Weblogic server 7.0 security

When I start the server (it is a admin managed server in a domain), I got this message:
[java] <Oct 16, 2002 11:47:44 AM CDT> <Error> <Security> <090158> <The Server was unable to find the private key with alias demokey at location wlDefaultKeyStore.jks on server TracFoneSrv, realm myrealm. Make sure the KeyStore exists and contains the key entry under the specified alias.>
[java] java.lang.Exception: Cannot find the private key with alias demokey in the KeyStore at location wlDefaultKeyStore.jks
[java] <Oct 16, 2002 11:47:44 AM CDT> <Alert> <WebLogicServer> <000297> <Inconsistent security configuration, java.lang.Exception: Cannot find the private key
with alias demokey in the KeyStore at location wlDefaultKeyStore.jks>
How do I know whether the keystore contains a certain key or not? I see the demokey.pem and wlDefaultKeyStore.jks both exist in the same directory for that domain.
Thank you for your help,
Bin

Hi Bin,
You can use keytool to display the contents of the keystore.
The keytool utility comes with the JDK so set your path to
include $JAVA_HOME/bin directory. Use the following command
to list all the entries in the keystore.
keytool -list -keystore <key-store-name>
You will be prompted for the keystore password.
I hope that helps.
Regards,
Tom Hegadorn
Developer Relations Engineer
BEA Support
Bin <[email protected]> wrote:
When I start the server (it is a admin managed server in a domain), I
got this message:
[java] <Oct 16, 2002 11:47:44 AM CDT> <Error> <Security> <090158>
<The Server was unable to find the private key with alias demokey at
location wlDefaultKeyStore.jks on server TracFoneSrv, realm myrealm.
Make sure the KeyStore exists and contains the key entry under the specified
alias.>
[java] java.lang.Exception: Cannot find the private key with
alias demokey in the KeyStore at location wlDefaultKeyStore.jks
[java] <Oct 16, 2002 11:47:44 AM CDT> <Alert> <WebLogicServer> <000297>
<Inconsistent security configuration, java.lang.Exception: Cannot find
the private key
with alias demokey in the KeyStore at location wlDefaultKeyStore.jks>
How do I know whether the keystore contains a certain key or not? I
see the demokey.pem and wlDefaultKeyStore.jks both exist in the same
directory for that domain.
Thank you for your help,
Bin

Similar Messages

  • Weblogic server 9.2 security and administartion

    hi all,
    i have few questions in my mind can anybody answer for these.
    1> in weblogic server 9.2 can existing infrastrcture allow to generate auto alert on going down the server instance or due to any erroe during running and that should be available to the adminstrator anywhere?if yes then how?
    2>Can we administrator decide the previlieges/access to be given to the client by setting proxy with username and passoword?If yes how?
    3>For security purpose as user logs out can we make provision to shut down the browser instead of just signing out?
    4>If i need to deploye j2ee applciation on weblogic server that is created using by some another IDE,what is the steps/points to be considered as premigration study?
    i will be thankful if anybody try to answer these questions.
    with regards
    santoh.r

    Hello User,
    You can find the application under below path
    Domain_name - Expand "Environment" and Select " Deployments " - here your application will show which are deployed in this domain.
    Please refer -http://docs.oracle.com/cd/E13222_01/wls/docs100/intro/console.html
    Regards
    Laksh

  • ADF security : How to get fnd_users list in weblogic server

    Hi All,
    I have a question related to ADF security.
    I am able to apply ADF security to the application, where users information and roles are defined in jazn.xml file.
    On deployment, users/ roles information is being successfully ported to weblogic server.
    But my requirement is to fetch users information from fnd_users table. If you have any idea as how to get the fnd_users data to weblogic, please reply.
    Thanks,
    Randhir

    Thanks John.
    I went through the link and got steps for authentication with fnd_users.
    I have one more question on this.
    Do I need to enable jazn.xml for implementing security or only the steps given in this link is sufficient?
    Since roles are also stored into fnd table, how to secure the taskflow? (roles are not defined in jazn.xml)

  • How to use security roles in Weblogic server?

    Hello Gurus,
    I am new to Weblogic server and I am trying to investigate how to make
    use of security roles in weblogic server (5.1.0). Can anyone point me
    to some documentation. Specifically, I am looking for instance level,
    and method level security and how to use it.
    Thanks for taking your time to read this e-mail.
    Thank You all in advance,
    Hari.

    You should read the security information in the Servlet 2.2 specification
    that WL 5.1 implements:
    http://java.sun.com/products/servlet/download.html
    Chapter 11 deals with declarative and programmatic security, and includes a
    section on roles:
    11.4 Roles
    A role is an abstract logical grouping of users that is defined by the
    Application Developer or
    Assembler. When the application is deployed, these roles are mapped by a
    Deployer to security
    identities, such as principals or groups, in the runtime environment.
    A servlet container enforces declarative or programmatic security for the
    principal associated with
    an incoming request based on the security attributes of that calling
    principal. For example,
    1. When a deployer has mapped a security role to a user group in the
    operational environment. The
    user group to which the calling principal belongs is retrieved from its
    security attributes. If the
    principal's user group matches the user group in the operational environment
    that the security
    role has been mapped to, the principal is in the security role.
    2. When a deployer has mapped a security role to a principal name in a
    security policy domain, the
    principal name of the calling principal is retrieved from its security
    attributes. If the principal is
    the same as the principal to which the security role was mapped, the calling
    principal is in the
    security role.
    Cameron Purdy
    http://www.tangosol.com
    "Hari" <[email protected]> wrote in message
    news:[email protected]..
    Hello Gurus,
    I am new to Weblogic server and I am trying to investigate how to make
    use of security roles in weblogic server (5.1.0). Can anyone point me
    to some documentation. Specifically, I am looking for instance level,
    and method level security and how to use it.
    Thanks for taking your time to read this e-mail.
    Thank You all in advance,
    Hari.

  • Deploying ADF application to a managed weblogic server - ADF security error

    Hi,
    Our group has written an ADF web application, which we are attempting to deploy to a managed weblogic server. Thus far, we have been unsuccessful. The application does successfully deploy to the AdminServer. Our setup:
    Weblogic version is 10.3.0. Domain name is adf_domain. We have installed the ADF (ADF version is 11.1.1.0.0), JSTL(1.2.0.1), and JSF(1.2.7.1) runtime libraries, and they are targeted to both the admin server AND the managed server, which is called CollabServer. This server communicates with the node manager and can be started and stopped via the admin console successfully. The AdminServer is on port 7101, and the CollabServer is on port 7104. We are not using SSL.
    application.xml:
    <?xml version = '1.0' encoding = 'windows-1252'?>
    <application xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
    xsi:schemaLocation="http://java.sun.com/xml/ns/javaee http://java.sun.com/xml/ns/javaee/application_5.xsd"
    version="5" xmlns="http://java.sun.com/xml/ns/javaee">
    <display-name>OracleRetailCollaboration</display-name>
    <module>
    <web>
    <web-uri>orc.war</web-uri>
    <context-root>orc</context-root>
    </web>
    </module>
    </application>
    weblogic-application.xml (as taken from the ear file):
    <?xml version = '1.0' encoding = 'windows-1252'?>
    <weblogic-application xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.bea.com/ns/weblogic/weblogic-application.xsd" xmln
    s="http://www.bea.com/ns/weblogic/weblogic-application">
    <listener>
    <listener-class>oracle.security.jps.wls.listeners.JpsApplicationLifecycleListener</listener-class>
    </listener>
    <library-ref>
    <library-name>adf.oracle.domain</library-name>
    </library-ref>
    </weblogic-application>
    weblogic.xml (as taken from the war file):
    <?xml version = '1.0' encoding = 'UTF-8'?>
    <weblogic-web-app xmlns="http://www.bea.com/ns/weblogic/weblogic-web-app" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://ww
    w.bea.com/ns/weblogic/weblogic-web-app http://www.bea.com/ns/weblogic/weblogic-web-app/1.0/weblogic-web-app.xsd">
    <container-descriptor>
    <prefer-web-inf-classes>true</prefer-web-inf-classes>
    </container-descriptor>
    <security-role-assignment>
    <role-name>valid-users</role-name>
    <principal-name>users</principal-name>
    </security-role-assignment>
    <library-ref>
    <library-name>jstl</library-name>
    <specification-version>1.2</specification-version>
    </library-ref>
    <library-ref>
    <library-name>jsf</library-name>
    <specification-version>1.2</specification-version>
    </library-ref>
    </weblogic-web-app>
    As I said, there are no deployment errors when we deploy to the admin server. However, we always see the following errors when deploying to the managed server:
    java.lang.ClassNotFoundException: oracle.security.jps.wls.listeners.JpsApplicationLifecycleListener
    etc.
    This error occurs when deploying via the <wldeploy> ant task included with weblogic, and when deploying the application manually via the admin console.
    So I removed this from weblogic-application.xml:
    <listener>
    <listener-class>oracle.security.jps.wls.listeners.JpsApplicationLifecycleListener</listener-class>
    </listener>
    Which resolved the initial error (I assume there is some sort of bug that causes this workaround to be necessary). The next error is this:
    java.lang.ClassNotFoundException: oracle.adf.share.security.authentication.AuthenticationServlet
    Again, we don't get this error when deploying to the AdminServer - ONLY the managed server CollabServer.
    web.xml:
    <servlet>
    <servlet-name>adfAuthentication</servlet-name>
    <servlet-class>oracle.adf.share.security.authentication.AuthenticationServlet</servlet-class>
    <load-on-startup>1</load-on-startup>
    </servlet>
    <servlet-mapping>
    <servlet-name>adfAuthentication</servlet-name>
    <url-pattern>/adfAuthentication/*</url-pattern>
    </servlet-mapping>
    I then added some adf jar files to the ear file, finally get this error message:
    java.lang.ClassNotFoundException: oracle.adf.share.jsp.ADFLibUtils
    Any ideas on how to resolve this? Thanks.
    Edited by: user10451099 on Apr 15, 2009 12:10 PM

