About the Authors |
|
xix | |
About the Technical Reviewers |
|
xxi | |
Acknowledgments |
|
xxiii | |
CHAPTER 1 Overview of Features, Editions, and Releases |
|
|
|
1 | (3) |
|
Deciding Which Features You Need |
|
|
3 | (1) |
|
Choosing a Release Version |
|
|
4 | (2) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
5 | (1) |
|
|
6 | (2) |
|
Servlets and JavaServer Pages |
|
|
6 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
Java Database Connectivity and J2EE Connectors |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
7 | (1) |
|
|
8 | (1) |
|
|
8 | (5) |
|
|
8 | (1) |
|
|
9 | (1) |
|
Application Server Control |
|
|
9 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
Oracle Internet Directory |
|
|
11 | (1) |
|
|
11 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
12 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (2) |
CHAPTER 2 Developing with Oracle 10g AS |
|
15 | (8) |
|
Choosing an Edition for Developers |
|
|
15 | (2) |
|
Consider Application Requirements |
|
|
15 | (1) |
|
Consider Developer Experience |
|
|
16 | (1) |
|
Setting Up the Development Environment |
|
|
16 | (1) |
|
Choosing an Edition for Testing |
|
|
17 | (1) |
|
|
17 | (1) |
|
Running Integration Tests |
|
|
17 | (1) |
|
Running Performance Tests |
|
|
18 | (1) |
|
Environmental Considerations |
|
|
18 | (1) |
|
Strategies for Development |
|
|
18 | (1) |
|
|
19 | (1) |
|
Strategies for Deployment |
|
|
20 | (1) |
|
Accessing J2EE Applications |
|
|
21 | (1) |
|
|
21 | (2) |
CHAPTER 3 OC4J Installation and Runtime Behavior |
|
23 | (18) |
|
Installing the Standalone Server |
|
|
23 | (5) |
|
Downloading and Setting Up OC4J Standalone |
|
|
24 | (1) |
|
Testing Your Installation |
|
|
25 | (2) |
|
Exploring the Server Directory Structure |
|
|
27 | (1) |
|
|
28 | (4) |
|
|
28 | (1) |
|
|
29 | (1) |
|
|
30 | (1) |
|
|
31 | (1) |
|
Running as a Windows Service |
|
|
31 | (1) |
|
Running as a UNIX Service |
|
|
32 | (1) |
|
|
32 | (8) |
|
|
32 | (2) |
|
|
34 | (5) |
|
|
39 | (1) |
|
Performance and Memory Usage |
|
|
39 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
CHAPTER 4 General Server Configuration |
|
41 | (18) |
|
Working with Configuration Files |
|
|
41 | (3) |
|
Configuring Application-level Resources |
|
|
41 | (1) |
|
Editing Configuration Files |
|
|
42 | (1) |
|
Managing Multiple Configurations |
|
|
42 | (2) |
|
Finding the Right Configuration File |
|
|
44 | (2) |
|
|
46 | (2) |
|
Configuring Log Filenames and Locations |
|
|
46 | (1) |
|
Redirecting Standard Output and Error Streams |
|
|
47 | (1) |
|
Using OC4J Debug Parameters |
|
|
47 | (1) |
|
Configuring File Locations |
|
|
48 | (1) |
|
|
49 | (3) |
|
|
49 | (1) |
|
|
50 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
51 | (1) |
|
|
52 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
53 | (1) |
|
|
54 | (1) |
|
Configuring Other J2EE Services |
|
|
54 | (1) |
|
Configuring HTTP Connection Throttling |
|
|
54 | (1) |
|
Configuring Deployment Behavior |
|
|
55 | (2) |
|
application-auto-deploy-directory |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
57 | (1) |
|
|
58 | (1) |
CHAPTER 5 Configuring JNDI and JDBC Services |
|
59 | (20) |
|
Java Naming and Directory Interface |
|
|
59 | (2) |
|
Understanding JNDI Locations |
|
|
60 | (1) |
|
|
61 | (1) |
|
Accessing Databases from J2EE Applications |
|
|
61 | (3) |
|
Simple Database Access in Non-J2EE Environment |
|
|
61 | (1) |
|
Database Access in a J2EE Environment |
|
