Security provider in JAVA 7.1

Hello experts,
I was hoping you know this, but since web as 7.1 the visual admin tool was replaced by nwa.
The problem is mapping the functionalities.
In Security provider (Visual Admin) i could insert permitions in actions or roles, but how do i do that in netweaver administrator?
I know which permission to grant to which user, but i don't know how to grant the permission. And i can't use "user admin" because it doesn't deal with permissions, it only deals with actions, roles, groups and users and that is not enought.
Cheers,
Thiago Delou
Basis Team

Hello Thiago,
I recommend you to check the following online security documentation where it is explainned how to manage security in 7.1:
http://help.sap.com-> SAP NetWeaver CE 7.1 -> SAP NetWeaver Composition Environment Library u2192 Administrator's Guide u2192 SAPNetWeaver CE Security Guide u2192 SAP NetWeaver Application Server Java Security Guide u2192 User Administration and Authentication
I hope this helps you.
Regards,
Blanca

Similar Messages

  • JCE requires: java.lang.RuntimePermission requires accessClassInPackage.sun.security.provider

    I'm trying to use the JCE with JWS1.0.2. All I want to do is generate a KeyPair and I can NOT use a signed application. The code is:
    public static KeyPair genDHKeyPair() throws Exception {
    // properties...
    DHParameterSpec dhSkipParamSpec;
    dhSkipParamSpec = new      DHParameterSpec(skip1024Modulus, skip1024Base);
    KeyPairGenerator keyPairGenerator = KeyPairGenerator.getInstance("DH");
    keyPairGenerator.initialize(dhSkipParamSpec);
    KeyPair keyPair = keyPairGenerator.generateKeyPair();
    return keyPair;
    I'm using JDK1.4. This code works fine outside of JWS.
    If I call this code I get an exception that states I need the stated RuntimePermission. IMHO this is a bug because I should be able to make use of simple standard extension methods like this. Is getting an instance of a KeyPairGenerator and generating a key pair a security risk?
    The fix for this should be a simple addition to the security policy for JWS which gives SUN javax.crypto code access to the appropriate RuntimePermission.
    Can anyone think of a reason why NOT to do this?
    Thank you.
    BTW, here's the Exception you would get if you tried this:
    java.security.AccessControlException: access denied (java.lang.RuntimePermission accessClassInPackage.sun.security.provider)
         at java.security.AccessControlContext.checkPermission(AccessControlContext.java:270)
         at java.security.AccessController.checkPermission(AccessController.java:401)
         at java.lang.SecurityManager.checkPermission(SecurityManager.java:542)
         at java.lang.SecurityManager.checkPackageAccess(SecurityManager.java:1513)
         at sun.misc.Launcher$AppClassLoader.loadClass(Launcher.java:262)
         at java.lang.ClassLoader.loadClass(ClassLoader.java:299)
         at java.lang.ClassLoader.loadClass(ClassLoader.java:262)
         at java.lang.ClassLoader.loadClassInternal(ClassLoader.java:322)
         at com.wss.calendar.client.swing.Main.main(Main.java:47)
         at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
         at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
         at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
         at java.lang.reflect.Method.invoke(Method.java:324)
         at com.sun.javaws.Launcher.executeApplication(Launcher.java:739)
         at com.sun.javaws.Launcher.executeMainClass(Launcher.java:701)
         at com.sun.javaws.Launcher.continueLaunch(Launcher.java:584)
         at com.sun.javaws.Launcher.handleApplicationDesc(Launcher.java:328)
         at com.sun.javaws.Launcher.handleLaunchFile(Launcher.java:166)
         at com.sun.javaws.Launcher.run(Launcher.java:134)
         at java.lang.Thread.run(Thread.java:536)

    hi there,
    Please I have the same problem in an applet that uses DSA with the following call:
    pkey = (PublicKey) new DSAPublicKey(server_pub_key);
    The Exception i am having on the console is
    java.security.AccessControlException: access denied (java.lang.RuntimePermission accessClassInPackage.sun.security.provider)
    Note that I am NOT using JCE and that both netscape and IE browsers gave this error
    Can somebody help me please?
    Thanks in advance,
    JPDib

  • Problems using NSS library as PKCS#11 provider with JAVA 6

    Hi,
    I�m trying to configure JAVA 6 on Solaris 10 SPARC to use Mozilla NSS library as PKCS#11 provider (to achieve FIPS-140 certification for my application). I�m following the guidelines from http://java.sun.com/javase/6/docs/technotes/guides/security/p11guide.html#NSS but unfortunately something doesn�t work for me as expected...
    Let me describe the exact steps that I followed (because devil may be in the small details :-)
    I downloaded NSS 3.11.4 and NSPR 4.6.4 binaries from mozilla.org (32 bit �debug� versions for Solaris 9, because these were the only �binary� versions for SPARC available on Mozilla site and as far as I understand these are the exact versions that passed FIPS-140 certification), unpacked them under the /opt directory and copied both of them into a single /opt/nss tree as follows:
    mkdir /opt/nss
    cp �r /opt/nss-3.11.4/* /opt/nss
    cp �r /opt/nspr-4.6.4/* /opt/nss
    I created a PKCS#11 configuration file /opt/nss/pkcs11.cfg as per JAVA 6 security guide:
    name = NSScrypto
    nssLibraryDirectory = /opt/nss/lib
    nssDbMode = noDb
    attributes = compatibility
    (I know that this configuration is not for FIPS mode � but I thought that I�d better start with a simple NSS configuration)
    Then I modified /usr/jdk/jdk1.6.0_03/jre/lib/security/java.security file and replaced 1st provider with:
    security.provider.1=sun.security.pkcs11.SunPKCS11 /opt/nss/pkcs11.cfg
    Now everything should be in place � so I created a small JAVA program and ran it:
    import javax.crypto.SecretKeyFactory;
    import javax.crypto.spec.DESedeKeySpec;
    import javax.crypto.SecretKey;
    import javax.crypto.Cipher;
    import java.security.*;
    public class Test
    public static void main(String[] args)
    try
    SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("DESede");
    DESedeKeySpec keySpec = null;
    keySpec = new DESedeKeySpec(new String("laKuf1Tcc6sOhsdPf49=m4es").getBytes());
    System.out.println("keyFactory provider: " + keyFactory.getProvider().getName());
    SecretKey key = keyFactory.generateSecret(keySpec);
    Cipher decryptCipher = Cipher.getInstance("DESede");
    decryptCipher.init(Cipher.DECRYPT_MODE, key);
    System.out.println("decryptCipher provider: " + decryptCipher.getProvider().getName());
    catch (Exception ex)
    ex.printStackTrace();
    Unfortunately it produced the following output:
    EMS-Server42# java test
    keyFactory provider: SunPKCS11-NSScrypto
    decryptCipher provider: SunJCE
    And when I comment out SunJCE provider in java.security file I get the following exception:
    java.security.NoSuchAlgorithmException: Cannot find any provider supporting DESede
    at javax.crypto.Cipher.getInstance(DashoA13*..)
    at test.main(test.java:38)
    So it looks like something is wrong with my NSS configuration. Because AFAIK DESede (3DES) is supported by the NSS library, but for some reason JAVA doesn�t see this algorithm implemented in NSS PKCS#11 provider.
    Any suggestions on what am I doing wrong?
    Best regards,
    Alex

