Oracle delivers secure infrastructure through a wide range of products, processes, and technologies to help prevent unauthorized access to confidential information, reduce the cost of managing users, and facilitate privacy management. (Note: Oracle does not validate the information on any third-party sites or content you may see here.)
OIM Clustering: Keeping separate environments separate
For testing and development purposes, it is common to have multiple distinct OIM environments co-existing on the same subnet. In that scenario, it is essential that the distinct environments utilize separate multicast addresses, so that they do not talk to each other. How-to from solution architect Simon Kissane.
posted Thu, 17 Apr 2014 13:00:28 +0000
OUD External change log and rootDSE search
Sylvain Duloutre shares the command to run on Oracle Unified Directory servers to disable the external changelog without disabling the underlying replication changelog used by the replication.
posted Tue, 08 Apr 2014 19:31:48 +0000
Blog: Integrating ADFS 2.0 with OIF: Pre-Requisites
In this article, the first in a 3-part series, Damien Carru describes how to integrate OIF (188.8.131.52.0 or later) with ADFS 2.0 for Federation SSO using the SAML 2.0 protocol.
posted Mon, 07 Apr 2014 14:44:33 +0000
Analyzing How Blog: MDM and MAM Stack Up Against Your Mobile Security Requirements
"As the mobile access landscape changes...there is also a seismic shift taking place in the underlying mobile security models, " says Matt Flynn. He explores some of those models in this post.
posted Thu, 03 Apr 2014 15:36:26 +0000
Blog: Multi Channel Architectures and Securing The Mobile Channel
Ricardo Diaz's post is the first in a series that will cover mobile security risks, look at variety of IDM issues, including MDM, MAM, device management, fraud, secure containers, and extending IdM to mobile
posted Sun, 30 Mar 2014 18:24:27 +0000
Blog: Playing with SSL
Oracle ACE Director Rene vn Wijk shows you how to set up "SSL on a WebLogic Dynamic Cluster (with a few managed servers that have SSL enabled), by using a custom identity and custom trust."
posted Mon, 24 Mar 2014 17:19:48 +0000