Posts

How to make OHS server proxy for 2 Weblogic servers

<IfModule mod_weblogic.c> MatchExpression /<URI> WebLogicHost=<hs1>:<port> MatchExpression /<URI> WebLogicHost=<hs2>:<port> </IfModule>

Types of Virtualization

Virtualization Types docs.aws.amazon.com View Original June 15th, 2014 Amazon Machine Images use one of two types of virtualization: paravirtual (PV) or hardware virtual machine (HVM). Some current generation instance types support only HVM AMIs, while some previous generation instance types support only PV AMIs. The main difference between PV and HVM AMIs is the way in which they boot and whether or not they can take advantage of special hardware extensions (CPU, network, and storage) for better performance. Paravirtual (PV) Paravirtual AMIs boot with a special boot loader called PV-GRUB, which starts the boot cycle and then chain loads the kernel specified in the menu.lst  file on your image. Only Linux AMIs can use PV virtualization. Paravirtual guests can run on host hardware that does not have explicit support for virtualization, but they cannot take advantage of special hardware extensions such as enhanced networking or GPU processing. Historically, PV guests had

What is C4CA

C4CA is  Citizen and Commerce Class Common Certification Authority C4 is a streamlined process based on memorandum of agreement rather than detailed review  of CP and CPS for compliance. The C4 policy is modeled against the FBCA Rudimentary  level of assurance and defines requirements for certificates accepted by the U.S. Federal  Government for the purpose of authenticating citizens and commercial enterprises for many  electronic services.  Certification authorities and credential services by citizens and  companies (e.g., AOL, Wells Fargo, PEPCO) conducting business with the federal  government are subordinate to, or have the option to two-way cross-certify with, the C4 CA. 

Federal PKI

PUBLIC KEY INFRASTRUCTURES - FEDERAL PKI Federal PKI NIST plays a leading role in the deployment of the Federal PKI, serving as an advisor for architectural issues and leading the development, evaluation, and maintenance of certificate policies for the Federal PKI. The Federal PKI architecture features the Federal Bridge Certification Authority (FBCA), which supports interoperability among PKI domains with disparate policies in a peer to peer fashion, and the Common Policy Root CA, which manages a hierarchical PKI. FPKI Architecture The FBCA operates under the FBCA Certificate Policy, which specifies five levels of assurance. The FBCA issues certificates to the Principal CA of a PKI domain after the Federal PKI Policy Authority: (1) determines which FBCA levels of assurance are satisfied by the policies supported in that PKI domain; (2) determines that the PKI domain fulfills its responsibilities under those policies; and (3) establishes a legal agreement between the FBCA and

OIM 11gR1 decrypt password

Image
http://oraclestack.blogspot.com/2013/05/oim-11g-r1-getting-oim-user-decrypted.html OIM 11g R1: Getting OIM User Decrypted Password Version:   Oracle Identity Manager 11g R1 Description:  If you look at the OIM.USR table, you'll notice that the password column is encrypted. There are several ways to get the password decrypted. I'll be showing you how to get the decrypted password by querying from the OIM database using the tcDataBaseClient. This requires you to set the client handle with the OIMClient object. The user who is logged in for the OIMClient needs to be an End-User Administrator in order to use the tcDatabaseClient. The “Design Console Access” attribute on the OIM User Profile determines whether a user is an End-User or an End-User Administrator. Below is a java application to get all the OIM users' passwords in plain text.  Note: You can also query the OIM.PCQ table to get users' challenge questions and answers. ? 1 2 3 4 5 6 7 8