Oracle Example MS-SQL Example

Managing the RDBMS Security Store 10-3 ■ By using the WebLogic Scripting Tool WLST Offline. Operations for creating and configuring the RDBMS security store are available via the RDBMSSecurityStoreMBean. Regardless of the method you choose to create the domain, be sure to configure the connection properties for the database that serves as the RDBMS security store as explained in the following sections.

10.2.1.1 Specifying Database Connection Properties

When configuring the RDBMS security store in either the Configuration Wizard or WLST, you need to specify or configure the following: ■ RDBMS type The following RDBMS systems are supported for containing the RDBMS security store: – Oracle 9i, 10g, and 11g – MS-SQL 2000 and 2005 – DB2 9.2 and 9.5 ■ JDBC driver and class name for connecting to the RDBMS ■ RDBMS name, host, port, and URL ■ Username and password of the domain user who can access the RDBMS system ■ Optionally, any properties that need to be passed to the RDBMS system The parameters that you specify in the JDBC driver connection properties attribute must be a comma-separated list. The following examples show the use of WLST to configure the database connection properties for Oracle, MS-SQL, and DB2.

10.2.1.1.1 Oracle Example

Example 10–1 shows an example of configuring Oracle for the RDBMS security store. Note: When you use the Configuration Wizard to configure the RDBMS security store, the Configuration Wizard provides a drop-down list for selecting the database you want to use. The databases appearing in this drop-down list are not exclusive to only those supported for the RDBMS security store. Make sure you choose a database that is supported for this purpose. See Oracle Fusion Middleware Supported System Configurations at http:www.oracle.comtechnologysoftwareproductsi asfilesfusion_certification.html for the most up-to-date list. Caution: For clarity, the WLST examples provided in this section show passing username and password credentials of the RDBMS system user in clear text. However, you should avoid entering clear-text passwords in WLST commands in general, and you should especially avoid saving on disk WLST scripts that include clear-text passwords. In these instances you should use a mechanism for passing encrypted passwords instead. 10-4 Securing Oracle WebLogic Server Example 10–1 Configuring Oracle for the RDBMS Security Store createbase_domain,SecurityConfiguration cdSecurityConfigurationbase_domain a=getDefaultRealm cdRealmmyrealm rdbms = createmyRDBMSSecurityStore, RDBMSSecurityStore rdbms.setUsernameortiz rdbms.setPasswordwelcome1 rdbms.setConnectionURLjdbc:bea:oracle:avitek21:1521 rdbms.setDriverNameweblogic.jdbc.oracle.OracleDriver rdbms.setConnectionPropertiesuser=ortiz,portNumber=1521,SID=pint101a,serverName= avitek21

10.2.1.1.2 MS-SQL Example

Example 10–2 shows an example of configuring MS-SQL for the RDBMS security store. Example 10–2 Configuring MS-SQL for the RDBMS Security Store createbase_domain,SecurityConfiguration cdSecurityConfigurationbase_domain a=getDefaultRealm cdRealmmyrealm rdbms = createmyRDBMSSecurityStore, RDBMSSecurityStore rdbms.setUsernamegarnett rdbms.setPasswordwelcome1 rdbms.setConnectionURLjdbc:bea:sqlserver:avitek6:1433 rdbms.setDriverNameweblogic.jdbc.sqlserver.SQLServerDriver rdbms.setConnectionPropertiesuser=garnett,portNumber=1433,databaseName=wls3,serv erName=avitek6

10.2.1.1.3 DB2 Example