Search Results

Search found 9779 results on 392 pages for 'articles'.

Page 117/392 | < Previous Page | 113 114 115 116 117 118 119 120 121 122 123 124  | Next Page >

  • Data Source Security Part 1

    - by Steve Felts
    I’ve written a couple of articles on how to store data source security credentials using the Oracle wallet.  I plan to write a few articles on the various types of security available to WebLogic Server (WLS) data sources.  There are more options than you might think! There have been several enhancements in this area in WLS 10.3.6.  There are a couple of more enhancements planned for release WLS 12.1.2 that I will include here for completeness.  This isn’t intended as a teaser.  If you call your Oracle support person, you can get them now as minor patches to WLS 10.3.6.   The current security documentation is scattered in a few places, has a few incorrect statements, and is missing a few topics.  It also seems that the knowledge of how to apply some of these features isn’t written down.  The goal of these articles is to talk about WLS data source security in a unified way and to introduce some approaches to using the available features.  Introduction to WebLogic Data Source Security Options By default, you define a single database user and password for a data source.  You can store it in the data source descriptor or make use of the Oracle wallet.  This is a very simple and efficient approach to security.  All of the connections in the connection pool are owned by this user and there is no special processing when a connection is given out.  That is, it’s a homogeneous connection pool and any request can get any connection from a security perspective (there are other aspects like affinity).  Regardless of the end user of the application, all connections in the pool use the same security credentials to access the DBMS.   No additional information is needed when you get a connection because it’s all available from the data source descriptor (or wallet). java.sql.Connection conn =  mydatasource.getConnection(); Note: You can enter the password as a name-value pair in the Properties field (this not permitted for production environments) or you can enter it in the Password field of the data source descriptor. The value in the Password field overrides any password value defined in the Properties passed to the JDBC Driver when creating physical database connections. It is recommended that you use the Password attribute in place of the password property in the properties string because the Password value is encrypted in the configuration file (stored as the password-encrypted attribute in the jdbc-driver-params tag in the module file) and is hidden in the administration console.  The Properties and Password fields are located on the administration console Data Source creation wizard or Data Source Configuration tab. The JDBC API can also be used to programmatically specify a database user name and password as in the following.  java.sql.Connection conn = mydatasource.getConnection(“user”, “password”); According to the JDBC specification, it’s supposed to take a database user and associated password but different vendors implement this differently.  WLS, by default, treats this as an application server user and password.  The pair is authenticated to see if it’s a valid user and that user is used for WLS security permission checks.  By default, the user is then mapped to a database user and password using the data source credential mapper, so this API sort of follows the specification but database credentials are one-step removed from the application code.  More details and the rationale are described later. While the default approach is simple, it does mean that only one database user is doing all of the work.  You can’t figure out who actually did the update and you can’t restrict SQL operations by who is running the operation, at least at the database level.   Any type of per-user logic will need to be in the application code instead of having the database do it.  There are various WLS data source features that can be configured to provide some per-user information about the operations to the database. WebLogic Data Source Security Options This table describes the features available for WebLogic data sources to configure database security credentials and a brief description.  It also captures information about the compatibility of these features with one another. Feature Description Can be used with Can’t be used with User authentication (default) Default getConnection(user, password) behavior – validate the input and use the user/password in the descriptor. Set client identifier Proxy Session, Identity pooling, Use database credentials Use database credentials Instead of using the credential mapper, use the supplied user and password directly. Set client identifier, Proxy session, Identity pooling User authentication, Multi Data Source Set Client Identifier Set a client identifier property associated with the connection (Oracle and DB2 only). Everything Proxy Session Set a light-weight proxy user associated with the connection (Oracle-only). Set client identifier, Use database credentials Identity pooling, User authentication Identity pooling Heterogeneous pool of connections owned by specified users. Set client identifier, Use database credentials Proxy session, User authentication, Labeling, Multi-datasource, Active GridLink Note that all of these features are available with both XA and non-XA drivers. Currently, the Proxy Session and Use Database Credentials options are on the Oracle tab of the Data Source Configuration tab of the administration console (even though the Use Database Credentials feature is not just for Oracle databases – oops).  The rest of the features are on the Identity tab of the Data Source Configuration tab in the administration console (plan on seeing them all in one place in the future). The subsequent articles will describe these features in more detail.  Keep referring back to this table to see the big picture.

    Read the article

  • How Search Engines Work

    The knowing about how the different search engines are working is necessary for your SEO efforts, weather you do it your self or hire a SEO consultant to it. You should know how the search engines find WebPages, and their well known criteria for determining the ranking that will be displayed in the search results screen.

    Read the article

  • Top SEO Tips - Get Google to Crawl Your Website in Less Than 24 Hours

    No matter if you are a website owner or internet marketing professional it is important to work with Google and from time to time you will need to get Google to crawl yours or you clients website ASAP. This could be for many reasons, one being that your client has changed their domain name or you are launching a new or improved website.

    Read the article

  • Top 10 SEO Lies

    There is a lot of white noise out there about SEO tactics. Sometimes it's hard to keep up with and we fall behind using out dated methods to optimize our websites. Here are the top 10 SEO lies so that you don't make that same mistake.

