Understand Two Important Restrictions
3.2 Security Services Provider Interfaces SSPIs
As described in Section 2.2, Overview of the Development Process, you develop a custom security provider by first implementing a number of security services provider interfaces SSPIs to create runtime classes. This section helps you: ■ Section 3.2.1, Understand Two Important Restrictions ■ Section 3.2.2, Understand the Purpose of the Provider SSPIs ■ Section 3.2.3, Understand the Purpose of the Bulk Access Providers ■ Section 3.2.4, Determine Which Provider Interface You Will Implement ■ Section 3.2.5, Understand the SSPI Hierarchy and Determine Whether You Will Create One or Two Runtime Classes Additionally, this section provides Section 3.2.6, SSPI Quick Reference that indicates which SSPIs can be implemented for each type of security provider.3.2.1 Understand Two Important Restrictions
Security providers must adhere to the following restrictions: ■ A custom security providers runtime class implementation must not contain any code that requires a security check to be performed by the WebLogic Security Framework. Doing so causes infinite recursion, because the security providers are the components of the WebLogic Security Framework that actually perform the security checks and grant access to WebLogic resources. Note: The SSPIs and the runtime classes that is, implementations you will create using the SSPIs are shown on the left side of Figure 3–1 and are .java files. Like the other files on the right side of Figure 3–1 , MyFooMBean begins as a .xml file, in which you will extend and optionally implement SSPI MBeans. When this MBean Definition File MDF is run through the WebLogic MBeanMaker utility, the utility generates the .java files for the MBean type, as described in Section 2.2.3, Generating an MBean Type to Configure and Manage the Custom Security Provider. Design Considerations 3-3 ■ No local where local refers to the same server, cluster, or domain Java Platform, Enterprise Edition Java EE Version 5 services are available for use within a security providers implementation. Any attempt to use them is unsupported. For example, this prohibits calling an EJB in the current domain from your security provider. Java EE services in other domains are accessible and can be used within a security provider.3.2.2 Understand the Purpose of the Provider SSPIs
Parts
» Oracle Fusion Middleware Online Documentation Library
» Document Scope Documentation Audience Guide to this Document
» Writing Console Extensions Overview of the Development Process
» Understand Two Important Restrictions
» Understand the Purpose of the Provider SSPIs Understand the Purpose of the Bulk Access Providers
» Determine Which Provider Interface You Will Implement
» Understand Why You Need an MBean Type
» Understand the SSPI MBean Hierarchy and How It Affects the Administration Console
» Understand What the WebLogic MBeanMaker Provides
» Migration Concepts Security Data Migration
» The Architecture of WebLogic Resources Types of WebLogic Resources
» Looking Up WebLogic Resources in a Security Providers Runtime Class
» ContextHandlers and WebLogic Resources
» Best Practice: Create a Simple Database If None Exists
» Best Practice: Configure an Existing Database
» Users and Groups, Principals and Subjects
» Java Authentication and Authorization Service JAAS
» Example: Creating the Runtime Classes for the Sample Authentication Provider
» Install the MBean Type Into the WebLogic Server Environment
» Specifying the Order of Authentication Providers
» Identity Assertion Providers and LoginModules Identity Assertion and Tokens
» Do You Need to Develop a Custom Authentication Provider? The Identity Assertion Process
» Do You Need to Develop a Custom Identity Assertion Provider?
» Create Runtime Classes Using the Appropriate SSPIs
» Implement the PrincipalValidator SSPI
» The Principal Validation Process The Authorization Process
» Policy Consumer SSPI How to Develop a Custom Authorization Provider
» PolicyStoreMBean How to Develop a Custom Authorization Provider
» Provide a Mechanism for Security Policy Management
» Security Roles Dynamic Security Role Computation
» Role Consumer SSPI How to Develop a Custom Role Mapping Provider
» PolicyStoreMBean How to Develop a Custom Role Mapping Provider
» Is Your Custom Role Mapping Provider Thread Safe? The Auditing Process
» ContextHandlerMBean Methods Example: Implementing the ContextHandlerMBean
» Extend weblogic.management.security.audit.ContextHandlerImpl
» Do You Need to Develop a Custom Auditing Provider?
» Configure the Custom Auditing Provider Using the Administration Console
» Passing Additional Audit Information Audit Event Interfaces and Audit Events
» Credential Mapping Concepts The Credential Mapping Process
» Security Services and the Auditor Service
» Example: Auditing Management Operations from a Providers MBean
» Best Practice: Posting Audit Events from a Providers MBean
» Why Filters are Needed Servlet Authentication Filter Design Considerations
» Implementing Challenge Identity Assertion from a Filter
» Example of a Provider that Implements a Filter Versionable Application Concepts
Show more