    Works for me:
    import java.security.Provider;
    import java.security.SecureRandom;
    import java.security.Security;
    import javax.crypto.Cipher;
    import javax.crypto.SecretKey;
    import javax.crypto.SecretKeyFactory;
    import javax.crypto.spec.DESedeKeySpec;
    import javax.crypto.spec.IvParameterSpec;
    public class Test
      public static void main(String[] args)
        try
          String configFileName = "/nss/nss.cfg";
          Provider nss = new sun.security.pkcs11.SunPKCS11(configFileName);
          Security.addProvider(nss);
          SecretKeyFactory keyFactory = SecretKeyFactory.getInstance("DESede", nss);
          DESedeKeySpec keySpec = new DESedeKeySpec(new String("laKuf1Tcc6sOhsdPf49=m4es").getBytes("UTF-8"));
          System.out.println("keyFactory provider: " + keyFactory.getProvider().getName());
          SecretKey key = keyFactory.generateSecret(keySpec);
          //iv for CBC mode - note, in practice you don't generate a random iv for decryption :)
          byte[] iv = new byte[8];  //64-bit block size for 3DES
          SecureRandom sr = SecureRandom.getInstance("PKCS11", nss);
          sr.nextBytes(iv);
          IvParameterSpec params = new IvParameterSpec(iv);
          Cipher decryptCipher = Cipher.getInstance("DESede/CBC/NoPadding", nss);
          decryptCipher.init(Cipher.DECRYPT_MODE, key, params);
          System.out.println("decryptCipher provider: " + decryptCipher.getProvider().getName());
        catch (Exception ex)
          ex.printStackTrace();
    }Oh, I wouldn't expect your key loading to work when you switch over to FIPS mode.
    cfg file:
    name = NSScrypto
    nssLibraryDirectory = /nss
    nssSecmodDirectory = /nss
    nssModule = fipsYields the following error:
    java.security.spec.InvalidKeySpecException: java.security.InvalidKeyException: Could not create key
    because you can't directly handle keying material in FIPS. You'll have to save the secret key in the NSS certDB or generate a random one each time and send it wrapped to the other side.

  • Java.rmi.UnmarshalException: Failed to load class com.msl.security.provider

    Hi ,
    I have the following error while i am stopping a Weblogic instance. Did anyone face a similar issue, please let me know. I see a classnotfound error , but not sure what is that jar file. Is it a application jar or a weblogic one?
    Stopping Weblogic Server...
    Initializing WebLogic Scripting Tool (WLST) ...
    log4j: Trying to find [resources/comdev/default-log4j.properties] using context classloader java.net.URLClassLoader@183f74d.
    log4j: Using URL [jar:file:/teamrule/10.2/modules/com.bea.cie.comdev_5.3.0.0.jar!/resources/comdev/default-log4j.properties] for automatic log4j configuration.
    log4j: Reading configuration from URL jar:file:/teamrule/10.2/modules/com.bea.cie.comdev_5.3.0.0.jar!/resources/comdev/default-log4j.properties
    log4j: Hierarchy threshold set to [ALL].
    log4j: Parsing for [root] with value=[INFO, NA].
    log4j: Level token is [INFO].
    log4j: Category root set to INFO
    log4j: Parsing appender named "NA".
    log4j: Parsed "NA" options.
    log4j: Finished configuring.
    Welcome to WebLogic Server Administration Scripting Shell
    Type help() for help on available commands
    Connecting to t3://localhost:7009 with userid weblogic ...
    This Exception occurred at Sun Apr 10 14:17:03 UTC 2011.
    javax.naming.CommunicationException [Root exception is java.rmi.UnmarshalException: failed to unmarshal class weblogic.security.acl.internal.AuthenticatedUser; nested excep
    tion is:
    java.lang.ClassNotFoundException: Failed to load class com.msl.security.providers.SessionPrincipal]
    at weblogic.jndi.internal.ExceptionTranslator.toNamingException(ExceptionTranslator.java:74)
    at weblogic.jndi.internal.ExceptionTranslator.toNamingException(ExceptionTranslator.java:32)
    at weblogic.jndi.WLInitialContextFactoryDelegate.toNamingException(WLInitialContextFactoryDelegate.java:773)
    at weblogic.jndi.WLInitialContextFactoryDelegate.pushSubject(WLInitialContextFactoryDelegate.java:673)
    at weblogic.jndi.WLInitialContextFactoryDelegate.newContext(WLInitialContextFactoryDelegate.java:466)
    at weblogic.jndi.WLInitialContextFactoryDelegate.getInitialContext(WLInitialContextFactoryDelegate.java:373)
    ... 48 more
    Problem invoking WLST - Traceback (innermost last):
    File "/web/10.2/user_projects/domains/dom/shutdown.py", line 1, in ?
    File "<iostream>", line 22, in connect
    WLSTException: 'Error occured while performing connect : Error getting the initial context. There is no server running at t3://localhost:7009 Use dumpStac
    k() to view the full stacktrace'
    Thanks a lot for your time.
    Manish

    Hi Manish,
    It seems that you are using a custom security provider and the weblogic server is not able to find the class / jar file that contains the class.
    java.lang.ClassNotFoundException: Failed to load class com.msl.security.providers.SessionPrincipal]
    Make sure you have all the required jar files in the server classpath.
    You can use the JarScan utility to find the jar that contains the class.
    Refer the below link regarding the jarScan.
    http://weblogic-wonders.com/weblogic/2011/01/26/finding-jar-files-using-jarscan/
    Regards,
    Anandraj
    http://weblogic-wonders.com

