Ramifications of weblogic.policy permissions...

What are the ramifications/dangers of setting these
in the general grant section of the weblogic.policy file:
permission java.net.NetPermission "specifyStreamHandler";
permission java.security.AllPermission
I am running wl 5.1, sp8 (maybe sp10), jdk 1.3.1_01.
Jason

What are the ramifications/dangers of setting these
in the general grant section of the weblogic.policy file:
permission java.net.NetPermission "specifyStreamHandler";
permission java.security.AllPermission
I am running wl 5.1, sp8 (maybe sp10), jdk 1.3.1_01.
Jason

Similar Messages

  • Sample of weblogic.policy for WLS6.0

    Dear all,
    I had installed WLS6.0 on Solaris 2.6 and try to turn on
    java security manager with this option
    -Djava.security.policy==/usr/home/bea/wlserver6.0/lib/
    weblogic.policy -Djava.security.manager
    This make me unable to boot WLS. Here is contents of my weblogic.policy
    grant {
    // Permission "enableSubstitution" needed to run the WebLogic console
    permission java.io.SerializablePermission "enableSubstitution";
    // Permission "modifyThreadGroup" required to run the WebLogic Server
    permission java.lang.RuntimePermission "modifyThreadGroup";
    permission java.lang.RuntimePermission "setContextClassLoader";
    // Permission "setIO" needed to start a server from the WebLogic console
    permission java.lang.RuntimePermission "setIO";
    // Permission "getClassLoader" needed for many EJB clients
    permission java.lang.RuntimePermission "getClassLoader";
    permission java.lang.RuntimePermission "stopThread";
    permission java.net.SocketPermission "localhost:1024-", "listen";
    permission java.util.PropertyPermission "*", "read,write";
    permission java.io.FilePermission "${/}usr${/}home${/}bea${/}wlserver6.0${/}-",
    "read,write,delete,execute";
    And here is the error occurs
    java.security.AccessControlException: access denied (java.io.FilePermission /usr/home/bea/wlserver6.0
    read)
    at java.security.AccessControlContext.checkPermission(AccessControlContext.java:272)
    at java.security.AccessController.checkPermission(AccessController.java:399)
    at java.lang.SecurityManager.checkPermission(SecurityManager.java:545)
    at java.lang.SecurityManager.checkRead(SecurityManager.java:890)
    at java.io.File.exists(File.java:535)
    at weblogic.utils.classloaders.ClasspathClassFinder.<init>(ClasspathClassFinder.java:61)
    at weblogic.Home.getFileSource(Home.java:64)
    at weblogic.Home.<init>(Home.java:29)
    at weblogic.Home.getInstance(Home.java:82)
    at weblogic.Home.getPath(Home.java:90)
    at weblogic.security.internal.ServerAuthenticate.main(ServerAuthenticate.java:76)
    at weblogic.t3.srvr.T3Srvr.run(T3Srvr.java:167)
    at weblogic.Server.main(Server.java:35)
    Could anyone give me what goes wrong. If you have a working version of weblogic.policy,
    please share with me.
    Regards,
    Khemchart

    Here's a snippet from upcoming release notes about the Java
    security manager and the example weblogic.policy file.
    Using the Java Security Manager with WebLogic Server
    When you run WebLogic Server under Java 2 (JDK 1.2 or 1.3), WebLogic
    Server can use the Java Security Manager in Java 2 to provide
    additional access control for WebLogic Server resources. The Java
    Virtual Machine (JVM) has security mechanisms built into it which can
    be managed via a security policy file. The Java Security Manager can
    enforce a set of permissions granted to CodeSource or SignedBy
    classes. The permissions allow certain classes running in that
    instance of the JVM to do or not do certain runtime operations. In
    many cases, where the threat model does not include malicious code
    being run on the JVM, the Java Security Manager is unnecessary. In
    cases such as when an Application Service Provider uses WebLogic
    Server and unknown classes are being run, the Java Security Manager is
    necessary. To use the Java Security Manager with WebLogic Server,
    specify the -Djava.security.manager property when starting WebLogic
    Server.
    Note: In past releases of WebLogic Server, the Java Security Manager
    was enabled by using the -Dweblogic.security.manager property when
    starting WebLogic Server. Please note the change in the property for
    WebLogic Server version 6.0 and greater.
    The Java Security Manager uses a security policy file that defines
    permissions. The full pathname of security policy is specified in the
    -Djava.security.policy property when starting WebLogic Server. If you
    enable the Java Security Manager but do not specify a security policy
    file, the Java Security Manager uses the default security policies
    defined in the java.security and java.policy files in the
    $JAVA_HOME/lib/security directory.
    WebLogic Server includes an example security policy file named
    weblogic.policy. This file contains a set of default permissions.
    You need to make the following edits to the file in order to use the
    file with your WebLogic Server deployment.
    1. Edit the following lines in the weblogic.policy file, replacing the
    specified location with the location of your WebLogic Server
    installation:
    grant codebase "file://BEA/-"{
    permission java.io.FilePermission "D:${/}BEA${/}=", ...
    Note: This change assumes your installation directory structure is the
    same as the one described in the BEA Home Directory topic in the BEA
    WebLogic Server Installation Guide.
    2. If you want to run the Administration Console, add the following
    grant block and permissions to the weblogic.policy file:
    grant {
         permission java.io.FilePermission
    "D:{/}BEA${/}wlserver600${/}weblogic${/}management${/}console${/}-",
    "read";
         permission java.io.FilePermission
    "D:{/}BEA${/}wlserver600${/}config${/}mydomain${/}applications${/}.wl_te\
    mp_do_not_delete${/}weblogic${/}management${/}console${/}-", "read";
         permission java.util.PropertyPermission "user.*", "read";
    3. If you have extra directories in your CLASSPATH or if you are
    deploying applications in extra directories, you need to add specific
    permissions for those directories to your weblogic.policy file.
    BEA also recommends taking the following precautions:
    ? Make a backup copy of the weblogic.policy file and put the backup
    copy in a secure location.
    ? Set the permissions on the weblogic.policy file such that the
    adminstrator of the WebLogic Server deployment has write and read
    privileges and no other users
    To use the Java Security Manager and the weblogic.policy file with
    your WebLogic Server deployment, use the following properties when
    starting WebLogic Server:
    $java... -Djava.security.manager \
    -Djava.security.policy==D:/BEA/wlserver600/lib/weblogic.policy
    For more information about the Java Security Manager, see the Javadoc
    shipped with Java 2.
    The RecordingSecurityManager utility can be used to detect permission
    problems that occur when starting and running WebLogic Server. The
    utility outputs permissions that can be added to your security policy
    file to resolve the permission problems that the utility finds. The
    RecordingSecurityManager is available at the BEA Developer's Center.

