Configuring a WebLogic Credential Mapping Provider

Configuring WebLogic Security Providers 4-13 If you enable the default WebLogic Server Auditing provider, it writes all Audit Events as log messages in its own log file. Other Auditing providers that you create or purchase can filter these events and write them to output repositories such as an LDAP server, database, or a simple file. In addition, other types of security providers can request audit services from an Auditing provider. See Auditing Providers in Developing Security Providers for Oracle WebLogic Server.

4.8 Configuring a WebLogic Credential Mapping Provider

Credential mapping is the process whereby the authentication and authorization mechanisms of a remote system for example, a legacy system or application obtain an appropriate set of credentials to authenticate remote users to a target WebLogic resource. The WebLogic Credential Mapping provider maps WebLogic Server subjects to the usernamepassword pairs to be used when accessing such resources. By default, most configuration options for the WebLogic Credential Mapping provider are defined. In order to support Credential Mapping Deployment Enabled, a Credential Mapping provider must implement the DeployableCredentialProvider SSPI. The credential mapping information is stored in the embedded LDAP server. For more information: ■ See Credential Mapping Providers in Developing Security Providers for Oracle WebLogic Server. Table 4–6 Summary of Audit Events for Configuration Auditing When This Event Occurs... WebLogic Server Generates This Audit Event Object... A request to create a new configuration artifact has been allowed or prevented. weblogic.security.spi.AuditCreateConfigurationEvent A request to delete an existing configuration artifact has been allowed or prevented. weblogic.security.spi.AuditDeleteConfigurationEvent A request to modify an existing configuration artifact has been allowed or prevented. weblogic.security.spi.AuditInvokeConfigurationEvent A invoke an operation on an existing configuration artifact has been allowed or prevented. weblogic.security.spi.AuditSetAttributeConfigurationE vent Note: WebLogic Server provides the option of setting Credential Mapping Deployment Enabled, which specifies whether or not the Credential Mapping provider imports credential maps from a resource adapters deployment descriptor weblogic-ra.xml file into the security realm. However, this option is now deprecated. Deploying credential maps from a weblogic-ra.xml file is no longer supported by WebLogic Server. 4-14 Securing Oracle WebLogic Server ■ See Configure Credential Mapping Providers and Create credential mappings in the Oracle WebLogic Server Administration Console Help. ■ For information about using credential maps, see Programming Resource Adapters for Oracle WebLogic Server. ■ You can also use the WebLogic Scripting Tool or Java Management Extensions JMX APIs to create a new security configuration. ■ For information about other credential mapping providers, see Section 4.9, Configuring a PKI Credential Mapping Provider, and