Reordering Security Providers Enabling Synchronization in Security Policy and Role Modification at Deployment
4-2 Securing Oracle WebLogic Server
■
To map tokens to a user in a security realm, configure the user name mapper in the WebLogic Identity Assertion provider. See
Section 4.8, Configuring a WebLogic Credential Mapping Provider.
■
To use auditing in the default active security realm, configure either the WebLogic Auditing provider or a custom Auditing provider. See
Section 4.7, Configuring the WebLogic Auditing Provider.
■
To use HTTP and Kerberos-based authentication in conjunction with WebLogic Server. See
Chapter 6, Configuring Single Sign-On with Microsoft Clients.
■
To use identity assertion based on SAML assertions. See Chapter 7, Configuring
Single Sign-On with Web Browsers and HTTP Clients.
■
To use certificate revocation. See Section 4.12.2, Certificate Registry.
■
To use an LDAP server other than the embedded LDAP server, configure one of the LDAP Authentication providers. An LDAP authentication provider can be
used instead of or in addition to the WebLogic Authentication provider. See Section 5.4, Configuring LDAP Authentication Providers.
■
To access user, password, group, and group membership information stored in databases for authentication purposes. See
Section 5.5, Configuring RDBMS Authentication Providers.
The RDBMS Authentication providers can be used to upgrade from the RDBMS security realm.
■
To use Windows NT users and groups for authentication purposes. See Section 5.6,
Configuring a Windows NT Authentication Provider. The Windows NT
Authentication provider is the upgrade path for the Window NT security realm.
■
When you create a new security realm, configure security providers for that realm. See
Section 3.3, Creating and Configuring a New Security Realm: Main Steps.
■
When you add a custom security provider to a security realm or replace a WebLogic security provider with a custom security provider, configure options for
the custom security provider. When you create a custom security provider, you can implement options that are configurable through the Administration Console.
However, those options are implementation-specific and are not addressed in this manual. See Extending the Administration Console for Oracle WebLogic Server.
You can use either the WebLogic-supplied security providers or a custom security provider in a security realm. To configure a custom security provider, see Configure
custom security providers in the Oracle WebLogic Server Administration Console Help.