Security Provided Config

Greetings
I have an oc4j container server 10.1.3. I have an app that uses a custom login module. Whenever I deploy my app the server resets the security provider back to File Based Security, I then have to go in to the server admin, and change to custom login module, and put my auth module in as required. After this my app works and the login works correctly with the custom module. My question is, is there something I can do in jdeveloper or somewhere that will tell the server to use my module for this app? or do I have to go in every time and manually update it?
thanks
troy

Troy,
Bascially you need to package whatever xml file you are using (your jazn config files) inside the ear file. This way OC4J will not create a new file every time you deploy, since these files will be present in the ear by default.
Hope this helps.
Deepak

Similar Messages

  • Problem in loading OPSS security provider: Cannot read from policy store  Error getting while starting weblogic server

    [JavaPolicyProvider]: System Property [java.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [oracle.deployed.app.ext => \-]
    [JavaPolicyProvider]: System Property [sun.java.launcher => SUN_STANDARD]
    [JavaPolicyProvider]: System Property [sun.management.compiler => HotSpot Client Compiler]
    [JavaPolicyProvider]: System Property [java.security.debug => jpspolicy]
    [JavaPolicyProvider]: System Property [oracle.core.ojdl.logging.usercontextprovider => oracle.core.ojdl.logging.impl.UserContextImpl]
    [JavaPolicyProvider]: System Property [os.name => Windows 7]
    [JavaPolicyProvider]: System Property [sun.boot.class.path => D:\ORACLE~1.6_M\JDK160~1\jre\lib\resources.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\rt.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\sunrsasign.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\jsse.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\jce.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\charsets.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\modules\jdk.boot.jar;D:\ORACLE~1.6_M\JDK160~1\jre\classes]
    [JavaPolicyProvider]: System Property [sun.desktop => windows]
    [JavaPolicyProvider]: System Property [java.vm.specification.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [java.runtime.version => 1.6.0_24-b50]
    [JavaPolicyProvider]: System Property [igf.arisidbeans.carmlloc => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\carml]
    [JavaPolicyProvider]: System Property [oracle.domain.config.dir => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1]
    [JavaPolicyProvider]: System Property [weblogic.Name => DefaultServer]
    [JavaPolicyProvider]: System Property [user.name => SudhanshuG]
    [JavaPolicyProvider]: System Property [DebugOPSSPolicyLoading => true]
    [JavaPolicyProvider]: System Property [java.naming.factory.initial => weblogic.jndi.WLInitialContextFactory]
    [JavaPolicyProvider]: System Property [user.language => en]
    [JavaPolicyProvider]: System Property [jrockit.optfile => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jrf_11.1.1\jrocket_optfile.txt]
    [JavaPolicyProvider]: System Property [sun.boot.library.path => D:\ORACLE~1.6_M\JDK160~1\jre\bin]
    [JavaPolicyProvider]: System Property [domain.home => D:\JDevSys\SYSTEM~1.92\DEFAUL~1]
    [JavaPolicyProvider]: System Property [igf.arisidstack.home => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\arisidprovider]
    [JavaPolicyProvider]: System Property [wlw.testConsole => ]
    [JavaPolicyProvider]: System Property [wlw.iterativeDev => ]
    [JavaPolicyProvider]: System Property [jps.combiner.optimize => true]
    [JavaPolicyProvider]: System Property [jps.auth => ACC]
    [JavaPolicyProvider]: System Property [java.version => 1.6.0_24]
    [JavaPolicyProvider]: System Property [user.timezone => Asia/Calcutta]
    [JavaPolicyProvider]: System Property [sun.arch.data.model => 32]
    [JavaPolicyProvider]: System Property [javax.rmi.CORBA.UtilClass => weblogic.iiop.UtilDelegateImpl]
    [JavaPolicyProvider]: System Property [java.endorsed.dirs => D:\ORACLE~1.6_M\JDK160~1\jre\lib\endorsed]
    [JavaPolicyProvider]: System Property [vde.home => D:\JDevSys\system11.1.1.6.38.61.92\DefaultDomain\servers\DefaultServer\data\ldap]
    [JavaPolicyProvider]: System Property [jps.combiner.optimize.lazyeval => true]
    [JavaPolicyProvider]: System Property [sun.cpu.isalist => pentium_pro+mmx pentium_pro pentium+mmx pentium i486 i386 i86]
    [JavaPolicyProvider]: System Property [sun.jnu.encoding => Cp1252]
    [JavaPolicyProvider]: System Property [file.encoding.pkg => sun.io]
    [JavaPolicyProvider]: System Property [wlw.logErrorsToConsole => ]
    [JavaPolicyProvider]: System Property [file.separator => \]
    [JavaPolicyProvider]: System Property [java.specification.name => Java Platform API Specification]
    [JavaPolicyProvider]: System Property [java.class.version => 50.0]
    [JavaPolicyProvider]: System Property [weblogic.home => D:\ORACLE~1.6_M\WLSERV~1.3\server]
    [JavaPolicyProvider]: System Property [user.country => IN]
    [JavaPolicyProvider]: System Property [java.home => D:\ORACLE~1.6_M\JDK160~1\jre]
    [JavaPolicyProvider]: System Property [platform.home => D:\ORACLE~1.6_M\WLSERV~1.3]
    [JavaPolicyProvider]: System Property [java.vm.info => mixed mode]
    [JavaPolicyProvider]: System Property [os.version => 6.1]
    [JavaPolicyProvider]: System Property [org.omg.CORBA.ORBSingletonClass => weblogic.corba.orb.ORB]
    [JavaPolicyProvider]: System Property [path.separator => ;]
    [JavaPolicyProvider]: System Property [java.vm.version => 19.1-b02]
    [JavaPolicyProvider]: System Property [weblogic.alternateTypesDirectory => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.ossoiap_11.1.1,D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.oamprovider_11.1.1]
    [JavaPolicyProvider]: System Property [user.variant => ]
    [JavaPolicyProvider]: System Property [java.protocol.handler.pkgs => oracle.mds.net.protocol|weblogic.net]
    [JavaPolicyProvider]: System Property [oracle.deployed.app.dir => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\servers\DefaultServer\tmp\_WL_user]
    [JavaPolicyProvider]: System Property [wc.oracle.home => D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper]
    [JavaPolicyProvider]: System Property [java.awt.printerjob => sun.awt.windows.WPrinterJob]
    [JavaPolicyProvider]: System Property [java.security.policy => D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic.policy]
    [JavaPolicyProvider]: System Property [sun.io.unicode.encoding => UnicodeLittle]
    [JavaPolicyProvider]: System Property [awt.toolkit => sun.awt.windows.WToolkit]
    [JavaPolicyProvider]: System Property [weblogic.jdbc.remoteEnabled => false]