  • WebLogic 9.2 and weblogic.policy file

    Hello,
    I'm using weblogic.policy file while starting weblogic.
    After adding it to JAVA_OPTIONS in startWebLogic.cmd I've got AccessControlException, and I'have to grant this persmision to all:
    permission java.util.PropertyPermission "debug.properties", "read";
    permission java.util.PropertyPermission "netuix.logger.implementation", "read";
    permission java.util.PropertyPermission "netuix.formatter.implementation", "read";
    permission java.lang.RuntimePermission "accessDeclaredMembers";     
    permission java.lang.RuntimePermission "weblogic.kernelPermission";
    permission java.lang.RuntimePermission "setContextClassLoader";
    This is not all permissions which I have to grant.
    While I'm tring to run my deployed application I've got
    java.security.AccessControlException: access denied (java.io.FilePermission D:\serwery\bea\jrockit90_150_04\jre\lib\managementapi.jar read).
    So which permission I have to give (I don't want to add this permissions to all, so the question is where this permissions have to be added).
    I think that this permissions should be granted to Servlets, as it is written on page
    http://e-docs.bea.com/wls/docs92/security/server_prot.html#wp1032298
    but resource path "file:/weblogic/application/defaults/Web" seems strange to me - there is nothing like this in Weblogic 9.2"
    I also add this grant:
    grant codeBase "file:${user.domain}/servers/${weblogic.Name}/tmp/-" {
    permission java.security.AllPermission;
    to weblogic.policy to run all deployed applications.
    Thanks in advice,
    Marcin Dabrowski

    Hi
    According to
    http://e-docs.bea.com/wls/docs90/webserv/annotations.html#1050414
    If you are going to publish the policy file in the Web Service archive, the policy XML file must be located in either the META-INF/policies or WEB-INF/policies directory of the EJB JAR file (for EJB implemented Web Services) or WAR file (for Java class implemented Web Services), respectively.
    Can you make sure the policy file is in there?
    Also there is a sample from the developer at http://dev2dev.bea.com/blog/jlee/archive/2005/09/how_to_use_anno.html
    Vimala-

  • Weblogic.policy doesn't work

    I always get the below exception output, when starting WebLogic Server with
    the weblogic.policy file. It seems to me, that I forgot something, but I
    don't know what. What am I doing wrong here?
    I did the following:
    1. I added the folling property into weblogic.properties:
    'weblogic.security.URLAclFile=weblogic.policy'
    2. I adjusted the weblogic.policy file:
    grant codeBase "file:/d:/program files/-" {
    permission java.io.FilePermission "d:${/}program files${/}weblogic${/}-",
    "read,write,delete,execute";
    Also, I tried to replace 'codeBase' in weblogic.policy with 'Principal' but
    it didn't work.
    Thank you in advance,
    Andreas
    WebLogic Server Output:
    =================
    Unable to initialize server: weblogic.utils.security.ParsingException: line
    30:
    only Principal-based grant entries permitted
    fatal initialization exception
    weblogic.utils.security.ParsingException: line 30: only Principal-based
    grant en
    tries permitted
    at
    weblogic.utils.security.PolicyParser.parseGrantEntry(PolicyParser.jav
    a, Compiled Code)
    at weblogic.utils.security.PolicyParser.read(PolicyParser.java,
    Compiled
    Code)
    at
    weblogic.security.acl.internal.WLPropertyRealm.loadURLAcls(WLProperty
    Realm.java:402)
    at weblogic.t3.srvr.T3Srvr.initializeSecurity(T3Srvr.java:1759)
    at weblogic.t3.srvr.T3Srvr.start(T3Srvr.java, Compiled Code)
    at weblogic.t3.srvr.T3Srvr.main(T3Srvr.java:825)
    at java.lang.reflect.Method.invoke(Native Method)
    at weblogic.Server.startServerDynamically(Server.java:99)
    at weblogic.Server.main(Server.java:65)
    at weblogic.Server.main(Server.java:55)

    [email protected] (Andreas Guenther) wrote in
    <[email protected]>:
    I always get the below exception output, when starting WebLogic Server
    with the weblogic.policy file. It seems to me, that I forgot something,
    but I don't know what. What am I doing wrong here?
    I did the following:
    1. I added the folling property into weblogic.properties:
    'weblogic.security.URLAclFile=weblogic.policy'
    2. I adjusted the weblogic.policy file:
    grant codeBase "file:/d:/program files/-" {
    permission java.io.FilePermission "d:${/}program
    files${/}weblogic${/}-",
    "read,write,delete,execute";
    Also, I tried to replace 'codeBase' in weblogic.policy with 'Principal'
    but it didn't work.
    Thank you in advance,
    Andreas
    WebLogic Server Output:
    =================
    Unable to initialize server: weblogic.utils.security.ParsingException:
    line 30:
    only Principal-based grant entries permitted
    fatal initialization exception
    weblogic.utils.security.ParsingException: line 30: only Principal-based
    grant en
    tries permitted
    at
    weblogic.utils.security.PolicyParser.parseGrantEntry(PolicyParser.jav
    a, Compiled Code)
    at weblogic.utils.security.PolicyParser.read(PolicyParser.java,
    Compiled
    Code)
    at
    weblogic.security.acl.internal.WLPropertyRealm.loadURLAcls(WLProperty
    Realm.java:402)
    at weblogic.t3.srvr.T3Srvr.initializeSecurity(T3Srvr.java:1759)
    at weblogic.t3.srvr.T3Srvr.start(T3Srvr.java, Compiled Code)
    at weblogic.t3.srvr.T3Srvr.main(T3Srvr.java:825)
    at java.lang.reflect.Method.invoke(Native Method)
    at weblogic.Server.startServerDynamically(Server.java:99)
    at weblogic.Server.main(Server.java:65)
    at weblogic.Server.main(Server.java:55)
    Obvious question/answer time:
    I am unaware of problems with spaces, but they may need to be escaped. i
    could not find any reference to special characters in the Sun
    documentation.
    Are you using only this policy file? The WebLogic documentation expects
    you to specify this file as the security policy file to the JVM (ie on the
    java.exe command-line). It must also be specified with ==, not = (e.g. -
    Djava.security.policy==c:/weblogic/weblogic.policy) so the default policy
    is overridden, not appended.
    Finally, in the top of the weblogic.policy file, it is stated:
    // If WebLogic is not installed in a root directory, you must only
    // list the first component of the path in the "file:" URL. This is
    // because of a bug in JavaSoft JDK 1.2.1. For example, if you
    // install WebLogic in the "c:/test/weblogic" directory, the first
    // two lines below must be:
    // grant codeBase "file:/c:/test/-" {
    // permission java.io.FilePermission "c:${/}test${/}weblogic${/}-",
    "read,write,delete,execute";
    This may apply to you since you're not in a root directory.
    Jesse

