and groups.

  • Form-based authentication is used to secure a Web application. This Web application has roles that are mapped in weblogic.xml to the deployed WebLogic Server caching realm instance that is deployed.

  • Resources in the Web application are designated to have different security attributes in the web.xml deployment descriptor file. This designates that certain pages should be sent unencrypted while others should be protected with encryption. ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required