Search Results

Search found 9779 results on 392 pages for 'articles'.

Page 109/392 | < Previous Page | 105 106 107 108 109 110 111 112 113 114 115 116  | Next Page >

  • Data Source Security Part 1

    - by Steve Felts
    I’ve written a couple of articles on how to store data source security credentials using the Oracle wallet.  I plan to write a few articles on the various types of security available to WebLogic Server (WLS) data sources.  There are more options than you might think! There have been several enhancements in this area in WLS 10.3.6.  There are a couple of more enhancements planned for release WLS 12.1.2 that I will include here for completeness.  This isn’t intended as a teaser.  If you call your Oracle support person, you can get them now as minor patches to WLS 10.3.6.   The current security documentation is scattered in a few places, has a few incorrect statements, and is missing a few topics.  It also seems that the knowledge of how to apply some of these features isn’t written down.  The goal of these articles is to talk about WLS data source security in a unified way and to introduce some approaches to using the available features.  Introduction to WebLogic Data Source Security Options By default, you define a single database user and password for a data source.  You can store it in the data source descriptor or make use of the Oracle wallet.  This is a very simple and efficient approach to security.  All of the connections in the connection pool are owned by this user and there is no special processing when a connection is given out.  That is, it’s a homogeneous connection pool and any request can get any connection from a security perspective (there are other aspects like affinity).  Regardless of the end user of the application, all connections in the pool use the same security credentials to access the DBMS.   No additional information is needed when you get a connection because it’s all available from the data source descriptor (or wallet). java.sql.Connection conn =  mydatasource.getConnection(); Note: You can enter the password as a name-value pair in the Properties field (this not permitted for production environments) or you can enter it in the Password field of the data source descriptor. The value in the Password field overrides any password value defined in the Properties passed to the JDBC Driver when creating physical database connections. It is recommended that you use the Password attribute in place of the password property in the properties string because the Password value is encrypted in the configuration file (stored as the password-encrypted attribute in the jdbc-driver-params tag in the module file) and is hidden in the administration console.  The Properties and Password fields are located on the administration console Data Source creation wizard or Data Source Configuration tab. The JDBC API can also be used to programmatically specify a database user name and password as in the following.  java.sql.Connection conn = mydatasource.getConnection(“user”, “password”); According to the JDBC specification, it’s supposed to take a database user and associated password but different vendors implement this differently.  WLS, by default, treats this as an application server user and password.  The pair is authenticated to see if it’s a valid user and that user is used for WLS security permission checks.  By default, the user is then mapped to a database user and password using the data source credential mapper, so this API sort of follows the specification but database credentials are one-step removed from the application code.  More details and the rationale are described later. While the default approach is simple, it does mean that only one database user is doing all of the work.  You can’t figure out who actually did the update and you can’t restrict SQL operations by who is running the operation, at least at the database level.   Any type of per-user logic will need to be in the application code instead of having the database do it.  There are various WLS data source features that can be configured to provide some per-user information about the operations to the database. WebLogic Data Source Security Options This table describes the features available for WebLogic data sources to configure database security credentials and a brief description.  It also captures information about the compatibility of these features with one another. Feature Description Can be used with Can’t be used with User authentication (default) Default getConnection(user, password) behavior – validate the input and use the user/password in the descriptor. Set client identifier Proxy Session, Identity pooling, Use database credentials Use database credentials Instead of using the credential mapper, use the supplied user and password directly. Set client identifier, Proxy session, Identity pooling User authentication, Multi Data Source Set Client Identifier Set a client identifier property associated with the connection (Oracle and DB2 only). Everything Proxy Session Set a light-weight proxy user associated with the connection (Oracle-only). Set client identifier, Use database credentials Identity pooling, User authentication Identity pooling Heterogeneous pool of connections owned by specified users. Set client identifier, Use database credentials Proxy session, User authentication, Labeling, Multi-datasource, Active GridLink Note that all of these features are available with both XA and non-XA drivers. Currently, the Proxy Session and Use Database Credentials options are on the Oracle tab of the Data Source Configuration tab of the administration console (even though the Use Database Credentials feature is not just for Oracle databases – oops).  The rest of the features are on the Identity tab of the Data Source Configuration tab in the administration console (plan on seeing them all in one place in the future). The subsequent articles will describe these features in more detail.  Keep referring back to this table to see the big picture.

    Read the article

  • Making a Fun Website Web 2.0 and Beyond

    If you think that making a website that is informative and easy to navigate is going to bring targeted visitors to your website, guess again. You have to make it fun and captivating because you want your visitors to come back and see you again.