  • Help! Unable to Start - weblogic.policy - (Linux) and WLS 5.1

     

    Does this hold true for NT as well? The comments in the weblogic.policy file read:
    // If WebLogic is not installed in a root directory, you must only
    // list the first component of the path in the "file:" URL. This is
    // because of a bug in JavaSoft JDK 1.2.1. For example, if you
    // install WebLogic in the "c:/test/weblogic" directory, the first
    // two lines below must be:
    // grant codeBase "file:/c:/test/-" {
    // permission java.io.FilePermission "c:${/}test${/}weblogic${/}-", "read,write,delete,execute";
    However, when I use the similar file structure:
    grant codeBase "file:/c:/bea/-" {
    permission java.io.FilePermission "c:${/}bea${/}wlserver6.0sp1${/}lib${/}-",
    "read,write,delete,execute";
    I receive the same error and WebLogic Server will not start up.
    Thanks for your help.
    Tawnya
    Mark Griffith <[email protected]> wrote:
    If you have a directory :
    /usr/local/releases/451/weblogic
    in that dir lives:
    weblogic.policy
    that policy file should say:
    grant codeBase "file://weblogic/-" {
    NOT
    grant codeBase "file://usr/local/releases/451/weblogic/-" {
    mbg
    In article <[email protected]>, [email protected]
    says...
    ENV:
    Redhat Linux 6.2 (Current Kernel)
    Weblogic Server 5.1
    Sun JDK for Linux version 1.2.2
    It seems like I am having a weblogic.policy problem. I have read the
    documenattion over and over and still cannot figure out this problem.
    I have weblogic installed on /usr/local/weblogic directory
    I Start with the command line:from the startWebLogic.sh Script
    $JAVA $JAVA_OPTIONS -ms64m -mx64m -classpath $JAVACLASSPATH
    -Dweblogic.class.path=$WEBLOGICCLASSPATH -Djava.security.manager
    -Djava.security.policy=='pwd'/weblogic.policy
    -Dweblogic.home=. weblogic.Server
    I followed all the instrcutions on modifying the weblogic.policy
    file.
    example:
    grant codeBase "file:/usr/local/weblogic/-" {
    permission java.io.FilePermission "${/}usr${/}local${/}weblogic${/}-",
    "read,write,delete,execute";
    I still get the following :
    Exception in thread "main" java.security.AccessControlException:access
    denied (java.lang.RuntimePermission createSecurityManager )
    at
    java.security.AccessControlContext.checkPermission(AccessControlContext.java
    :191)
    at
    java.security.AccessController.checkPermission(AccessController.java:399)
    at
    java.lang.SecurityManager.checkPermission(SecurityManager.java:545)
    at java.lang.SecurityManager.<init>(SecurityManager.java:303)
    at
    weblogic.boot.ServerSecurityManager.<init>(ServerSecurityManager.java:11)
    at weblogic.Server.main(Server.java:59)
    at weblogic.Server.main(Server.java:55)
    Can anyboby Help me out here?
    Tony McClay
    Mr. BigMAN--
    ==================================================
    NewsGroup Rant
    ==================================================
    Rant 1.
    The less info you provide about your problem means
    the less we can help you. Try to look at the
    problem from an external perspective and provide
    all the data necessary to put your problem in
    perspective.

  • OpenAM Weblogic Policy Agent

    Hi Everyone,
    I have installed Weblogic Policy Agent in OpenAM. Followed the URL “http://openam.forgerock.org/openam-documentation/openam-doc-source/doc/agent-install-guide/index/chap-weblogic.html” to install the policy Agent.
    I am using Oracle Weblogic server 10.3.5.0 to use deploy the .war file. Same Weblogic server used for Oracle Identity Manager 11.1.1.5.0.
    In Weblogic Policy Agent post-installation steps need to select Agent Authenticator for the security Realm.
    I have doubt here. Whether i want to create the *"new realm"* or i can use the existing realm *"myrealm"*? But , "myrealm" is consists the details of OIM.
    I am thinking to create the new realm for openAM Weblogic policy Agent, if so what are the things i need to do create new realm for OpenAM.
    Please suggest me on this.
    Thanks & Regards,
    Karthick

    Hi Aaron;
    I am trying to see if I can force the policy agent to be invoked on non-protected resources. The agent is in J2EE mode. The scenario that I have is the whole site is open and nothing is protected so I have to make the policy agent recognize requests for both protected and non protected resources. The other issue I have is that even if I create a cookie the policy agent doesn't maintain the session state since the requests are for unprotected resources. It (PA) doesn't "touch" the cookie since the requests didn't go through it.
    Thanks,

  • How to override weblogic.policy file?