    [JavaPolicyProvider]: System Property [weblogic.nodemanager.ServiceEnabled => true]
    [JavaPolicyProvider]: System Property [java.naming.factory.url.pkgs => weblogic.jndi.factories:weblogic.corba.j2ee.naming.url:weblogic.jndi.factories:weblogic.corba.j2ee.naming.url]
    [JavaPolicyProvider]: System Property [oracle.webcenter.tagging.scopeTags => false]
    [JavaPolicyProvider]: System Property [user.home => C:\Users\SudhanshuG]
    [JavaPolicyProvider]: System Property [wls.home => D:\ORACLE~1.6_M\WLSERV~1.3\server]
    [JavaPolicyProvider]: System Property [java.specification.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [oracle.server.config.dir => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\servers\DefaultServer]
    [JavaPolicyProvider]: System Property [java.library.path => D:\ORACLE~1.6_M\JDK160~1\bin;.;C:\Windows\Sun\Java\bin;C:\Windows\system32;C:\Windows;D:\ORACLE~1.6_M\patch_wls1035\profiles\default\native;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\native;D:\ORACLE~1.6_M\WLSERV~1.3\server\native\win\32;D:\ORACLE~1.6_M\WLSERV~1.3\server\bin;D:\ORACLE~1.6_M\modules\ORGAPA~1.1\bin;D:\ORACLE~1.6_M\JDK160~1\jre\bin;D:\ORACLE~1.6_M\JDK160~1\bin;D:\oraclexe\app\oracle\product\10.2.0\server\bin;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program Files\TortoiseSVN\bin;D:\ORACLE~1.6_M\WLSERV~1.3\server\native\win\32\oci920_8]
    [JavaPolicyProvider]: System Property [java.vendor.url => http://java.sun.com/]
    [JavaPolicyProvider]: System Property [jps.policystore.hybrid.mode => false]
    [JavaPolicyProvider]: System Property [USE_JAAS => false]
    [JavaPolicyProvider]: System Property [java.vm.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [java.runtime.name => Java(TM) SE Runtime Environment]
    [JavaPolicyProvider]: System Property [java.class.path => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jdbc_11.1.1\ojdbc6dms.jar;D:\ORACLE~1.6_M\patch_wls1035\profiles\default\sys_manifest_classpath\weblogic_patch.jar;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\sys_manifest_classpath\weblogic_patch.jar;D:\ORACLE~1.6_M\JDK160~1\lib\tools.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic_sp.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic.jar;D:\ORACLE~1.6_M\modules\features\weblogic.server.modules_10.3.5.0.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\webservices.jar;D:\ORACLE~1.6_M\modules\ORGAPA~1.1/lib/ant-all.jar;D:\ORACLE~1.6_M\modules\NETSFA~1.0_1/lib/ant-contrib.jar;D:\JDevSys\SYSTEM~1.92\DEFAUL~1\wcps-lib\derby-10.6.1.0.jar;D:\JDevSys\SYSTEM~1.92\DEFAUL~1\wcps-lib\derbytools-10.6.1.0.jar;D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper\webcenter\modules\oracle.portlet.server_11.1.1\oracle-portlet-api.jar;D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jrf_11.1.1\jrf.jar;D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper\webcenter\modules\wcps_11.1.1.4.0\wcps-connection-mbeans.jar;D:\ORACLE~1.6_M\WLSERV~1.3\common\derby\lib\derbyclient.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\xqrl.jar]
    [JavaPolicyProvider]: System Property [oracle.security.jps.config => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\config\fmwconfig\jps-config.xml]
    [JavaPolicyProvider]: System Property [java.vm.specification.name => Java Virtual Machine Specification]
    [JavaPolicyProvider]: System Property [javax.rmi.CORBA.PortableRemoteObjectClass => weblogic.iiop.PortableRemoteObjectDelegateImpl]
    [JavaPolicyProvider]: System Property [java.vm.specification.version => 1.0]
    [JavaPolicyProvider]: System Property [sun.cpu.endian => little]
    [JavaPolicyProvider]: System Property [sun.os.patch.level => Service Pack 1]
    [JavaPolicyProvider]: System Property [portlet.oracle.home => D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper]
    [JavaPolicyProvider]: System Property [java.io.tmpdir => C:\Users\SUDHAN~1\AppData\Local\Temp\]
    [JavaPolicyProvider]: System Property [jrf.version => 11.1.1]
    [JavaPolicyProvider]: System Property [oracle.webcenter.analytics.disable-native-partitioning => false]
    [JavaPolicyProvider]: System Property [java.vendor.url.bug => http://java.sun.com/cgi-bin/bugreport.cgi]
    [JavaPolicyProvider]: System Property [jps.app.credential.overwrite.allowed => true]
    [JavaPolicyProvider]: System Property [os.arch => x86]
    [JavaPolicyProvider]: System Property [java.awt.graphicsenv => sun.awt.Win32GraphicsEnvironment]
    [JavaPolicyProvider]: System Property [java.ext.dirs => D:\ORACLE~1.6_M\JDK160~1\jre\lib\ext;C:\Windows\Sun\Java\lib\ext]
    [JavaPolicyProvider]: System Property [user.dir => D:\JDevSys\system11.1.1.6.38.61.92\DefaultDomain]
    [JavaPolicyProvider]: System Property [common.components.home => D:\ORACLE~1.6_M\ORACLE~1]
    [JavaPolicyProvider]: System Property [weblogic.ext.dirs => D:\ORACLE~1.6_M\patch_wls1035\profiles\default\sysext_manifest_classpath;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\sysext_manifest_classpath]
    [JavaPolicyProvider]: System Property [wsm.repository.path => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\oracle\store\gmds]
    [JavaPolicyProvider]: System Property [line.separator =>
    [JavaPolicyProvider]: System Property [java.vm.name => Java HotSpot(TM) Client VM]
    [JavaPolicyProvider]: System Property [org.apache.commons.logging.Log => org.apache.commons.logging.impl.Jdk14Logger]
    [JavaPolicyProvider]: System Property [weblogic.management.discover => true]
    [JavaPolicyProvider]: System Property [org.omg.CORBA.ORBClass => weblogic.corba.orb.ORB]
    [JavaPolicyProvider]: System Property [file.encoding => Cp1252]
    [JavaPolicyProvider]: System Property [weblogic.classloader.preprocessor => weblogic.diagnostics.instrumentation.DiagnosticClassPreProcessor]
    [JavaPolicyProvider]: System Property [java.specification.version => 1.6]
    [JavaPolicyProvider]: System Property [javax.net.ssl.trustStore => D:\Oracle_Jdev11.1.1.6_Middleware_Home\wlserver_10.3\server\lib\DemoTrust.jks]
    policy: reading file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/weblogic.policy
    java.lang.IllegalArgumentException: null KeyStore name
        at sun.security.util.PolicyUtil.getKeyStore(PolicyUtil.java:65)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:635)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:546)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/../modules/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/ORACLE~1/modules/oracle.jps_11.1.1/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/ORACLE~1/modules/oracle.pki_11.1.1/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/EJB
    policy:   (java.lang.RuntimePermission queuePrintJob)
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/Web
    policy:   (java.lang.RuntimePermission loadLibrary)
    policy:   (java.lang.RuntimePermission queuePrintJob)
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read,write)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\..\- read)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/Connector
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read,write)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\..\- read)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/C:/Windows/Sun/Java/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Administrators
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Deployers
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Operators
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Monitors
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSKernelIdentity/*
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   (java.util.PropertyPermission java.version read)
    policy:   (java.util.PropertyPermission java.vendor read)
    policy:   (java.util.PropertyPermission java.vendor.url read)
    policy:   (java.util.PropertyPermission java.class.version read)
    policy:   (java.util.PropertyPermission os.name read)
    policy:   (java.util.PropertyPermission os.version read)
    policy:   (java.util.PropertyPermission os.arch read)
    policy:   (java.util.PropertyPermission file.separator read)
    policy:   (java.util.PropertyPermission path.separator read)
    policy:   (java.util.PropertyPermission line.separator read)
    policy:   (java.util.PropertyPermission java.specification.version read)
    policy:   (java.util.PropertyPermission java.specification.vendor read)
    policy:   (java.util.PropertyPermission java.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.specification.version read)
    policy:   (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   (java.util.PropertyPermission java.vm.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.version read)
    policy:   (java.util.PropertyPermission java.vm.vendor read)
    policy:   (java.util.PropertyPermission java.vm.name read)
    policy:
    policy: reading file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/security/java.policy
    java.lang.IllegalArgumentException: null KeyStore name
        at sun.security.util.PolicyUtil.getKeyStore(PolicyUtil.java:65)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:635)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:587)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/C:/Windows/Sun/Java/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   (java.lang.RuntimePermission stopThread)
    policy:   (java.net.SocketPermission localhost:1024- listen,resolve)
    policy:   (java.util.PropertyPermission java.version read)
    policy:   (java.util.PropertyPermission java.vendor read)
    policy:   (java.util.PropertyPermission java.vendor.url read)
    policy:   (java.util.PropertyPermission java.class.version read)
    policy:   (java.util.PropertyPermission os.name read)
    policy:   (java.util.PropertyPermission os.version read)
    policy:   (java.util.PropertyPermission os.arch read)
    policy:   (java.util.PropertyPermission file.separator read)
    policy:   (java.util.PropertyPermission path.separator read)
    policy:   (java.util.PropertyPermission line.separator read)
    policy:   (java.util.PropertyPermission java.specification.version read)
    policy:   (java.util.PropertyPermission java.specification.vendor read)
    policy:   (java.util.PropertyPermission java.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.specification.version read)
    policy:   (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   (java.util.PropertyPermission java.vm.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.version read)
    policy:   (java.util.PropertyPermission java.vm.vendor read)
    policy:   (java.util.PropertyPermission java.vm.name read)
    policy:
    policy: reading file:/C:/Users/SudhanshuG/.java.policy
    policy: error parsing file:/C:/Users/SudhanshuG/.java.policy
    policy: java.io.FileNotFoundException: C:\Users\SudhanshuG\.java.policy (The system cannot find the file specified)
    java.io.FileNotFoundException: C:\Users\SudhanshuG\.java.policy (The system cannot find the file specified)
        at java.io.FileInputStream.open(Native Method)
        at java.io.FileInputStream.<init>(FileInputStream.java:106)
        at java.io.FileInputStream.<init>(FileInputStream.java:66)
        at sun.security.util.PolicyUtil.getInputStream(PolicyUtil.java:43)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:626)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:587)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: getPermissions:
        PD CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
        PD ClassLoader: sun.misc.Launcher$AppClassLoader@1172e08
        PD Principals: <no principals>
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/modules/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.security.AllPermission <all permissions> <all actions>)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.pki_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/EJB <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Web <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Connector <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Administrators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Deployers]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Operators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Monitors]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSKernelIdentity/*]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.lang.RuntimePermission stopThread)
    policy:   granting (java.net.SocketPermission localhost:1024- listen,resolve)
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: getPermissions:
        PD CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
        PD ClassLoader: sun.misc.Launcher$AppClassLoader@1172e08
        PD Principals: <no principals>
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/modules/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.security.AllPermission <all permissions> <all actions>)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.pki_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/EJB <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Web <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Connector <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Administrators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Deployers]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Operators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Monitors]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSKernelIdentity/*]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources

    Hi,
    Your issue is something similar to the issue described in below metalink id. Please check below metalink id, you issue may be resolved.
    Start OMS failed with "javax.xml.stream.XMLStreamException: Premature end of file encountered" [ID 1481158.1]
    Mark if this helps you.
    Regards,
    Kishore

  • JAAS, jazn.xml, & oracle.security.jazn.config

    I have a swing application using LDAP to authenticate users that will typically be launched via Java Web Start, thus the application is deploy using a jar file.
    I can run this application from JDev or from the command-line when the jazn.xml file is located in the root (start-in) directory.
    Unfortunately, when the jazn.xml file is only in the jar file (as it would be when launched via JWS) the application cannot find it and throws an exception:
    oracle.security.jazn.JAZNInitException: d:\path\.\jazn-data.xml (The system cannot find the file specified).
    I found some documentation that indicates that I can specify the path to the jazn.xml file with
    System.setProperty("oracle.security.jazn.config", "path/to/jazn/xml/file");
    If I set it to a relative path without the filename on the end (ex. "./my/path" or "my/path") I get the above exception.
    If I set it to a relative path with the filename (ex. "./my/path/jazn.xml" or "my/path/jazn.xml") it works.
    What I can't figure out is how to tell it that it is in a jar file that is in my classpath. It doesn't find it from the path examples above. I've tried things like "client.jar/jazn.xml", "d:/my/path/client.jar/jazn.xml", and a host of other things with the jazn.xml filename on the end.
    Oddly enough, when I set it to "d:/my/path/client.jar" I get a different exception:
    Caused by: oracle.security.jazn.JAZNInitException: no protocol: "ldap://hostname.com:389">
         at oracle.security.jazn.spi.xml.FSXMLStore.<init>(FSXMLStore.java:128)
         ... 59 more
    Caused by: java.net.MalformedURLException: no protocol: "ldap://hostname.com:389">
         at java.net.URL.<init>(URL.java:537)
         at java.net.URL.<init>(URL.java:434)
         at java.net.URL.<init>(URL.java:383)
    So it seems like it read the file but parsed it incorrectly. Any ideas?

    Thanks for the reply Yvonne. Sorry I haven't updated this after my testing. I think you're close to correct.
    I did some more testing and figured out that any time the protocol is included in a path (protocol://d:/my/path/client.jar) that jazn does not understand. When the referenced file (jazn.xml) is in a jar file, it includes the protocol in the path. For example the path to the jazn.xml file (the value that the java.security.auth.policy property needs to be set to) would be jar:file://my/path/client.jar!/my/path/jazn.xml
    I think the oracle.security.jazn.spi.PolicyProvider (the value of the java.security.auth.policy.provider property) causes the jazn.xml file to be read. That class is, I think, what fails to find that file because it doesn't understand when the protocol (jar:file:) is included in the path to the file. That's my guess anyway.
    I did figure out a work around and it goes like this:
    1. create a new jazn.xml file
    File tmp = new File ("jazn.xml");
    2. and set it to be deleted on exit
    tmp.deleteOnExit();
    3. get a ByteArrayInputStream for the jazn.xml file and read it out of the jar file.
    4. then write the stream to the tmp file
    5. then set the system property
    System.setProperty("java.security.auth.policy", tmp.toURL().getPath());
    It is kind of a pain since I have to check to see if the property I'm setting is "jazn.xml", but it seems to work.
    I think the oracle.security.jazn.spi.PolicyProvider problem is a defect, which I'll report on meta-link.
    tcoker

  • Error in security provider logon stack: no logon to visual administrator

    Probably i made a mistake in configuring SAP-J2EE-Engine security provider login modules.
    Now i cannot logon to Visual Administrator, it tells me
    "Error while connecting
    com.sap.engine.services.security.exceptions.BaseLoginException: Access Denied."
    Is there a way to reset login module stack from configtool or in some config file?
    Many thanks in advance.
    Simone Zaffalon

    Hi
    you can configure your login stack configuration using config tool. Config tool works locally against the server's database, thus no authentication is required.
    1. Be sure that your server is not running! (shutdown SAP J2EE processes)
    2. Launch config tool ("use default db settings").
    3. switch to configuration editor mode (the most-right icon in the icon toolbar)
    4. navigate to security-->configurations
    Here you find your logon stacks and the login modules contained within them. Click on the "pencil" icon for changing your current configuration.
    See the thread below .It will resolve your issue
    Unable to access Visual Admin
    Points are welcome if it is helpful
    Koti Reddy

  • Urgent..................External third party security provider

    Hello!
    I am trying to deploy a web module in home OC4j on Oracle application server v.10.3.1.0 using Windows 2003 Active Directory.
    Knowing that in active directory I have a group whose DN is :CN=Administrators,CN=Builtin,DC=SWSERVER,DC=DGET,DC=COM
    and a user whose DN is CN=Administrator,CN=Users,DC=SWSERVER,DC=DGET,DC=COM
    the giving user is a member of the Group Administrators .
    In Security provider page, I add users and groups settings
    LDAP Group Name Attribute: cn
    LDAP Group Object Class: group
    LDAP Group Member Attribute:member
    LDAP User Name Attribute:name
    LDAP User Object Class :user
    I also map roles between Web application and Security provider.
    When I browse to the application in IE, I am prompted to enter user name and password. I entered Administrator password but not authenticated!!!!!!
    What should i put in security provider page????????? what should be the settings?????????????
    N.B: winodws people are encouraged to reply!!!!
    thank you in advance!!!

    several things could have gone wrong. Can you increase the logging level. Set it to TRACE:32 instead of NOTIFICATION:1 to see what is going on with your authentication.
    ../j2ee/home/config/jps-config.xml:
    <logger name='oracle.j2ee.security' level='TRACE:32'
    useParentHandlers='false'>
    <handler name='oc4j-handler'/>
    </logger>
    After restarting OC4J, you would monitor log.xml in your j2ee/home/log/oc4j directory to analyze what is going on.

  • Question on OID Security Provider?

