Search Results

Search found 11778 results on 472 pages for 'online sources'.

Page 144/472 | < Previous Page | 140 141 142 143 144 145 146 147 148 149 150 151  | Next Page >

  • Data Source Security Part 1

    - by Steve Felts
    I’ve written a couple of articles on how to store data source security credentials using the Oracle wallet.  I plan to write a few articles on the various types of security available to WebLogic Server (WLS) data sources.  There are more options than you might think! There have been several enhancements in this area in WLS 10.3.6.  There are a couple of more enhancements planned for release WLS 12.1.2 that I will include here for completeness.  This isn’t intended as a teaser.  If you call your Oracle support person, you can get them now as minor patches to WLS 10.3.6.   The current security documentation is scattered in a few places, has a few incorrect statements, and is missing a few topics.  It also seems that the knowledge of how to apply some of these features isn’t written down.  The goal of these articles is to talk about WLS data source security in a unified way and to introduce some approaches to using the available features.  Introduction to WebLogic Data Source Security Options By default, you define a single database user and password for a data source.  You can store it in the data source descriptor or make use of the Oracle wallet.  This is a very simple and efficient approach to security.  All of the connections in the connection pool are owned by this user and there is no special processing when a connection is given out.  That is, it’s a homogeneous connection pool and any request can get any connection from a security perspective (there are other aspects like affinity).  Regardless of the end user of the application, all connections in the pool use the same security credentials to access the DBMS.   No additional information is needed when you get a connection because it’s all available from the data source descriptor (or wallet). java.sql.Connection conn =  mydatasource.getConnection(); Note: You can enter the password as a name-value pair in the Properties field (this not permitted for production environments) or you can enter it in the Password field of the data source descriptor. The value in the Password field overrides any password value defined in the Properties passed to the JDBC Driver when creating physical database connections. It is recommended that you use the Password attribute in place of the password property in the properties string because the Password value is encrypted in the configuration file (stored as the password-encrypted attribute in the jdbc-driver-params tag in the module file) and is hidden in the administration console.  The Properties and Password fields are located on the administration console Data Source creation wizard or Data Source Configuration tab. The JDBC API can also be used to programmatically specify a database user name and password as in the following.  java.sql.Connection conn = mydatasource.getConnection(“user”, “password”); According to the JDBC specification, it’s supposed to take a database user and associated password but different vendors implement this differently.  WLS, by default, treats this as an application server user and password.  The pair is authenticated to see if it’s a valid user and that user is used for WLS security permission checks.  By default, the user is then mapped to a database user and password using the data source credential mapper, so this API sort of follows the specification but database credentials are one-step removed from the application code.  More details and the rationale are described later. While the default approach is simple, it does mean that only one database user is doing all of the work.  You can’t figure out who actually did the update and you can’t restrict SQL operations by who is running the operation, at least at the database level.   Any type of per-user logic will need to be in the application code instead of having the database do it.  There are various WLS data source features that can be configured to provide some per-user information about the operations to the database. WebLogic Data Source Security Options This table describes the features available for WebLogic data sources to configure database security credentials and a brief description.  It also captures information about the compatibility of these features with one another. Feature Description Can be used with Can’t be used with User authentication (default) Default getConnection(user, password) behavior – validate the input and use the user/password in the descriptor. Set client identifier Proxy Session, Identity pooling, Use database credentials Use database credentials Instead of using the credential mapper, use the supplied user and password directly. Set client identifier, Proxy session, Identity pooling User authentication, Multi Data Source Set Client Identifier Set a client identifier property associated with the connection (Oracle and DB2 only). Everything Proxy Session Set a light-weight proxy user associated with the connection (Oracle-only). Set client identifier, Use database credentials Identity pooling, User authentication Identity pooling Heterogeneous pool of connections owned by specified users. Set client identifier, Use database credentials Proxy session, User authentication, Labeling, Multi-datasource, Active GridLink Note that all of these features are available with both XA and non-XA drivers. Currently, the Proxy Session and Use Database Credentials options are on the Oracle tab of the Data Source Configuration tab of the administration console (even though the Use Database Credentials feature is not just for Oracle databases – oops).  The rest of the features are on the Identity tab of the Data Source Configuration tab in the administration console (plan on seeing them all in one place in the future). The subsequent articles will describe these features in more detail.  Keep referring back to this table to see the big picture.

