Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Oracle SOA Suite 11g Administrator's Handbook

You're reading from   Oracle SOA Suite 11g Administrator's Handbook This book will quickly become your constant companion in achieving the reliability and security you want in your day to day administration of Oracle SOA Suite 11g. Covers both broad concepts and real-world implementation.

Arrow left icon
Product type Paperback
Published in Aug 2012
Publisher Packt
ISBN-13 9781849686082
Length 380 pages
Edition 1st Edition
Arrow right icon
Toc

Table of Contents (16) Chapters Close

Oracle SOA Suite 11g Administrator's Handbook
Credits
About the Authors
Acknowledgement
About the Reviewers
www.PacktPub.com
1. Preface
1. SOA Infrastructure Management: What you Need to Know FREE CHAPTER 2. Management of SOA Composite Applications 3. Monitoring Oracle SOA Suite 11g 4. Tuning Oracle SOA Suite 11g for Optimum Performance 5. Configuring and Administering Oracle SOA Suite 11g 6. Troubleshooting the Oracle SOA Suite 11g Infrastructure 7. Configuring Security Policies for SOA Composites 8. Managing the Metadata Services Repository and Dehydration Store 9. Backup and Recovery

Managing OWSM policies at runtime


In this section, we will discuss how to manage OWSM policies at runtime.

Attaching and removing policies

As an administrator, you have a number of options available to attach/remove OWSM-based security policies to web service components deployed in your infrastructure. If you have a standard web service available inside a WAR application, policies can be attached to it from even the Oracle WebLogic Server Administration Console. For SOA composites, from Oracle Enterprise Manager Fusion Middleware Control, you can navigate to the particular service, component, or reference and attach a predefined or custom policy to them. Then, you have your reliable friend, that is, WLST, which offers handy and convenient ways to list, attach, detach, enable, and/or disable security policies for your service artifacts.

Having said this, the question on which you can deliberate is when to use which approach. If you like scripting things out once and then applying them whenever...

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime