Download D58682GC20_sg2 PDF

File Size7.6 MB
Total Pages360
Table of Contents
                            Oracle WebLogic Server 11g:Administration Essentials
lesson 14: Understanding JDBC and Configuring Data Sources
	Road Map
	JDBC Review
	JDBC Data Sources
	Data Source Scope
	Multi-Tier Architecture
	Type 4 Drivers
	WebLogic JDBC Drivers
	Road Map
	What Is a Connection Pool?
	JDBC Connection Pooling
	Benefits of Connection Pools
	Modular Configuration and Deployment of JDBC Resources
	How Data Source Connection Pools Are Used
	Creating a Data Source Using the Administration Console
	Non-XA Configuration
	Data Source Connection Properties
	Test Configuration
	Connection Pool Configuration
	Connection Pool Advanced
	Targeting a Data Source
	Viewing the Server JNDI Tree via the Administration Console
	Listing the JNDI Contents Via WLST
	Connection Properties
	Specifying Connection Properties
	Road Map
	Monitoring and Testing a Data Source
	Connection Pool Life Cycle
	Fixing an Offline Data Source
	Practice 14 Overview: Configuring JDBC Data Sources
lesson 15: Setting Up Java Message Service (JMS) Resources
	Road Map
	Message-Oriented Middleware
	Point-To-Point Queue
	Publish/Subscribe Topics
	Oracle WebLogic Server JMS Features
	WebLogic JMS Architecture
	Typical JMS Messaging Process
	Transacted Messaging
	JMS Administrative Tasks
	Oracle WLS JMS Implementation
	Road Map
	Creating a JMS Server
	Configuring a JMS Server
	Targeting a JMS Server to a Managed Server
	JMS Modules
	Creating a JMS Module
	Modular JMS Resource Configuration and Deployment
	Connection Factories
	Creating a Connection Factory
	Configuring a Connection Factory
	Queue Destinations
	Topic Destinations
	Creating a Destination (Topic)
	Threshold, Quota, and Paging
	Configuring Thresholds and Quotas
	Road Map
	Durable Subscribers and Subscriptions
	How a Durable Subscription Works
	Configuring a Durable Subscription
	Persistent Messaging
	Creating a JMS Store
	Creating a JDBC Store for JMS
	Creating a JMS JDBC Store
	Assigning a Store to a JMS Server
	Persistent Connection Factory
	Configuring Destination Overrides
	Road Map
	Monitoring JMS Servers
	Monitoring and Managing Destinations (Active Queues and Topics)
	Monitoring Queues
	Managing Messages in a Queue
	Practice 15 Overview: Configuring JMS Resources
lesson 16: Introduction to Clustering
	Road Map
	What Is a Cluster?
	Benefits of Clustering
	What Can Be Clustered
	Proxy Servers for HTTP Clusters
	High Availability for EJBs
	Road Map
	Selecting a Cluster Architecture
	Cluster Architecture
	Basic Cluster Architecture
	Basic Cluster Architecture: Advantages and Disadvantages
	Multitier Cluster Architecture
	Multitier: Advantages and Disadvantages
	Basic Cluster Proxy Architecture
	Multitier Cluster Proxy Architecture
	Proxy Web Server Plug-In Versus Load Balancer
	Proxy Plug-Ins
	OHS as Proxy Web Server
	Request Flow When Using OHS
	WLS HttpClusterServlet
	Road Map
	Server Communication in a Cluster
	One-To-Many Communications
	Considerations When Using Unicast
	Peer-To-Peer Communications
	Clusterwide JNDI Naming Service
	Name Conflicts and Resolution
lesson 17: Configuring a Cluster
	Road Map
	Preparing Your Environment
	IP Addresses and Host Names
	Cluster Address
	Road Map
	Methods of Configuring Clusters
	Creating a Cluster by Using  the Administration Console
	Setting Cluster Attributes
	Configuring Cluster Communication
	Adding Cluster Members: Option 1
	Adding Cluster Members: Option 2
	Creating a Cluster with the Configuration Wizard
	Creating a Cluster Using the Cluster MBean
	Clusters and WLST
	Synchronizing When Starting Servers in a Cluster
	Configuring OHS as Proxy Server
	Starting and Stopping OHS Manually
	Verifying Access Through OHS