    Dan,
    thanks fro reminding me :-)
    Here are the steps we had to take to get a managed WLS to run an adf application without copying any jar in the domain/lib directory:
    1. you still have to install the adf runtime to any server you want the adf application to deploy to
    2. open the admin console, select the managed server, and select the 'server start' tab in configutation settings.
    3. add /u01/bea/patch_wls1030/profiles/default/sys_manifest_classpath/weblogic_patch.jar:/u01/bea/patch_jdev1111/profiles/default/sys_manifest_classpath/weblogic_patch.jar:
    /u01/bea/patch_cie660/profiles/default/sys_manifest_classpath/weblogic_patch.jar:/u01/bea/jrockit_160_05/lib/tools.jar:/u01/bea/wlserver_103/server/lib/weblogic_sp.jar:
    /u01/bea/wlserver_103/server/lib/weblogic.jar:/u01/bea/modules/features/weblogic.server.modules_10.3.0.0.jar:/u01/bea/wlserver_103/server/lib/webservices.jar:
    /u01/bea/modules/org.apache.ant_1.6.5/lib/ant-all.jar:/u01/bea/modules/net.sf.antcontrib_1.0.0.0_1-0b2/lib/ant-contrib.jar:/u01/bea/jdeveloper/modules/features/adf.share_11.1.1.jar:
    /u01/bea/wlserver_103/common/eval/pointbase/lib/pbclient57.jar:/u01/bea/wlserver_103/server/lib/xqrl.jar:
    /u01/bea/patch_wls1030/profiles/default/sysext_manifest_classpath/weblogic_ext_patch.jar to the classpath edit box you have to change '/u01/bea/' with your bea home. The classpath should be on one line without the CR/LF i put in to make it readable.
    4. add -Xms256m -Xmx512m -da -Dplatform.home=/u01/bea/wlserver_103 -Dwls.home=/u01/bea/wlserver_103/server -Dweblogic.home=/u01/bea/wlserver_103/server
    -Ddomain.home=/u01/bea/user_projects/domains/naa_qs -Doracle.home=/u01/bea/jdeveloper -Doracle.security.jps.config=/u01/bea/user_projects/domains/naa_qs/config/oracle/jps-config.xml
    -Doracle.dms.context=OFF -Djava.protocol.handler.pkgs=oracle.mds.net.protocol -Dweblogic.management.discover=false -Dweblogic.management.server=http://localhost:7001
    -Dwlw.iterativeDev=false -Dwlw.testConsole=false -Dwlw.logErrorsToConsole=
    -Dweblogic.ext.dirs=/u01/bea/patch_wls1030/profiles/default/sysext_manifest_classpath:/u01/bea/patch_jdev1111/profiles/default/sysext_manifest_classpath:/u01/bea/patch_cie660/profiles/default/sysext_manifest_classpath
    -Dweblogic.management.username=weblogic -Dweblogic.management.password=******** -Dweblogic.Name=GESTIS_QS
    -Djava.security.policy=/u01/bea/wlserver_103/server/lib/weblogic.policy to the 'Arguments' edit box. As with the calsspath change '/u01/bea' to your bea home and change the domain name (in our case 'naa_qs') to your domain name. change the managementuser and passwort to your needs. As whith the classpath I put some CR/LF into the code section to make it readable.
    5. save the changes and restart the server
    Essentially all we copied the arguments from the admin server start script in addition to adding the class path.
    Timo

  • Problem in loading OPSS security provider: Cannot read from policy store  Error getting while starting weblogic server