    Read the article

  • Website Value Calculator - Know What Your Website is Worth Before Selling It

    We all know how important it is to have a website of your own when you are into an online business. If you would like to maintain your own website or if you are selling them to earn some money, it is definitely important for you to know what is the true value of your websites. How do you do this? With the help of a website value calculator you will now have the ability to know your site's worth.

    Read the article

  • Desktop Fun: Waterfalls Wallpaper Collection Series 2

    - by Asian Angel
    Two years ago we shared a terrific collection of waterfall wallpapers with you and today we are back with more. Let these wonders of nature cascade onto your desktop with the second in our series of Waterfalls Wallpaper collections. HTG Explains: Learn How Websites Are Tracking You Online Here’s How to Download Windows 8 Release Preview Right Now HTG Explains: Why Linux Doesn’t Need Defragmenting

    Read the article

  • Creating Your First Website

    If you are looking into website creation as a form of business or just as a hobby to give an input of your freedom of expression, check out how creating your first website can be a simple task as long as you follow these simple tips and believe in yourself. The first thing you want to do when you are looking to create your first website is run a search in a search engine for guides that can help you though the process. There are hundreds of guides available online that run you through the process of website creation....

    Read the article

  • SEO Frequently Asked Questions

    When starting your online business, you will definitely come across certain terms, and the most common of which are those that talk about SEO (Search Engine Optimization). To get you more familiar with it, here are some questions you may ask.

    Read the article

  • VMMap - awesome memory analysis tool

    VMMap is a process virtual and physical memory analysis utility. It shows a breakdown of a process's committed virtual memory types as well as the amount of physical memory (working set) assigned by the operating system to those types. Besides graphical representations of memory usage, VMMap also shows summary information and a detailed process memory map. Powerful filtering and refresh capabilities allow you to identify the sources of process memory usage and the memory cost of application features. Besides flexible views for analyzing live processes, VMMap supports the export of data in multiple forms, including a native format that preserves all the information so that you can load back in. It also includes command-line options that enable scripting scenarios. VMMap is the ideal tool for developers wanting to understand and optimize their application's memory resource usage. span.fullpost {display:none;}

    Read the article

  • Quick Steps to Setting Up a Law Firm Website

    Here are some quick tips for creating a pro law firm website that will get found online. The first stage is choosing a domain for your law firm website. Your first instinct in picking a domain might be to choose a branded domain based on the name of your firm.

    Read the article

  • What is Your Reason to Build a Website?

    To succeed online (or anywhere, for that matter) you must get out of the complacency of routine...you must stop thinking about things and do something; this is vital for you to get anywhere. Life does not just happen, something has to be done or moved.

    Read the article

  • Free Silverlight 4 Training Course on Channel 9

    - by D'Arcy Lussier
    Want to learn what’s new in Silverlight 4 and how to develop using all the kewl new features, bells, and whistles? John Papa and Adam Kinney have put together a fantastic and expansive Silverlight 4 course and you can get all the materials online FOR FREE! To see what’s included and download the materials individually, check out the course page on Channel 9 here. Alternately, you can download all the materials in a single executable from this site. D