    1. I find two offical documents on config OID security provider, which one is correct?
    http://download.oracle.com/docs/cd/E15523_01/webcenter.1111/e12405/wcadm_security.htm#BGBBHAGJ
    http://download.oracle.com/docs/cd/E12839_01/apirefs.1111/e13952/taskhelp/security/ConfigureOracleInternetDirectoryATNProvider.html
    The main differences are:
    a. whether to change cn to uid at Groups related fields?
    for example:All Groups Filter to (&(uid=*)(|(objectclass=groupofUniqueNames)(objectclass=orcldynamicgroup)))
    b. whether to modify jps-config.xml file?
    2. I config provider successful based on http://download.oracle.com/docs/cd/E15523_01/webcenter.1111/e12405/wcadm_security.htm#BGBBHAGJ, I can find all user and group of OID at weblogic console. My question is why can't I delete or change group of user which at OID. When I add new user via weblogic console wizard I can't find OID provider at Authentication Provider list. What matter with it? a bug or somthing wrong with my configuration, even it is build-in design?

    a. whether to change cn to uid at Groups related fields?
    If the group name attribute for the static group object in the LDAP directory structure is a type other than cn, change that type in the settings for the All Groups Filter and Group Name From Filter attributes.
    For OID, Static group attribute is CN if i am not wrong. So I believe we dont need to change the All Groups Filter.
    b. whether to modify jps-config.xml file?
    I believe NO.
    why can't I delete or change group of user which at OID. When I add new user via weblogic console wizard I can't find OID provider at Authentication Provider list.
    The Weblogic OID Provider is read only, we cant modify anything on OID. Its not the bug, you get the same behaviour with the other providers as well.
    Hope it answers.

  • Custom Security Provider impossible to remove the MBean Jar File

    Hi,
    I am currently developping a custom security provider for Weblogic. I
    have deploy my Mbean File Jar on a remote server weblogic running on
    solaris. NO authentication provider for this security provider has
    been defined in the console, it means there is no link with this
    security provider. Nevertheless, when I remove the MJF the server
    crashes when starting:
    <...>
    <May 21, 2003 3:37:08 PM CEST> <Critical> <WebLogicServer> <000364>
    <Server failed during initialization.
    Exception:weblogic.management.configuration.ConfigurationException: -
    with nested exception:
    [javax.management.MBeanException: Commo type:
    be.fgov.minfin.ccff.security.provider.CCFFSimpleSampleAuthenticator is
    not loaded. Checks MJFs.]
    javax.management.MBeanException: Commo type:
    be.fgov.minfin.ccff.security.provider.CCFFSimpleSampleAuthenticator is
    not loaded. Checks MJFs.
    at weblogic.management.commo.CommoModelMBean.load(CommoModelMBean.java:588)
    at weblogic.management.commo.Commo.initInstances(Commo.java:241)
    at weblogic.management.commo.Commo.init(Commo.java:125)
    at weblogic.management.AdminServerAdmin.initializeCommo(AdminServerAdmin.java:477)
    at weblogic.management.AdminServerAdmin.initialize(AdminServerAdmin.java:108)
    at weblogic.t3.srvr.T3Srvr.initialize1(T3Srvr.java:659)
    at weblogic.t3.srvr.T3Srvr.initialize(T3Srvr.java:589)
    at weblogic.t3.srvr.T3Srvr.run(T3Srvr.java:277)
    at weblogic.Server.main(Server.java:32)
    <...>
    I have been looking through all the config file where the MJF
    (removed) could be linked but I did not find anything.
    I am really confused because with my local weblogic running on
    win2000, there is no problem to remove this MJF.
    Thx in advance,
    tiggy

    Tiggy,
    Remove the userConfig directory under your domain directory. That should
    fix the problem.
    Thanks,
    ~satya
    Tiggy wrote:
    Hi,
    I am currently developping a custom security provider for Weblogic. I
    have deploy my Mbean File Jar on a remote server weblogic running on
    solaris. NO authentication provider for this security provider has
    been defined in the console, it means there is no link with this
    security provider. Nevertheless, when I remove the MJF the server
    crashes when starting:
    <...>
    <May 21, 2003 3:37:08 PM CEST> <Critical> <WebLogicServer> <000364>
    <Server failed during initialization.
    Exception:weblogic.management.configuration.ConfigurationException: -
    with nested exception:
    [javax.management.MBeanException: Commo type:
    be.fgov.minfin.ccff.security.provider.CCFFSimpleSampleAuthenticator is
    not loaded. Checks MJFs.]
    javax.management.MBeanException: Commo type:
    be.fgov.minfin.ccff.security.provider.CCFFSimpleSampleAuthenticator is
    not loaded. Checks MJFs.
    at weblogic.management.commo.CommoModelMBean.load(CommoModelMBean.java:588)
    at weblogic.management.commo.Commo.initInstances(Commo.java:241)
    at weblogic.management.commo.Commo.init(Commo.java:125)
    at weblogic.management.AdminServerAdmin.initializeCommo(AdminServerAdmin.java:477)
    at weblogic.management.AdminServerAdmin.initialize(AdminServerAdmin.java:108)
    at weblogic.t3.srvr.T3Srvr.initialize1(T3Srvr.java:659)
    at weblogic.t3.srvr.T3Srvr.initialize(T3Srvr.java:589)
    at weblogic.t3.srvr.T3Srvr.run(T3Srvr.java:277)
    at weblogic.Server.main(Server.java:32)
    <...>
    I have been looking through all the config file where the MJF
    (removed) could be linked but I did not find anything.
    I am really confused because with my local weblogic running on
    win2000, there is no problem to remove this MJF.
    Thx in advance,
    tiggy

  • Error using 10.1.3 Security Provider:3rd party LDAP or Custom Login Module

    Hello all,
    After deploying my JSF/ADF application using Jdeveloper 10.1.3 to Oracle Application Server 10.1.3, I used the Application Server control to change the 'Security Provider' configuration:
    1. Using 3rd Party LDAP Provider (Novell eDirectory)
    I get the following error when restarting the application with the new config.
    06/06/21 16:42:32 Error while configuring security provider MBean for application AccessList
    06/06/21 16:42:32 java.lang.ClassNotFoundException: oracle/security/jazn/jmx/CustomLDAPSecurityProvider
    2. Using Custom Login Module (again programmatically talks to eDirectory and it works in UIX/10.1.2 application)
    I get the following error when restarting the application with the new config.
    06/06/21 14:31:19 Error while configuring security provider MBean for application AccessList
    06/06/21 14:31:19 java.lang.ClassNotFoundException: oracle/security/jazn/jmx/LoginModuleSecurityProviderAlso, I get this error with both the settings..
    06/06/21 14:31:19 WARNING: Application.setConfig Application: AccessList is in failed state as initialization failedjava.lang.
    InstantiationException
    Jun 21, 2006 2:31:19 PM com.evermind.server.Application setConfig
    WARNING: Application: AccessList is in failed state as initialization failedjava.lang.InstantiationException
    06/06/21 14:31:19 java.lang.InstantiationException
    06/06/21 14:31:19       at com.evermind.server.ApplicationStateRunning.initDataSources(ApplicationStateRunning.java:1424)
    06/06/21 14:31:19       at com.evermind.server.ApplicationStateRunning.initializeApplication(ApplicationStateRunning.java:195)
    java.lang.ClassNotFoundException error leads me to believe, I am just missing to include some libraries..
    I have included "bc4j.security" in my web project and I am not sure if that is what is needed!
    Will appreciate your help..
    Thanks,
    Karthik

