Other APIs Security APIs

WebLogic Security Programming Overview 2-5

2.4.3 Other APIs

Additionally, you use the following APIs to develop WebLogic Server applications: ■ weblogic.security.jacc This API provides the RoleMapper interface. If you implement the Java Authorization Contract for Containers JACC, you can use this package with the javax.security.jacc package http:java.sun.comjavaee5docsapijavaxsecurityjaccpa ckage-summary.html . See Section 8.2.3, Using the Java Authorization Contract for Containers for information about the WebLogic JACC provider. See http:java.sun.comj2eejavaacc for information on developing a JACC provider. ■ weblogic.security.net This API provides interfaces and classes that are used to implement network connection filters. Network connection filters allow or deny connections to WebLogic Server based on attributes such as the IP address, domain, or protocol of the initiator of the network connection. For more information about how to use this API, see Chapter 7, Using Network Connection Filters . ■ weblogic.security.pk This API provides interfaces and classes to build and validate certification paths. See Chapter 10, Using CertPath Building and Validation for information on using this API to build and validate certificate chains. See the java.security.cert package http:java.sun.comjavase6docsapijavasecuritycertpac kage-summary.html for additional information on certificates and certificate paths. ■ weblogic.security.providers.saml This API provides interfaces and classes that are used to perform mapping of user and group information to Security Assertion Markup Language SAML assertions, and to cache and retrieve SAML assertions. SAML is an XML-based framework for exchanging security information. WebLogic Server supports SAML V2.0 and V1.1, including the BrowserPost and BrowserArtifact profiles. SAML authorization is not supported. For more information about SAML, see http:www.oasis-open.org . ■ weblogic.security.service This API includes interfaces, classes, and exceptions that support security providers. The WebLogic Security Framework consists of interfaces, classes, and exceptions provided by this API. The interfaces, classes, and exceptions in this API should be used in conjunction with those in the weblogic.security.spi package. For more information about how to use this API, see Developing Security Providers for Oracle WebLogic Server. ■ weblogic.security.services This API provides the server-side authentication class. This class is used to perform a local login to the server. It provides login methods that are used with CallbackHandlers to authenticate the user and return credentials using the default security realm. ■ weblogic.security.spi 2-6 Programming Security for Oracle WebLogic Server This package provides the Security Service Provider Interfaces SSPIs. It provides interfaces, classes, and exceptions that are used for developing custom security providers. In many cases, these interfaces, classes, and exceptions should be used in conjunction with those in the weblogic.security.service API. You implement interfaces, classes, and exceptions from this package to create runtime classes for security providers. For more information about how to use the SSPIs, see Developing Security Providers for Oracle WebLogic Server. ■ weblogic.servlet.security This API provides a server-side API that supports programmatic authentication from within a servlet application. For more about how to use this API, see Section 3.7, Using the Programmatic Authentication API . 3 Securing Web Applications 3-1 3 Securing Web Applications WebLogic Server supports the Java EE architecture security model for securing Web applications, which includes support for declarative authorization also referred to in this document as declarative security and programmatic authorization also referred to in this document as programmatic security. This section covers the following topics: ■ Section 3.1, Authentication With Web Browsers ■ Section 3.2, Multiple Web Applications, Cookies, and Authentication ■ Section 3.3, Developing Secure Web Applications ■ Section 3.4, Using Declarative Security With Web Applications ■ Section 3.5, Web Application Security-Related Deployment Descriptors ■ Section 3.6, Using Programmatic Security With Web Applications ■ Section 3.7, Using the Programmatic Authentication API WebLogic Server supports the use of the HttpServletRequest.isUserInRole and HttpServletRequest.getUserPrincipal methods and the use of the security-role-ref element in deployment descriptors to implement programmatic authorization in Web applications.

3.1 Authentication With Web Browsers

Web browsers can connect to WebLogic Server over either a HyperText Transfer Protocol HTTP port or an HTTP with SSL HTTPS port. The benefits of using an HTTPS port versus an HTTP port are two-fold. With HTTPS connections: ■ All communication on the network between the Web browser and the server is encrypted. None of the communication, including the user name and password, is in clear text. ■ As a minimum authentication requirement, the server is required to present a digital certificate to the Web browser client to prove its identity. Note: You can use deployment descriptor files and the Administration Console to secure Web applications. This document describes how to use deployment descriptor files. For information on using the Administration Console to secure Web applications, see Securing Resources Using Roles and Policies for Oracle WebLogic Server.