	Successful Access of OHS Splash Page
	Practice 17 Overview: Configuring Clusters
lesson 18: Managing Clusters
	Road Map
	Deploying Applications to a Cluster
	Two-Phase Deployment
	Considerations for Deploying to Cluster
	Production Redeployment in a Cluster
	Road Map
	HTTP Session Failover
	HTTP Session State Replication
	HTTP Session In-Memory Replication
	In-Memory Replication and Proxy Servers
	In-Memory Replication
	In-Memory Replication: Example
	Requirements for In-Memory Replication
	Configuring In-Memory Replication
	Failover with Load Balancer
	Replication Groups
	Configuring Replication Groups
	Replication Groups for Different Criteria
	HTTP Session Persistence Using JDBC
	Configuring JDBC Persistence
	JDBC Persistent Table Configuration
	HTTP Session Persistence Using Files
	Configuring File Persistence
	HTTP State Management Best Practices
	Road Map
	Clustering EJB Objects: Replica-Aware Stub
	EJB: Server Failure Situations
	Load-Balancing Clustered EJB Objects
	Stateless Session Bean Failover
	Configuring EJB Clustering in Deployment Descriptors
	Configuring EJB Clustering Using the Administration Console
	Configuring Clusterable Stateless Session EJBs
	Stateful Session Beans
lesson 19: Security Concepts and Configuration
	Road Map
	Introduction to Oracle WebLogic Security Service
	Oracle Platform Security Services
	Oracle WLS Security Architecture
	Security Services
	Overview of Security Concepts
	Credential Mapping
	Road Map
	Security Realms
	Security Model Options for Applications
	How WLS Resources Are Protected
	Users and Groups
	Configuring New Users
	Configuring New Groups
	Configuring Group Memberships
	Embedded LDAP Server
	Configuring an Embedded LDAP
	Road Map
	Security Roles
	Configuring the Global Security Role
	Security Policies
	Policy Conditions
	Protecting Web Applications
	Specifying Protected Web Resources
	Defining Policies and Roles for Other Resources
	Configuring Authentication
	Authentication Examples
	Migrating Security Data
	Exporting the WLS Default Authenticator Provider
	Importing into a Different Domain
	Practice 19: Overview Configuring Security for WLS Resources
lesson 20: Protecting Against Attacks
	Road Map
	What Is SSL?
	Trust and Identity
	Using an SSL Connection
	Enabling Secure Communication
	Oracle WebLogic Server SSL Requirements
	keytool Utility
	Obtaining a Digital Certificate: keytool Examples
	Configuring Keystores
	Configuring SSL for an Oracle WebLogic Server
	Road Map
	Protecting Against Attacks
	Man-in-the-Middle Attacks
	Man-in-the-Middle: Countermeasures
	Configuring a Hostname Verifier
	Denial of Service Attacks
	Denial of Service Attacks: Countermeasures
	Filtering Network Connections
	Connection Filter
	Excessive Resource Consumption
	Large Buffer Attacks
	Setting the Post Size
	Connection Starvation
	User Lockout
	Configuring User Lockout
	Unlocking Users
	Protecting the Administration Console
	Practice 20: Overview Configuring Keystores
lesson 21: Backup and Recovery Operations
	Road Map
	Review of Terms and Components
	Homes: Oracle, Middleware, WebLogic
	Understanding Backup and Recovery
	Types of Backups
	Backup Recommendations
	Limitations and Restrictions for Backing Up Data
	Performing a Full Offline Backup
	Backing Up a Domain Configuration
	Backing Up an Instance Home
	Creating a Record of Installations
	Road Map
	Directories to Restore
	Recovery After Disaster
	Recovery of Homes
	Recovery of a Managed Server
	Recovery of the Administration Server Configuration
	Restarting an Administration Server on a New Computer
	Recovery of a Cluster
	Restoring OPMN-Managed Components to a New Computer
	Practice 21 Overview: Backing Up and Restoring Configuration and Data
Document Text Contents
Page 1

