role-name run-as-identity-principal weblogic-ejb-jar.xml Deployment Descriptors
6.3.2.9 role-name
The role-name element identifies an application role name that the EJB provider placed in the companion ejb-jar.xml file. Subsequent principal-name elements in the stanza map ProductName principals to the specified role-name.6.3.2.9.1 Used Within The role-name element is used within the
security-role-assignment element.6.3.2.9.2 Example For an example of how to use the role-name element, see
Example 6–1 .6.3.2.10 run-as-identity-principal
The run-as-identity-principal element specifies which security principal name is to be used as the run-as principal for a bean that has specified a security-identity run-as role-name in its ejb-jar deployment descriptor. For an explanation of how of run-as role-names to are mapped to run-as-identity-principals or run-as-principal-names, see Section 6.3.2.12, run-as-role-assignment .6.3.2.10.1 Used Within The run-as-identity-principal element is used within
the run-as-role-assignment element.6.3.2.10.2 Example For an example of how to use the run-as-identity-principal
element, see Example 6–7 . Example 6–7 run-as-identity-principal Element Example ebj-jar.xml: ejb-jar enterprise-beans session ejb-nameCaller2EJBejb-name homeweblogic.ejb11.security.CallerBeanHomehome remoteweblogic.ejb11.security.CallerBeanRemoteremote ejb-classweblogic.ejb11.security.CallerBeanejb-class session-typeStatefulsession-type transaction-typeContainertransaction-type ejb-refejb-ref-nameCallee2Beanejb-ref-name ejb-ref-typeSessionejb-ref-type homeweblogic.ejb11.security.CalleeBeanHomehome remoteweblogic.ejb11.security.CalleeBeanRemoteremote ejb-ref security-role-ref role-nameusers1role-name role-linkusers1role-link security-role-ref security-identity run-as role-nameusers2role-name run-as security-identity session enterprise-beans Note: Deprecated: The run-as-identity-principal element is deprecated in the WebLogic Server 8.1. Use the run-as-principal-name element instead. 6-16 Programming Security for Oracle WebLogic Server ejb-jar woblogic-ejb-jar.xml: weblogic-ejb-jar weblogic-enterprise-bean ejb-nameCaller2EJBejb-name reference-descriptor ejb-reference-description ejb-ref-nameCallee2Beanejb-ref-name jndi-namesecurity.Callee2Beanjndi-name ejb-reference-description reference-descriptor run-as-identity-principalwsUser3run-as-identity-principal weblogic-enterprise-bean security-role-assignment role-nameuserrole-name principal-namewsUser2principal-name principal-namewsUser3principal-name principal-namewsUser4principal-name security-role-assignment weblogic-ejb-jar6.3.2.11 run-as-principal-name
Parts
» Oracle Fusion Middleware Online Documentation Library
» Document Scope Audience for This Guide
» Guide to this Document Related Information
» New and Changed Security Features in This Release What Is Security?
» Authentication Authorization Java EE Security
» User Name and Password Authentication
» Digital Certificate Authentication Authentication With Web Browsers
» Using Secure Cookies to Prevent Session Stealing
» Developing BASIC Authentication Web Applications
» Using WLST to Check the Value of enforce-valid-basic-auth-credentials
» Developing FORM Authentication Web Applications
» Developing Swing-Based Authentication Web Applications Deploying Web Applications
» auth-constraint security-constraint web.xml Deployment Descriptors
» security-role security-role-ref user-data-constraint web.xml Deployment Descriptors
» externally-defined weblogic.xml Deployment Descriptors
» security-permission-spec security-role-assignment weblogic.xml Deployment Descriptors
» getUserPrincipal isUserInRole Using Programmatic Security With Web Applications
» JAAS Authentication APIs JAAS Authentication Development Environment
» JAAS Client Application Components
» WebLogic LoginModule Implementation JVM-Wide Default User and the runAs Method
» Writing a Client Application Using JAAS Authentication
» Using JNDI Authentication Oracle Fusion Middleware Online Documentation Library
» Java Client JAAS Authentication Code Examples JSSE and WebLogic Server
» SSL Authentication APIs SSL Certificate Authentication Development Environment
» SSL Client Application Components
» SSLClient Sample SSLSocketClient Sample
» Two-Way SSL Authentication with JNDI
» Using Two-Way SSL Authentication Between WebLogic Server Instances
» Using Two-Way SSL Authentication with Servlets
» Using the CertPath Trust Manager Using a Handshake Completed Listener
» Using an SSLContext Using URLs to Make Outbound SSL Connections
» Declarative Authorization Programmatic Authorization
» SSL Client Code Examples Using Declarative Security With EJBs
» method method-permission ejb-jar.xml Deployment Descriptors
» role-name run-as security-identity ejb-jar.xml Deployment Descriptors
» security-role security-role-ref ejb-jar.xml Deployment Descriptors
» externally-defined weblogic-ejb-jar.xml Deployment Descriptors
» identity-assertion iiop-security-descriptor integrity principal-name
» role-name run-as-identity-principal weblogic-ejb-jar.xml Deployment Descriptors
» run-as-principal-name run-as-role-assignment weblogic-ejb-jar.xml Deployment Descriptors
» security-permission security-permission-spec security-role-assignment transport-requirements
» ConnectionFilterImpl Class ConnectionEvent Class
» Connection Filter Rules Syntax Types of Connection Filter Rules
» Modifying the weblogic.policy file for General Use
» Setting Application-Type Security Policies Setting Application-Specific Security Policies
» Using Java EE Security to Protect WebLogic Resources SAML API Description
» Custom POST Form Parameter Names
» Overview of Creating a Custom SAML Name Mapper
» SAMLAttributeStatementInfo Class Classes, Interfaces, and Methods
» SAMLCredentialAttributeMapper Interface Classes, Interfaces, and Methods
» Make the Custom SAMLCredentialAttributeMapper Class Available in the Console
» What Are SAML SSO Attributes?
» How to Implement SAML Attributes
» Example Custom SAML 2.0 Credential Attribute Mapper
» Custom SAML 2.0 Identity Asserter Attribute Mapper
» Example Custom SAML 1.1 Credential Attribute Mapper
» Custom SAML 1.1 Identity Asserter Attribute Mapper
» Instantiate a CertPathSelector CertPath Building
» Instantiate a CertPathBuilderParameters CertPath Building
» Use the JDK CertPathBuilder Interface Example Code Flow for Looking Up a Certificate Chain
Show more