    Hi Friends,
    I am using weblogic9.2
    What are the steps to follow override the webloic.policy file to give the access permission on a particular file?
    I tried but its not working. The following steps are i did
    1. i added one entry in weblogic.policy that was
    grant codeBase "http://localhost/SampleServlet/-" {
    permission java.io.FilePermission "c:\\kathir\\ErrorReport.txt", "read";
    2.startWeblogic.cmd
    -Djava.security.manager -Djava.security.policy==%WL_HOME%\server\lib\weblogic.policy
    modified this entry.
    But its not working...
    please help me
    Thanks in advance

    It would help if you could provide a much higher level description of your use case.
    Example: A servlet needs to read an arbitrary file on the local file system. Explain the security behavior you would like to see, etc.

  • Documentation bug- -Djava.security.policy==weblogic.policy?

    All,
    According to the documentation, an example of invoking weblogic server
    from the command line for JDK1.2 is as follows:
    JDK 1.2 (Java 2) example
    $ java -ms64m -mx64m -classpath c:/weblogic/classes/boot
    -Dweblogic.class.path=c:/weblogic/classes;
    c:/weblogic/license;c:/weblogic/lib/weblogicaux.jar;
    c:/weblogic/myserver/serverclasses
    -Djava.security.manager
    -Djava.security.policy==c:/weblogic/weblogic.policy
    weblogic.Server
    Is the property
    -Djava.security.policy==C:/weblogic/weblogic.policy
    correct in that there are 2 equals signs? Should this be rather:
    -Djava.security.policy=C:/weblogic/weblogic.policy?
    It seems as if either works, I just wanted to clarify, as I've noticed
    our startup scripts use the former and not the latter.
    Thanks,
    Ben

    Hi Ben,
    the doc is correct, there is a semantic difference between '==' and '=',
    check
    http://java.sun.com/j2se/1.3/docs/guide/security/spec/security-spec.doc3
    .html for details.
    Daniel
    -----Ursprüngliche Nachricht-----
    Von: Benjamin D. Engelsma [mailto:bengelsm@NO_SPAM.gfs.com]
    Bereitgestellt: Mittwoch, 4. April 2001 16:30
    Bereitgestellt in: environment
    Unterhaltung: Documentation bug->
    -Djava.security.policy==weblogic.policy?
    Betreff: Documentation bug-> -Djava.security.policy==weblogic.policy?
    All,
    According to the documentation, an example of invoking weblogic server
    from the command line for JDK1.2 is as follows:
    JDK 1.2 (Java 2) example
    $ java -ms64m -mx64m -classpath c:/weblogic/classes/boot
    -Dweblogic.class.path=c:/weblogic/classes;
    c:/weblogic/license;c:/weblogic/lib/weblogicaux.jar;
    c:/weblogic/myserver/serverclasses
    -Djava.security.manager
    -Djava.security.policy==c:/weblogic/weblogic.policy
    weblogic.Server
    Is the property
    -Djava.security.policy==C:/weblogic/weblogic.policy
    correct in that there are 2 equals signs? Should this be rather:
    -Djava.security.policy=C:/weblogic/weblogic.policy?
    It seems as if either works, I just wanted to clarify, as I've noticed
    our startup scripts use the former and not the latter.
    Thanks,
    Ben

  • Weblogic.policy and class.forname

    Hi,
    my company develops an application for an external customer (bea 6.1). In
    our cutomers eyes the application is a security risk because our customer is
    afraid that we are using the class.forname command to create manually
    connections to other databases.
    I would like to know, is it possible to disable this command for our
    application with the help of the weblogic.policy file?
    Regards
    Michael

    yes.. i think it returns Class object. But, isthere
    any other way to instantiate a class other thanusing
    the new operatorOthers
    - JNI, similar but not exactly new
    - Serialization which by passes the normal processCloning
    Class.newInstance has been mentioned, but Constructor.newInstance has not

  • Need help with weblogic.policy file

    I'm running WebLogic 5.1 sp10 on Solaris 2.8 with Java 1.3.1_b24.
    WebLogic is installed in directory:
    /tech/lpp/webmstr/bea/weblogic5
    If I turn on jdbc logging:
    weblogic.jdbc.enableLogFile=true
    weblogic.jdbc.logFileName=jdbc.log
    I get the following when WebLogic attempts to create a connection pool:
    java.security.AccessControlException: access denied (java.sql.SQLPermission setLog)
    My weblogic.policy looks like:
    grant codeBase "file:/tech/-" {
    permission java.io.FilePermission "${/}tech${/} "read,write,delete,execute";
    Any help is greatly appreciated.
    Thanks,
    Kevin

    Naveen,
    That did it!
    Many Thanks,
    Kevin
    "Naveen \([email protected]\)" <[email protected]> wrote:
    Hi,
    Within the grant block that is at the end of the weblogic.policy file,
    try
    adding the following entry :
    permission java.sql.SQLPermission "setLog", "*";
    Thanks,
    -- Naveen
    "Kevin Toomey" <[email protected]> wrote in message
    news:3c0bad4a$[email protected]..
    I'm running WebLogic 5.1 sp10 on Solaris 2.8 with Java 1.3.1_b24.
    WebLogic is installed in directory:
    /tech/lpp/webmstr/bea/weblogic5
    If I turn on jdbc logging:
    weblogic.jdbc.enableLogFile=true
    weblogic.jdbc.logFileName=jdbc.log
    I get the following when WebLogic attempts to create a connection pool:
    java.security.AccessControlException: access denied(java.sql.SQLPermission setLog)
    My weblogic.policy looks like:
    grant codeBase "file:/tech/-" {
    permission java.io.FilePermission "${/}tech${/}"read,write,delete,execute";
    Any help is greatly appreciated.
    Thanks,
    Kevin

  • Does Java Plug-in Ignore java.policy Permissions?

    I am running Firefox 3.6.12 on Ubuntu Karmic with Java plug-in 1.6.0_22. I'm trying to run an Aventail OnDemand applet, and I keep getting I/O file-reading permissions exceptions in the Java console. I tried granting the permission in /usr/lib/jvm/java-6-sun-1.6.0.22/jre/lib/security/java.policy, but that was apparently ignored. Any help would be greatly appreciated.