    The problem i had with my Custom login module was that JDeveloper includes the datasources listed in the connection tab.
    When JDeveloper does that it writes the username and password in the jazn-data.xml. But with the Custom Login module the reference in de data-source declaration cannot find the password. that's why i got the InstantiationException at the initDataSources point.
    In tools>preferences>deployment you can uncheck the option:
    Bundle Default data-sources.xml During Deployment.
    The problem with this is when i specify a datasource in the data-sources.xml i included myself, jdeveloper will also put de datasources under the Connections tab in the data-sources.xml.
    Does anyone knows how to stop jdeveloper putting the datasources automatic in the file, or how to prevent jdeveloper storing the password in jazn-data.xml?

  • 3rd party LDAP security provider problem

    I'm having an issue that when I've deployed my j2ee application to Oracle AS 10g rel3 app server, the security-constraint I've configured in my web.xml file isn't being obeyed, or at least it doesn't appear to be.
    As part of the deployment process I've configured a 3rd party LDAP server as the security provider. As for mapping groups to roles, I've set it such that all users and groups should be mapped to the role AuthorisedUser - my intention is that for any protected url's defined in the web.xml, the user should be redirected to a login page as defined in the web.xml file as well (I'm using FORM based authentication in the login-config) - but after they are logged in they will be assigned the role of AuthorisedUser.
    The following is being written to the orion-application.xml file
    <security-role-mapping name="AuthorisedUser" impliesAll="true" />
    What I'm observing is that users aren't being challenged when they hit a secured url-pattern. Is this as a result of the impliesAll="true" attribute ?

    I found that the <security-role-mapping> element is not functioning correctly for 10.1.3.4 OC4J LDAP authentication. I saw in the log.xml that I was getting authenticated but it wasn't finding the role-group map.
    I changed the role-name in the web.xml to be the exact same thing as the group in LDAP and that fixed that problem.
    I know the original poster has gone past this problem, but for people in the future, I hope this helps.
    Now my problem is the j_security_check... once I'm authenticated, the browser ends up at http://hostname:port/OrderManagement/j_security_check instead of the application page. Any ideas?
    Thanks,
    David

  • Custom security provider exception

    Good day, colleagues. I want to raise an old topic.
    I use custom security provider exceptions:
    -AccountExpiredException
    -AccountLockedException
    However, the login() method only captures FailedLoginException
    try
      CallbackHandler pwcall = new weblogic.security.URLCallbackHandler(user, pass.getBytes("UTF-8"));
      subject = weblogic.security.services.Authentication.login(pwcall);
      weblogic.servlet.security.ServletAuthentication.runAs(subject, request);
    catch (javax.security.auth.login.LoginException e) {
      e.printStackTrace();
    javax.security.auth.login.FailedLoginException: [Security:090304]Authentication Failed: User ...
      at weblogic.security.providers.authentication.LDAPAtnLoginModuleImpl.login(LDAPAtnLoginModuleImpl.java:240)
      at com.bea.common.security.internal.service.LoginModuleWrapper$1.run(LoginModuleWrapper.java:110)
      at java.security.AccessController.doPrivileged(Native Method)
    I found similar questions IdentityAssertion custom exception, FailedLoginException asked many years ago for WLS 9.2
    Their solution (wlp.propogate.login.exception.cause=true) does not work for WLS 10.3.
    How to propagate original LoginException?
    Or exception message only.

    I did it! look closely to source code:
    javax.security.auth.login.LoginContext:875
    if (moduleStack[i].entry.getControlFlag() == AppConfigurationEntry.LoginModuleControlFlag.REQUISITE) {
      // if REQUISITE, then immediately throw an exception
      if (methodName.equals(ABORT_METHOD) || methodName.equals(LOGOUT_METHOD)) {
           if (firstRequiredError == null)
                firstRequiredError = le;
      } else {
           throwException(firstRequiredError, le);
    } else if (moduleStack[i].entry.getControlFlag() == AppConfigurationEntry.LoginModuleControlFlag.REQUIRED) {
      // mark down that a REQUIRED module failed
      if (firstRequiredError == null)
           firstRequiredError = le;
    } else {
      // mark down that an OPTIONAL module failed
      if (firstError == null)
           firstError = le;
    javax.security.auth.login.LoginContext:922
    // we went thru all the LoginModules.
    if (firstRequiredError != null) {
      // a REQUIRED module failed -- return the error
      throwException(firstRequiredError, null);
    } else if (success == false && firstError != null) {
      // no module succeeded -- return the first error
      throwException(firstError, null);
    } else...
    I set Control flag: OPTION to DefaultAuth (was REQUIRED)
    and order it after my LoginModule. (restart required!)
    Now I catch my exceptions %)

  • Security Provider for a web dynpro with tool Visual Administrator

    Hello all,
    after deploying successfully my web dynpro on the J2EE 7.0 WAS, I'm trying to set up authentication to it but I cannot find my applicaiton in the list of policy configurations of the Security Provider entry. When I try to add the path to my local web dynpro, the engine doesn't find it.
    I have noticed that all other policy configurations reference a servlet_jsp application. Should I transform my web dynpro into a servlet_jsp? How do I do that?
    Thanks for your input,
    Tanguy Mezzano

