The User and Role API JAAS Authorization and the JpsAuth.checkPermission API

19-12 Oracle Fusion Middleware Application Security Guide ■ Oracle Fusion Middleware Fusion Developers Guide for Oracle Application Development Framework

19.4.3 The Oracle ADF Development Life Cycle

Figure 19–9 illustrates how an application is first deployed to integrated Oracle WebLogic Server Oracle WebLogic Server embedded in Oracle JDeveloper. A developer then produces an EAR file that is deployed, through Oracle Enterprise Manager Fusion Middleware Control, to another Oracle WebLogic Server domain. In regards to grants with duplicate permissions, see note in Policy Management . This Oracle WebLogic Server domain is likely to be located in a test or staging area. Figure 19–9 Oracle ADF Application Deployed to Oracle WebLogic Server Key features include: ■ Oracle ADF application developed with Oracle JDeveloper ■ Oracle ADF security wizard and Oracle ADF authorization policy editor ■ Oracle JDeveloper provides an integrated user experience, migrating artifacts to the run-time environment: – Users and groups defined at design-time are available in the default authenticator – Authorization policy and credential data is migrated using the OPSS listener framework ■ Application developer creates EAR file containing policy and credentials ■ Administrator deploys the EAR to a remote Oracle WebLogic Server using Fusion Middleware Control or WLST scripts

19.5 Using the Oracle Security Developer Tools

Oracle Security Developer Tools provide you with the cryptographic building blocks necessary for developing robust security applications, ranging from basic tasks like secure messaging to more complex projects such as securely implementing a Note: For more information about deployment tools and options, see Chapter 6, Deploying Secure Applications. Developing Secure Applications with Oracle Platform Security Services 19-13 service-oriented architecture. The tools build upon the core foundations of cryptography, public key infrastructure, web services security, and federated identity management, and are widely used in building Oracles own security offerings. For more information about the tools, see: ■ Oracle Security Developer Toolkit in the Oracle Fusion Middleware Security Overview ■ Oracle Fusion Middleware Reference for Oracle Security Developer Tools

19.6 Using OPSS Outside Oracle JDeveloperOracle ADF

You can make use of OPSS APIs in your applications if you are using a development IDE other than Oracle JDeveloper and Oracle ADF. However, in that case, you will need to perform manual configuration in OPSS configuration files and web.xml, so you do not get the benefits of automatic configuration and security migration that are available when using Oracle JDeveloper. For more information about this topic, see Chapter 21, Manually Configuring Java EE Applications to Use OPSS .