Technical data
14 Managing Security
14-72 Administration Guide
8. Set the -E option of the ISL command to configure the IIOP Listener/Handler to 
detect and utilize the propagated security context from the WebLogic Server 
realm. The
 -E option of the ISL command requires you to specify a principal 
name. The principal name defines the principal used by the WLEC connection 
pool to log in to the WebLogic Enterprise domain. The principal name should 
match the name defined in the User Name attribute when creating a WLEC 
connection pool.
Using certificate authentication between the WebLogic Server environment and the 
BEA Tuxedo environment implies performing a new SSL handshake when 
establishing a connection from the WebLogic Server environment to a BEA Tuxedo 
CORBA object. To support multiple client requests over the same SSL network 
connection, you must set up certificate authentication so that it operates as follows:
1. Obtain a digital certificate for the WebLogic Server User and put the private key in 
the 
TUXDIR/udataobj/security/keys directory of BEA Tuxedo.
2. In the 
UBBCONFIG file for the BEA Tuxedo CORBA application, use the 
tpusradd command to define the WebLogic Server User as a BEA Tuxedo user.
3. Define the IIOP Listener/Handler in the UBBCONFIG file with the -E option to 
indicate the WebLogic Server User is to be used for authentication.
4. Define the WebLogic Server User name in the User Name attribute when creating 
a WLEC Connection pool in the Administration Console of WebLogic Server.
5. Obtain a digital certificate for the IIOP Listener/Handler. 
6. Specify the digital certificate in the 
SEC_PRINCIPAL_NAME option of the ISL 
command and use the 
-S option to indicate that a secure port should be used for 
communication between the BEA Tuxedo domain and the WebLogic Server 
security realm.
For more information about the 
UBBCONFIG file, see Creating a Configuration File in 
the BEA Tuxedo documentation.
For more information about the 
corbalocs prefix, see Understanding the Address 
Formats of the Bootstrap Object in the BEA Tuxedo documentation.
For information about BEA Tuxedo security levels, see Defining a Security Level in 
the BEA Tuxedo documentation.










