Using Fusion Middleware Control, click WebLogic Server, and then Web

Monitoring the Performance of Web Services 13-5 Viewing the Security Violations for a Web Service Follow the procedure below to view security violations for a Web service. To view the security violations for an Oracle Infrastructure Web service: 1. Navigate to the Web Services Summary page as described in Navigating to the Web Services Summary Page for an Application on page 6-4.

2. In the Charts section of the page, select the Security Violations tab.

A graphical representation of the authentication, authorization, confidentiality, and integrity faults for all Web services in the application is displayed in the pie chart. 3. In the Web Service Details section of the page, click on the plus + for the Web service to display the Web service endpoints if they are not already displayed. 4. Click the name of the endpoint to navigate to the Web Service Endpoint page.

5. Click the Charts tab to see a graphical representation of all faults and all security

violations for the endpoint.

6. Click the OWSM Policies tab.

Two tables are displayed. The Globally Attached Policies table displays the name of the policy and the policy set that references it. The Directly Attached Policies table displays the name of the policy and the policy status whether the policy is enabled or disabled. Both tables list the category to which the policy belongs security, MTOM attachments, reliable messaging, WS-addressing, and management. Table 13–1 lists the violation information provided for each type of policy attachment. To view the security violations for a WebLogic JAX-WS Web service: 1. Navigate to the Web Services Summary page as described in Navigating to the Web Services Summary Page for an Application on page 6-4. Table 13–1 Policy Violation Information for an Endpoint Violation Type Description Total Violations Total number of faults for this policy. Note : Total violations may not be equal to the sum of the security violations shown below for example, Authentication, Authorization, Confidentiality, and Integrity. Other security violations that do not fall into these major categories and non-security violations are also captured in the total violations count. Security Violations Authentication Number of authentication failures since the server was restarted. Authorization Number of authorization failures since the server was restarted. Confidentiality Number of message confidentiality failures since the server was restarted. Integrity Number of message integrity failures since the server was restarted. 13-6 Oracle Fusion Middleware Security and Administrators Guide for Web Services 2. In the Web Service Details section of the page, click on the plus + for the Web service to display the Web service endpoints if they are not already displayed. 3. Click the name of the endpoint to navigate to the Web Service Endpoint page. 4. Do one of the following, depending on the type of policies attached to the endpoint: ■ If Oracle WSM policies are attached to the endpoint, click the OWSM Policies tab. A list of the policies that are attached to the endpoint is displayed. For each policy, the table displays the name of the policy, the policy status whether the policy is enabled or disabled, and the category of the policy security, MTOM attachments, reliable messaging, WS-addressing, and management. Table 13–1 describes the violation information that is displayed for each Oracle WSM policy attached to the endpoint. ■ If WebLogic policies are attached to the endpoint, click the WebLogic Policy Violations tab. This tab shows policy violation details about WebLogic policies attached to a JAX-WS endpoint. Table 13–2 describes the information provided on this page. To view the security violations for a WebLogic JAX-RPC Web service: 1. Navigate to the Web Services Summary page for the application. 2. In the Web Service Details section of the page, click on the plus + for the Web service to display the Web service endpoints if they are not already displayed. 3. Click the name of the endpoint to navigate to the Web Service Endpoint page.

4. Click the WebLogic Policy Violations tab.

Table 13–2 WebLogic Policy Violation Data Element Description Summary Total Faults Total number of failed requests. Policy Faults Number of failed requests because a policy was not successfully executed. Total Violations Total number of faults for this policy. Violations Authentication Violations Number of authentication failures since the server was restarted. Confidentiality Violations Number of message confidentiality failures since the server was restarted. Integrity Violations Number of message integrity failures since the server was restarted. Successes Authentication Successes Number of authentication successes since the server was restarted. Confidentiality Successes Number of message confidentiality successes since the server was restarted. Integrity Successes Number of message integrity successes since the server was restarted.