Securing WebLogic Server 12c /
In Detail Security is a must in modern Enterprise architecture, and WebLogic implements a very complete and complex architecture for configuration and implementation, and we need to deeply know in technologies, terminology and how the security process works between all actors. Transparent security o...
Clasificación: | Libro Electrónico |
---|---|
Autor principal: | |
Otros Autores: | |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Birmingham :
Packt Pub.,
2012.
|
Colección: | Professional expertise distilled.
|
Temas: | |
Acceso en línea: | Texto completo Texto completo |
MARC
LEADER | 00000cam a2200000Ia 4500 | ||
---|---|---|---|
001 | EBSCO_ocn825076957 | ||
003 | OCoLC | ||
005 | 20231017213018.0 | ||
006 | m o d | ||
007 | cr unu|||||||| | ||
008 | 130124s2012 enka o 001 0 eng d | ||
040 | |a UMI |b eng |e pn |c UMI |d MERUC |d N$T |d COO |d OCLCQ |d IDEBK |d DEBSZ |d OCLCF |d OCLCQ |d DKDLA |d OCLCQ |d YDXCP |d OCLCQ |d OCLCO |d OCLCA |d OCLCQ |d JBG |d FEM |d OCLCQ |d OCLCO |d ZCU |d VTS |d CEF |d ICG |d NLE |d OCLCQ |d OCLCO |d UKMGB |d STF |d AGLDB |d DKC |d OCLCQ |d M8D |d UKAHL |d HS0 |d OCLCO |d OCLCQ |d OCLCO | ||
015 | |a GBB747777 |2 bnb | ||
016 | 7 | |a 018015176 |2 Uk | |
019 | |a 821180858 |a 903688324 |a 968125010 |a 969057796 | ||
020 | |a 9781849687799 |q (electronic bk.) | ||
020 | |a 184968779X |q (electronic bk.) | ||
020 | |a 1849687781 | ||
020 | |a 9781849687782 | ||
020 | |z 9781849687782 | ||
029 | 1 | |a AU@ |b 000050492174 | |
029 | 1 | |a DEBBG |b BV041120907 | |
029 | 1 | |a DEBBG |b BV043045178 | |
029 | 1 | |a DEBBG |b BV044171458 | |
029 | 1 | |a DEBSZ |b 396758185 | |
029 | 1 | |a DEBSZ |b 397444753 | |
029 | 1 | |a DEBSZ |b 421305673 | |
029 | 1 | |a UKMGB |b 018015176 | |
029 | 1 | |a DKDLA |b 820120-katalog:999935442905765 | |
035 | |a (OCoLC)825076957 |z (OCoLC)821180858 |z (OCoLC)903688324 |z (OCoLC)968125010 |z (OCoLC)969057796 | ||
037 | |a CL0500000182 |b Safari Books Online | ||
050 | 4 | |a TK5105.8885 .O75 |b M37 2012 | |
072 | 7 | |a COM |x 061000 |2 bisacsh | |
082 | 0 | 4 | |a 004.36 |
049 | |a UAMI | ||
100 | 1 | |a Masini, Luca. | |
245 | 1 | 0 | |a Securing WebLogic Server 12c / |c Luca Masini. |
260 | |a Birmingham : |b Packt Pub., |c 2012. | ||
300 | |a 1 online resource (1 volume) : |b illustrations. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |2 rda | ||
490 | 1 | |a Professional expertise distilled | |
588 | 0 | |a Online resource; title from cover (Safari, viewed Jan. 23, 2013). | |
520 | |a In Detail Security is a must in modern Enterprise architecture, and WebLogic implements a very complete and complex architecture for configuration and implementation, and we need to deeply know in technologies, terminology and how the security process works between all actors. Transparent security of your applications and Weblogic infrastructure need a good knowledge of the issues you can incur in this long and error prone configuration process. "Securing WebLogic Server 12c" will simplify a complex world like WebLogic Security, helping the reader to implement and configure. It's the only fast guide that will let you develop and deploy in a production system with best practices both from the development world and the operation world. This book will try to make a clear picture of Java EE Security with clean and simple step-by-step examples that will guide the reader to security implementation and configuration From the concepts of Java EE Security to the development of secure application, from the configuration of a realm to the setup of Kerberos Single Sign on, every concept is expressed in simple terms and surrounded by examples and pictures. Finally, also a way to develop WebLogic Security Providers with Maven, so that you can add the security part of your infrastructure to your enterprise best practices. Approach This book is written in simple, easy to understand format with lots of screenshots and step-by-step explanations. Who this book is for If you are a WebLogic Server administrator looking forward to a step by step guide to administer and configure WebLogic security, then this is the guide for you. Working knowledge of WebLogic is required. | ||