Oracle WebLogic Server 11g:
Administration Essentials
Volume I • Student Guide


Edition 2.0

July 2010


Page 2

Copyright © 2010, Oracle and/or it affiliates. All rights reserved.


This document contains proprietary information and is protected by copyright and
other intellectual property laws. You may copy and print this document solely for your
own use in an Oracle training course. The document may not be modified or altered in
any way. Except where your use constitutes "fair use" under copyright law, you may
not use, share, download, upload, copy, print, display, perform, reproduce, publish,
license, post, transmit, or distribute this document in whole or in part without the
express authorization of Oracle.

The information contained in this document is subject to change without notice. If you
find any problems in the document, please report them in writing to: Oracle University,
500 Oracle Parkway, Redwood Shores, California 94065 USA. This document is not
warranted to be error-free.

Restricted Rights Notice

If this documentation is delivered to the United States Government or anyone using
the documentation on behalf of the United States Government, the following notice is

The U.S. Government’s rights to use, modify, reproduce, release, perform, display, or
disclose these training materials are restricted by the terms of the applicable Oracle
license agreement and/or the applicable U.S. Government contract.

Trademark Notice

Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names
may be trademarks of their respective owners.

Shankar Raman
Steve Friedberg

Technical Contributors
and Reviewers
Anand Rudrabatla
Angelika Krupp
Bala Kothandaraman
David Cabelus
Holger Dindler Rasmussen
Matthew Slingsby
Mike Blevins
Mike Lehmann
Nagavalli Pataballa
Serge Moiseev
Shailesh Dwivedi
Steve Button
Takyiu Liu
TJ Palazzolo
Werner Bauer
William Albert
Will Hopkins

Graphic Designer
Satish Bettegowda

Amitha Narayan
Malavika Jinka

Shaik Mahaboob Basha
Veena Narasimhan

Page 181

Copyright © 2010, Oracle and/or its affiliates. All rights reserved.

Managing Clusters

Page 359

Oracle WebLogic Server 11g: Administration Essentials Glossary - 5

O/R object-relational
OAAM Oracle Adaptive Access Manager
OASIS Organization for the Advancement of Structured Information Standards
OBE Oracle By Example. Self-paced Web-based training on OTN.
ODBC Open Database Connectivity
OEPE Oracle Enterprise Pack for Eclipse
OHS Oracle HTTP Server
OID Oracle Internet Directory
OOTB Out Of The Box (by default; without modification)
OPMN Oracle Process Manager and Notification Server
OPSS Oracle Platform Security Services
ORB Object Request Broker
OS Operating system (examples: Windows, Linux)
OTN Oracle Technology Network.
PAM Pluggable Authentication Module
PKI Public Key Infrastructure
PTP Point To Point
QoS Quality of Service
RAC Real Application Clusters (for multihost databases)
RAR Resource Adapter Archive
RBAC Role-Based Access Control (part of JPS)
RCU Repository Creation Utility
RMAN Recovery Manager (for the database)
RMI Remote Method Invocation
RSH Remote Shell (as opposed to SSH)
SAF store-and-forward
SAML Security Assertion Markup Language
SDK Software development kit (programming tools)
SHA Secure Hash Algorithm
SLA service-level agreements
SNMP Simple Network Management Protocol
SOA Service-Oriented Architecture
SOAP Simple Object Access Protocol
SQL Structured Query Language
SSH Secure Shell (as opposed to RSH)
SSL Secure Sockets Layer
SSPI Security Services Provider Interface

Page 360

Oracle WebLogic Server 11g: Administration Essentials Glossary - 6

T3 An optimized, proprietary communications protocol used to transport data
between WebLogic Server and other Java programs, including clients and other
WebLogic Servers.

T3S T3 protocol using SSL
TAR Tape Archive
TCP Transmission Control Protocol
TLS Transport Layer Security
TTL time-to-live
URL Uniform Resource Locator
VM Virtual Machine
WAN Wide Area Network
WAR Web Archive
WLDF WebLogic Diagnostics Framework
WLS WebLogic Server
WLST WebLogic Scripting Tool
WSIT Web Services Interoperability Technologies
XA X/Open Distributed Transaction Processing (part of two-phase commit)
XACML eXtensible Access Control Markup Language
XML Extensible Markup Language

Similer Documents