    [JavaPolicyProvider]: System Property [java.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [oracle.deployed.app.ext => \-]
    [JavaPolicyProvider]: System Property [sun.java.launcher => SUN_STANDARD]
    [JavaPolicyProvider]: System Property [sun.management.compiler => HotSpot Client Compiler]
    [JavaPolicyProvider]: System Property [java.security.debug => jpspolicy]
    [JavaPolicyProvider]: System Property [oracle.core.ojdl.logging.usercontextprovider => oracle.core.ojdl.logging.impl.UserContextImpl]
    [JavaPolicyProvider]: System Property [os.name => Windows 7]
    [JavaPolicyProvider]: System Property [sun.boot.class.path => D:\ORACLE~1.6_M\JDK160~1\jre\lib\resources.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\rt.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\sunrsasign.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\jsse.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\jce.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\charsets.jar;D:\ORACLE~1.6_M\JDK160~1\jre\lib\modules\jdk.boot.jar;D:\ORACLE~1.6_M\JDK160~1\jre\classes]
    [JavaPolicyProvider]: System Property [sun.desktop => windows]
    [JavaPolicyProvider]: System Property [java.vm.specification.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [java.runtime.version => 1.6.0_24-b50]
    [JavaPolicyProvider]: System Property [igf.arisidbeans.carmlloc => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\carml]
    [JavaPolicyProvider]: System Property [oracle.domain.config.dir => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1]
    [JavaPolicyProvider]: System Property [weblogic.Name => DefaultServer]
    [JavaPolicyProvider]: System Property [user.name => SudhanshuG]
    [JavaPolicyProvider]: System Property [DebugOPSSPolicyLoading => true]
    [JavaPolicyProvider]: System Property [java.naming.factory.initial => weblogic.jndi.WLInitialContextFactory]
    [JavaPolicyProvider]: System Property [user.language => en]
    [JavaPolicyProvider]: System Property [jrockit.optfile => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jrf_11.1.1\jrocket_optfile.txt]
    [JavaPolicyProvider]: System Property [sun.boot.library.path => D:\ORACLE~1.6_M\JDK160~1\jre\bin]
    [JavaPolicyProvider]: System Property [domain.home => D:\JDevSys\SYSTEM~1.92\DEFAUL~1]
    [JavaPolicyProvider]: System Property [igf.arisidstack.home => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\arisidprovider]
    [JavaPolicyProvider]: System Property [wlw.testConsole => ]
    [JavaPolicyProvider]: System Property [wlw.iterativeDev => ]
    [JavaPolicyProvider]: System Property [jps.combiner.optimize => true]
    [JavaPolicyProvider]: System Property [jps.auth => ACC]
    [JavaPolicyProvider]: System Property [java.version => 1.6.0_24]
    [JavaPolicyProvider]: System Property [user.timezone => Asia/Calcutta]
    [JavaPolicyProvider]: System Property [sun.arch.data.model => 32]
    [JavaPolicyProvider]: System Property [javax.rmi.CORBA.UtilClass => weblogic.iiop.UtilDelegateImpl]
    [JavaPolicyProvider]: System Property [java.endorsed.dirs => D:\ORACLE~1.6_M\JDK160~1\jre\lib\endorsed]
    [JavaPolicyProvider]: System Property [vde.home => D:\JDevSys\system11.1.1.6.38.61.92\DefaultDomain\servers\DefaultServer\data\ldap]
    [JavaPolicyProvider]: System Property [jps.combiner.optimize.lazyeval => true]
    [JavaPolicyProvider]: System Property [sun.cpu.isalist => pentium_pro+mmx pentium_pro pentium+mmx pentium i486 i386 i86]
    [JavaPolicyProvider]: System Property [sun.jnu.encoding => Cp1252]
    [JavaPolicyProvider]: System Property [file.encoding.pkg => sun.io]
    [JavaPolicyProvider]: System Property [wlw.logErrorsToConsole => ]
    [JavaPolicyProvider]: System Property [file.separator => \]
    [JavaPolicyProvider]: System Property [java.specification.name => Java Platform API Specification]
    [JavaPolicyProvider]: System Property [java.class.version => 50.0]
    [JavaPolicyProvider]: System Property [weblogic.home => D:\ORACLE~1.6_M\WLSERV~1.3\server]
    [JavaPolicyProvider]: System Property [user.country => IN]
    [JavaPolicyProvider]: System Property [java.home => D:\ORACLE~1.6_M\JDK160~1\jre]
    [JavaPolicyProvider]: System Property [platform.home => D:\ORACLE~1.6_M\WLSERV~1.3]
    [JavaPolicyProvider]: System Property [java.vm.info => mixed mode]
    [JavaPolicyProvider]: System Property [os.version => 6.1]
    [JavaPolicyProvider]: System Property [org.omg.CORBA.ORBSingletonClass => weblogic.corba.orb.ORB]
    [JavaPolicyProvider]: System Property [path.separator => ;]
    [JavaPolicyProvider]: System Property [java.vm.version => 19.1-b02]
    [JavaPolicyProvider]: System Property [weblogic.alternateTypesDirectory => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.ossoiap_11.1.1,D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.oamprovider_11.1.1]
    [JavaPolicyProvider]: System Property [user.variant => ]
    [JavaPolicyProvider]: System Property [java.protocol.handler.pkgs => oracle.mds.net.protocol|weblogic.net]
    [JavaPolicyProvider]: System Property [oracle.deployed.app.dir => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\servers\DefaultServer\tmp\_WL_user]
    [JavaPolicyProvider]: System Property [wc.oracle.home => D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper]
    [JavaPolicyProvider]: System Property [java.awt.printerjob => sun.awt.windows.WPrinterJob]
    [JavaPolicyProvider]: System Property [java.security.policy => D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic.policy]
    [JavaPolicyProvider]: System Property [sun.io.unicode.encoding => UnicodeLittle]
    [JavaPolicyProvider]: System Property [awt.toolkit => sun.awt.windows.WToolkit]
    [JavaPolicyProvider]: System Property [weblogic.jdbc.remoteEnabled => false]
    [JavaPolicyProvider]: System Property [weblogic.nodemanager.ServiceEnabled => true]
    [JavaPolicyProvider]: System Property [java.naming.factory.url.pkgs => weblogic.jndi.factories:weblogic.corba.j2ee.naming.url:weblogic.jndi.factories:weblogic.corba.j2ee.naming.url]
    [JavaPolicyProvider]: System Property [oracle.webcenter.tagging.scopeTags => false]
    [JavaPolicyProvider]: System Property [user.home => C:\Users\SudhanshuG]
    [JavaPolicyProvider]: System Property [wls.home => D:\ORACLE~1.6_M\WLSERV~1.3\server]
    [JavaPolicyProvider]: System Property [java.specification.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [oracle.server.config.dir => D:\JDevSys\SYSTEM~1.92_\DEFAUL~1\config\FMWCON~1\servers\DefaultServer]
    [JavaPolicyProvider]: System Property [java.library.path => D:\ORACLE~1.6_M\JDK160~1\bin;.;C:\Windows\Sun\Java\bin;C:\Windows\system32;C:\Windows;D:\ORACLE~1.6_M\patch_wls1035\profiles\default\native;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\native;D:\ORACLE~1.6_M\WLSERV~1.3\server\native\win\32;D:\ORACLE~1.6_M\WLSERV~1.3\server\bin;D:\ORACLE~1.6_M\modules\ORGAPA~1.1\bin;D:\ORACLE~1.6_M\JDK160~1\jre\bin;D:\ORACLE~1.6_M\JDK160~1\bin;D:\oraclexe\app\oracle\product\10.2.0\server\bin;C:\Windows\system32;C:\Windows;C:\Windows\System32\Wbem;C:\Windows\System32\WindowsPowerShell\v1.0\;C:\Program Files\TortoiseSVN\bin;D:\ORACLE~1.6_M\WLSERV~1.3\server\native\win\32\oci920_8]
    [JavaPolicyProvider]: System Property [java.vendor.url => http://java.sun.com/]
    [JavaPolicyProvider]: System Property [jps.policystore.hybrid.mode => false]
    [JavaPolicyProvider]: System Property [USE_JAAS => false]
    [JavaPolicyProvider]: System Property [java.vm.vendor => Sun Microsystems Inc.]
    [JavaPolicyProvider]: System Property [java.runtime.name => Java(TM) SE Runtime Environment]
    [JavaPolicyProvider]: System Property [java.class.path => D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jdbc_11.1.1\ojdbc6dms.jar;D:\ORACLE~1.6_M\patch_wls1035\profiles\default\sys_manifest_classpath\weblogic_patch.jar;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\sys_manifest_classpath\weblogic_patch.jar;D:\ORACLE~1.6_M\JDK160~1\lib\tools.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic_sp.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\weblogic.jar;D:\ORACLE~1.6_M\modules\features\weblogic.server.modules_10.3.5.0.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\webservices.jar;D:\ORACLE~1.6_M\modules\ORGAPA~1.1/lib/ant-all.jar;D:\ORACLE~1.6_M\modules\NETSFA~1.0_1/lib/ant-contrib.jar;D:\JDevSys\SYSTEM~1.92\DEFAUL~1\wcps-lib\derby-10.6.1.0.jar;D:\JDevSys\SYSTEM~1.92\DEFAUL~1\wcps-lib\derbytools-10.6.1.0.jar;D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper\webcenter\modules\oracle.portlet.server_11.1.1\oracle-portlet-api.jar;D:\ORACLE~1.6_M\ORACLE~1\modules\oracle.jrf_11.1.1\jrf.jar;D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper\webcenter\modules\wcps_11.1.1.4.0\wcps-connection-mbeans.jar;D:\ORACLE~1.6_M\WLSERV~1.3\common\derby\lib\derbyclient.jar;D:\ORACLE~1.6_M\WLSERV~1.3\server\lib\xqrl.jar]
    [JavaPolicyProvider]: System Property [oracle.security.jps.config => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\config\fmwconfig\jps-config.xml]
    [JavaPolicyProvider]: System Property [java.vm.specification.name => Java Virtual Machine Specification]
    [JavaPolicyProvider]: System Property [javax.rmi.CORBA.PortableRemoteObjectClass => weblogic.iiop.PortableRemoteObjectDelegateImpl]
    [JavaPolicyProvider]: System Property [java.vm.specification.version => 1.0]
    [JavaPolicyProvider]: System Property [sun.cpu.endian => little]
    [JavaPolicyProvider]: System Property [sun.os.patch.level => Service Pack 1]
    [JavaPolicyProvider]: System Property [portlet.oracle.home => D:\Oracle_Jdev11.1.1.6_Middleware_Home\jdeveloper]
    [JavaPolicyProvider]: System Property [java.io.tmpdir => C:\Users\SUDHAN~1\AppData\Local\Temp\]
    [JavaPolicyProvider]: System Property [jrf.version => 11.1.1]
    [JavaPolicyProvider]: System Property [oracle.webcenter.analytics.disable-native-partitioning => false]
    [JavaPolicyProvider]: System Property [java.vendor.url.bug => http://java.sun.com/cgi-bin/bugreport.cgi]
    [JavaPolicyProvider]: System Property [jps.app.credential.overwrite.allowed => true]
    [JavaPolicyProvider]: System Property [os.arch => x86]
    [JavaPolicyProvider]: System Property [java.awt.graphicsenv => sun.awt.Win32GraphicsEnvironment]
    [JavaPolicyProvider]: System Property [java.ext.dirs => D:\ORACLE~1.6_M\JDK160~1\jre\lib\ext;C:\Windows\Sun\Java\lib\ext]
    [JavaPolicyProvider]: System Property [user.dir => D:\JDevSys\system11.1.1.6.38.61.92\DefaultDomain]
    [JavaPolicyProvider]: System Property [common.components.home => D:\ORACLE~1.6_M\ORACLE~1]
    [JavaPolicyProvider]: System Property [weblogic.ext.dirs => D:\ORACLE~1.6_M\patch_wls1035\profiles\default\sysext_manifest_classpath;D:\ORACLE~1.6_M\patch_jdev1111\profiles\default\sysext_manifest_classpath]
    [JavaPolicyProvider]: System Property [wsm.repository.path => D:\JDevSys\SYSTEM~1.92\DEFAUL~1\oracle\store\gmds]
    [JavaPolicyProvider]: System Property [line.separator =>
    [JavaPolicyProvider]: System Property [java.vm.name => Java HotSpot(TM) Client VM]
    [JavaPolicyProvider]: System Property [org.apache.commons.logging.Log => org.apache.commons.logging.impl.Jdk14Logger]
    [JavaPolicyProvider]: System Property [weblogic.management.discover => true]
    [JavaPolicyProvider]: System Property [org.omg.CORBA.ORBClass => weblogic.corba.orb.ORB]
    [JavaPolicyProvider]: System Property [file.encoding => Cp1252]
    [JavaPolicyProvider]: System Property [weblogic.classloader.preprocessor => weblogic.diagnostics.instrumentation.DiagnosticClassPreProcessor]
    [JavaPolicyProvider]: System Property [java.specification.version => 1.6]
    [JavaPolicyProvider]: System Property [javax.net.ssl.trustStore => D:\Oracle_Jdev11.1.1.6_Middleware_Home\wlserver_10.3\server\lib\DemoTrust.jks]
    policy: reading file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/weblogic.policy
    java.lang.IllegalArgumentException: null KeyStore name
        at sun.security.util.PolicyUtil.getKeyStore(PolicyUtil.java:65)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:635)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:546)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/../modules/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/-
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/ORACLE~1/modules/oracle.jps_11.1.1/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/ORACLE~1/modules/oracle.pki_11.1.1/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/EJB
    policy:   (java.lang.RuntimePermission queuePrintJob)
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/Web
    policy:   (java.lang.RuntimePermission loadLibrary)
    policy:   (java.lang.RuntimePermission queuePrintJob)
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read,write)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\..\- read)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/weblogic/application/defaults/Connector
    policy:   (java.net.SocketPermission * connect,resolve)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\- read,write)
    policy:   (java.io.FilePermission WEBLOGIC-APPLICATION-ROOT\..\- read)
    policy:   (java.util.PropertyPermission * read)
    policy:   (java.lang.management.ManagementPermission control)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/C:/Windows/Sun/Java/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Administrators