  • Error "java.lang.NoClassDefFoundError: sun/security/provider/Sun" in 10.1.2

    Hi,
    I developed an ADF UIX application in JDeveloper 10.1.2. It works fine when I run on embedded oc4j in my machine.
    I deployed it to Oracle Application Server 10g in AIX. When I run the application from the Application Server and try to open a uix page with data I get the following error:
    500 Internal Server Error
    java.lang.NoClassDefFoundError: sun/security/provider/Sun     at oracle.jbo.common.ampool.PoolMgr.createPool(PoolMgr.java:280)     at oracle.jbo.common.ampool.PoolMgr.findPool(PoolMgr.java:482)     at oracle.jbo.common.ampool.ContextPoolManager.findPool(ContextPoolManager.java:165)     at oracle.adf.model.bc4j.DataControlFactoryImpl.findOrCreateSessionCookie(DataControlFactoryImpl.java(Compiled Code))     at oracle.adf.model.bc4j.DataControlFactoryImpl.createSession(DataControlFactoryImpl.java(Compiled Code))     at oracle.adf.model.binding.DCDataControlReference.getDataControl(DCDataControlReference.java(Compiled Code))     at oracle.adf.model.BindingContext.get(BindingContext.java(Compiled Code))     at oracle.adf.model.binding.DCUtil.findSpelObject(DCUtil.java:228)     at oracle.adf.model.binding.DCUtil.findContextObject(DCUtil.java:308)     at oracle.adf.model.binding.DCIteratorBinding.<init>(DCIteratorBinding.java:127)     at oracle.jbo.uicli.binding.JUIteratorBinding.<init>(JUIteratorBinding.java:59)     at oracle.jbo.uicli.binding.JUIteratorDef.createIterBinding(JUIteratorDef.java:58)     at oracle.jbo.uicli.binding.JUIteratorDef.createIterBinding(JUIteratorDef.java:47)     at oracle.adf.model.binding.DCBindingContainerDef.createIterBindings(DCBindingContainerDef.java(Compiled Code))     at oracle.adf.model.binding.DCBindingContainerDef.createBindingContainer(DCBindingContainerDef.java(Compiled Code))     at oracle.adf.model.binding.DCBindingContainerReference.getBindingContainer(DCBindingContainerReference.java(Inlined Compiled Code))     at oracle.adf.model.BindingContext.get(BindingContext.java(Compiled Code))     at oracle.adf.model.binding.DCUtil.findSpelObject(DCUtil.java:228)     at oracle.adf.model.binding.DCUtil.findContextObject(DCUtil.java:308)     at oracle.adf.model.binding.DCUtil.findBindingContainer(DCUtil.java:536)     at oracle.adf.controller.lifecycle.LifecycleContext.initialize(LifecycleContext.java:121)     at oracle.adf.controller.lifecycle.LifecycleContext.initialize(LifecycleContext.java:77)     at oracle.adf.controller.struts.actions.DataActionContext.initialize(DataActionContext.java:51)     at oracle.adf.controller.struts.actions.DataAction.execute(DataAction.java:150)     at org.apache.struts.action.RequestProcessor.processActionPerform(RequestProcessor.java:484)     at org.apache.struts.action.RequestProcessor.process(RequestProcessor.java:274)     at org.apache.struts.action.ActionServlet.process(ActionServlet.java:1482)     at org.apache.struts.action.ActionServlet.doGet(ActionServlet.java:507)     at javax.servlet.http.HttpServlet.service(HttpServlet.java(Compiled Code))     at javax.servlet.http.HttpServlet.service(HttpServlet.java(Compiled Code))     at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.ResourceFilterChain.doFilter(ResourceFilterChain.java(Compiled Code))     at oracle.adf.model.servlet.ADFBindingFilter.doFilter(ADFBindingFilter.java(Compiled Code))     at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.ServletRequestDispatcher.invoke(ServletRequestDispatcher.java(Compiled Code))     at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.ServletRequestDispatcher.forwardInternal(ServletRequestDispatcher.java(Compiled Code))     at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.HttpRequestHandler.processRequest(HttpRequestHandler.java(Compiled Code))     at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.AJPRequestHandler.run(AJPRequestHandler.java(Compiled Code))     at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].server.http.AJPRequestHandler.run(AJPRequestHandler.java(Compiled Code))     at com.evermind[Oracle Application Server Containers for J2EE 10g (10.1.2.0.2)].util.ReleasableResourcePooledExecutor$MyWorker.run(ReleasableResourcePooledExecutor.java(Compiled Code))     at java.lang.Thread.run(Thread.java:568)
    Can anybody tell/help why I am getting this error?
    Thanks
    Syed

    I believe this counts to be a bug in adf. I met with such errors as well in migration 1012 from NT to AIX platform, and after decompiling adf jar code and tak a look at it, the following code block indicates that In class- oracle.jbo.client.Configuration
    , it is hard coded to get secure provider- sun/security/provider/Sun, as listed below...
    import sun.security.provider.Sun;
    static void checkSecurityProviders()
    Provider aprovider[] = Security.getProviders();
    boolean flag = false;
    for(int i = 0; i < aprovider.length; i++)
    if(!aprovider.getName().equals("SUN"))
    continue;
    flag = true;
    break;
    if(!flag)
    try
    Sun sun = new Sun();
    Security.addProvider(sun);
    catch(Exception exception)
    exception.printStackTrace();
    Adam

  • How to get domain name in java code/custom security provider

    Hi all,
    I've developed a custom security provider and deployed it in WL_HOME/server/lib/mbeantypes folder. I also have multiple domain created and running in the same machine. now if a user logs in from a specific domain, say, t3://localhost:7005, how do I retrieve the domain name in my custom security provider?
    I found the following code could do it, but this code needs to know the port number in advance
    Hashtable env = new Hashtable();
    env.put(Context.PROVIDER_URL,"t3://localhost:7101");
    env.put(Context.INITIAL_CONTEXT_FACTORY,
    "weblogic.jndi.WLInitialContextFactory");
    env.put(Context.SECURITY_PRINCIPAL,"weblogic");
    env.put(Context.SECURITY_CREDENTIALS,"weblogic1");
    Context ctx = new InitialContext(env);
    MBeanHome home = (MBeanHome)ctx.lookup(MBeanHome.ADMIN_JNDI_NAME);
    String domainName = home.getDomainName();
    System.out.println(domainName);
    Any help is greatly appreciated...
    Thanks,
    Philip
    Edited by: VivaCuba on Nov 14, 2010 9:43 AM

    Check out methods in the following classes: LegacyDirectoryLocator and DirectoryLocator.
    Jonathan
    http://jonathanhult.com

  • Problem in loading OPSS security provider: Cannot read from policy store  Error getting while starting weblogic server

