You deploy more than one application to the same WebLogic container. The security is set on
JavaEE level and all deployed JavaEE applications use the same security roles.
What is your recommendation for an architecture with those requirement?
A. Combine all applications into a single one.
B. Define global roles on the WebLogic Domain level.
C. Use Ms Active Directory to keep the roles there.
D. Use Oracle Identity and Access Management solution to simplify the management.
E. Keep role mapping in the external WebLogic Role Mapped developed for that solution.
* Types of Security Roles: Global Roles and Scoped Roles
There are two types of security roles in WebLogic Server:
/ A global security role can be used in any security policy. Oracle provides several default global
roles that you can use out of the box to secure your WebLogic resource
/ A scoped role can be used only in policies that are defined for a specific instance of a
WebLogic resource (such as a method on an EJB or a branch of a JNDI tree). You might never
need to use scoped roles. They are provided for their flexibility and are an extra feature for
Not E: Role mapping is the process whereby principals (users or groups) are dynamically
mapped to security roles at runtime. In WebLogic Server, a Role Mapping provider determines
what security roles apply to the principals stored a subject when the subject is attempting to
perform an operation on a WebLogic resource. Because this operation usual y involves gaining
access to the WebLogic resource, Role Mapping providers are typically used with Authorization
When your WebLogic Server solution needs to be scaled out with additional capacity and you
don't want to add additional hardware, which three techniques should you us?
A. Assign more than one managed server to a physical hardware that allows better CPU
B. Assign more than one application to one managed server to better utilize threads within a
single JVM process.
C. Assign the same application to more than one managed server to load balance requests
D. Assign the same heap size to the managed server across the cluster for easier control of
E. Create a virtualized environment with hypervisor for an easier solution
Answer(s): B, D, E