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Deployers
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Operators
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSGroupImpl/Monitors
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   weblogic.security.principal.WLSKernelIdentity/*
    policy:   (javax.management.MBeanPermission * addNotificationListener)
    policy:   (javax.management.MBeanPermission * removeNotificationListener)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   (java.util.PropertyPermission java.version read)
    policy:   (java.util.PropertyPermission java.vendor read)
    policy:   (java.util.PropertyPermission java.vendor.url read)
    policy:   (java.util.PropertyPermission java.class.version read)
    policy:   (java.util.PropertyPermission os.name read)
    policy:   (java.util.PropertyPermission os.version read)
    policy:   (java.util.PropertyPermission os.arch read)
    policy:   (java.util.PropertyPermission file.separator read)
    policy:   (java.util.PropertyPermission path.separator read)
    policy:   (java.util.PropertyPermission line.separator read)
    policy:   (java.util.PropertyPermission java.specification.version read)
    policy:   (java.util.PropertyPermission java.specification.vendor read)
    policy:   (java.util.PropertyPermission java.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.specification.version read)
    policy:   (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   (java.util.PropertyPermission java.vm.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.version read)
    policy:   (java.util.PropertyPermission java.vm.vendor read)
    policy:   (java.util.PropertyPermission java.vm.name read)
    policy:
    policy: reading file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/security/java.policy
    java.lang.IllegalArgumentException: null KeyStore name
        at sun.security.util.PolicyUtil.getKeyStore(PolicyUtil.java:65)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:635)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:587)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/D:/ORACLE~1.6_M/JDK160~1/jre/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase file:/C:/Windows/Sun/Java/lib/ext/*
    policy:   (java.security.AllPermission <all permissions> <all actions>)
    policy:
    policy: Adding policy entry:
    policy:   signedBy null
    policy:   codeBase null
    policy:   (java.lang.RuntimePermission stopThread)
    policy:   (java.net.SocketPermission localhost:1024- listen,resolve)
    policy:   (java.util.PropertyPermission java.version read)
    policy:   (java.util.PropertyPermission java.vendor read)
    policy:   (java.util.PropertyPermission java.vendor.url read)
    policy:   (java.util.PropertyPermission java.class.version read)
    policy:   (java.util.PropertyPermission os.name read)
    policy:   (java.util.PropertyPermission os.version read)
    policy:   (java.util.PropertyPermission os.arch read)
    policy:   (java.util.PropertyPermission file.separator read)
    policy:   (java.util.PropertyPermission path.separator read)
    policy:   (java.util.PropertyPermission line.separator read)
    policy:   (java.util.PropertyPermission java.specification.version read)
    policy:   (java.util.PropertyPermission java.specification.vendor read)
    policy:   (java.util.PropertyPermission java.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.specification.version read)
    policy:   (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   (java.util.PropertyPermission java.vm.specification.name read)
    policy:   (java.util.PropertyPermission java.vm.version read)
    policy:   (java.util.PropertyPermission java.vm.vendor read)
    policy:   (java.util.PropertyPermission java.vm.name read)
    policy:
    policy: reading file:/C:/Users/SudhanshuG/.java.policy
    policy: error parsing file:/C:/Users/SudhanshuG/.java.policy
    policy: java.io.FileNotFoundException: C:\Users\SudhanshuG\.java.policy (The system cannot find the file specified)
    java.io.FileNotFoundException: C:\Users\SudhanshuG\.java.policy (The system cannot find the file specified)
        at java.io.FileInputStream.open(Native Method)
        at java.io.FileInputStream.<init>(FileInputStream.java:106)
        at java.io.FileInputStream.<init>(FileInputStream.java:66)
        at sun.security.util.PolicyUtil.getInputStream(PolicyUtil.java:43)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:626)
        at sun.security.provider.PolicyFile.access$400(PolicyFile.java:266)
        at sun.security.provider.PolicyFile$3.run(PolicyFile.java:587)
        at java.security.AccessController.doPrivileged(Native Method)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:519)
        at sun.security.provider.PolicyFile.initPolicyFile(PolicyFile.java:505)
        at sun.security.provider.PolicyFile.init(PolicyFile.java:464)
        at sun.security.provider.PolicyFile.<init>(PolicyFile.java:309)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at java.security.Policy.getPolicyNoCheck(Policy.java:167)
        at java.security.ProtectionDomain.implies(ProtectionDomain.java:224)
        at java.security.AccessControlContext.checkPermission(AccessControlContext.java:352)
        at java.security.AccessController.checkPermission(AccessController.java:546)
        at oracle.security.jps.util.JpsAuth$AuthorizationMechanism$3.checkPermission(JpsAuth.java:458)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:518)
        at oracle.security.jps.util.JpsAuth.checkPermission(JpsAuth.java:544)
        at oracle.security.jps.internal.credstore.util.CsfUtil.checkPermission(CsfUtil.java:643)
        at oracle.security.jps.internal.credstore.ssp.SspCredentialStore.containsCredential(SspCredentialStore.java:320)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:176)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker$3.run(FileKeyStoreIntegrityChecker.java:174)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.CsContainsHash(FileKeyStoreIntegrityChecker.java:174)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreIntegrityChecker.<init>(FileKeyStoreIntegrityChecker.java:81)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.<init>(FileKeyStoreManager.java:165)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreManager.getInstance(FileKeyStoreManager.java:146)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.doInit(FileKeyStoreServiceImpl.java:95)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:76)
        at oracle.security.jps.internal.keystore.file.FileKeyStoreServiceImpl.<init>(FileKeyStoreServiceImpl.java:66)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:157)
        at oracle.security.jps.internal.keystore.KeyStoreProvider.getInstance(KeyStoreProvider.java:64)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.findServiceInstance(ContextFactoryImpl.java:139)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:170)
        at oracle.security.jps.internal.core.runtime.ContextFactoryImpl.getContext(ContextFactoryImpl.java:191)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:132)
        at oracle.security.jps.internal.core.runtime.JpsContextFactoryImpl.getContext(JpsContextFactoryImpl.java:127)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2827)
        at oracle.security.jps.internal.policystore.PolicyUtil$2.run(PolicyUtil.java:2821)
        at java.security.AccessController.doPrivileged(Native Method)
        at oracle.security.jps.internal.policystore.PolicyUtil.getDefaultPDPService(PolicyUtil.java:2821)
        at oracle.security.jps.internal.policystore.PolicyUtil.getPDPService(PolicyUtil.java:3097)
        at oracle.security.jps.internal.policystore.PolicyDelegationController.<init>(PolicyDelegationController.java:164)
        at oracle.security.jps.internal.policystore.JavaPolicyProvider.<init>(JavaPolicyProvider.java:369)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
        at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstructorAccessorImpl.java:39)
        at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingConstructorAccessorImpl.java:27)
        at java.lang.reflect.Constructor.newInstance(Constructor.java:513)
        at java.lang.Class.newInstance0(Class.java:355)
        at java.lang.Class.newInstance(Class.java:308)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.loadOPSSPolicy(CommonSecurityServiceManagerDelegateImpl.java:1339)
        at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.initialize(CommonSecurityServiceManagerDelegateImpl.java:1018)
        at weblogic.security.service.SecurityServiceManager.initialize(SecurityServiceManager.java:873)
        at weblogic.security.SecurityService.start(SecurityService.java:141)
        at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:209)
        at weblogic.work.ExecuteThread.run(ExecuteThread.java:178)
    policy: getPermissions:
        PD CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
        PD ClassLoader: sun.misc.Launcher$AppClassLoader@1172e08
        PD Principals: <no principals>
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/modules/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.security.AllPermission <all permissions> <all actions>)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.pki_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/EJB <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Web <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Connector <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Administrators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Deployers]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Operators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Monitors]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSKernelIdentity/*]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-api.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.lang.RuntimePermission stopThread)
    policy:   granting (java.net.SocketPermission localhost:1024- listen,resolve)
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: getPermissions:
        PD CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
        PD ClassLoader: sun.misc.Launcher$AppClassLoader@1172e08
        PD Principals: <no principals>
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/modules/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/server/ext/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/patch_wls1035/profiles/default/sysext_manifest_classpath%3bD:/ORACLE~1.6_M/patch_jdev1111/profiles/default/sysext_manifest_classpath/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/wlserver_10.3/common/eval/pointbase/lib/- <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.security.AllPermission <all permissions> <all actions>)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.pki_11.1.1/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/EJB <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Web <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/weblogic/application/defaults/Connector <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/C:/Windows/Sun/Java/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/jdk160_24/jre/lib/ext/* <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluation (codesource) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Administrators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Deployers]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Operators]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSGroupImpl/Monitors]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: [weblogic.security.principal.WLSKernelIdentity/*]
        Active Principals: []
    policy: evaluation (principals) failed
    policy: evaluate codesources:
        Policy CodeSource: (null <no signer certificates>)
        Active CodeSource: (file:/D:/Oracle_Jdev11.1.1.6_Middleware_Home/oracle_common/modules/oracle.jps_11.1.1/jps-internal.jar <no signer certificates>)
    policy: evaluate principals:
        Policy Principals: []
        Active Principals: []
    policy:   granting (java.util.PropertyPermission java.version read)
    policy:   granting (java.util.PropertyPermission java.vendor read)
    policy:   granting (java.util.PropertyPermission java.vendor.url read)
    policy:   granting (java.util.PropertyPermission java.class.version read)
    policy:   granting (java.util.PropertyPermission os.name read)
    policy:   granting (java.util.PropertyPermission os.version read)
    policy:   granting (java.util.PropertyPermission os.arch read)
    policy:   granting (java.util.PropertyPermission file.separator read)
    policy:   granting (java.util.PropertyPermission path.separator read)
    policy:   granting (java.util.PropertyPermission line.separator read)
    policy:   granting (java.util.PropertyPermission java.specification.version read)
    policy:   granting (java.util.PropertyPermission java.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.version read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.specification.name read)
    policy:   granting (java.util.PropertyPermission java.vm.version read)
    policy:   granting (java.util.PropertyPermission java.vm.vendor read)
    policy:   granting (java.util.PropertyPermission java.vm.name read)
    policy: evaluation (codesource/principals) passed
    policy: evaluate codesources