    Read the article

  • How Social Media Marketing and SEO Are Inter-Linked

    Today successful marketer is the one who leverages advantages from both SEO as well as Social Media Marketing (SMM). Social Media (SM) flourishes where people are, and marketers propel there only. Earlier SMM used to be a standalone strategy but with time it was realized that if it is united with marketing efforts it could generate even better results rather than working in isolation.

    Read the article

  • Weve Moved!

    Ive moved my blog to a new home at http://SilverlightGeek.me.  Within a few days, all the links here should automatically redirect you there. Thanks for sticking with me and I look forward to your feedback.             ( You can also reach the new blog at http://slgeek.com/wordpress )This work is licensed under a Creative Commons license. ...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Legitimate SEO Strategies - Which to Follow and Not to Follow?

    There are various SEO techniques which can help your business to get recognition on the internet. These techniques are mainly divided into two categories i.e. legitimate search engine optimization and illegitimate search engine optimization. Using legitimate search engine optimization techniques will guarantee a top spot and there will be nothing at risk. Whereas the illegitimate SEO has many risks attached to it.

    Read the article

  • Tips on Programming Your Website After Storyboarding

    The blueprint of your website is your storyboard. However, before you start constructing your website there are many steps that you need to pay attention to. Planning is the key element to the success of your website. The following tips will help you in building a robust website.

    Read the article

  • Upgrading Office 2007 to Office 2010, First Look

    In this post, Im going to simply document the process of updating my MIcrosoft Office 2007.  As almost anyone knows who has not been hiding under a rock, Microsoft Office 2010 has been in the... This site is a resource for asp.net web programming. It has examples by Peter Kellner of techniques for high performance programming...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • 5 White Hat SEO Link Building Tips

    SEO link building is the corner stone of any and all successful websites. When sites from around the Web link to your website the search engines regard this as "votes" confirming the relevancy and quality of your website content.

    Read the article

  • 5 Reasons to Use An Instant Site Creator to Build Your Websites

    An Instant Site Creator is a piece of software that will allow you to create an unlimited number of websites with just a few mouse clicks. You can put up a new, professional looking site in minutes instead of hours or days, saving you both time and money. Here are five reasons you might want to use an instant site creator, or website builder software, instead of outsourcing the project or spending long hours doing it yourself

    Read the article

  • About Inbound Links

    For the object of search optimization processes inbound links are considered as among the best way to generate and direct high quality traffic to your website. The existence of a good pedigree of back links is always a good way to increase web traffic and gain that extra length over the competition.

    Read the article

  • Search Engine Optimization - The Best Way to Market Your Online Based Business

    There are many things to consider, when you start your own online marketing campaign via search engine optimization services. If you're an entrepreneur, you won't have time for all this, meaning you would need to hire someone to do all the work related to the optimization and the functioning of the website. The lucky fact is that most of the companies, which offer search engine optimization (SEO) services, also provide web design, content writing, web development, social bookmarking, and other related services.

    Read the article

  • New Development Snapshot

    More bug fixing and rounding out IKVM.Reflection. Changes: Fixed resolution of generic type instance names with "fake" type as type argument. Fixed bug in Finalize/finalize special casing for .NET types that caused exception when reflecting on them. Fixed Finalize/finalize special casing for .NET types to also work for java.lang.Throwable derived types. Removed fake core class library types from ikvmstub and added a -bootstrap...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • 5 Reasons to Use a Free Website Builder

    If you've done any research at all, you've found that there are tons of options when getting a website. You can hire a web design company to build your website from ground up, consulting you each step of the way. You can purchase a hosting package and domain name, then build a website using HTML or an offline program that creates HTML files.

    Read the article

  • Fun and Easy Ways to Get Backlinks

    The cat is out of the bag: The search algorithms place a fairly high degree of emphasis on the number of incoming links when determining a site's authority in the rankings. As a result, every SEO guru and would-be superstar blogger has started spamming the living daylights out of the rest of the web trying to build backlinks to their own sites. In itself, this is not necessarily a bad thing; in theory, it forces people to stop being so myopic.

    Read the article

  • ASP.NET Combo Box and List Box Performance Improvements - v2010 vol 1

    Check out this great new performance feature of our ASP.NET combo box and list box controls for the DXperience v2010.1 release. You can now manually populate lists with items based on the currently applied filter criteria. This means that you can significantly decrease web server workload by loading only a subset of all items when working with large datasets. For instance, when using a large data source, you can only request a few records to be visible on the screen. The rest of the items can...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • How to Interview an "SEO Expert"

    I recently wrote this article for a potential customer of ours. He needed a list of simple questions he could use to interview so-called "search engine optimization (SEO) experts". He needed this list for a couple of reasons.

    Read the article

< Previous Page | 105 106 107 108 109 110 111 112 113 114 115 116  | Next Page >