Technical data

14 Managing Security
14-68 Administration Guide
is trailed with/-” it means that the element preceding it is a directory and
that grant functions for all elements below it. It does not mean that you can
read the directory itself.” The workaround for this nuance is to add an
additional
FilePermission entry that consists of just the directory itself
(with no trailing “
/-’).
Using the Recording Security Manager
Utility
The Recording Security Manager utility can be used to detect permission problems that
occur when starting and running WebLogic Server. The utility outputs permissions
that can be added to your security policy file to resolve the permission problems that
the utility finds. The Recording Security Manager is available at the BEA Developer's
Center.
Configuring Security Context Propagation
Security context propagation enables Java applications running in a WebLogic Server
environment to access objects and operations in BEA Tuxedo domains. The BEA
WebLogic Enterprise Connectivity component of WebLogic Server provides the
security context propagation capability.
With security context propagation, the security identity of a User defined in a
WebLogic Server security realm is propagated as part of the service context of an
Internet Inter-ORB Protocol (IIOP) request sent to the BEA Tuxedo domain over a
network connection that is part of a WLEC connection pool. Each network connection
in the WLEC connection pool has been authenticated using a defined User identity.
To use security context propagation, create a WLEC connection pool for each BEA
Tuxedo domain you want to access from WebLogic Server. WebLogic Server
populates each WLEC connection pool with IIOP connections. Java applications in a