    Hello Marcel,
    in fact, I don't succeed to redeploy with another provider name... I have undeployed my webdynpro with SDM on the Java stack, but from NWDS, when I change the application-j2ee-engine.xml and application.xml files, and that I rebuild the webdynpro, when I run and deploy, it always redeploys under the former provider: local.
    When I create the application, I tell to use the existing component, should I select create a new one, but that means that I have to rebuild the whole application.
    Will then the webdynpro be in the Security Provider list, so that I can configure it with http header?
    Thx for your help,
    Tanguy

  • Access denied to a security provider on a signed applet

    Hi,
    I'm having permissions problems to work with a security provider.
    The security provider is already installed at java.security. In fact, at Netbeans when debbuging the app it's working perfectly.
    If I'm working the provider in an signed applet, then there are errors.
    Even, I have created a .jar file and I have saved in the /ext directory, wich by default in the java.policy file has got all security permissions.
    grant codeBase "file:${{java.ext.dirs}}/*" {
    permission java.security.AllPermission;
    Even with these granted permissions, I'm getting problems to work with the security provider that I have installed. Also, with these permissions I should be able to install the security provider.
    log:
    <record>
    <date>2012-03-13T12:13:39</date>
    <millis>1331637219126</millis>
    <sequence>17</sequence>
    <logger>appletpdf.appletPdf</logger>
    <level>SEVERE</level>
    <class>appletpdf.appletPdf</class>
    <method>applTest</method>
    <thread>11</thread>
    <message>excepcion: {0} </message>
    <exception>
    <message>java.security.AccessControlException: access denied (java.security.SecurityPermission authProvider.SunPKCS11-Provider-name)</message>
    <frame>
    <class>java.security.AccessControlContext</class>
    <method>checkPermission</method>
    <line>393</line>
    </frame>
    <frame>
    <class>java.security.AccessController</class>
    <method>checkPermission</method>
    <line>553</line>
    </frame>
    <frame>
    <class>java.lang.SecurityManager</class>
    <method>checkPermission</method>
    <line>549</line>
    </frame>
    <frame>
    <class>net.sourceforge.jnlp.runtime.JNLPSecurityManager</class>
    <method>checkPermission</method>
    <line>250</line>
    </frame>
    <frame>
    <class>sun.security.pkcs11.SunPKCS11</class>
    <method>login</method>
    <line>1036</line>
    </frame>
    <frame>
    <class>sun.security.pkcs11.P11KeyStore</class>
    <method>login</method>
    <line>874</line>
    </frame>
    <frame>
    <class>sun.security.pkcs11.P11KeyStore</class>
    <method>engineLoad</method>
    <line>764</line>
    </frame>
    <frame>
    <class>java.security.KeyStore</class>
    <method>load</method>
    <line>1201</line>
    </frame>
    <frame>
    <class>apppdf.appPdf</class>
    <method>tPKCS11</method>
    <line>174</line>
    </frame>
    <frame>
    <class>appletpdf.appletPdf</class>
    <method>applTest</method>
    <line>137</line>
    </frame>
    <frame>
    <class>appletpdf.appletPdf</class>
    <method>initapplDPdf</method>
    <line>116</line>
    </frame>
    <frame>
    <class>sun.reflect.NativeMethodAccessorImpl</class>
    <method>invoke0</method>
    </frame>
    <frame>
    <class>sun.reflect.NativeMethodAccessorImpl</class>
    <method>invoke</method>
    <line>57</line>
    </frame>
    <frame>
    <class>sun.reflect.DelegatingMethodAccessorImpl</class>
    <method>invoke</method>
    <line>43</line>
    </frame>
    <frame>
    <class>java.lang.reflect.Method</class>
    <method>invoke</method>
    <line>616</line>
    </frame>
    <frame>
    <class>sun.applet.PluginAppletSecurityContext$4</class>
    <method>run</method>
    <line>699</line>
    </frame>
    <frame>
    <class>java.security.AccessController</class>
    <method>doPrivileged</method>
    </frame>
    <frame>
    <class>sun.applet.PluginAppletSecurityContext</class>
    <method>handleMessage</method>
    <line>696</line>
    </frame>
    <frame>
    <class>sun.applet.AppletSecurityContextManager</class>
    <method>handleMessage</method>
    <line>69</line>
    </frame>
    <frame>
    <class>sun.applet.PluginStreamHandler</class>
    <method>handleMessage</method>
    <line>273</line>
    </frame>
    <frame>
    <class>sun.applet.PluginMessageHandlerWorker</class>
    <method>run</method>
    <line>82</line>
    </frame>
    </exception>
    </record>
    Fails in the line where the KeyStore is loading:(Pin is correct)
    KeyStore myKeyStore=null;
    Provider p = Security.getProvider("SunPKCS11-Provider-Name");
    myKeyStore = KeyStore.getInstance("PKCS11",p);
    char[] pinData = pin.toCharArray();
    myKeyStore.load(null, pinData);
    Any help would be apreciated.
    Thank you.
    Bye

    Thank you for your information, Frank, as it clarifies part of my confusion. However, there are a couple more loose ends I'd love to address before I mark your responses as answers.
    Do backup and restore privileges apply at all over a network mount created via "net use"?
    The network mount requires a username and password for the destination machine. Assuming the destination machine is a Windows box with a simple CIFS share, how does this user affect our permissions and access? Do we end up effectively impersonating this
    user, or is the access check still done with our sync process's run-as user?
    We require that both our configured run-as user for our sync process *and* the credentials passed to the network mount be administrator users of the local system and destination system, respectively, meaning they're in of the "BUILTIN\Administrators,
    S-1-5-32-544" group.
    On re-syncs, the destination file will exist and since we don't have the ability to read the ACL in all cases (we're running as one user, the file is owned by another user, and we aren't specified in the ACL in any way), we aren't able to determine if the
    file has changed. Is it possible to determine the owner of this file in this case? Preferably, we'd obtain the entire SDDL.
    My proposed plan is to interpret access denied as a difference requiring re-sync, resulting in us taking ownership of the file, granting ourselves access, determining if there are data differences, and then re-syncing the metadata as appropriate.