    [JavaPolicyProvider]: System Property [java.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [oracle.deployed.app.ext => \-]
    [JavaPolicyProvider]: System Property [sun.java.launcher => SUN_STANDARD]
    [JavaPolicyProvider]: System Property [sun.management.compiler => HotSpot Client Compiler]
    [JavaPolicyProvider]: System Property [java.security.debug => jpspolicy]
    [JavaPolicyProvider]: System Property [oracle.core.ojdl.logging.usercontextprovider => oracle.core.ojdl.logging.impl.UserContextImpl]
    [JavaPolicyProvider]: System Property [os.name => Windows 7]
    [JavaPolicyProvider]: System Property [sun.boot.class.path => D:\ORACLE~1.6_M\JDK160~1\jre\lib\resources.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\rt.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\sunrsasign.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\jsse.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\jce.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\charsets.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\modules\jdk.boot.jar;D:\ORACLE~1.6_M\JDK160~1\jre\classes]
    [JavaPolicyProvider]: System Property [sun.desktop => windows]
    [JavaPolicyProvider]: System Property [java.vm.specification.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [java.runtime.version => 1.6.0_24-b50]
    [JavaPolicyProvider]: System Property [igf.arisidbeans.carmlloc => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\carml]
    [JavaPolicyProvider]: System Property [oracle.domain.config.dir => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1]
    [JavaPolicyProvider]: System Property [weblogic.Name => DefaultServer]
    [JavaPolicyProvider]: System Property [user.name => SudhanshuG]
    [JavaPolicyProvider]: System Property [DebugOPSSPolicyLoading => true]
    [JavaPolicyProvider]: System Property [java.naming.factory.initial => weblogic.jndi.WLInitialContextFactory]
    [JavaPolicyProvider]: System Property [user.language => en]
    [JavaPolicyProvider]: System Property [jrockit.optfile => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jrf_11.1.1\jrocket_optfile.txt]
    [JavaPolicyProvider]: System Property [sun.boot.library.path => D:\ORACLE~1.6_M\JDK160~1\jre\bin]
    [JavaPolicyProvider]: System Property [domain.home => D:\JDevSys\SYSTEM~1.92\DEFAUL~1]
    [JavaPolicyProvider]: System Property [igf.arisidstack.home => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\arisidprovider]
    [JavaPolicyProvider]: System Property [wlw.testConsole => ]
    [JavaPolicyProvider]: System Property [wlw.iterativeDev => ]
    [JavaPolicyProvider]: System Property [jps.combiner.optimize => true]
    [JavaPolicyProvider]: System Property [jps.auth => ACC]
    [JavaPolicyProvider]: System Property [java.version => 1.6.0_24]
    [JavaPolicyProvider]: System Property [user.timezone => Asia/Calcutta]
    [JavaPolicyProvider]: System Property [sun.arch.data.model => 32]
    [JavaPolicyProvider]: System Property [javax.rmi.CORBA.UtilClass => weblogic.iiop.UtilDelegateImpl]
    [JavaPolicyProvider]: System Property [java.endorsed.dirs => D:\ORACLE~1.6_M\JDK160~1\jre\lib\endorsed]
    [JavaPolicyProvider]: System Property [vde.home => D:\JDevSys\system11.1.1.6.38.61.92\DefaultDomain\servers\DefaultServer\data\ldap]
    [JavaPolicyProvider]: System Property [jps.combiner.optimize.lazyeval => true]
    [JavaPolicyProvider]: System Property [sun.cpu.isalist => pentium_pro+mmx pentium_pro pentium+mmx pentium i486 i386 i86]
    [JavaPolicyProvider]: System Property [sun.jnu.encoding => Cp1252]
    [JavaPolicyProvider]: System Property [file.encoding.pkg => sun.io]
    [JavaPolicyProvider]: System Property [wlw.logErrorsToConsole => ]
    [JavaPolicyProvider]: System Property [file.separator => \]
    [JavaPolicyProvider]: System Property [java.specification.name => Java Platform API Specification]
    [JavaPolicyProvider]: System Property [java.class.version => 50.0]
    [JavaPolicyProvider]: System Property [weblogic.home => D:\ORACLE~1.6_M\WLSERV~1.3\server]
    [JavaPolicyProvider]: System Property [user.country => IN]
    [JavaPolicyProvider]: System Property [java.home => D:\ORACLE~1.6_M\JDK160~1\jre]
    [JavaPolicyProvider]: System Property [platform.home => D:\ORACLE~1.6_M\WLSERV~1.3]
    [JavaPolicyProvider]: System Property [java.vm.info => mixed mode]
    [JavaPolicyProvider]: System Property [os.version => 6.1]
    [JavaPolicyProvider]: System Property [org.omg.CORBA.ORBSingletonClass => weblogic.corba.orb.ORB]
    [JavaPolicyProvider]: System Property [path.separator => ;]
    [JavaPolicyProvider]: System Property [java.vm.version => 19.1-b02]
    [JavaPolicyProvider]: System Property [weblogic.alternateTypesDirectory => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.ossoiap_11.1.1,D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.oamprovider_11.1.1]
    [JavaPolicyProvider]: System Property [user.variant => ]
    [JavaPolicyProvider]: System Property [java.protocol.handler.pkgs => oracle.mds.net.protocol|weblogic.net]
    [JavaPolicyProvider]: System Property [oracle.deployed.app.dir => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\servers\DefaultServer\tmp\_WL_user]
    [JavaPolicyProvider]: System Property [wc.oracle.home => D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper]
    [JavaPolicyProvider]: System Property [java.awt.printerjob => sun.awt.windows.WPrinterJob]
    [JavaPolicyProvider]: System Property [java.security.policy => D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic.policy]
    [JavaPolicyProvider]: System Property [sun.io.unicode.encoding => UnicodeLittle]
    [JavaPolicyProvider]: System Property [awt.toolkit => sun.awt.windows.WToolkit]
    [JavaPolicyProvider]: System Property [weblogic.jdbc.remoteEnabled => false]
    [JavaPolicyProvider]: System Property [weblogic.nodemanager.ServiceEnabled => true]
    [JavaPolicyProvider]: System Property [java.naming.factory.url.pkgs => weblogic.jndi.factories:weblogic.corba.j2ee.naming.url:weblogic.jndi.factories:weblogic.corba.j2ee.naming.url]
    [JavaPolicyProvider]: System Property [oracle.webcenter.tagging.scopeTags => false]
    [JavaPolicyProvider]: System Property [user.home => C:\Users\SudhanshuG]
    [JavaPolicyProvider]: System Property [wls.home => D:\ORACLE~1.6_M\WLSERV~1.3\server]
    [JavaPolicyProvider]: System Property [java.specification.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [oracle.server.config.dir => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\servers\DefaultServer]
    [JavaPolicyProvider]: System Property [java.library.path => D:\ORACLE~1.6_M\JDK160~1\bin;.;C:\Windows\Sun\Java\bin;C:\Windows\system32;C:\Windows;D:\ORACLE~1.6_M\patch_wls1035\profiles\default\native;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\native;D:\ORACLE~1.6_M\WLSERV~1.3\server\native\win\32;D:\ORACLE~1.6_M\WLSERV~1.3\server\bin;D:\ORACLE~1.6_M\modules\ORGAPA~1.1\bin;D:\ORACLE~1.6_M\JDK160~1\jre\bin;D:\ORACLE~1.6_M\JDK160~1\bin;D:\oraclexe\app\oracle\product\10.2.0\server\bin;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program Files\TortoiseSVN\bin;D:\ORACLE~1.6_M\WLSERV~1.3\server\native\win\32\oci920_8]
    [JavaPolicyProvider]: System Property [java.vendor.url => http://java.sun.com/]
    [JavaPolicyProvider]: System Property [jps.policystore.hybrid.mode => false]
    [JavaPolicyProvider]: System Property [USE_JAAS => false]
    [JavaPolicyProvider]: System Property [java.vm.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [java.runtime.name => Java(TM) SE Runtime Environment]
    [JavaPolicyProvider]: System Property [java.class.path => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jdbc_11.1.1\ojdbc6dms.jar;D:\ORACLE~1.6_M\patch_wls1035\profiles\default\sys_manifest_classpath\weblogic_patch.jar;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\sys_manifest_classpath\weblogic_patch.jar;D:\ORACLE~1.6_M\JDK160~1\lib\tools.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic_sp.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic.jar;D:\ORACLE~1.6_M\modules\features\weblogic.server.modules_10.3.5.0.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\webservices.jar;D:\ORACLE~1.6_M\modules\ORGAPA~1.1/lib/ant-all.jar;D:\ORACLE~1.6_M\modules\NETSFA~1.0_1/lib/ant-contrib.jar;D:\JDevSys\SYSTEM~1.92\DEFAUL~1\wcps-lib\derby-10.6.1.0.jar;D:\JDevSys\SYSTEM~1.92\DEFAUL~1\wcps-lib\derbytools-10.6.1.0.jar;D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper\webcenter\modules\oracle.portlet.server_11.1.1\oracle-portlet-api.jar;D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jrf_11.1.1\jrf.jar;D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper\webcenter\modules\wcps_11.1.1.4.0\wcps-connection-mbeans.jar;D:\ORACLE~1.6_M\WLSERV~1.3\common\derby\lib\derbyclient.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\xqrl.jar]
    [JavaPolicyProvider]: System Property [oracle.security.jps.config => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\config\fmwconfig\jps-config.xml]
    [JavaPolicyProvider]: System Property [java.vm.specification.name => Java Virtual Machine Specification]
    [JavaPolicyProvider]: System Property [javax.rmi.CORBA.PortableRemoteObjectClass => weblogic.iiop.PortableRemoteObjectDelegateImpl]
    [JavaPolicyProvider]: System Property [java.vm.specification.version => 1.0]
    [JavaPolicyProvider]: System Property [sun.cpu.endian => little]
    [JavaPolicyProvider]: System Property [sun.os.patch.level => Service Pack 1]
    [JavaPolicyProvider]: System Property [portlet.oracle.home => D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper]
    [JavaPolicyProvider]: System Property [java.io.tmpdir => C:\Users\SUDHAN~1\AppData\Local\Temp\]