    Hi,
    Your issue is something similar to the issue described in below metalink id. Please check below metalink id, you issue may be resolved.
    Start OMS failed with "javax.xml.stream.XMLStreamException: Premature end of file encountered" [ID 1481158.1]
    Mark if this helps you.
    Regards,
    Kishore

  • Cross Domain user security Authentication in Oracle Weblogic Server 10.3.3

    Now i have configure the cross domain user configuration in the oracle weblogic 10.3.3 server. But i am not able to configure.
    I have mentioned the below oracle document to configure the cross domain configuration.
    http://download.oracle.com/docs/cd/E12840_01/wls/docs103/secmanage/domain.html#domain_interop
    http://download.oracle.com/docs/cd/E14571_01/web.1111/e13752/toc.htm#INTRO120
    http://download.oracle.com/docs/cd/E14571_01/apirefs.1111/e13952/taskhelp/security/EnableTrustBetweenDomains.html
    http://download.oracle.com/docs/cd/E12840_01/wls/docs103/ConsoleHelp/taskhelp/security/ConfigureConnectionFiltering.html
    http://download.oracle.com/docs/cd/E12840_01/wls/docs103/security/con_filtr.html#wp1030656
    Regards,
    S.Vinoth Babu

    sorry,wrong forum
    move to Weblogic Server Section
    Edited by: inchlin on Apr 1, 2009 9:39 AM

  • Security tools for audit and penetration testing weblogic server 10.3.5.0 and other

    hi all
    is it possible please introduce me the best softwares for auditing and penetration testing on weblogic server 10.3.5 (scan the machine for finding vulnerabilities and unsecured configuration in web logic server)
    thanks for your attention
    good luck

    This is a good one
    IBM developerWorks : Download : IBM Security AppScan V8.8

  • Testing weblogic server with jdk1.4b3 -- how to configure login security manager?

    Hi got the error I include when trying to start weblogic server sp1 with new jdk1.4b3.
    Since it seems just an error of authentication, I'm wondering if it is possible
    to give a correct login configuration.
    It's just a test to see if we can use jdk1.4 for our next project with Bea Weblogic.
    Thanks,
    pakkio
    D:\bea\wlserver6.0\config\mydomain>notepad startWebLogic.cmd
    D:\bea\wlserver6.0>set PATH=.\bin;d:\apps\Oracle\Ora81\bin;C:\Programmi\Oracle\j
    re\1.1.7\bin;C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;d:\apps\Ora
    cle\Ora81\orb\bin;d:\apps\SSH
    D:\bea\wlserver6.0>set CLASSPATH=d:\bea\wlserver6.0.;D:\bea\wlser
    ver6.0\config\mydomain\applications\DefaultWebApp_myserver\WEB-INF\classes\lib\mail.jar;D:\bea\wlserver6.0\config\mydomain\applications\DefaultWebApp_myserver\W
    EB-INF\lib\jasper.jar;.\lib\weblogic_sp.jar;.\lib\weblogic.jar
    La sintassi del nome del file, della directory o del volume è incorretta.
    D:\bea\wlserver6.0>"D:\apps\jdk14b3\bin\java" -hotspot -ms64m -mx64m -classpath
    d:\bea\wlserver6.0\ext\crack.jar;.;D:\bea\wlserver6.0\config\mydomain\applicatio
    ns\DefaultWebApp_myserver\WEB-INF\classes\lib\mail.jar;D:\bea\wlserver6.0\config
    \mydomain\applications\DefaultWebApp_myserver\WEB-INF\lib\jasper.jar;.\lib\weblo
    gic_sp.jar;.\lib\weblogic.jar -Dweblogic.Domain=mydomain -Dweblogic.Name=myserve
    r "-Dbea.home=D:\bea" weblogic.Server
    java.lang.SecurityException: Impossibile trovare una configurazione di login
    at com.sun.security.auth.login.ConfigFile.<init>(ConfigFile.java:99)
    at sun.reflect.NativeConstructorAccessorImpl.newInstance0(Native Method)
    at sun.reflect.NativeConstructorAccessorImpl.newInstance(NativeConstruct
    orAccessorImpl.java:42)
    at sun.reflect.DelegatingConstructorAccessorImpl.newInstance(DelegatingC
    onstructorAccessorImpl.java:30)
    at java.lang.reflect.Constructor.newInstance(Constructor.java:277)
    at java.lang.Class.newInstance0(Class.java:301)
    at java.lang.Class.newInstance(Class.java:254)
    at javax.security.auth.login.Configuration$3.run(Configuration.java:223)
    at java.security.AccessController.doPrivileged(Native Method)
    at javax.security.auth.login.Configuration.getConfiguration(Configuratio
    n.java:217)
    at javax.security.auth.login.LoginContext$1.run(LoginContext.java:172)
    at java.security.AccessController.doPrivileged(Native Method)
    at javax.security.auth.login.LoginContext.init(LoginContext.java:169)
    at javax.security.auth.login.LoginContext.<init>(LoginContext.java:395)
    at weblogic.security.internal.ServerAuthenticate.main(ServerAuthenticate
    .java:80)
    at weblogic.t3.srvr.T3Srvr.run(T3Srvr.java:167)
    at weblogic.Server.main(Server.java:35)
    Caused by: java.io.IOException: Impossibile trovare una configurazione di login
    at com.sun.security.auth.login.ConfigFile.init(ConfigFile.java:208)
    at com.sun.security.auth.login.ConfigFile.<init>(ConfigFile.java:97)
    ... 16 more

    Did you find any solution? We have the same problem: If we define a realm in weblogic-application.xml
    <security>
    <!--
    This element names a security realm that will be used by the
    application. If no specified, then the system default realm will be
    used
    -->
    <realm-name>dmzrealm</realm-name>
    </security>
    then the following exception is logged even if there is a dmzrealm in our Weblogic configuration:
    weblogic.security.service.InvalidParameterException: [Security:090396]Security Realm dmzrealm does not exist
    at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.getSecurityServiceInternal(CommonSecurityServiceManagerDelegateImpl.java:279)
    at weblogic.security.service.CommonSecurityServiceManagerDelegateImpl.getSecurityService(CommonSecurityServiceManagerDelegateImpl.java:225)
    at weblogic.security.service.SecurityServiceManager.getSecurityService(SecurityServiceManager.java:188)
    at weblogic.application.internal.flow.SecurityRoleFlow.initSecurityService(SecurityRoleFlow.java:133)
    at weblogic.application.internal.flow.SecurityRoleFlow.prepare(SecurityRoleFlow.java:79)
    Truncated. see log file for complete stacktrace

  • SpacesWebService proxy security failure when deployed in weblogic server

    Hi all,
    I plan to use the SPacesWebservice by creating a webservices proxy. A proxy client was created and I passed on appropriate security information.
    public static void main(String[] args) {
    try {
    spacesWebService_Service = new SpacesWebService_Service();
    SpacesWebService spacesWebService = spacesWebService_Service.getSpacesWebServiceSoapHttpPort();
    Map<String, Object> requestContext = ((BindingProvider) spacesWebService).getRequestContext();
    setPortCredentialProviderList(requestContext);
    System.out.println(spacesWebService.getGroupSpaces(null));
    // Add your code to call the desired methods.
    } catch (Exception ex) {
    ex.printStackTrace();
    @Generated("Oracle JDeveloper")
    public static void setPortCredentialProviderList(Map<String, Object> requestContext) throws Exception {
    // TODO - Provide the required values
    String username = "weblogic";
    String password = "weblogic1";
    String clientKeyStore = "C:\\default-keystore.jks";
    String clientKeyStorePassword = "weblogic1";
    String clientKeyAlias = "orakey";
    String clientKeyPassword = "weblogic1";
    String serverKeyStore = "C:\\default-keystore.jks";
    String serverKeyStorePassword = "weblogic1";
    String serverKeyAlias = "orakey";
    List<CredentialProvider> credList = new ArrayList<CredentialProvider>();
    // Add the necessary credential providers to the list
    credList.add(getUNTCredentialProvider(username, password));
    credList.add(getBSTCredentialProvider(clientKeyStore, clientKeyStorePassword, clientKeyAlias, clientKeyPassword, serverKeyStore, serverKeyStorePassword, serverKeyAlias, requestContext));
    //credList.add(getSAMLTrustCredentialProvider());
    requestContext.put(WSSecurityContext.CREDENTIAL_PROVIDER_LIST, credList);
    When i run this client, just plain java, the client runs fine.
    But additionally, I created the webservice proxy in a web application, and I try to use the proxy client to invoke the webservice. However, when I deploy the web application in weblogic server, and I try to touch the SpacesWebService methods using the client then I get the following errors :
    Caused by: oracle.wsm.common.sdk.WSMException: FailedCheck : failure in security check
    at oracle.wsm.security.policy.scenario.executor.Wss11UsernameWithCertsScenarioExecutor.receiveRequest(Wss11UsernameWithCertsScenarioExecutor.java:201)
    at oracle.wsm.security.policy.scenario.executor.SecurityScenarioExecutor.execute(SecurityScenarioExecutor.java:596)
    at oracle.wsm.policyengine.impl.runtime.AssertionExecutor.execute(AssertionExecutor.java:41)
    at oracle.wsm.policyengine.impl.runtime.WSPolicyRuntimeExecutor.executeSimpleAssertion(WSPolicyRuntimeExecutor.java:666)
    at oracle.wsm.policyengine.impl.runtime.WSPolicyRuntimeExecutor.executeXorAssertion(WSPolicyRuntimeExecutor.java:477)
    at oracle.wsm.policyengine.impl.runtime.WSPolicyRuntimeExecutor.executeAndAssertion(WSPolicyRuntimeExecutor.java:336)
    at oracle.wsm.policyengine.impl.runtime.WSPolicyRuntimeExecutor.execute(WSPolicyRuntimeExecutor.java:289)
    at oracle.wsm.policyengine.impl.PolicyExecutionEngine.execute(PolicyExecutionEngine.java:102)
    at oracle.wsm.agent.WSMAgent.processCommon(WSMAgent.java:975)
    at oracle.wsm.agent.WSMAgent.processRequest(WSMAgent.java:460)
    at oracle.fabric.common.BindingSecurityInterceptor.processRequest(BindingSecurityInterceptor.java:94)
    ... 46 more
    Caused by: oracle.wsm.security.policy.scenario.policycompliance.PolicyComplianceException: WSM-00034 : Error in Encryption reference mechanism compliance : Expected : thumbprint , Actual : issuerserial. Ensure that a compatible policy is attached at the client side.
    at oracle.wsm.security.policy.scenario.policycompliance.impl.ComplianceEngine.preDecryptionCompliance(ComplianceEngine.java:223)
    at oracle.wsm.security.policy.scenario.policycompliance.impl.ComplianceEngine.checkCompliance(ComplianceEngine.java:385)
    at oracle.wsm.security.policy.scenario.processor.Wss11X509TokenProcessor.verifyRequest(Wss11X509TokenProcessor.java:882)
    at oracle.wsm.security.policy.scenario.processor.Wss11X509TokenProcessor.verify(Wss11X509TokenProcessor.java:844)
    at oracle.wsm.security.policy.scenario.processor.Wss11X509TokenProcessor.verify(Wss11X509TokenProcessor.java:808)
    at oracle.wsm.security.policy.scenario.executor.Wss11UsernameWithCertsScenarioExecutor.receiveRequest(Wss11UsernameWithCertsScenarioExecutor.java:134)
    ... 56 more
    Does anyone know why authentication is not happening only in the webapp ? (Note: the weblogic server is in the same machine. So the path to the keystore is valid)
    Edited by: user9138987 on Aug 21, 2011 3:04 PM