    I think the java plugin uses C:\Program Files\Java\j2re1.4.2_04\lib\security\cacerts as a store to get keys.
    The password of this file is changeit and you can use keytool to import keys.
    I found contradicting information about what can be imported but if you have a p12 file (Mozilla convention for PKCS12) you can import it with java control panel:
    C:\Program Files\Java\j2re1.4.2_04\bin\jpicpl32.exe
    After imported a cert with control panel it was put in a file located here
    C:\Documents and Settings\sbaker\Application Data\Sun\Java\Deployment\security\
    Importing with the control panel makes a user specific import and importing with keytool in C:\Program Files\Java\j2re1.4.2_04\lib\security\cacerts (password is changeit) makes it machine specific.

  • Weblogic Policy Agent

    Hi All,
    I am using policy agnet in front of the app that is running on weblogic. I installed the policy agent created the agent profile and other necessary steps. Also, copied the following line in my startWebLogic.cmd file
    call "%DOMAIN_HOME%\bin\setDomainEnv.cmd" %*
    call "D:\bea\user_projects\domains\portalDomain\setAgentEnv_%SERVER_NAME%.cmd"
    Below is my classpath info, this loads the sun policy agent jars.
    java.class.path = ;D:\bea\patch_weblogic922\profiles\default\sys_manifest_classpath\weblogic_patch.jar;D:\bea\JDK150~1\lib\tools.jar;D:\bea\WEBLOG~1\server\lib\weblogic_sp.jar;D:\bea\WEBLOG~1\server\lib\weblogic.jar;D:\bea\WEBLOG~1\server\lib\webservices.jar;;D:\bea\WEBLOG~1\common\eval\pointbase\lib\pbembedded51.jar;D:\bea\WEBLOG~1\common\eval\pointbase\lib\pbupgrade51.jar;D:\bea\WEBLOG~1\common\eval\pointbase\lib\pbclient51.jar;D:\bea\WEBLOG~1\server\lib\xqrl.jar;D:\bea\WEBLOG~1\server\lib\xquery.jar;D:\bea\WEBLOG~1\server\lib\binxml.jar;D:/SunPolicyAgent/j2ee_agents/am_wl92_agent/lib/amauthprovider.jar;D:/SunPolicyAgent/j2ee_agents/am_wl92_agent/lib/agent.jar;D:/SunPolicyAgent/j2ee_agents/am_wl92_agent/lib/amclientsdk.jar;D:/SunPolicyAgent/j2ee_agents/am_wl92_agent/locale;D:/SunPolicyAgent/j2ee_agents/am_wl92_agent/agent_001/config;
    Also, in the log file I found the following information
    com.iplanet.security.encryptor = com.iplanet.services.util.JCEEncryption
    which is different than what is in the error below.
    When I run the agenadmin command to get the getUuid I get the following error.
    D:\SunPolicyAgent\j2ee_agents\am_wl92_agent\bin>agentadmin --getUuid bkrishna us
    er dc=ad,dc=nsf,dc=gov
    Failed to create debug directory
    Failed to create debug directory
    Failed to create debug directory
    Failed to create debug directory
    Failed to create debug directory
    10/12/2007 12:16:38:662 PM EDT: Thread[main,5,main]
    DataLayer: number of retry = 3
    10/12/2007 12:16:38:662 PM EDT: Thread[main,5,main]
    DataLayer: retry interval = 1000
    10/12/2007 12:16:38:662 PM EDT: Thread[main,5,main]
    DataLayer: retry error codes = []
    Failed to create debug directory
    10/12/2007 12:16:38:662 PM EDT: Thread[main,5,main]
    AdminUtils: Could not initialize admin info message: Got LDAPServiceException c
    ode=19
    10/12/2007 12:16:38:662 PM EDT: Thread[main,5,main]
    Crypt.static{}: Encryptor class= com.iplanet.services.util.JSSEncryption
    Exception in thread "main" java.lang.NoClassDefFoundError: org/mozilla/jss/Crypt
    oManager$NotInitializedException
    at java.lang.Class.forName0(Native Method)
    at java.lang.Class.forName(Class.java:164)
    at com.iplanet.services.util.Crypt.createInstance(Crypt.java:133)
    at com.iplanet.services.util.Crypt.<clinit>(Crypt.java:103)
    at com.iplanet.am.util.AdminUtils.getAdminDN(AdminUtils.java:106)
    at com.sun.identity.sm.SMSEntry.<clinit>(SMSEntry.java:166)
    at com.sun.identity.sm.DNMapper.<clinit>(DNMapper.java:59)
    at com.sun.identity.idm.AMIdentity.<init>(AMIdentity.java:135)
    at com.sun.identity.agents.tools.handler.GetUniversalIdHandler.handleReq
    uest(GetUniversalIdHandler.java:120)
    at com.sun.identity.agents.tools.admin.AgentAdmin.dispatch(AgentAdmin.ja
    va:251)
    at com.sun.identity.agents.tools.admin.AgentAdmin.run(AgentAdmin.java:15
    2)
    at com.sun.identity.agents.tools.launch.AgentAdminLauncher.launchAdminTo
    ol(AgentAdminLauncher.java:204)
    at com.sun.identity.agents.tools.launch.AgentAdminLauncher.main(AgentAdm
    inLauncher.java:308)
    I would appreciate if someone coule throw some light here to fix this issue.
    Thanks,
    bala.

    Hi Aaron;
    I am trying to see if I can force the policy agent to be invoked on non-protected resources. The agent is in J2EE mode. The scenario that I have is the whole site is open and nothing is protected so I have to make the policy agent recognize requests for both protected and non protected resources. The other issue I have is that even if I create a cookie the policy agent doesn't maintain the session state since the requests are for unprotected resources. It (PA) doesn't "touch" the cookie since the requests didn't go through it.
    Thanks,

  • Extending WebLogic policy agent

    Hello all;
    I am using AM policy agent for WebLogic portal server. Is there a way to extend the functionality of this policy agent. I need to make the agent do more than what it provides OOTB. Is there a way to do that? Any suggestions?
    Thanks

    Hi Aaron;
    I am trying to see if I can force the policy agent to be invoked on non-protected resources. The agent is in J2EE mode. The scenario that I have is the whole site is open and nothing is protected so I have to make the policy agent recognize requests for both protected and non protected resources. The other issue I have is that even if I create a cookie the policy agent doesn't maintain the session state since the requests are for unprotected resources. It (PA) doesn't "touch" the cookie since the requests didn't go through it.
    Thanks,