|
62 | (2) |
|
|
64 | (4) |
|
Choosing the Right Driver |
|
|
65 | (3) |
|
Choosing a Data Source Type |
|
|
68 | (1) |
|
|
68 | (6) |
|
Customizing Data-Source Attributes |
|
|
71 | (2) |
|
Customizing Data Source Properties |
|
|
73 | (1) |
|
|
74 | (1) |
|
|
74 | (2) |
|
Determining the Correct JNDI Location |
|
|
75 | (1) |
|
Overriding the Default Username and Password |
|
|
75 | (1) |
|
Using Oracle JDBC extensions |
|
|
75 | (1) |
|
Configuring Two-Phase Commit |
|
|
76 | (1) |
|
|
77 | (2) |
CHAPTER 6 Configuring Java Message Service |
|
79 | (20) |
|
JMS in Oracle 10g Application Server |
|
|
79 | (2) |
|
The Resource Provider Model |
|
|
80 | (1) |
|
Configuring and Using Oracle 10g AS JMS |
|
|
81 | (12) |
|
|
81 | (2) |
|
Building and Configuring an Application |
|
|
83 | (7) |
|
Configuring File Persistence |
|
|
90 | (2) |
|
Configuring Hosts and Ports |
|
|
92 | (1) |
|
|
92 | (1) |
|
|
93 | (2) |
|
|
93 | (1) |
|
Configuring Oracle 10g AS |
|
|
94 | (1) |
|
Configuring the Hello World Application |
|
|
95 | (1) |
|
Configuring Third-Party JMS |
|
|
95 | (2) |
|
|
97 | (1) |
|
|
98 | (1) |
CHAPTER 7 Security |
|
99 | (26) |
|
Introduction to J2EE Security |
|
|
100 | (1) |
|
Introduction to the Java Authentication and Authorization Service |
|
|
100 | (24) |
|
Oracle Application Server Security Overview |
|
|
102 | (2) |
|
Creating and Configuring a Secure Application |
|
|
104 | (11) |
|
Administering the HelloServlet Application with JAZN Admintool |
|
|
115 | (1) |
|
Using the JAZNUserManager LDAP Provider |
|
|
116 | (3) |
|
Using DataSourceUserManager |
|
|
119 | (3) |
|
|
122 | (1) |
|
Choosing Your Security Method |
|
|
123 | (1) |
|
|
124 | (1) |
CHAPTER 8 Using JavaMail and Java APIs for XML |
|
125 | (12) |
|
|
125 | (9) |
|
Building an Application with JavaMail and JNDI |
|
|
125 | (1) |
|
Configuring a Mail Session |
|
|
126 | (1) |
|
Creating a Local Resource Reference |
|
|
127 | (1) |
|
|
128 | (1) |
|
Building the JavaMailServlet |
|
|
129 | (4) |
|
Choosing Between Global and Local Namespaces |
|
|
133 | (1) |
|
|
134 | (2) |
|
Determining your JAX version |
|
|
134 | (1) |
|
Overriding the JAX implementation |
|
|
135 | (1) |
|
|
135 | (1) |
|
|
136 | (1) |
CHAPTER 9 J2EE Application Deployment |
|
137 | (22) |
|
|
137 | (1) |
|
|
138 | (3) |
|
OC4J Server Configuration Files |
|
|
139 | (1) |
|
Application Configuration Files |
|
|
140 | (1) |
|
Organization and Packaging |
|
|
141 | (9) |
|
|
142 | (1) |
|
|
143 | (5) |
|
Enterprise Archive (EAR) File |
|
|
148 | (2) |
|
|
150 | (7) |
|
|
150 | (3) |
|
Explanation of Deployment |
|
|
153 | (3) |
|
Forcing a Automatic Redeployment |
|
|
156 | (1) |
|
|
157 | (2) |
CHAPTER 10 Web Applications |
|
159 | (36) |
|
Building and Deploying Applications |
|
|
159 | (13) |
|
|
159 | (7) |
|
|
166 | (2) |
|
|
168 | (4) |
|
Configuring orion-web.xml |
|
|
172 | (20) |
|
First Look at orion-web.xml |
|
|
173 | (2) |
|
Overriding Context Parameters and Environment Variables |
|
|
175 | (2) |
|
|
177 | (4) |
|
File Types, Locations, and Type-Based Filters |
|
|
181 | (3) |
|
|
184 | (1) |
|
|
185 | (1) |
|
Session Configuration, Session and Request Tracking |
|
|
186 | (2) |
|
Resolving Resource References and EJB References |
|
|
188 | (1) |
|
Security Configuration and Resolving Security Roles |
|
|
189 | (1) |
|
Host and Network-Based Access Control |
|
|
190 | (1) |
|
Summary of Overriding web.xml Settings |
|
|
191 | (1) |
|
Using the Application Server Control |
