Configuring OC4J Remote JMS Resources on Oracle WebLogic Server

5-10 Oracle Fusion Middleware Upgrade Guide for Java EE

5.3.5 Configuring Startup and Shutdown Classes

Any startup or shutdown class configured within the source OC4J environment should be converted to a set of Oracle WebLogic Server startup or shutdown classes. Each class must then be configured within the target Oracle WebLogic Server domain and targeted to the Oracle WebLogic Server instances corresponding to the associated OC4J instances in the source environment. Unlike OC4J startup and shutdown classes, an Oracle WebLogic Server startup or shutdown class does not require any specific interface or provide pre-deployment or post-deployment methods. Instead, you implement the custom logic within the standard main method of the class. WebLogic Server allows for pre-deployment and post-deployment execution of this logic by providing configuration parameters, which must be set accordingly when configuring a domain with the startup or shutdown class. To convert an OC4J startup or shutdown class, it might therefore be necessary to create two WebLogic Server startup and shutdown classes: ■ One that contains the code from the original class preUndeploy method ■ One that contains the code from the postUndeploy method. Although pre-configured parameters can be passed to the main method of a WebLogic Server startup or shutdown class, Oracle WebLogic Server startup classes have no access to arguments in the way that JNDI context and configuration hash table parameters are passed to an OC4J startup class. If the custom logic within the startup class makes use of these parameters, then this logic should be modified to obtain the JNDI context from scratch and access the server configuration through the Oracle WebLogic Server JMX interfaces. For more information, see the following: ■ Programming Application Life Cycle Events in Oracle Fusion Middleware Developing Applications for Oracle WebLogic Server ■ Configure startup classes and Configure shutdown classes in the Oracle Fusion Middleware Oracle WebLogic Server Administration Console Online Help

5.3.6 Configuring Security on Oracle WebLogic Server

To support the security requirements of your application, you must map the security features of OC4J to the equivalent security features in Oracle WebLogic Server. Table 5–2 describes how specific OC4J security configurations can be mapped to a WebLogic Server environment. Upgrading Your Java EE Environment 5-11

5.3.7 Configuring Logging on Oracle WebLogic Server

WebLogic Logging Services provides a comprehensive set of logging features that provide capabilities similar to OC4J. As with OC4J, the Oracle Diagnostics Logging ODL framework can be integrated into Oracle WebLogic Server through the Oracle Java Required Files JRF domain template. For more information, see Section 5.1.4, Using the Java Required Files JRF Domain Template . Table 5–2 Comparison of OC4J and Oracle WebLogic Server Security Features For this OC4J Security Feature... Perform the following task in Oracle WebLogic Server... More Information Users and groups are stored in the system-jazn-data.xml file. Move the user and group information contained in the system-jazn-data.xml file should be moved to the embedded LDAP server. Managing the Embedded LDAP Server in Oracle Fusion Middleware Securing Oracle WebLogic Server OC4J is configured to use an external LDAP provider. Configure the Oracle WebLogic Server domain with the same LDAP server as you were using for OC4J. Configuring LDAP Authentication Providers in Oracle Fusion Middleware Securing Oracle WebLogic Server Users are authenticated against a database. Configure an RDBMS authentication provider, which can be one of three types: ■ SQL Authenticator ■ Read-only SQL Authenticator ■ Custom RDBMS Authenticator Configuring RDBMS Authentication Providers in Oracle Fusion Middleware Securing Oracle WebLogic Server OC4J environment is configured with Java single sign-on or subject propagation between multiple OC4J server instances. WebLogic Server single sign-on and subject propagation are automatic across the server and clusters within a domain and therefore no special configuration is required. Not applicable. OC4J environment is configured with custom JAAS login modules. Create an Oracle WebLogic Server authentication provider within the target domain, either out-of-the-box or a custom provider which wraps the JAAS login module functionality. Supported Login Modules for JavaSE Applications in the Oracle Fusion Middleware Application Security Guide Configuring Authentication Providers in the Oracle Fusion Middleware Securing Oracle WebLogic Server OC4J environment is configured with Oracle Access Manager. Configure the Oracle WebLogic Server domain to use Oracle Access Manager. Integrating the Security Provider for WebLogic SSPI in the Oracle Access Manager Integration Guide in the Oracle Identity Management 10g 10.1.4 Identity Management instancedocumentation library on the Oracle Technology Network OTN. OC4J server instances are configured with SSL encryption. Configure the Oracle WebLogic Server domain to use SSL. Configuring SSL in Oracle Fusion Middleware Securing Oracle WebLogic Server OC4J environment uses Oracle Wallet to store security keys. Store your security keys in a JKS key store in the WebLogic Server domain. Configuring Identity and Trust in Oracle Fusion Middleware Securing Oracle WebLogic Server