  • Weblogic user Permissions

    Hi Experts,
    Am trying to login as WEBLOGIC,but i dont see any kind of permissions for the user,Attached the screen shot for your reference.Kindly help me here.
    Thanks,
    Nagireddy.
    [http://img254.imageshack.us/img254/2100/analyticsscreenshot.jpg]

    Check this
    Unable to Create a new Analysis in OBIEE 11g
    Edited by: Srini VEERAVALLI on May 1, 2013 2:21 PM

  • Problem in loading OPSS security provider: Cannot read from policy store  Error getting while starting weblogic server

    [JavaPolicyProvider]: System Property [java.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [oracle.deployed.app.ext => \-]
    [JavaPolicyProvider]: System Property [sun.java.launcher => SUN_STANDARD]
    [JavaPolicyProvider]: System Property [sun.management.compiler => HotSpot Client Compiler]
    [JavaPolicyProvider]: System Property [java.security.debug => jpspolicy]
    [JavaPolicyProvider]: System Property [oracle.core.ojdl.logging.usercontextprovider => oracle.core.ojdl.logging.impl.UserContextImpl]
    [JavaPolicyProvider]: System Property [os.name => Windows 7]
    [JavaPolicyProvider]: System Property [sun.boot.class.path => D:\ORACLE~1.6_M\JDK160~1\jre\lib\resources.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\rt.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\sunrsasign.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\jsse.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\jce.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\charsets.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\modules\jdk.boot.jar;D:\ORACLE~1.6_M\JDK160~1\jre\classes]
    [JavaPolicyProvider]: System Property [sun.desktop => windows]
    [JavaPolicyProvider]: System Property [java.vm.specification.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [java.runtime.version => 1.6.0_24-b50]
    [JavaPolicyProvider]: System Property [igf.arisidbeans.carmlloc => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\carml]
    [JavaPolicyProvider]: System Property [oracle.domain.config.dir => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1]
    [JavaPolicyProvider]: System Property [weblogic.Name => DefaultServer]
    [JavaPolicyProvider]: System Property [user.name => SudhanshuG]
    [JavaPolicyProvider]: System Property [DebugOPSSPolicyLoading => true]
    [JavaPolicyProvider]: System Property [java.naming.factory.initial => weblogic.jndi.WLInitialContextFactory]
    [JavaPolicyProvider]: System Property [user.language => en]
    [JavaPolicyProvider]: System Property [jrockit.optfile => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jrf_11.1.1\jrocket_optfile.txt]
    [JavaPolicyProvider]: System Property [sun.boot.library.path => D:\ORACLE~1.6_M\JDK160~1\jre\bin]
    [JavaPolicyProvider]: System Property [domain.home => D:\JDevSys\SYSTEM~1.92\DEFAUL~1]
    [JavaPolicyProvider]: System Property [igf.arisidstack.home => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\arisidprovider]
    [JavaPolicyProvider]: System Property [wlw.testConsole => ]
    [JavaPolicyProvider]: System Property [wlw.iterativeDev => ]
    [JavaPolicyProvider]: System Property [jps.combiner.optimize => true]
    [JavaPolicyProvider]: System Property [jps.auth => ACC]
    [JavaPolicyProvider]: System Property [java.version => 1.6.0_24]
    [JavaPolicyProvider]: System Property [user.timezone => Asia/Calcutta]
    [JavaPolicyProvider]: System Property [sun.arch.data.model => 32]
    [JavaPolicyProvider]: System Property [javax.rmi.CORBA.UtilClass => weblogic.iiop.UtilDelegateImpl]
    [JavaPolicyProvider]: System Property [java.endorsed.dirs => D:\ORACLE~1.6_M\JDK160~1\jre\lib\endorsed]
    [JavaPolicyProvider]: System Property [vde.home => D:\JDevSys\system11.1.1.6.38.61.92\DefaultDomain\servers\DefaultServer\data\ldap]
    [JavaPolicyProvider]: System Property [jps.combiner.optimize.lazyeval => true]
    [JavaPolicyProvider]: System Property [sun.cpu.isalist => pentium_pro+mmx pentium_pro pentium+mmx pentium i486 i386 i86]
    [JavaPolicyProvider]: System Property [sun.jnu.encoding => Cp1252]
    [JavaPolicyProvider]: System Property [file.encoding.pkg => sun.io]
    [JavaPolicyProvider]: System Property [wlw.logErrorsToConsole => ]
    [JavaPolicyProvider]: System Property [file.separator => \]
    [JavaPolicyProvider]: System Property [java.specification.name => Java Platform API Specification]
    [JavaPolicyProvider]: System Property [java.class.version => 50.0]
    [JavaPolicyProvider]: System Property [weblogic.home => D:\ORACLE~1.6_M\WLSERV~1.3\server]
    [JavaPolicyProvider]: System Property [user.country => IN]
    [JavaPolicyProvider]: System Property [java.home => D:\ORACLE~1.6_M\JDK160~1\jre]
    [JavaPolicyProvider]: System Property [platform.home => D:\ORACLE~1.6_M\WLSERV~1.3]
    [JavaPolicyProvider]: System Property [java.vm.info => mixed mode]
    [JavaPolicyProvider]: System Property [os.version => 6.1]
    [JavaPolicyProvider]: System Property [org.omg.CORBA.ORBSingletonClass => weblogic.corba.orb.ORB]
    [JavaPolicyProvider]: System Property [path.separator => ;]
    [JavaPolicyProvider]: System Property [java.vm.version => 19.1-b02]
    [JavaPolicyProvider]: System Property [weblogic.alternateTypesDirectory => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.ossoiap_11.1.1,D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.oamprovider_11.1.1]
    [JavaPolicyProvider]: System Property [user.variant => ]
    [JavaPolicyProvider]: System Property [java.protocol.handler.pkgs => oracle.mds.net.protocol|weblogic.net]
    [JavaPolicyProvider]: System Property [oracle.deployed.app.dir => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\servers\DefaultServer\tmp\_WL_user]
    [JavaPolicyProvider]: System Property [wc.oracle.home => D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper]
    [JavaPolicyProvider]: System Property [java.awt.printerjob => sun.awt.windows.WPrinterJob]
    [JavaPolicyProvider]: System Property [java.security.policy => D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic.policy]
    [JavaPolicyProvider]: System Property [sun.io.unicode.encoding => UnicodeLittle]
    [JavaPolicyProvider]: System Property [awt.toolkit => sun.awt.windows.WToolkit]
    [JavaPolicyProvider]: System Property [weblogic.jdbc.remoteEnabled => false]
    [JavaPolicyProvider]: System Property [weblogic.nodemanager.ServiceEnabled => true]
    [JavaPolicyProvider]: System Property [java.naming.factory.url.pkgs => weblogic.jndi.factories:weblogic.corba.j2ee.naming.url:weblogic.jndi.factories:weblogic.corba.j2ee.naming.url]
    [JavaPolicyProvider]: System Property [oracle.webcenter.tagging.scopeTags => false]
    [JavaPolicyProvider]: System Property [user.home => C:\Users\SudhanshuG]