    [JavaPolicyProvider]: System Property [jrf.version => 11.1.1]
    [JavaPolicyProvider]: System Property [oracle.webcenter.analytics.disable-native-partitioning => false]
    [JavaPolicyProvider]: System Property [java.vendor.url.bug => http://java.sun.com/cgi-bin/bugreport.cgi]
    [JavaPolicyProvider]: System Property [jps.app.credential.overwrite.allowed => true]
    [JavaPolicyProvider]: System Property [os.arch => x86]
    [JavaPolicyProvider]: System Property [java.awt.graphicsenv => sun.awt.Win32GraphicsEnvironment]
    [JavaPolicyProvider]: System Property [java.ext.dirs => D:\ORACLE~1.6_M\JDK160~1\jre\lib\ext;C:\Windows\Sun\Java\lib\ext]
    [JavaPolicyProvider]: System Property [user.dir => D:\JDevSys\system11.1.1.6.38.61.92\DefaultDomain]
    [JavaPolicyProvider]: System Property [common.components.home => D:\ORACLE~1.6_M\ORACLE~1]
    [JavaPolicyProvider]: System Property [weblogic.ext.dirs => D:\ORACLE~1.6_M\patch_wls1035\profiles\default\sysext_manifest_classpath;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\sysext_manifest_classpath]
    [JavaPolicyProvider]: System Property [wsm.repository.path => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\oracle\store\gmds]
    [JavaPolicyProvider]: System Property [line.separator =>
    [JavaPolicyProvider]: System Property [java.vm.name => Java HotSpot(TM) Client VM]
    [JavaPolicyProvider]: System Property [org.apache.commons.logging.Log => org.apache.commons.logging.impl.Jdk14Logger]
    [JavaPolicyProvider]: System Property [weblogic.management.discover => true]
    [JavaPolicyProvider]: System Property [org.omg.CORBA.ORBClass => weblogic.corba.orb.ORB]
    [JavaPolicyProvider]: System Property [file.encoding => Cp1252]
    [JavaPolicyProvider]: System Property [weblogic.classloader.preprocessor => weblogic.diagnostics.instrumentation.DiagnosticClassPreProcessor]
    [JavaPolicyProvider]: System Property [java.specification.version => 1.6]
    [JavaPolicyProvider]: System Property [javax.net.ssl.trustStore => D:\Oracle_Jdev11.1.1.6_Middleware_Home\wlserver_10.3\server\lib\DemoTrust.jks]
    policy: reading file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/weblogic.policy
    java.lang.IllegalArgumentException: null KeyStore name
        at sun.security.util.PolicyUtil.getKeyStore(PolicyUtil.java:65)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:635)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:546)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/../modules/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/ORACLE~1/modules/oracle.jps_11.1.1/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/ORACLE~1/modules/oracle.pki_11.1.1/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/EJB
    policy:   (java.lang.RuntimePermission queuePrintJob)
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/Web
    policy:   (java.lang.RuntimePermission loadLibrary)
    policy:   (java.lang.RuntimePermission queuePrintJob)
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read,write)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\..\- read)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/Connector
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read,write)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\..\- read)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/C:/Windows/Sun/Java/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Administrators
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Deployers
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Operators
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Monitors
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSKernelIdentity/*
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   (java.util.PropertyPermission java.version read)
    policy:   (java.util.PropertyPermission java.vendor read)
    policy:   (java.util.PropertyPermission java.vendor.url read)
    policy:   (java.util.PropertyPermission java.class.version read)
    policy:   (java.util.PropertyPermission os.name read)
    policy:   (java.util.PropertyPermission os.version read)
    policy:   (java.util.PropertyPermission os.arch read)
    policy:   (java.util.PropertyPermission file.separator read)
    policy:   (java.util.PropertyPermission path.separator read)
    policy:   (java.util.PropertyPermission line.separator read)
    policy:   (java.util.PropertyPermission java.specification.version read)
    policy:   (java.util.PropertyPermission java.specification.vendor read)
    policy:   (java.util.PropertyPermission java.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.specification.version read)
    policy:   (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   (java.util.PropertyPermission java.vm.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.version read)
    policy:   (java.util.PropertyPermission java.vm.vendor read)
    policy:   (java.util.PropertyPermission java.vm.name read)
    policy:
    policy: reading file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/security/java.policy
    java.lang.IllegalArgumentException: null KeyStore name
        at sun.security.util.PolicyUtil.getKeyStore(PolicyUtil.java:65)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:635)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:587)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/C:/Windows/Sun/Java/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   (java.lang.RuntimePermission stopThread)
    policy:   (java.net.SocketPermission localhost:1024- listen,resolve)
    policy:   (java.util.PropertyPermission java.version read)
    policy:   (java.util.PropertyPermission java.vendor read)
    policy:   (java.util.PropertyPermission java.vendor.url read)
    policy:   (java.util.PropertyPermission java.class.version read)
    policy:   (java.util.PropertyPermission os.name read)
    policy:   (java.util.PropertyPermission os.version read)
    policy:   (java.util.PropertyPermission os.arch read)
    policy:   (java.util.PropertyPermission file.separator read)
    policy:   (java.util.PropertyPermission path.separator read)
    policy:   (java.util.PropertyPermission line.separator read)
    policy:   (java.util.PropertyPermission java.specification.version read)
    policy:   (java.util.PropertyPermission java.specification.vendor read)
    policy:   (java.util.PropertyPermission java.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.specification.version read)
    policy:   (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   (java.util.PropertyPermission java.vm.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.version read)
    policy:   (java.util.PropertyPermission java.vm.vendor read)
    policy:   (java.util.PropertyPermission java.vm.name read)
    policy:
    policy: reading file:/C:/Users/SudhanshuG/.java.policy
    policy: error parsing file:/C:/Users/SudhanshuG/.java.policy
    policy: java.io.FileNotFoundException: C:\Users\SudhanshuG\.java.policy (The system cannot find the file specified)
    java.io.FileNotFoundException: C:\Users\SudhanshuG\.java.policy (The system cannot find the file specified)
        at java.io.FileInputStream.open(Native Method)
        at java.io.FileInputStream.<init>(FileInputStream.java:106)
        at java.io.FileInputStream.<init>(FileInputStream.java:66)
        at sun.security.util.PolicyUtil.getInputStream(PolicyUtil.java:43)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:626)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:587)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: getPermissions:
        PD CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
        PD ClassLoader: sun.misc.Launcher$AppClassLoader@1172e08
        PD Principals: <no principals>
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/modules/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.security.AllPermission <all permissions> <all actions>)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.pki_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/EJB <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Web <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Connector <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Administrators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Deployers]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Operators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Monitors]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSKernelIdentity/*]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.lang.RuntimePermission stopThread)
    policy:   granting (java.net.SocketPermission localhost:1024- listen,resolve)
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: getPermissions:
        PD CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
        PD ClassLoader: sun.misc.Launcher$AppClassLoader@1172e08
        PD Principals: <no principals>
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/modules/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.security.AllPermission <all permissions> <all actions>)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.pki_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/EJB <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Web <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Connector <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Administrators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Deployers]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Operators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Monitors]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSKernelIdentity/*]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources

    Hi,
    Your issue is something similar to the issue described in below metalink id. Please check below metalink id, you issue may be resolved.
    Start OMS failed with "javax.xml.stream.XMLStreamException: Premature end of file encountered" [ID 1481158.1]
    Mark if this helps you.
    Regards,
    Kishore

  • Custom security provider exception

    Good day, colleagues. I want to raise an old topic.
    I use custom security provider exceptions:
    -AccountExpiredException
    -AccountLockedException
    However, the login() method only captures FailedLoginException
    try
      CallbackHandler pwcall = new weblogic.security.URLCallbackHandler(user, pass.getBytes("UTF-8"));
      subject = weblogic.security.services.Authentication.login(pwcall);
      weblogic.servlet.security.ServletAuthentication.runAs(subject, request);
    catch (javax.security.auth.login.LoginException e) {
      e.printStackTrace();
    javax.security.auth.login.FailedLoginException: [Security:090304]Authentication Failed: User ...
      at weblogic.security.providers.authentication.LDAPAtnLoginModuleImpl.login(LDAPAtnLoginModuleImpl.java:240)
      at com.bea.common.security.internal.service.LoginModuleWrapper$1.run(LoginModuleWrapper.java:110)
      at java.security.AccessController.doPrivileged(Native Method)
    I found similar questions IdentityAssertion custom exception, FailedLoginException asked many years ago for WLS 9.2
    Their solution (wlp.propogate.login.exception.cause=true) does not work for WLS 10.3.
    How to propagate original LoginException?
    Or exception message only.

    I did it! look closely to source code:
    javax.security.auth.login.LoginContext:875
    if (moduleStack[i].entry.getControlFlag() == AppConfigurationEntry.LoginModuleControlFlag.REQUISITE) {
      // if REQUISITE, then immediately throw an exception
      if (methodName.equals(ABORT_METHOD) || methodName.equals(LOGOUT_METHOD)) {
           if (firstRequiredError == null)
                firstRequiredError = le;
      } else {
           throwException(firstRequiredError, le);
    } else if (moduleStack[i].entry.getControlFlag() == AppConfigurationEntry.LoginModuleControlFlag.REQUIRED) {
      // mark down that a REQUIRED module failed
      if (firstRequiredError == null)
           firstRequiredError = le;
    } else {
      // mark down that an OPTIONAL module failed
      if (firstError == null)
           firstError = le;
    javax.security.auth.login.LoginContext:922
    // we went thru all the LoginModules.
    if (firstRequiredError != null) {
      // a REQUIRED module failed -- return the error
      throwException(firstRequiredError, null);
    } else if (success == false && firstError != null) {
      // no module succeeded -- return the first error
      throwException(firstError, null);
    } else...
    I set Control flag: OPTION to DefaultAuth (was REQUIRED)
    and order it after my LoginModule. (restart required!)
    Now I catch my exceptions %)

  • Security Provider for a web dynpro with tool Visual Administrator

    Hello all,
    after deploying successfully my web dynpro on the J2EE 7.0 WAS, I'm trying to set up authentication to it but I cannot find my applicaiton in the list of policy configurations of the Security Provider entry. When I try to add the path to my local web dynpro, the engine doesn't find it.
    I have noticed that all other policy configurations reference a servlet_jsp application. Should I transform my web dynpro into a servlet_jsp? How do I do that?
    Thanks for your input,
    Tanguy Mezzano

    Hello Marcel,
    in fact, I don't succeed to redeploy with another provider name... I have undeployed my webdynpro with SDM on the Java stack, but from NWDS, when I change the application-j2ee-engine.xml and application.xml files, and that I rebuild the webdynpro, when I run and deploy, it always redeploys under the former provider: local.
    When I create the application, I tell to use the existing component, should I select create a new one, but that means that I have to rebuild the whole application.
    Will then the webdynpro be in the Security Provider list, so that I can configure it with http header?
    Thx for your help,
    Tanguy

  • Access denied to a security provider on a signed applet

    Hi,
    I'm having permissions problems to work with a security provider.
    The security provider is already installed at java.security. In fact, at Netbeans when debbuging the app it's working perfectly.
    If I'm working the provider in an signed applet, then there are errors.
    Even, I have created a .jar file and I have saved in the /ext directory, wich by default in the java.policy file has got all security permissions.
    grant codeBase "file:${{java.ext.dirs}}/*" {
    permission java.security.AllPermission;
    Even with these granted permissions, I'm getting problems to work with the security provider that I have installed. Also, with these permissions I should be able to install the security provider.
    log:
    <record>
    <date>2012-03-13T12:13:39</date>
    <millis>1331637219126</millis>
    <sequence>17</sequence>
    <logger>appletpdf.appletPdf</logger>
    <level>SEVERE</level>
    <class>appletpdf.appletPdf</class>
    <method>applTest</method>
    <thread>11</thread>
    <message>excepcion: {0} </message>
    <exception>
    <message>java.security.AccessControlException: access denied (java.security.SecurityPermission authProvider.SunPKCS11-Provider-name)</message>
    <frame>
    <class>java.security.AccessControlContext</class>
    <method>checkPermission</method>
    <line>393</line>
    </frame>
    <frame>
    <class>java.security.AccessController</class>
    <method>checkPermission</method>
    <line>553</line>
    </frame>
    <frame>
    <class>java.lang.SecurityManager</class>
    <method>checkPermission</method>
    <line>549</line>
    </frame>
    <frame>
    <class>net.sourceforge.jnlp.runtime.JNLPSecurityManager</class>
    <method>checkPermission</method>
    <line>250</line>
    </frame>
    <frame>
    <class>sun.security.pkcs11.SunPKCS11</class>
    <method>login</method>
    <line>1036</line>
    </frame>
    <frame>
    <class>sun.security.pkcs11.P11KeyStore</class>
    <method>login</method>
    <line>874</line>
    </frame>
    <frame>
    <class>sun.security.pkcs11.P11KeyStore</class>
    <method>engineLoad</method>
    <line>764</line>
    </frame>
    <frame>
    <class>java.security.KeyStore</class>
    <method>load</method>
    <line>1201</line>
    </frame>
    <frame>
    <class>apppdf.appPdf</class>
    <method>tPKCS11</method>
    <line>174</line>
    </frame>
    <frame>
    <class>appletpdf.appletPdf</class>
    <method>applTest</method>
    <line>137</line>
    </frame>
    <frame>
    <class>appletpdf.appletPdf</class>
    <method>initapplDPdf</method>
    <line>116</line>
    </frame>
    <frame>
    <class>sun.reflect.NativeMethodAccessorImpl</class>
    <method>invoke0</method>
    </frame>
    <frame>
    <class>sun.reflect.NativeMethodAccessorImpl</class>
    <method>invoke</method>
    <line>57</line>
    </frame>
    <frame>
    <class>sun.reflect.DelegatingMethodAccessorImpl</class>
    <method>invoke</method>
    <line>43</line>
    </frame>
    <frame>
    <class>java.lang.reflect.Method</class>
    <method>invoke</method>
    <line>616</line>
    </frame>
    <frame>
    <class>sun.applet.PluginAppletSecurityContext$4</class>
    <method>run</method>
    <line>699</line>
    </frame>
    <frame>
    <class>java.security.AccessController</class>
    <method>doPrivileged</method>
    </frame>
    <frame>
    <class>sun.applet.PluginAppletSecurityContext</class>
    <method>handleMessage</method>
    <line>696</line>
    </frame>
    <frame>
    <class>sun.applet.AppletSecurityContextManager</class>
    <method>handleMessage</method>
    <line>69</line>
    </frame>
    <frame>
    <class>sun.applet.PluginStreamHandler</class>
    <method>handleMessage</method>
    <line>273</line>
    </frame>
    <frame>
    <class>sun.applet.PluginMessageHandlerWorker</class>
    <method>run</method>
    <line>82</line>
    </frame>
    </exception>
    </record>
    Fails in the line where the KeyStore is loading:(Pin is correct)
    KeyStore myKeyStore=null;
    Provider p = Security.getProvider("SunPKCS11-Provider-Name");
    myKeyStore = KeyStore.getInstance("PKCS11",p);
    char[] pinData = pin.toCharArray();
    myKeyStore.load(null, pinData);
    Any help would be apreciated.
    Thank you.
    Bye