|
|
192 | (1) |
|
|
193 | (2) |
CHAPTER 11 Enterprise JavaBeans |
|
195 | (32) |
|
|
195 | (1) |
|
|
196 | (2) |
|
|
198 | (1) |
|
Configuring EJB Deployments |
|
|
198 | (27) |
|
Session Bean Deployment Header |
|
|
198 | (2) |
|
Entity Bean Deployment Header |
|
|
200 | (17) |
|
Message-Driven Bean Deployment Header |
|
|
217 | (2) |
|
|
219 | (1) |
|
Resolving Resource References |
|
|
220 | (1) |
|
Resolving Resource env References |
|
|
221 | (1) |
|
Overriding Environment Entries |
|
|
222 | (1) |
|
Asynchronous Invocation with AC4J |
|
|
222 | (2) |
|
RMI/IIOP Security Interoperability |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
226 | (1) |
CHAPTER 12 J2EE Connectors |
|
227 | (24) |
|
What Are J2EE Connectors? |
|
|
227 | (1) |
|
OC4J Support for Connectors |
|
|
228 | (1) |
|
|
229 | (7) |
|
|
229 | (7) |
|
|
236 | (7) |
|
Basic Packaging and Configuration |
|
|
236 | (1) |
|
OC4J Connector Descriptor |
|
|
237 | (1) |
|
Configuring the Name and JNDI Location |
|
|
238 | (1) |
|
Overriding Values from ra.xml |
|
|
238 | (1) |
|
Configuring Connection Pooling |
|
|
238 | (1) |
|
|
239 | (4) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
243 | (6) |
|
|
249 | (2) |
CHAPTER 13 Configuring Web Services |
|
251 | (16) |
|
Choosing a Web-Service Implementation Type |
|
|
251 | (1) |
|
Creating the Echo Web Service |
|
|
252 | (5) |
|
Building the Web-Service Interface |
|
|
252 | (1) |
|
Building the Stateless Implementation |
|
|
252 | (1) |
|
Building the Stateful Implementation |
|
|
253 | (1) |
|
Configuring and Deploying the Web Service |
|
|
253 | (2) |
|
Using Stateless Session Beans |
|
|
255 | (2) |
|
|
257 | (3) |
|
Testing the echo Operation |
|
|
259 | (1) |
|
Creating Web-Service Clients |
|
|
260 | (5) |
|
Building the Apache Axis Client |
|
|
260 | (1) |
|
Building the Proxy Client |
|
|
261 | (2) |
|
|
263 | (2) |
|
|
265 | (2) |
CHAPTER 14 Application Clients |
|
267 | (12) |
|
|
267 | (1) |
|
Connecting from a J2SE Client |
|
|
268 | (4) |
|
|
268 | (1) |
|
|
269 | (1) |
|
Authenticating Through JNDI |
|
|
269 | (1) |
|
Authenticating Through JAAS |
|
|
270 | (1) |
|
|
271 | (1) |
|
|
272 | (1) |
|
Connecting from a J2EE Application Client |
|
|
272 | (5) |
|
|
272 | (1) |
|
|
273 | (1) |
|
Implementing a JAAS CallbackHandler |
|
|
274 | (1) |
|
Server-Side Configuration |
|
|
275 | (1) |
|
|
276 | (1) |
|
|
277 | (2) |
CHAPTER 15 Architecture and Deployment Topologies |
|
279 | (24) |
|
|
279 | (5) |
|
|
280 | (4) |
|
|
284 | (12) |
|
|
284 | (3) |
|
|
287 | (7) |
|
|
294 | (2) |
|
|
296 | (5) |
|
Standalone J2EE with Web Cache |
|
|
296 | (2) |
|
Business Intelligence and Forms |
|
|
298 | (2) |
|
J2EE Clusters with Web Cache |
|
|
300 | (1) |
|
|
301 | (2) |
CHAPTER 16 Installation and Administration |
|
303 | (40) |
|
|
303 | (23) |
|
Preinstallation Requirements |
|
|
304 | (10) |
|
|
314 | (12) |
|
|
326 | (16) |
|
|
327 | (1) |
|
Application Server Control Utility |
|
|
328 | (6) |
|
|
334 | (8) |
|
|
342 | (1) |
CHAPTER 17 Configuring J2EE Services |
|
343 | (26) |
|
|
343 | (5) |
|
|
344 | (1) |
|
|
345 | (1) |
|
|
346 | (2) |
|
|
348 | (3) |
|
|
348 | (1) |
|
|
349 | (2) |
|
Configuration Utilities and Options |
|
|
351 | (9) |
|
Monitoring and Tuning Utilities |
|
|
360 | (7) |
|
Application Server Control Log Utilities |
|
|
360 | (3) |
|
|
363 | (1) |
|
|
364 | (3) |
|
|
367 | (2) |
CHAPTER 18 Deploying Applications |
|
369 | (20) |
|
|
369 | (1) |
|
