O'Reilly logo

J2EE™ Applications and BEA™ WebLogic Server™ by Sandra L. Emerson, Rob Woollen, Michael Girdley

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Using WebLogic Server JNDI for Application Client Security

WebLogic Server implements JNDI security for both authentication and authorization. As you recall from Chapter 6, the JNDI naming tree is replicated across the entire cluster of WebLogic Server instances. This makes it ideal as a security-context tracking mechanism. Virtually every service in WebLogic Server is registered in the JNDI naming tree. ACLs are defined in the WebLogic Server console and stored in the WebLogic Server realm. These ACLs determine what principals (users or groups) are allowed access to given resources.

JNDI authentication and authorization in WebLogic Server security realms works by allowing application clients to do lookups into the JNDI tree to find objects to ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required