Book Image

Securing WebLogic Server 12c

Book Image

Securing WebLogic Server 12c

Overview of this book

Security is a must in modern Enterprise architecture, and WebLogic implements a very complete and complex architecture for configuration and implementation, and we need to deeply know in technologies, terminology and how the security process works between all actors. Transparent security of your applications and Weblogic infrastructure need a good knowledge of the issues you can incur in this long and error prone configuration process. "Securing WebLogic Server 12c" will simplify a complex world like WebLogic Security, helping the reader to implement and configure. It's the only fast guide that will let you develop and deploy in a production system with best practices both from the development world and the operation world. This book will try to make a clear picture of Java EE Security with clean and simple step-by-step examples that will guide the reader to security implementation and configuration From the concepts of Java EE Security to the development of secure application, from the configuration of a realm to the setup of Kerberos Single Sign on, every concept is expressed in simple terms and surrounded by examples and pictures. Finally, also a way to develop WebLogic Security Providers with Maven, so that you can add the security part of your infrastructure to your enterprise best practices.
Table of Contents (12 chapters)

Preface

Security is a must in a modern Enterprise infrastructure, and WebLogic implements a very complete and complex architecture for configuration and implementation. That is why it is necessary to deeply know technologies, terminologies, and how the security process works between all actors. Securing WebLogic Server 12c aims to simplify the complex world of WebLogic Security, helping the reader to implement standard Java EE application security, and configuring it inside WebLogic with clean and simple step-by-step examples. This guide will let you develop and deploy in a production system with the best practices, both from the development world and the operation world. From the concepts of Java EE Security to the development of secure applications, from the configuration of a realm to the setup of Kerberos Single Sign-on, every concept is expressed in simple terms and completed by working examples and pictures. Finally, a way to develop WebLogic security providers with Maven is provided, so that you can add the security part of your infrastructure to your enterprise best practices.

What this book covers

Chapter 1, WebLogic Security Concepts, covers the custom concepts and framework that implement security inside the WebLogic server.

Chapter 2, WebLogic Security Realm, will allow you to understand in detail how the internal LDAP works and also explain the necessary configuration. Also explained in this chapter is how an existing LDAP server can be integrated with WebLogic. This chapter includes a complete troubleshooting section that will help you overcome some typical configuration mistakes.

Chapter 3, Java EE Security with WebLogic, explains how you can leverage all the power of WebLogic security using only standard Java EE coding and vice versa. Also, this chapter explains how you can have the value added feature from WebLogic in a standard Java EE application.

Chapter 4, Creating Custom Authentication Providers with Maven, shows a better way to create your own provider that can use the WebLogic framework to integrate your custom security needs.

Chapter 5, Integrating with Kerberos SPNEGO Identity Assertion, covers the Single Sign-On activation process between your Active Directory Domain/Kerberos Server and desktop clients through WebLogic, to access the protected application resource in a seamless way. Every configuration is explained in full detail for this complex task.

What you need for this book

The following are the software that you need for this book:

Who this book is for

If you are a WebLogic Server administrator who is looking forward to a step-by-step guide to administer and configure WebLogic security, then this guide is for you. This book is also for WebLogic developers who want to leverage the complex but powerful WebLogic security infrastructure.

Working knowledge of WebLogic and/or Java EE 6 is required.

Conventions

In this book, you will find a number of styles of text that distinguish between different kinds of information. Here are some examples of these styles, and an explanation of their meaning.

Code words in text are shown as follows: "We can also disable the standard maven-install-plugin plugin".

A block of code is set as follows:

    <plugin>
        <artifactId>maven-compiler-plugin</artifactId>
        <version>2.0.2</version>
        <configuration>
            <encoding>UTF-8</encoding>
            <source>${maven.compiler.source}</source>
            <target>${maven.compiler.target}</target>
        </configuration>
    </plugin>
   <plugin>

Note

Warnings or important notes appear in a box like this.

Tip

Tips and tricks appear like this.

Reader feedback

Feedback from our readers is always welcome. Let us know what you think about this book—what you liked or may have disliked. Reader feedback is important for us to develop titles that you really get the most out of.

To send us general feedback, simply send an e-mail to , and mention the book title via the subject of your message.

If there is a topic that you have expertise in and you are interested in either writing or contributing to a book, see our author guide on www.packtpub.com/authors.

Customer support

Now that you are the proud owner of a Packt book, we have a number of things to help you to get the most from your purchase.

Downloading the example code

You can download the example code files for all Packt books you have purchased from your account at http://www.PacktPub.com. If you purchased this book elsewhere, you can visit http://www.PacktPub.com/support and register to have the files e-mailed directly to you.

Errata

Although we have taken every care to ensure the accuracy of our content, mistakes do happen. If you find a mistake in one of our books—maybe a mistake in the text or the code—we would be grateful if you would report this to us. By doing so, you can save other readers from frustration and help us improve subsequent versions of this book. If you find any errata, please report them by visiting http://www.packtpub.com/support, selecting your book, clicking on the errata submission form link, and entering the details of your errata. Once your errata are verified, your submission will be accepted and the errata will be uploaded on our website, or added to any list of existing errata, under the Errata section of that title. Any existing errata can be viewed by selecting your title from http://www.packtpub.com/support.

Piracy

Piracy of copyright material on the Internet is an ongoing problem across all media. At Packt, we take the protection of our copyright and licenses very seriously. If you come across any illegal copies of our works, in any form, on the Internet, please provide us with the location address or website name immediately so that we can pursue a remedy.

Please contact us at with a link to the suspected pirated material.

We appreciate your help in protecting our authors, and our ability to bring you valuable content.

Questions

You can contact us at if you are having a problem with any aspect of the book, and we will do our best to address it.