Creating a Dedicated OC4J Instance |
|
|
370 | (4) |
|
|
370 | (1) |
|
|
371 | (3) |
|
Deploying and Undeploying Applications with the ASC |
|
|
374 | (6) |
|
|
374 | (5) |
|
|
379 | (1) |
|
|
380 | (1) |
|
Deploying and Undeploying Applications Manually |
|
|
380 | (3) |
|
|
381 | (1) |
|
|
382 | (1) |
|
|
382 | (1) |
|
Modifying Application Configurations with the ASC |
|
|
383 | (4) |
|
Default Application Settings |
|
|
383 | (1) |
|
Application-Specific Settings |
|
|
384 | (3) |
|
|
387 | (2) |
CHAPTER 19 Configuring Web Caching |
|
389 | (34) |
|
|
389 | (6) |
|
|
390 | (3) |
|
|
393 | (1) |
|
|
394 | (1) |
|
|
395 | (15) |
|
|
396 | (6) |
|
|
402 | (5) |
|
|
407 | (3) |
|
|
410 | (5) |
|
|
411 | (1) |
|
|
412 | (1) |
|
|
413 | (1) |
|
|
414 | (1) |
|
Web Cache Detailed Statistics Monitor |
|
|
414 | (1) |
|
Cacheability Rules and Invalidation |
|
|
415 | (6) |
|
|
416 | (2) |
|
|
418 | (1) |
|
|
419 | (2) |
|
|
421 | (2) |
CHAPTER 20 Configuring Enterprise Security |
|
423 | (34) |
|
Threats and Impacted Parties |
|
|
423 | (3) |
|
|
424 | (1) |
|
|
425 | (1) |
|
Web Security Fundamentals |
|
|
426 | (11) |
|
|
426 | (4) |
|
Network Design and Firewalls |
|
|
430 | (2) |
|
Shut Down Unnecessary Services and Ports |
|
|
432 | (1) |
|
|
433 | (1) |
|
Check Security Alerts Regularly |
|
|
434 | (1) |
|
Use Common Sense and Be Vigilant |
|
|
435 | (1) |
|
|
436 | (1) |
|
Securing the Application Server Control Utility |
|
|
437 | (6) |
|
Changing Default ASC Port |
|
|
437 | (1) |
|
Changing the ASC ias_admin Password |
|
|
438 | (1) |
|
Encrypting the ASC Traffic with SSL |
|
|
439 | (4) |
|
Secure Sockets Layer and Oracle Wallet Manager |
|
|
443 | (7) |
|
|
443 | (1) |
|
|
444 | (1) |
|
Oracle Certificate Authority |
|
|
445 | (1) |
|
|
445 | (3) |
|
|
448 | (2) |
|
|
450 | (6) |
|
|
450 | (1) |
|
Identity Management Solution |
|
|
451 | (1) |
|
Identity Management Implementation |
|
|
452 | (4) |
|
|
456 | (1) |
CHAPTER 21 Configuring Clustering and Failover |
|
457 | (40) |
|
|
458 | (3) |
|
|
458 | (1) |
|
|
459 | (1) |
|
|
460 | (1) |
|
|
461 | (3) |
|
|
462 | (2) |
|
|
464 | (15) |
|
Installing an Infrastructure |
|
|
464 | (5) |
|
Joining an Infrastructure |
|
|
469 | (8) |
|
|
477 | (2) |
|
|
479 | (12) |
|
Creating a Cluster Instance |
|
|
479 | (2) |
|
Adding Members to a Cluster |
|
|
481 | (4) |
|
|
485 | (6) |
|
Deploying Clustered Applications |
|
|
491 | (2) |
|
|
493 | (3) |
|
|
494 | (2) |
|
|
496 | (1) |
APPENDIX A Server Configuration Files and Document Type Declaration |
|
497 | (22) |
|
Server Configuration Files |
|
|
497 | (22) |
|
|
497 | (1) |
|
|
497 | (22) |
APPENDIX B Deployment Descriptors and Document Type Declaration |
|
519 | (8) |
|
Deployment Descriptor Files |
|
|
519 | (8) |
|
|
519 | (1) |
|
|
519 | (8) |
APPENDIX C Command-Line Utility Usage |
|
527 | (14) |
|
|
527 | (2) |
|
|
527 | (1) |
|
|
527 | (1) |
|
|
527 | (1) |
|
|
528 | (1) |
|
|
529 | (5) |
|
|
529 | (1) |
|
|
530 | (1) |
|
|
530 | (2) |
|
|
532 | (2) |
|
|
534 | (2) |
|
|
534 | (1) |
|
|
535 | (1) |
|
|
535 | (1) |
|
|
536 | (1) |
|
|
536 | (5) |
|
|
536 | (1) |
|
|
536 | (1) |
|
|
536 | (1) |
|
|
537 | (4) |
APPENDIX D Debugging Tips |
|
541 | (8) |
|
10g AS Application Server Control Utility |
|
|
541 | (2) |
|
|
541 | (2) |
|
10g AS Application Server Control Logging |
|
|
543 | (2) |
|
|
543 | (2) |
|
Logging and Debugging Options within OC4J |
|
|
545 | (4) |
|
|
545 | (1) |
|
|
546 | (3) |
INDEX |
|
549 | |