    [JavaPolicyProvider]: System Property [wls.home => D:\ORACLE~1.6_M\WLSERV~1.3\server]
    [JavaPolicyProvider]: System Property [java.specification.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [oracle.server.config.dir => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\servers\DefaultServer]
    [JavaPolicyProvider]: System Property [java.library.path => D:\ORACLE~1.6_M\JDK160~1\bin;.;C:\Windows\Sun\Java\bin;C:\Windows\system32;C:\Windows;D:\ORACLE~1.6_M\patch_wls1035\profiles\default\native;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\native;D:\ORACLE~1.6_M\WLSERV~1.3\server\native\win\32;D:\ORACLE~1.6_M\WLSERV~1.3\server\bin;D:\ORACLE~1.6_M\modules\ORGAPA~1.1\bin;D:\ORACLE~1.6_M\JDK160~1\jre\bin;D:\ORACLE~1.6_M\JDK160~1\bin;D:\oraclexe\app\oracle\product\10.2.0\server\bin;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program Files\TortoiseSVN\bin;D:\ORACLE~1.6_M\WLSERV~1.3\server\native\win\32\oci920_8]
    [JavaPolicyProvider]: System Property [java.vendor.url => http://java.sun.com/]
    [JavaPolicyProvider]: System Property [jps.policystore.hybrid.mode => false]
    [JavaPolicyProvider]: System Property [USE_JAAS => false]
    [JavaPolicyProvider]: System Property [java.vm.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [java.runtime.name => Java(TM) SE Runtime Environment]
    [JavaPolicyProvider]: System Property [java.class.path => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jdbc_11.1.1\ojdbc6dms.jar;D:\ORACLE~1.6_M\patch_wls1035\profiles\default\sys_manifest_classpath\weblogic_patch.jar;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\sys_manifest_classpath\weblogic_patch.jar;D:\ORACLE~1.6_M\JDK160~1\lib\tools.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic_sp.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic.jar;D:\ORACLE~1.6_M\modules\features\weblogic.server.modules_10.3.5.0.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\webservices.jar;D:\ORACLE~1.6_M\modules\ORGAPA~1.1/lib/ant-all.jar;D:\ORACLE~1.6_M\modules\NETSFA~1.0_1/lib/ant-contrib.jar;D:\JDevSys\SYSTEM~1.92\DEFAUL~1\wcps-lib\derby-10.6.1.0.jar;D:\JDevSys\SYSTEM~1.92\DEFAUL~1\wcps-lib\derbytools-10.6.1.0.jar;D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper\webcenter\modules\oracle.portlet.server_11.1.1\oracle-portlet-api.jar;D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jrf_11.1.1\jrf.jar;D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper\webcenter\modules\wcps_11.1.1.4.0\wcps-connection-mbeans.jar;D:\ORACLE~1.6_M\WLSERV~1.3\common\derby\lib\derbyclient.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\xqrl.jar]
    [JavaPolicyProvider]: System Property [oracle.security.jps.config => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\config\fmwconfig\jps-config.xml]
    [JavaPolicyProvider]: System Property [java.vm.specification.name => Java Virtual Machine Specification]
    [JavaPolicyProvider]: System Property [javax.rmi.CORBA.PortableRemoteObjectClass => weblogic.iiop.PortableRemoteObjectDelegateImpl]
    [JavaPolicyProvider]: System Property [java.vm.specification.version => 1.0]
    [JavaPolicyProvider]: System Property [sun.cpu.endian => little]
    [JavaPolicyProvider]: System Property [sun.os.patch.level => Service Pack 1]
    [JavaPolicyProvider]: System Property [portlet.oracle.home => D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper]
    [JavaPolicyProvider]: System Property [java.io.tmpdir => C:\Users\SUDHAN~1\AppData\Local\Temp\]
    [JavaPolicyProvider]: System Property [jrf.version => 11.1.1]
    [JavaPolicyProvider]: System Property [oracle.webcenter.analytics.disable-native-partitioning => false]
    [JavaPolicyProvider]: System Property [java.vendor.url.bug => http://java.sun.com/cgi-bin/bugreport.cgi]
    [JavaPolicyProvider]: System Property [jps.app.credential.overwrite.allowed => true]
    [JavaPolicyProvider]: System Property [os.arch => x86]
    [JavaPolicyProvider]: System Property [java.awt.graphicsenv => sun.awt.Win32GraphicsEnvironment]
    [JavaPolicyProvider]: System Property [java.ext.dirs => D:\ORACLE~1.6_M\JDK160~1\jre\lib\ext;C:\Windows\Sun\Java\lib\ext]
    [JavaPolicyProvider]: System Property [user.dir => D:\JDevSys\system11.1.1.6.38.61.92\DefaultDomain]
    [JavaPolicyProvider]: System Property [common.components.home => D:\ORACLE~1.6_M\ORACLE~1]
    [JavaPolicyProvider]: System Property [weblogic.ext.dirs => D:\ORACLE~1.6_M\patch_wls1035\profiles\default\sysext_manifest_classpath;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\sysext_manifest_classpath]
    [JavaPolicyProvider]: System Property [wsm.repository.path => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\oracle\store\gmds]
    [JavaPolicyProvider]: System Property [line.separator =>
    [JavaPolicyProvider]: System Property [java.vm.name => Java HotSpot(TM) Client VM]
    [JavaPolicyProvider]: System Property [org.apache.commons.logging.Log => org.apache.commons.logging.impl.Jdk14Logger]
    [JavaPolicyProvider]: System Property [weblogic.management.discover => true]
    [JavaPolicyProvider]: System Property [org.omg.CORBA.ORBClass => weblogic.corba.orb.ORB]
    [JavaPolicyProvider]: System Property [file.encoding => Cp1252]
    [JavaPolicyProvider]: System Property [weblogic.classloader.preprocessor => weblogic.diagnostics.instrumentation.DiagnosticClassPreProcessor]
    [JavaPolicyProvider]: System Property [java.specification.version => 1.6]
    [JavaPolicyProvider]: System Property [javax.net.ssl.trustStore => D:\Oracle_Jdev11.1.1.6_Middleware_Home\wlserver_10.3\server\lib\DemoTrust.jks]
    policy: reading file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/weblogic.policy
    java.lang.IllegalArgumentException: null KeyStore name
        at sun.security.util.PolicyUtil.getKeyStore(PolicyUtil.java:65)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:635)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:546)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/../modules/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/ORACLE~1/modules/oracle.jps_11.1.1/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/ORACLE~1/modules/oracle.pki_11.1.1/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/EJB
    policy:   (java.lang.RuntimePermission queuePrintJob)
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/Web
    policy:   (java.lang.RuntimePermission loadLibrary)
    policy:   (java.lang.RuntimePermission queuePrintJob)
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read,write)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\..\- read)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/Connector
