The Principal Validation Process The Authorization Process

WebLogic Security Service Architecture 5-3 Validation provider. For more information on Principal Validation providers, see Section 5.5.8, WebLogic Principal Validation Provider . After successfully proving a callers identity, an authentication context is established, which allows an identified user or system to be authenticated to other entities. Authentication contexts may also be delegated to an application component, allowing that component to call another application component while impersonating the original caller.

5.1.2 The Identity Assertion Process

Identity Assertion providers are used as part of perimeter authentication process. When perimeter authentication is used see Figure 5–3 , a token from outside of the WebLogic Server domain is passed to an Identity Assertion provider in a security realm that is responsible for validating tokens of that type and that is configured as active. If the token is successfully validated, the Identity Assertion provider maps the token to a WebLogic Server username, and sends that username back to WebLogic Server, which then continues the authentication process. Specifically, the username is sent via a JAAS CallbackHandler and passed to each configured Authentication providers LoginModule so that the LoginModule can populate the subject with the appropriate principals. Figure 5–3 Perimeter Authentication As Figure 5–3 also shows, perimeter authentication requires the same components as the authentication process, but also adds an Identity Assertion provider.

5.1.3 The Principal Validation Process

As shown in Figure 5–4 , a user attempts to log into a system using a usernamepassword combination. WebLogic Server establishes trust by calling the configured Authentication providers LoginModule, which validates the users Note: To use the WebLogic Identity Assertion provider for X.501 and X.509 certificates, you have the option of using either the default user name mapper that is supplied with the WebLogic Server product weblogic.security.providers.authentication. DefaultUserNameMapperImpl or your own implementation of the weblogic.security.providers.authentication.UserNameM apper interface. See Do You Need to Develop a Custom Identity Assertion Provider? in Developing Security Providers for Oracle WebLogic Server. 5-4 Understanding Security for Oracle WebLogic Server username and password and returns a subject that is populated with principals per JAAS requirements. Figure 5–4 The Principal Validation Process WebLogic Server then passes the subject to the specified Principal Validation provider, which signs the principals and returns them to the client application via WebLogic Server. Whenever the principals stored within the subject are required for other security operations, the same Principal Validation provider will verify that the principals stored within the subject have not been modified since they were signed.

5.1.4 The Authorization Process

Figure 5–5 illustrates how Authorization providers and the associated Adjudication and Role Mapping providers interact with the WebLogic Security Framework during the authorization process. Figure 5–5 Authorization Process The authorization process is initiated when a user or system process requests a WebLogic resource on which it will attempt to perform a given operation. The resource container that handles the type of WebLogic resource being requested receives the request for example, the EJB container receives the request for an EJB resource. The resource container calls the WebLogic Security Framework and passes in the request parameters, including information such as the subject of the request and the WebLogic resource being requested. The WebLogic Security Framework calls the configured Role Mapping providers and passes in the request parameters in a format that the Role Mapping providers can use. The Role Mapping providers use the request parameters to compute a list of roles to which the subject making the request is entitled and passes the list of applicable roles back to the WebLogic Security Framework. The Authorization provider determines whether the subject is entitled to perform the WebLogic Security Service Architecture 5-5 requested action on the WebLogic resource, that is, the Authorization provider makes the Access Decision. If there are multiple Authorization providers configured, the WebLogic Security Framework delegates the job of reconciling any conflicts in the Access Decisions rendered by the Authorization providers to the Adjudication provider and the Adjudication provider determines the ultimate outcome of the authorization decision.

5.1.5 The Adjudication Process