    Read the article

  • Desktop Fun: Feathered Friends Wallpaper Collection

    - by Asian Angel
    Birds can serve as wonderful sources of inspiration with their varied colors, song, and feats of flight. Today we have a beautiful flock of birds that you can add to your desktop with our Feathered Friends Wallpaper collection Latest Features How-To Geek ETC How to Enable User-Specific Wireless Networks in Windows 7 How to Use Google Chrome as Your Default PDF Reader (the Easy Way) How To Remove People and Objects From Photographs In Photoshop Ask How-To Geek: How Can I Monitor My Bandwidth Usage? Internet Explorer 9 RC Now Available: Here’s the Most Interesting New Stuff Here’s a Super Simple Trick to Defeating Fake Anti-Virus Malware Comix is an Awesome Comics Archive Viewer for Linux Get the MakeUseOf eBook Guide to Speeding Up Windows for Free Need Tech Support? Call the Star Wars Help Desk! [Video Classic] Reclaim Vertical UI Space by Adding a Toolbar to the Left or Right Side of Firefox Androidify Turns You into an Android-style Avatar Reader for Android Updates; Now with Feed Widgets and More

    Read the article

  • Website Development Basics

    With the emergence of many Web 2.0 sites, there are many web pages being created each day. With a very user-friendly control panel that helps the creator navigate and modify the pages with just a flick of the wrist, this is definitely becoming the better (and cheaper) alternative way to establish a presence online.

    Read the article

  • VMMap - awesome memory analysis tool

    VMMap is a process virtual and physical memory analysis utility. It shows a breakdown of a process's committed virtual memory types as well as the amount of physical memory (working set) assigned by the operating system to those types. Besides graphical representations of memory usage, VMMap also shows summary information and a detailed process memory map. Powerful filtering and refresh capabilities allow you to identify the sources of process memory usage and the memory cost of application features. Besides flexible views for analyzing live processes, VMMap supports the export of data in multiple forms, including a native format that preserves all the information so that you can load back in. It also includes command-line options that enable scripting scenarios. VMMap is the ideal tool for developers wanting to understand and optimize their application's memory resource usage. span.fullpost {display:none;}

    Read the article

  • How to reduce bubble-notification time in empathy?

    - by MCan
    empathy shows a bubble notification message on top right corner if a user comes online or goes offline (obviously we can change them from the preferences), but is there any way we can reduce the time for which the bubble notification remains on screen. By default it remains fro 3-4 seconds, is there any way we can change it to 1 or may be 2 seconds (I know the matter is of few seconds only but 4 seconds looks too long and I want to reduce it). Any help is welcome. Cheers.

    Read the article

  • Which tool can tidy/indent HTML5?

    - by user2534
    I've already spent about 2 hours searching google and trying various tools but either they don't do indent tags per say or they aren't HTML5 compatible such as the famous HTML tidy which was last updated 3 years ago… N.B. I don't want to apply this to the source of a page (like PHP or JS would do) but to the code in the editor so that a clear hierarchy appears between tags. Ideally I'd like a Mac OS X tool but I'll take any online tool and in last resot a Wine compatible one. P.S. at the moment I use Coda from Panic

    Read the article

  • Is DreamWeaver a good tool to write PHP code? [closed]

    - by Akito
    I have started learning PHP. I have Windows XP installed. I use DreamWeaver to write PHP code and XAMP to run it. I love using DreamWeaver as I can handle, HTML, CSS, PHP, JavaScript using DreamWeaver. While learning online, I have seen many other configurations like using Eclipse and other tools. I wanted to ask if using Dreamweaver to write PHP code a good practice or it can be made better using any other code writing tool?

    Read the article

  • Install problem on UEFI, Windows 8 new desktop

    - by albuquerque mat
    I just bought an HP desktop, p6-2326s, which has windows 8 installed. I have tried booting a Ubuntu live disc but the machine won't boot it. When I bring up the UEFI boot menu it offers a selection of UEFI BOOT SOURCES, windows boot manager, dvd drive, IP4 Ethernet controller, or IP6 Ethernet controller. If I select the dvd drive with the CD in it I get the message "Secure boot violation, Invalid structure detected. Check secure boot policy in setup." With all other selections it just boots into windows. So where do I go from here?

    Read the article

< Previous Page | 140 141 142 143 144 145 146 147 148 149 150 151  | Next Page >