    The keystore is created using the following commands and the default-keystore is assigned to the weblogic domain
    keytool -genkeypair -keyalg RSA -dname "cn=spaces,dc=example,dc=com" -alias orakey -keypass weblogic1 -keystore default-keystore.jks -storepass welcome1 -validity 1064
    keytool -exportcert -v -alias orakey -keystore default-keystore.jks -storepass weblogic1 -rfc -file orakey.cer
    keytool -importcert -alias webcenter_spaces_ws -file orakey.cer -keystore default-keystore.jks -storepass weblogic1

  • How to secure webservice in weblogic server?

    Hi,
    How many ways to secure a webservice in weblogic server? and what is the purpose of SSL ?

    How to run JSP and EJB program using weblogic server

  • Security issue between weblogic server

    Hello,
    Here is security issue that we are facing.
    Here is setup
    Environment 1
    Admin server say "env1admin"
    Managed Weblogic Server say "env1managed"
    We deployed an EJB called HelloEJB in env1managed server and this has an api
    sayHello(). HelloClient is a client to HelloEJB.
    S/w Weblogic 6.1 sp3
    Environment 2
    Admin server say "env2admin"
    Managed Weblogic Server say "env2managed"
    We deployed an EJB called ServiceEJB in env2managed server and this has an api
    serviceRequest(). We use weblogic role based security and restrict access to this
    api by user HelloEJB.
    s/w Weblogic 6.1 sp3
    Here is how the system works:
    We start the env2admin, env2managed (ServiceEJB is which is a Stateless session
    EJB deployed in env2Managed)
    We start the env1admin and env1managed (HelloEJB(which is a Stateless session
    EJB is deployed in env1Managed)
    Test case:
    1)HelloClient invokes HelloEJB api sayHello().
    2)Now at this point in ejbCreate() at HelloEJB() end we get a reference to ServiceEJB
    using Jndi and the context is never closed ). HelloEJB then calls serviceRequest()
    api in ServiceEJB. Then gets back a response and then returns response to HelloClient.
    Now if we repeat the above testcase.
    After step1 in step2 HelloEJB though has all the permissions to invoke api on
    ServiceEJB gets an SecurityException.
    Question is why doe this happen. Only way HelloEJB can make api calls to serviceEJB
    is by making a lookup() every single time. Which is very expensive. I looked at
    documents what they say is leave the context open and never close it. Though I
    am doing that I am getting this exception.
    Any thoughts ?
    Thanks in advance,
    Vijay

    Here are the details of exception stack trace:
    java.rmi.AccessException: Security violation: insufficient permission to access
    method; nested exception is:
    java.lang.SecurityException: Security violation: insufficient permission
    to access method
    java.lang.SecurityException: Security violation: insufficient permission to access
    method
    at weblogic.ejb20.internal.BaseEJBObject.preInvoke(BaseEJBObject.java:92)
    at weblogic.ejb20.internal.StatelessEJBObject.preInvoke(StatelessEJBObject.java:63)
    at service.ServiceBean_nr0s19_EOImpl.sendServiceRequest(ServiceBean_nr0s19_EOImpl.java:25)
    at service.ServiceBean_nr0s19_EOImpl_WLSkel.invoke(Unknown Source)
    at weblogic.rmi.internal.BasicServerRef.invoke(BasicServerRef.java:298)
    at weblogic.rmi.cluster.ReplicaAwareServerRef.invoke(ReplicaAwareServerRef.java:93)
    at weblogic.rmi.internal.BasicServerRef.handleRequest(BasicServerRef.java:267)
    at weblogic.rmi.internal.BasicExecuteRequest.execute(BasicExecuteRequest.java:22)
    at weblogic.kernel.ExecuteThread.execute(ExecuteThread.java:139)
    at weblogic.kernel.ExecuteThread.run(ExecuteThread.java:120)
    End server side stack trace
    ; nested exception is:
    Vijay
    "Vijay" <[email protected]> wrote:
    >
    Hello,
    Here is security issue that we are facing.
    Here is setup
    Environment 1
    Admin server say "env1admin"
    Managed Weblogic Server say "env1managed"
    We deployed an EJB called HelloEJB in env1managed server and this has
    an api
    sayHello(). HelloClient is a client to HelloEJB.
    S/w Weblogic 6.1 sp3
    Environment 2
    Admin server say "env2admin"
    Managed Weblogic Server say "env2managed"
    We deployed an EJB called ServiceEJB in env2managed server and this has
    an api
    serviceRequest(). We use weblogic role based security and restrict access
    to this
    api by user HelloEJB.
    s/w Weblogic 6.1 sp3
    Here is how the system works:
    We start the env2admin, env2managed (ServiceEJB is which is a Stateless
    session
    EJB deployed in env2Managed)
    We start the env1admin and env1managed (HelloEJB(which is a Stateless
    session
    EJB is deployed in env1Managed)
    Test case:
    1)HelloClient invokes HelloEJB api sayHello().
    2)Now at this point in ejbCreate() at HelloEJB() end we get a reference
    to ServiceEJB
    using Jndi and the context is never closed ). HelloEJB then calls serviceRequest()
    api in ServiceEJB. Then gets back a response and then returns response
    to HelloClient.
    Now if we repeat the above testcase.
    After step1 in step2 HelloEJB though has all the permissions to invoke
    api on
    ServiceEJB gets an SecurityException.
    Question is why doe this happen. Only way HelloEJB can make api calls
    to serviceEJB
    is by making a lookup() every single time. Which is very expensive. I
    looked at
    documents what they say is leave the context open and never close it.
    Though I
    am doing that I am getting this exception.
    Any thoughts ?
    Thanks in advance,
    Vijay

  • Weblogic server won't start: java.sql.SQLException: [Security:090735]

    I've been trying to start the weblogic server, installed locally, but it won't start. In checking the server log I see this as the first Error reported:
    java.sql.SQLException: [Security:090735]The DBMS connection was not usable
    I changed all ref from localhost to my actual IP and that did not help.
    Any ideas what the issue could be?

    I did not specify anything reg. a database. It was all created for me by the system, so in checking the config.xml I see something like this:
    <jdbc-store>
    <name>pfProliferationJMSStore</name>
    <prefix-name>PF_PROLIFERATION_</prefix-name>
    <data-source>portalDataSourceNeverXA</data-source>
    <target>AdminServer</target>
    </jdbc-store>
    Since I have not created a database, nor created any explicit connections to one, what else could the issue be?