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read,write)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\..\- read)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/C:/Windows/Sun/Java/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Administrators
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Deployers
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Operators
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Monitors
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSKernelIdentity/*
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   (java.util.PropertyPermission java.version read)
    policy:   (java.util.PropertyPermission java.vendor read)
    policy:   (java.util.PropertyPermission java.vendor.url read)
    policy:   (java.util.PropertyPermission java.class.version read)
    policy:   (java.util.PropertyPermission os.name read)
    policy:   (java.util.PropertyPermission os.version read)
    policy:   (java.util.PropertyPermission os.arch read)
    policy:   (java.util.PropertyPermission file.separator read)
    policy:   (java.util.PropertyPermission path.separator read)
    policy:   (java.util.PropertyPermission line.separator read)
    policy:   (java.util.PropertyPermission java.specification.version read)
    policy:   (java.util.PropertyPermission java.specification.vendor read)
    policy:   (java.util.PropertyPermission java.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.specification.version read)
    policy:   (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   (java.util.PropertyPermission java.vm.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.version read)
    policy:   (java.util.PropertyPermission java.vm.vendor read)
    policy:   (java.util.PropertyPermission java.vm.name read)
    policy:
    policy: reading file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/security/java.policy
    java.lang.IllegalArgumentException: null KeyStore name
        at sun.security.util.PolicyUtil.getKeyStore(PolicyUtil.java:65)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:635)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:587)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/C:/Windows/Sun/Java/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   (java.lang.RuntimePermission stopThread)
    policy:   (java.net.SocketPermission localhost:1024- listen,resolve)
    policy:   (java.util.PropertyPermission java.version read)
    policy:   (java.util.PropertyPermission java.vendor read)
    policy:   (java.util.PropertyPermission java.vendor.url read)
    policy:   (java.util.PropertyPermission java.class.version read)
    policy:   (java.util.PropertyPermission os.name read)
    policy:   (java.util.PropertyPermission os.version read)
    policy:   (java.util.PropertyPermission os.arch read)
    policy:   (java.util.PropertyPermission file.separator read)
    policy:   (java.util.PropertyPermission path.separator read)
    policy:   (java.util.PropertyPermission line.separator read)
    policy:   (java.util.PropertyPermission java.specification.version read)
    policy:   (java.util.PropertyPermission java.specification.vendor read)
    policy:   (java.util.PropertyPermission java.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.specification.version read)
    policy:   (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   (java.util.PropertyPermission java.vm.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.version read)
    policy:   (java.util.PropertyPermission java.vm.vendor read)
    policy:   (java.util.PropertyPermission java.vm.name read)
    policy:
    policy: reading file:/C:/Users/SudhanshuG/.java.policy
    policy: error parsing file:/C:/Users/SudhanshuG/.java.policy
    policy: java.io.FileNotFoundException: C:\Users\SudhanshuG\.java.policy (The system cannot find the file specified)
    java.io.FileNotFoundException: C:\Users\SudhanshuG\.java.policy (The system cannot find the file specified)
        at java.io.FileInputStream.open(Native Method)
        at java.io.FileInputStream.<init>(FileInputStream.java:106)
        at java.io.FileInputStream.<init>(FileInputStream.java:66)
        at sun.security.util.PolicyUtil.getInputStream(PolicyUtil.java:43)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:626)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:587)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: getPermissions:
        PD CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
        PD ClassLoader: sun.misc.Launcher$AppClassLoader@1172e08
        PD Principals: <no principals>
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/modules/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.security.AllPermission <all permissions> <all actions>)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.pki_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/EJB <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Web <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Connector <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Administrators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Deployers]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Operators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Monitors]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSKernelIdentity/*]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.lang.RuntimePermission stopThread)
    policy:   granting (java.net.SocketPermission localhost:1024- listen,resolve)
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: getPermissions:
        PD CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
        PD ClassLoader: sun.misc.Launcher$AppClassLoader@1172e08
        PD Principals: <no principals>
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/modules/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.security.AllPermission <all permissions> <all actions>)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.pki_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/EJB <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Web <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Connector <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Administrators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Deployers]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Operators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Monitors]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSKernelIdentity/*]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources

    Hi,
    Your issue is something similar to the issue described in below metalink id. Please check below metalink id, you issue may be resolved.
    Start OMS failed with "javax.xml.stream.XMLStreamException: Premature end of file encountered" [ID 1481158.1]
    Mark if this helps you.
    Regards,
    Kishore

Maybe you are looking for