    Thank you for your information, Frank, as it clarifies part of my confusion. However, there are a couple more loose ends I'd love to address before I mark your responses as answers.
    Do backup and restore privileges apply at all over a network mount created via "net use"?
    The network mount requires a username and password for the destination machine. Assuming the destination machine is a Windows box with a simple CIFS share, how does this user affect our permissions and access? Do we end up effectively impersonating this
    user, or is the access check still done with our sync process's run-as user?
    We require that both our configured run-as user for our sync process *and* the credentials passed to the network mount be administrator users of the local system and destination system, respectively, meaning they're in of the "BUILTIN\Administrators,
    S-1-5-32-544" group.
    On re-syncs, the destination file will exist and since we don't have the ability to read the ACL in all cases (we're running as one user, the file is owned by another user, and we aren't specified in the ACL in any way), we aren't able to determine if the
    file has changed. Is it possible to determine the owner of this file in this case? Preferably, we'd obtain the entire SDDL.
    My proposed plan is to interpret access denied as a difference requiring re-sync, resulting in us taking ownership of the file, granting ourselves access, determining if there are data differences, and then re-syncing the metadata as appropriate.

  • Security Provider(JAAS chaine module)logging with SAP J2EE Agent Policy 2.2

    Hello,
    I have installed and configured a SAP J2EE Policy Agent 2.2 on a SAP J2EE Application Server 7.0 and installed an opensso 8.0.
    I have configured and deployed a jsp application with the descriptor containing the agent filter on the SAP J2EE.
    I have configured the security provider (based on JAAS) as follows:
    EvaluateTicketModule
    AmSAPWASLoginModule
    CreateTicketLoginModule
    I have then increased the severity check of logging on the SAP J2EE Application Server for:
    com.sap.security.server.jaas
    com.sap.engine.services.security
    But since the installation of the agent, I am not able to see the logs of the different logon modules and be sure that the CreateLoginModule has been done.
    I need to check that after the success of the agent login module, it goes through the CreateTicketLoginModule, how can I check that.
    Thanks,
    Tanguy Mezzano
    amFilter log:
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: Notification Task Handler
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: Port Check Task Handler
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    PortCheckTaskHandler: request is on valid port
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: FQDN Task Handler
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    FQDNHelper: Incoming Server Name: [myserver] Result: null
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: Not Enforced List Task Handler
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    NotenforcedURIHelper.isNotEnforced(/myApp.jsp) found in enforced cache
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    NotenforcedURIHelper.isNotEnforced(/myApp.jsp) => false
    11/13/2008 06:02:39:810 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: SSO Task Handler
    11/13/2008 06:02:40:122 PM CET: SAPEngine_Application_Thread[impl:3]_35
    SSOTaskHandler: SSO Validation successful for id=myUser,ou=user,dc=myCompany,dc=com
    11/13/2008 06:02:40:122 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: URL Policy Task Handler
    11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
    URLPolicyTaskHandler: access allowed by AmWebPolicy
    11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: now processing: Redirect Check Result Handler
    11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
    RedirectCheckResultHandler: removing redirect counter cookie
    11/13/2008 06:02:40:310 PM CET: SAPEngine_Application_Thread[impl:3]_35
    AmFilter: result =>
    FilterResult:
    Status : CONTINUE
    RedirectURL : null
    RequestHelper:
    null
    Data:
    null
    -----------------------------------------------------------

    I want to use my login page in BEA instead of Access Manager or Distributed Authentication Module. I think it is similar to the problem you have? Did you come up with a solution?
    My problem is described in more detail on this thread:
    http://forum.java.sun.com/thread.jspa?threadID=5197783

  • Security Provider Issues

    Because of performance issues, we have a security provider that has a native back end. All the core pieces are implemented (SHA1, SHA256, RSA, DSA, etc.). However, when I add the new provider to the top of the list in java.security and start an app with signed jars. My provider isn't used. Digging through the openjdk code, it appears that JarVerifier refers to ManifestEntryVerifier and SignatureFileVerifier which has it hard coded to use the Sun security provider. Does anybody know a way around that? It seems that this would make it impossible to be FIPS compliant with a certified security provider, because the code signing verification would still be done by Sun/SunRsa/SunEC.
    Bill

    Because of performance issues, we have a security provider that has a native back end. All the core pieces are implemented (SHA1, SHA256, RSA, DSA, etc.). However, when I add the new provider to the top of the list in java.security and start an app with signed jars. My provider isn't used. Digging through the openjdk code, it appears that JarVerifier refers to ManifestEntryVerifier and SignatureFileVerifier which has it hard coded to use the Sun security provider. Does anybody know a way around that? It seems that this would make it impossible to be FIPS compliant with a certified security provider, because the code signing verification would still be done by Sun/SunRsa/SunEC.
    Bill

  • Bug in 'sun.security.provider.MD5'

    I have created a non-blocking server and a blocking client using NIO and SSLEngine.
    I have put the two in an endless read/write loop, i.e
    - the client writes to the server
    - the server reads
    - the server writes to the client
    - the client reads
    and so on...
    Everything works fine for a while, the "while" being almost constant, the I get the following exception:
    Exception in thread "Thread-0" java.lang.StackOverflowError
            at sun.security.provider.MD5.implCompress(MD5.java:129)
            at sun.security.provider.MD5.implDigest(MD5.java:92)
            at sun.security.provider.DigestBase.engineDigest(DigestBase.java:169)
            at sun.security.provider.DigestBase.engineDigest(DigestBase.java:148)
            at java.security.MessageDigest$Delegate.engineDigest(MessageDigest.java:545)
            at java.security.MessageDigest.digest(MessageDigest.java:323)
            at com.sun.crypto.provider.HmacCore.b(DashoA13*..)
            at com.sun.crypto.provider.HmacMD5.engineDoFinal(DashoA13*..)
            at javax.crypto.Mac.doFinal(DashoA13*..)
            at com.sun.net.ssl.internal.ssl.MAC.compute(MAC.java:172)
            at com.sun.net.ssl.internal.ssl.MAC.compute(MAC.java:136)
            at com.sun.net.ssl.internal.ssl.EngineInputRecord.checkMAC(EngineInputRecord.java:193)
            at com.sun.net.ssl.internal.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:881)
            at com.sun.net.ssl.internal.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:791)
            at com.sun.net.ssl.internal.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:667)
            at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:607)
            at pt.jmdsc.coms.SSLChannel.read(SSLChannel.java:126)This seems to be a bug in the MD5 class of the provider, has anyone come across the same issue?