  • Oracle Identity Server Authenticator as Security Provider for Weblogic 10.3

    Hi,
    I am getting the following exception on weblogic server 10.1.3 console when accessing users and groups in security realm. This can be reproduced using the following steps.
    1. I have installed Oracle Identity Management 10.1.4 (Oracle SSO). I have installed Oracle SSO using the default port options. I tested accessing the Internet directory using orcladmin user and it is working with out any problems.
    2. Installed Oracle weblogic Server 10.1.3 and then installed ADF runtime. I verified the installation by accessing the admin server console and did not find any issues.
    3. Opened the Admin Console and then accessed the Security Realms and then selected myrealm. Then selected Providers and added Oracle Internet directory Authentication provider.
    4. configured the provider specific parameters like the host name and port number (389).
    Now when I select user and groups tab I am getting the following exception on weblogic adminserver command prompt console.
    Am I missing any steps in configuring Oracle Internet directory authenitcaiton provider for weblogic 10.3.1
    <Oct 13, 2009 8:33:21 PM EDT> <Error> <Console> <BEA-240003> <Console encountere
    d the following error weblogic.security.providers.authentication.LDAPAtnDelegateException: [Security:090294]could not get connection
    at weblogic.security.providers.authentication.LDAPAtnDelegate.getConnection(LDAPAtnDelegate.java:3224)
    at weblogic.security.providers.authentication.LDAPAtnDelegate.listUsers(LDAPAtnDelegate.java:2248)
    at weblogic.security.providers.authentication.LDAPAuthenticatorImpl.listUsers(LDAPAuthenticatorImpl.java:178)
    at weblogic.security.providers.authentication.OracleInternetDirectoryAuthenticatorMBeanImpl.listUsers(OracleInternetDirectoryAuthenticatorMBeanImpl.java:221)
    at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
    at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
    at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
    at java.lang.reflect.Method.invoke(Method.java:597)
    at weblogic.management.jmx.modelmbean.WLSModelMBean.invoke(WLSModelMBean.java:437)
    at com.sun.jmx.interceptor.DefaultMBeanServerInterceptor.invoke(DefaultMBeanServerInterceptor.java:836)
    at com.sun.jmx.mbeanserver.JmxMBeanServer.invoke(JmxMBeanServer.java:761)
    at weblogic.management.jmx.mbeanserver.WLSMBeanServerInterceptorBase$16.run(WLSMBeanServerInterceptorBase.java:449)
    at java.security.AccessController.doPrivileged(Native Method)
    at weblogic.management.jmx.mbeanserver.WLSMBeanServerInterceptorBase.invoke(WLSMBeanServerInterceptorBase.java:447)
    at weblogic.management.mbeanservers.internal.JMXContextInterceptor.invoke(JMXContextInterceptor.java:268)
    at weblogic.management.jmx.mbeanserver.WLSMBeanServerInterceptorBase$16.run(WLSMBeanServerInterceptorBase.java:449)
    at java.security.AccessController.doPrivileged(Native Method)
    at weblogic.management.jmx.mbeanserver.WLSMBeanServerInterceptorBase.invoke(WLSMBeanServerInterceptorBase.java:447)
    at weblogic.management.mbeanservers.internal.SecurityInterceptor.invoke(SecurityInterceptor.java:443)
    at weblogic.management.jmx.mbeanserver.WLSMBeanServer.invoke(WLSMBeanServer.java:314)
    at weblogic.management.mbeanservers.internal.JMXConnectorSubjectForwarder$11$1.run(JMXConnectorSubjectForwarder.java:663)
    at java.security.AccessController.doPrivileged(Native Method)
    at weblogic.management.mbeanservers.internal.JMXConnectorSubjectForwarder$11.run(JMXConnectorSubjectForwarder.java:661)
    at weblogic.security.acl.internal.AuthenticatedSubject.doAs(AuthenticatedSubject.java:363)
    at weblogic.management.mbeanservers.internal.JMXConnectorSubjectForwarder.invoke(JMXConnectorSubjectForwarder.java:654)
    at javax.management.remote.rmi.RMIConnectionImpl.doOperation(RMIConnectionImpl.java:1426)
    at javax.management.remote.rmi.RMIConnectionImpl.access$200(RMIConnectionImpl.java:72)
    at javax.management.remote.rmi.RMIConnectionImpl$PrivilegedOperation.run(RMIConnectionImpl.java:1264)
    at java.security.AccessController.doPrivileged(Native Method)
    at javax.management.remote.rmi.RMIConnectionImpl.doPrivilegedOperation(RMIConnectionImpl.java:1366)
    at javax.management.remote.rmi.RMIConnectionImpl.invoke(RMIConnectionImpl.java:788)
    at javax.management.remote.rmi.RMIConnectionImpl_WLSkel.invoke(Unknown Source)
    at weblogic.rmi.internal.ServerRequest.sendReceive(ServerRequest.java:174)
    at weblogic.rmi.internal.BasicRemoteRef.invoke(BasicRemoteRef.java:222)
    at javax.management.remote.rmi.RMIConnectionImpl_1031_WLStub.invoke(Unknown Source)
    at javax.management.remote.rmi.RMIConnector$RemoteMBeanServerConnection.invoke(RMIConnector.java:978)
    at weblogic.management.jmx.MBeanServerInvocationHandler.doInvoke(MBeanServerInvocationHandler.java:544)
    at weblogic.management.jmx.MBeanServerInvocationHandler.invoke(MBeanServerInvocationHandler.java:380)
    at $Proxy106.listUsers(Unknown Source)
    at com.bea.console.utils.security.UserUtils.getUsers(UserUtils.java:78)
    at com.bea.console.actions.security.users.UserTableAction.getCollection(UserTableAction.java:100)
    at com.bea.console.actions.security.ManagementBaseTableAction.execute(ManagementBaseTableAction.java:83)
    at org.apache.struts.action.RequestProcessor.processActionPerform(RequestProcessor.java:431)
    at org.apache.beehive.netui.pageflow.PageFlowRequestProcessor.access$201(PageFlowRequestProcessor.java:97)
    at org.apache.beehive.netui.pageflow.PageFlowRequestProcessor$ActionRunner.execute(PageFlowRequestProcessor.java:2044)
    at org.apache.beehive.netui.pageflow.interceptor.action.internal.ActionInterceptors.wrapAction(ActionInterceptors.java:91)
    at org.apache.beehive.netui.pageflow.PageFlowRequestProcessor.processActionPerform(PageFlowRequestProcessor.java:2116)
    at com.bea.console.internal.ConsolePageFlowRequestProcessor.processActionPerform(ConsolePageFlowRequestProcessor.java:262)
    at org.apache.struts.action.RequestProcessor.process(RequestProcessor.java:236)
    at org.apache.beehive.netui.pageflow.PageFlowRequestProcessor.processInternal(PageFlowRequestProcessor.java:556)
    at org.apache.beehive.netui.pageflow.PageFlowRequestProcessor.process(PageFlowRequestProcessor.java:853)
    at org.apache.beehive.netui.pageflow.AutoRegisterActionServlet.process(AutoRegisterActionServlet.java:631)
    at org.apache.beehive.netui.pageflow.PageFlowActionServlet.process(PageFlowActionServlet.java:158)
    at com.bea.console.internal.ConsoleActionServlet.process(ConsoleActionServlet.java:256)
    at org.apache.struts.action.ActionServlet.doGet(ActionServlet.java:414)
    at com.bea.console.internal.ConsoleActionServlet.doGet(ConsoleActionServlet.java:133)
    at org.apache.beehive.netui.pageflow.PageFlowUtils.strutsLookup(PageFlowUtils.java:1199)
    at com.bea.portlet.adapter.scopedcontent.ScopedContentCommonSupport.executeAction(ScopedContentCommonSupport.java:686)
    at com.bea.portlet.adapter.scopedcontent.ScopedContentCommonSupport.renderInternal(ScopedContentCommonSupport.java:266)
    at com.bea.portlet.adapter.scopedcontent.StrutsStubImpl.render(StrutsStubImpl.java:107)
    at com.bea.netuix.servlets.controls.content.NetuiContent.preRender(NetuiContent.java:292)
    at com.bea.netuix.nf.ControlLifecycle$6.visit(ControlLifecycle.java:428)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:727)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walkRecursivePreRender(ControlTreeWalker.java:739)
    at com.bea.netuix.nf.ControlTreeWalker.walk(ControlTreeWalker.java:146)
         at com.bea.netuix.nf.Lifecycle.processLifecycles(Lifecycle.java:395)
    at com.bea.netuix.nf.Lifecycle.processLifecycles(Lifecycle.java:361)
    at com.bea.netuix.nf.Lifecycle.runOutbound(Lifecycle.java:208)
    at com.bea.netuix.nf.Lifecycle.run(Lifecycle.java:162)
    at com.bea.netuix.servlets.manager.UIServlet.runLifecycle(UIServlet.java:388)
    at com.bea.netuix.servlets.manager.UIServlet.doPost(UIServlet.java:258)
    at com.bea.netuix.servlets.manager.UIServlet.doGet(UIServlet.java:211)
    at com.bea.netuix.servlets.manager.UIServlet.service(UIServlet.java:196)
    at com.bea.netuix.servlets.manager.SingleFileServlet.service(SingleFileServlet.java:251)
    at javax.servlet.http.HttpServlet.service(HttpServlet.java:820)
    at com.bea.console.utils.MBeanUtilsInitSingleFileServlet.service(MBeanUtilsInitSingleFileServlet.java:47)
    at weblogic.servlet.AsyncInitServlet.service(AsyncInitServlet.java:130)
    at weblogic.servlet.internal.StubSecurityHelper$ServletServiceAction.run(StubSecurityHelper.java:227)
    at weblogic.servlet.internal.StubSecurityHelper.invokeServlet(StubSecurityHelper.java:125)
    at weblogic.servlet.internal.ServletStubImpl.execute(ServletStubImpl.java:292)
    at weblogic.servlet.internal.TailFilter.doFilter(TailFilter.java:26)
    at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:56)
    at weblogic.servlet.internal.RequestEventsFilter.doFilter(RequestEventsFilter.java:27)
    at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:56)
    at weblogic.servlet.internal.WebAppServletContext$ServletInvocationAction.run(WebAppServletContext.java:3588)
    at weblogic.security.acl.internal.AuthenticatedSubject.doAs(AuthenticatedSubject.java:321)
    at weblogic.security.service.SecurityManager.runAs(SecurityManager.java:121)
    at weblogic.servlet.internal.WebAppServletContext.securedExecute(WebAppServletContext.java:2200)
    at weblogic.servlet.internal.WebAppServletContext.execute(WebAppServletContext.java:2106)
    at weblogic.servlet.internal.ServletRequestImpl.run(ServletRequestImpl.java:1428)
    at weblogic.work.ExecuteThread.execute(ExecuteThread.java:201)
    at weblogic.work.ExecuteThread.run(ExecuteThread.java:173)
    Caused by: java.lang.reflect.InvocationTargetException
    at weblogic.security.providers.authentication.LDAPAtnDelegate$LDAPFactory.newInstance(LDAPAtnDelegate.java:3890)
    at weblogic.security.utils.Pool.newInstance(Pool.java:37)
         at weblogic.security.utils.Pool.getInstance(Pool.java:33)
    at weblogic.security.providers.authentication.LDAPAtnDelegate.getConnection(LDAPAtnDelegate.java:3219)
    ... 119 more
    Caused by: netscape.ldap.LDAPException: error result (49)
    at netscape.ldap.LDAPConnection.checkMsg(LDAPConnection.java:4871)
    at netscape.ldap.LDAPConnection.simpleBind(LDAPConnection.java:1766)
    at netscape.ldap.LDAPConnection.authenticate(LDAPConnection.java:1264)
    at netscape.ldap.LDAPConnection.authenticate(LDAPConnection.java:1273)
    at netscape.ldap.LDAPConnection.bind(LDAPConnection.java:1562)
    at weblogic.security.providers.authentication.LDAPAtnDelegate$LDAPFactory.newInstance(LDAPAtnDelegate.java:3860)
    ... 122 more
    Thanks and Regards,
    S R Prasad