    Read the article

  • NoSQL For The Rest Of Us

    No one would blame you for strictly associating NoSQL with performance. Most of the back and forth about NoSQL - an umbrella term given for non-relational storage mechanisms - has squarely put the focus on performance, sites with massive traffic, and server farms. It’s an interesting conversation, but one that risks alienating NoSQL from the majority of developers. The Problem Does NoSQL provide us simple developers with any tangible benefit? As a matter of fact, it can - one as significant...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Your Website - Make Your Own Website

    Build a website and profit from the ecommerce revolution that is taking place in the country or at the very least have an internet presence with at least a one page website. Experts tell us that in two years ecommerce is going to be a 300 Billion industry, get yourself a piece of that and you will be all set.

    Read the article

  • MEF (Microsoft Extensibility Framework) made simple (ish)

    Microsoft Extensibility Framework or MEF is one of the great features in Silverlight, designed around making Silverlight applications more extensible generally and provides a much more complete story for the separation of concerns. MEF then begs the question 'Why we care?' and 'What can MEF really do?' and we will address that here.Let us talk about a real world example for a moment.Say you are a vertical selling corporation of some kind, meaning that you sell to companies that do similar things....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Asking Can Make Your Website Stronger

    Google loves links. The premise behind the Google search isn't really about finding websites (we're used to thinking that because that's we use it to do!). It's about creating a stronger Internet through "inter-connectivity."

    Read the article

  • First Page of Google - Necessary Steps to Produce 1st Page Results on Google

    Everyone is fighting to get their website on the first page of Google and rarely have the knowledge or money to hiring a professional firm that specializes in search engine marketing or SEO services. Having your website whether it is a personal website blog or business website that sells products on the first page of Google and the other major search engines will drive that extra needed traffic that you are looking for.

    Read the article

  • Finding a Quality SEO

    When one looks to increase website traffic to his or her online web page, many people are turning to the many SEO services offered throughout the internet. SEO is a way in which one can gain the attention of online engines and increase website traffic through linking with other websites of similar subject matter. Professional search engine optimizers can take a website with virtually no traffic what so ever, and create a program that will drive traffic towards that website within a matter of days.

    Read the article

  • Website Building Prices - Money Getting Out Or Money Getting In?

    You are probably thinking of website building prices which are the contributing factors why you are still hesitating to have that website created for your business. If you are in this mindset of thinking of the costs rather than the benefits, you are probably missing out the big picture which more simply said could be the pay back that a website can give you once you have one that is operational.

    Read the article

  • Emperors dont come cheap

    Sorry I replied in a polite email. Maybe next year, when budgets allow for this. It was addressed to the organizer of TechEd US, which was to be in New Orleans this year. Man, I would have loved to be in new Orleans this year, but, I guess these guys only understand one language and I wont be their puppy any more. You see, they wouldnt pay for my business class flight to TechEd from Israel. Me the great emperor of unit testing?! travelling coach for 12 hours? No thanks. I have better things to...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • SEO Tips For Bloggers

    You will learn how to optimize your blog for popular Search Engines like Google and Yahoo in this article. You will also pick up what are the important areas to look out for when optimizing your blog.

    Read the article

  • SEO For Beginners - A Fast and Easy Overview of How SEO Works and Why it is Important

    If you are just getting started with your online business one of the first and most important things you should be aware of is search engine optimization or "SEO" as it is commonly referred to on the Internet. Search engine optimization involves a number of steps that are necessary to ensure your business is found by your target audience and it will be the foundation upon which you build your online business.

    Read the article

  • Link it Up

    Search Engine Optimization has been widely used as a traffic medium for some time now. Though using it properly can be tricky at times, so do not fall for the tricks.

    Read the article

  • Poor, Bad SEO Techniques

    In today's competitive web market place good search engine and Google rankings are so important when it comes to the fine lines of success or not. There are many SEO companies out there that can offer advice and/or optimise your site for you but when are we going too far?

    Read the article

  • WPF Release History : Q1 2010 SP2 (version 2010.1.0603)

    Q1 2010 SP2 Changes: RadGrid What's New: Added ItemTemplate property to GridViewComboBoxColumn. Added: ColumnWidthChanged and ColumnWidthChanging events. Added: GridViewCsvExportOptions type to control exporting in CSV format. Changed the namespace of LookupElement from Telerik.Windows.Controls to Telerik.Windows.Controls.Gridview. ElementExporting and ElementExported events added to GridViewDataControl. What's Fixed: Fixing problem with ShowInsertRow when clicked numerous times resulting...Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Importance of On-Page SEO in Affiliate Marketing

    You may already have heard that search engine optimization or SEO is important in affiliate marketing. Although it is not everything, SEO is indeed important. The higher you rank in the search engine results pages, the more clients you are likely to have.

    Read the article

  • SEO Marketing With Keywords

    When I begin my SEO marketing campaign, keyword research is very important. This is how I'll set up my keyword campaign. I'll start out with 50 terms to use. Then I'll look at the search volume to see what kind of traffic I can generate to my web site.

    Read the article

< Previous Page | 113 114 115 116 117 118 119 120 121 122 123 124  | Next Page >