  • LDAP security provider and web service authentication

    Background: we are currently developing web services to our existing weblogic application. Our users can configure user/password authentication in one of three ways: database, LDAP, or SSO. Setting SSO aside, we need to implement the same authentication for database and LDAP that we use in our existing logon servlet in our web services. In our servlet we detect which they are configured for and, if database, authenticate the encrypted password to a database table we have for user id/password. If LDAP we use weblogic.servlet.security.ServletAuthentication and the weak() method to authenticate.
    We've to use SOAP headers to communicate username/password from the client to the web service. We want to code a SOAP message handler to grab the username/password and do the authentication there. We've successfully put something together that handles the database authentication no problem and are now struggling with how to handle the LDAP authentication. We distribute a LDAP security provider we've coded for LDAP authentication. I guess what I am looking for is an equivalent functionality provided with weblogic.servlet.security.ServletAuthentication. Note that I realize the weblogic.servlet.security package has been deprecated starting with Weblogic 9.0 but cannot find what functionality replaces it. Any help there would be appreciated as well.
    Note that I am fairly new to web service development (about 10 months now) and definitely new to web service security and Weblogic security. I tried digging into the volumes of documentation out there regarding these two topics but am simply having a difficult time sorting it all out and figuring out how to do what I want to do.
    Thanks in advance!
    Julia

    Hi,
    Add Provider (LDAP Credentials) in Admin console Security Realm --> defaultrealm -->Providers. Configuring Ldap in Admin Console will enable Admin Server to connect to LDAP. All the LDAP preconfigured Users/Groups will be available in Users and Groups Tab of Security Realms >defaultrealm >Users and Groups. Add Roles using Security Realms >defaultrealm > Roles and Policies > Global Roles > Roles. Add Role Conditions to the role by specifying users/groups configured in LDAP. If your webservice runs with SSL Anotate the Webservice file something like this below.
    @RolesAllowed({
    @SecurityRole(role="test")
    @Policy(
    uri="policy:Wssp1.2-2007-Https-UsernameToken-Plain.xml",
    attachToWsdl=true)
    Here the role is Preconfigired role in AdminConsole. Add the following tag in the soapenv:header.
    <soapenv:Header>
    <wsse:Security soapenv:mustUnderstand="1" xmlns:wsse="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-secext-1.0.xsd">
    <wsse:UsernameToken>
    <wsse:Username>test</wsse:Username>
    <wsse:Password Type="http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-username-token-profile-1.0#PasswordText">password</wsse:Password>
    </wsse:UsernameToken>
    </wsse:Security>
    </soapenv:Header>

  • Security Provider(JAAS chaine module)logging with SAP J2EE Agent Policy 2.2

    Hello,
    I have installed and configured a SAP J2EE Policy Agent 2.2 on a SAP J2EE Application Server 7.0 and installed an opensso 8.0.
    I have configured and deployed a jsp application with the descriptor containing the agent filter on the SAP J2EE.
    I have configured the security provider (based on JAAS) as follows:
    EvaluateTicketModule
    AmSAPWASLoginModule
    CreateTicketLoginModule
    I have then increased the severity check of logging on the SAP J2EE Application Server for:
    com.sap.security.server.jaas
    com.sap.engine.services.security
    But since the installation of the agent, I am not able to see the logs of the different logon modules and be sure that the CreateLoginModule has been done.
    I need to check that after the success of the agent login module, it goes through the CreateTicketLoginModule, how can I check that.
    Thanks,
    Tanguy Mezzano
    amFilter log:
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: Notification Task Handler
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: Port Check Task Handler
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    PortCheckTaskHandler: request is on valid port
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: FQDN Task Handler
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    FQDNHelper: Incoming Server Name: [myserver] Result: null
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: Not Enforced List Task Handler
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    NotenforcedURIHelper.isNotEnforced(/myApp.jsp) found in enforced cache
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    NotenforcedURIHelper.isNotEnforced(/myApp.jsp) => false
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: SSO Task Handler
    11/13/2008 06:02:40:122 PM CET: SAPEngine_Application_Thread[impl:3]_35
    SSOTaskHandler: SSO Validation successful for id=myUser,ou=user,dc=myCompany,dc=com
    11/13/2008 06:02:40:122 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: URL Policy Task Handler
    11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
    URLPolicyTaskHandler: access allowed by AmWebPolicy
    11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: Redirect Check Result Handler
    11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
    RedirectCheckResultHandler: removing redirect counter cookie
    11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: result =>
    FilterResult:
    Status : CONTINUE
    RedirectURL : null
    RequestHelper:
    null
    Data:
    null
    -----------------------------------------------------------

    I want to use my login page in BEA instead of Access Manager or Distributed Authentication Module. I think it is similar to the problem you have? Did you come up with a solution?
    My problem is described in more detail on this thread:
    http://forum.java.sun.com/thread.jspa?threadID=5197783

  • From what vendors i can get more security provider in addition oracle seurity provider ??

    hi all    
    need to more security provider that produced by vendors other than oracle         
    please help me
    thanks a lot

    You can develop your own custom providers
    Simple Sample Custom Database Authenticator for Oracle Weblogic Server 11g
    http://weblogic-wonders.com/weblogic/2014/01/13/simple-sample-custom-identity-asserter-weblogic-server-12c/

Maybe you are looking for

  • Stuck at apple logo, Help?

    Hi, I had 3 user accounts, 1 which was hardly used. Well I was using the hardly used account a couple of weekends ago surfing the web and it suddenly froze & got the spinning beach ball. I tried to restart and it got stuck at the loading apple gray s

  • Can any one help me to download a file using struts2

    can any send me a sample program to download a file using struts2 regards saradhi

  • CSDiscovery Log

         Hi See the following in the CSDiscovery log log4j:WARN No appenders could be found for logger (com.cisco.nm.csdiscovery.CSDiscoveryManager). log4j:WARN Please initialize the log4j system properly. Is this a problem as I am trying to get to the b

  • Advise Using Base Station as wireless and wired connection

    I have an Airport Extreme dual N base station. I want to use it as a wireless base station to connect to the Internet and use the ethernet ports on the base station to connect to my security camera's DVR, to connect a Vonage phone and to plug into my

  • Why was the bean made abstract in EJB 2.0

    Hi I would like to know why the beanclass has to be declared abstract in EJB2.0. Also why the getter and setter methods dint have definition, they simply had the declaration Can any of u explain why this change was made I figured this when I tried to