    Yip I did shorten the post, the last 4 lines below keep repeating
    Exception in thread "Thread-0" java.lang.StackOverflowError
            at sun.security.provider.MD5.implCompress(MD5.java:129)
            at sun.security.provider.DigestBase.engineUpdate(DigestBase.java:116)
            at java.security.MessageDigestSpi.engineUpdate(MessageDigestSpi.java:97)
            at java.security.MessageDigest$Delegate.engineUpdate(MessageDigest.java:541)
            at java.security.MessageDigest.update(MessageDigest.java:311)
            at com.sun.crypto.provider.HmacCore.a(DashoA13*..)
            at com.sun.crypto.provider.HmacMD5.engineUpdate(DashoA13*..)
            at javax.crypto.Mac.update(DashoA13*..)
            at com.sun.net.ssl.internal.ssl.MAC.compute(MAC.java:167)
            at com.sun.net.ssl.internal.ssl.MAC.compute(MAC.java:136)
            at com.sun.net.ssl.internal.ssl.EngineInputRecord.checkMAC(EngineInputRecord.java:193)
            at com.sun.net.ssl.internal.ssl.SSLEngineImpl.readRecord(SSLEngineImpl.java:881)
            at com.sun.net.ssl.internal.ssl.SSLEngineImpl.readNetRecord(SSLEngineImpl.java:791)
            at com.sun.net.ssl.internal.ssl.SSLEngineImpl.unwrap(SSLEngineImpl.java:667)
            at javax.net.ssl.SSLEngine.unwrap(SSLEngine.java:607)
            at pt.jmdsc.coms.SSLChannel.read(SSLChannel.java:126)
            at pt.jmdsc.coms.Client.read(Client.java:92)
            at pt.jmdsc.coms.Client.write(Client.java:85)
            at pt.jmdsc.coms.Client.read(Client.java:92)
            at pt.jmdsc.coms.Client.write(Client.java:85)
            ....

  • Configuration file for pkcs11 security provider

    Hi all,
    I'm using Mandriva 2008.0 . In the jdk 1.5.0 documentation, it is given that, the security provider pkcs11 can be configured statically by adding an entry, as shown below, in the java.security file present in the directory jre/lib/security/.
    *# configuration for security providers 1-6 ommitted*
    security.provider.7=sun.security.pkcs11.SunPKCS11 /opt/bar/cfg/pkcs11.cfg
    Where can I get the configuration file (pkcs11.cfg) from? Please direct me how to proceed.
    Thanks.

    Hi,
    I went through that Java SE6 documentation link. It describes the contents of the configuration file for pkcs11. But I couldn't find the information of where can I get the configuration file for pkcs11 security provider from.
    Thanks.

  • Custom Security Provider impossible to remove the MBean Jar File

    Hi,
    I am currently developping a custom security provider for Weblogic. I
    have deploy my Mbean File Jar on a remote server weblogic running on
    solaris. NO authentication provider for this security provider has
    been defined in the console, it means there is no link with this
    security provider. Nevertheless, when I remove the MJF the server
    crashes when starting:
    <...>
    <May 21, 2003 3:37:08 PM CEST> <Critical> <WebLogicServer> <000364>
    <Server failed during initialization.
    Exception:weblogic.management.configuration.ConfigurationException: -
    with nested exception:
    [javax.management.MBeanException: Commo type:
    be.fgov.minfin.ccff.security.provider.CCFFSimpleSampleAuthenticator is
    not loaded. Checks MJFs.]
    javax.management.MBeanException: Commo type:
    be.fgov.minfin.ccff.security.provider.CCFFSimpleSampleAuthenticator is
    not loaded. Checks MJFs.
    at weblogic.management.commo.CommoModelMBean.load(CommoModelMBean.java:588)
    at weblogic.management.commo.Commo.initInstances(Commo.java:241)
    at weblogic.management.commo.Commo.init(Commo.java:125)
    at weblogic.management.AdminServerAdmin.initializeCommo(AdminServerAdmin.java:477)
    at weblogic.management.AdminServerAdmin.initialize(AdminServerAdmin.java:108)
    at weblogic.t3.srvr.T3Srvr.initialize1(T3Srvr.java:659)
    at weblogic.t3.srvr.T3Srvr.initialize(T3Srvr.java:589)
    at weblogic.t3.srvr.T3Srvr.run(T3Srvr.java:277)
    at weblogic.Server.main(Server.java:32)
    <...>
    I have been looking through all the config file where the MJF
    (removed) could be linked but I did not find anything.
    I am really confused because with my local weblogic running on
    win2000, there is no problem to remove this MJF.
    Thx in advance,
    tiggy

    Tiggy,
    Remove the userConfig directory under your domain directory. That should
    fix the problem.
    Thanks,
    ~satya
    Tiggy wrote:
    Hi,
    I am currently developping a custom security provider for Weblogic. I
    have deploy my Mbean File Jar on a remote server weblogic running on
    solaris. NO authentication provider for this security provider has
    been defined in the console, it means there is no link with this
    security provider. Nevertheless, when I remove the MJF the server
    crashes when starting:
    <...>
    <May 21, 2003 3:37:08 PM CEST> <Critical> <WebLogicServer> <000364>
    <Server failed during initialization.
    Exception:weblogic.management.configuration.ConfigurationException: -
    with nested exception:
    [javax.management.MBeanException: Commo type:
    be.fgov.minfin.ccff.security.provider.CCFFSimpleSampleAuthenticator is
    not loaded. Checks MJFs.]
    javax.management.MBeanException: Commo type:
    be.fgov.minfin.ccff.security.provider.CCFFSimpleSampleAuthenticator is
    not loaded. Checks MJFs.
    at weblogic.management.commo.CommoModelMBean.load(CommoModelMBean.java:588)
    at weblogic.management.commo.Commo.initInstances(Commo.java:241)
    at weblogic.management.commo.Commo.init(Commo.java:125)
    at weblogic.management.AdminServerAdmin.initializeCommo(AdminServerAdmin.java:477)
    at weblogic.management.AdminServerAdmin.initialize(AdminServerAdmin.java:108)
    at weblogic.t3.srvr.T3Srvr.initialize1(T3Srvr.java:659)
    at weblogic.t3.srvr.T3Srvr.initialize(T3Srvr.java:589)
    at weblogic.t3.srvr.T3Srvr.run(T3Srvr.java:277)
    at weblogic.Server.main(Server.java:32)
    <...>
    I have been looking through all the config file where the MJF
    (removed) could be linked but I did not find anything.
    I am really confused because with my local weblogic running on
    win2000, there is no problem to remove this MJF.
    Thx in advance,
    tiggy

Maybe you are looking for

  • LOADER COMPONENT ISSUE

    I noticed that when using the Loader component in Flash 8 - the following issue: I have a thumbnail gallery that uses the Loader component to view the large image. when i view the site in fire fox it works perfectly (scaling the content and centering

  • HT1688 Iphone 3gs can't slide to button to access the phone

    I have tried to reboot by holding power and home button.  Also installed the latest update.  Still can't slide the button on the screen.  Also can't slide the button to turn off the phone.  What can I do to fix this?  Thanks.

  • Convert Date in dd-MM-yy format

    I am taking parameter as date in front end and I am comparing it with database through view object through executeParams. But both the date formats are different, that's why I can't compare both formats. Please suggest me to compare both formats in d

  • Blank page after submitting.

    Hi all the Java Geeks can any one help me with this,<br> <br> I am getting a blank page after hitting the submit button. can you help me finding a solution for this in the JSP page or tell me where the error is. <br> <br> <br> <br> <br> <%@page conte

  • Final cut pro X project problem

    Hi there.... I have an unusual problem with my project..... i was working and everythig is good when FCP crashes and all of the sudden it wont open project.... it shows it but after few seconds beachball appears..... when I move project away everythi