    The problem has been resolved after providing OID admin user creadential with cn=orcladmin instead of orcladmin. The Security:090294 is related to OID credentials.
    Regards,
    S R Prasad

  • JoltConnectionPool can not start in weblogic server

    Hi
    I am trying to run the sample Tuxedo provided application which uses Servlets or Ejb.
    Now the Tuxedo Server has been configured and running properly.
    I have WebLogic Server installed and had created the JoltSessionPool with name "MAJoltConnectionPool" and had also defined the StartupClass & ShutdonClass.
    While defining the JoltSessionPool i had given min services as 1 and max services as 5 and others as default,
    and the JoltSessionPool's target is a weblogic managed server which named ct2.
    Then i tryed to start the ct2 server on command line such as:
    startManagedWebLogic.cmd ct2 http://localhost:7001
    I got an error in starting "MAJoltConnectionPool" but the server ct2 is starting normally.
    Anyone who can help me to find out the reason? Thanks a lot.
    The Command Line window shown following in the Log:
    Failed to invoke startup class "MAJoltPoolStart", java.lang.Exception: Errors in starting the following connection pools :
    com.bea:Name=MAJoltConnectionPool,Type=JoltConnectionPool :
    Access to sensitive attribute in clear text is not allowed due to the setting of ClearTextCredentialAccessEnabled attribute in SecurityConfigurationMBean. Attr: UserPassword, MBean name: com.bea:Name=MAJoltConnectionPool,Type=JoltConnectionPool
    The Entire Trace from the Log file is:
    ####<Mar 16, 2011 11:58:35 AM CST> <Notice> <Log Management> <HXU49> <ct2> <[STANDBY] ExecuteThread: '1' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1300247915024> <BEA-170027> <The Server has established connection with the Domain level Diagnostic Service successfully.>
    ####<Mar 16, 2011 11:58:35 AM CST> <Info> <Diagnostics> <HXU49> <ct2> <[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1300247915070> <BEA-320077> <Initialized the Diagnostic Accessor Service.>
    ####<Mar 16, 2011 11:58:35 AM CST> <Info> <WebLogicServer> <HXU49> <ct2> <[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1300247915078> <BEA-000256> <Invoking bea.jolt.pool.servlet.weblogic.PoolManagerStartUp.main(null)>
    ####<Mar 16, 2011 11:58:35 AM CST> <Critical> <WebLogicServer> <HXU49> <ct2> <[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)'> <<WLS Kernel>> <> <> <1300247915239> <BEA-000286> <Failed to invoke startup class "MAJoltPoolStart", java.lang.Exception: Errors in starting the following connection pools :
    com.bea:Name=MAJoltConnectionPool,Type=JoltConnectionPool : Access to sensitive attribute in clear text is not allowed due to the setting of ClearTextCredentialAccessEnabled attribute in SecurityConfigurationMBean. Attr: UserPassword, MBean name: com.bea:Name=MAJoltConnectionPool,Type=JoltConnectionPool
    java.lang.Exception: Errors in starting the following connection pools :
    com.bea:Name=MAJoltConnectionPool,Type=JoltConnectionPool : Access to sensitive attribute in clear text is not allowed due to the setting of ClearTextCredentialAccessEnabled attribute in SecurityConfigurationMBean. Attr: UserPassword, MBean name: com.bea:Name=MAJoltConnectionPool,Type=JoltConnectionPool
         at bea.jolt.pool.servlet.weblogic.impl.PoolManagerStartUpJMX.startup(PoolManagerStartUpJMX.java:216)
         at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
         at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
         at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
         at java.lang.reflect.Method.invoke(Method.java:597)
         at bea.jolt.pool.servlet.weblogic.PoolManagerStartUp.main(PoolManagerStartUp.java:38)
         at sun.reflect.NativeMethodAccessorImpl.invoke0(Native Method)
         at sun.reflect.NativeMethodAccessorImpl.invoke(NativeMethodAccessorImpl.java:39)
         at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
         at java.lang.reflect.Method.invoke(Method.java:597)
         at weblogic.management.deploy.classdeployment.ClassDeploymentManager.invokeMain(ClassDeploymentManager.java:362)
         at weblogic.management.deploy.classdeployment.ClassDeploymentManager.invokeClass(ClassDeploymentManager.java:272)
         at weblogic.management.deploy.classdeployment.ClassDeploymentManager.access$000(ClassDeploymentManager.java:54)
         at weblogic.management.deploy.classdeployment.ClassDeploymentManager$1.run(ClassDeploymentManager.java:214)
         at weblogic.security.acl.internal.AuthenticatedSubject.doAs(AuthenticatedSubject.java:321)
         at weblogic.security.service.SecurityManager.runAs(SecurityManager.java:120)
         at weblogic.management.deploy.classdeployment.ClassDeploymentManager.invokeClassDeployment(ClassDeploymentManager.java:207)
         at weblogic.management.deploy.classdeployment.ClassDeploymentManager.invokeClassDeployments(ClassDeploymentManager.java:186)
         at weblogic.management.deploy.classdeployment.ClassDeploymentManager.runStartupsAfterAppAdminState(ClassDeploymentManager.java:162)
         at weblogic.management.deploy.classdeployment.StartupClassPrelistenService.start(StartupClassPrelistenService.java:13)
         at weblogic.t3.srvr.SubsystemRequest.run(SubsystemRequest.java:64)
         at weblogic.work.ExecuteThread.execute(ExecuteThread.java:207)
         at weblogic.work.ExecuteThread.run(ExecuteThread.java:176)
    >
    ####<Mar 16, 2011 11:58:35 AM CST> <Notice> <WebLogicServer> <HXU49> <ct2> <main> <<WLS Kernel>> <> <> <1300247915288> <BEA-000365> <Server state changed to ADMIN>
    ####<Mar 16, 2011 11:58:35 AM CST> <Notice> <WebLogicServer> <HXU49> <ct2> <main> <<WLS Kernel>> <> <> <1300247915313> <BEA-000365> <Server state changed to RESUMING>
    ####<Mar 16, 2011 11:58:36 AM CST> <Notice> <WebLogicServer> <HXU49> <ct2> <main> <<WLS Kernel>> <> <> <1300247916769> <BEA-000365> <Server state changed to RUNNING>
    ####<Mar 16, 2011 11:58:36 AM CST> <Notice> <WebLogicServer> <HXU49> <ct2> <main> <<WLS Kernel>> <> <> <1300247916770> <BEA-000360> <Server started in RUNNING mode>
    With Regards
    Han

    Hi
    To resolve this problem , you have 2 solutions:
    - modify the config.xml file to add in the tag <security-configuration> the following line :
    <clear-text-credential-access-enabled>true</clear-text-credential-access-enabled>
    or
    - check the checkbox "Clear Text Credential Access Enabled" in the settings for the domain / security / general / advanced
    restart the weblogic server to activate this change if necessary (Normaly, no restarts are necessary with weblogic server v10.3.5.0)
    Hope this reponse help you (if it's not too late ;-) )
    Laurent.

Maybe you are looking for

  • Requirement Urgency for Purchase order

    Hi, I have configured Requirement Urgency ( I have created 2 code "01 and 99 respectively for emergency and routine , now while creating PR, system proposes 99 as routine , which is correct as per my requirement, again when I do change the requiremen

  • Automated Failure Message

    Hi, WE have a master flow which contains 5 process flows in it.... We have scheduled this master flow using the inbuilt OWB scheduler(OWB 10.2.0.4 version) I have a shell script which alerts our support team when there is any failure.... Now how can

  • Business Activity details in Opportunity transaction in CRM table.

    Hi In which table in CRM can i find data entered in business activity details in opportunity transaction. Please advice . Thanks, Vaishnavi

  • How to Commit table by writting Java code in Managed Bean?

    Hi, Can anyone suggest me how to Commit table by writing Java code in Managed Bean?. I want to commit table manually after modifying in UI. Please suggest me guys. Thanks, Ramit Mathur

  • Screen stuck in "Plug In" mode after download?

    When downloading the new software for iPhone I received an error message reading that the download was unsuccessful and now my phone is stuck in the screen that shows "Plug into iTunes" .... can anyone help? Ive done everything from trying different