505 | 0 | |a Cover; Copyright; Credits; About the Authors; About the Reviewers; www.PacktPub.com; Table of Contents; Preface; Chapter 1: WebLogic Security Concepts; General concept of security in Java EE; WebLogic security architecture; Identifying -- Subjects, Principals, and Credentials; WebLogic resources; Writing custom providers -- MBeans; Authentication Providers; Authentication under WebLogic; MBean and JAAS; Multipart Authentication Provider; Perimeter Authentication; Identity Assertion; Credential Mapper; JASPIC and Java EE; JACC; Summary; Chapter 2: WebLogic Security Realm | |
505 | 8 | |a Configuration of local LDAP server: user/roles/lockoutUsers and groups; Users section; Groups section; Security role condition; Basic; Date and time-based; Context element; User Lockout; Unlocking user; Configuring an external LDAP for Authentication/Authorization; Configuring a new provider; Control Flag; Active Directory provider-specific configuration; Connection; Users; Groups; Static groups; General; Performance options; Principal Validator Cache; Troubleshooting problems; User Lockout in an Active Directory context; Using Identity Assertion; Summary | |
505 | 8 | |a Chapter 3: Java EE Security with WebLogicSetting up an Enterprise Maven project; Creating the modules with maven-archetype-plugin; Installing the WebLogic Server and the WebLogic Maven plugin; Configuring wls-maven-plugin into the EAR POM; Split deploy and beabuild-maven-plugin; Launching our Hello Maven and WebLogic world application; Securing the web module; Standard DD mapping; Custom Roles Mapping; Programmatic security; Programmatic security with WebLogic XACML Provider; A RESTful and secure EJB component; Bean packaged into the WAR module; Changing Security Identity with RunAs | |
505 | 8 | |a Securing the EJB moduleSummary; Chapter 4: Creating Custom Authentication Providers with Maven; The Maven project; Creating the Maven project; Dependencies; Reconfiguring standard plugins; Adding WebLogic MBeanMaker to the POM; Defining the MBean with an MDF File; Writing the MBean implementation; Initializing the provider; Implementation of the provider; Custom JAAS LoginModule; The login() method; Lifecycle methods -- commit(), abort(), and logout(); A simple SSO JSP; Running the Provider; Summary; Chapter 5: Integrating with Kerberos SPNEGO Identity Assertion | |
505 | 8 | |a Using Identity Assertion SSO Kerberos in a Microsoft domainWindows client needs to be in the Active Directory domain; Windows client session needs to be logged in the Active Directory domain; Integrated Windows Authentication; DNS URL entry configuration and SPN definition; Technical Active Directory user; Keytab generation and the krb5 config file; JAAS file creation; WLS init startup arguments configuration; SPNEGO Identity asserter configuration; Debugging issues; Summary; Index | |
590 | |a eBooks on EBSCOhost |b EBSCO eBook Subscription Academic Collection - Worldwide | ||
590 | |a O'Reilly |b O'Reilly Online Learning: Academic/Public Library Edition | ||
630 | 0 | 0 | |a Oracle WebLogic server. |
630 | 0 | 7 | |a Oracle WebLogic server. |2 blmlsh |
630 | 0 | 7 | |a Oracle Weblogic Server |2 fast |
650 | 0 | |a Web servers. | |
650 | 0 | |a Web site development. | |
650 | 0 | |a Application software |x Development. | |
650 | 0 | |a Client/server computing. | |
650 | 6 | |a Serveurs Web. | |
650 | 6 | |a Sites Web |x Développement. | |
650 | 6 | |a Logiciels d'application |x Développement. | |
650 | 6 | |a Architecture client-serveur (Informatique) | |
650 | 7 | |a COMPUTERS |x Client-Server Computing. |2 bisacsh | |
650 | 7 | |a Application software |x Development |2 fast | |
650 | 7 | |a Client/server computing |2 fast | |
650 | 7 | |a Web servers |2 fast | |
650 | 7 | |a Web site development |2 fast | |
700 | 1 | |a Vincenzo, Rinaldi. | |
776 | 0 | 8 | |i Print version: |a Masini, Luca. |t Securing WebLogic Server 12c. |d Birmingham : Packt Publishing, ©2012 |z 9781849687782 |
830 | 0 | |a Professional expertise distilled. | |
856 | 4 | 0 | |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=507349 |z Texto completo |
856 | 4 | 0 | |u https://learning.oreilly.com/library/view/~/9781849687782/?ar |z Texto completo |
938 | |a Askews and Holts Library Services |b ASKH |n AH26944110 | ||
938 | |a EBSCOhost |b EBSC |n 507349 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis24586475 | ||
938 | |a YBP Library Services |b YANK |n 9939529 | ||
994 | |a 92 |b IZTAP |