Oracle delivers secure infrastructure through a wide range of products, processes, and technologies to help prevent unauthorized access to confidential information, reduce the cost of managing users, and facilitate privacy management. (Note: Oracle does not validate the information on any third-party sites or content you may see here.)
January 2015 Critical Patch Update Released
This Oracle Critical Patch Update provides 169 new fixes for security issues across a wide range of product families.
posted Tue, 20 Jan 2015 22:24:31 +0000
The Future of User Authentication
"The best authentication model is useless if customers or employees find it difficult to use," says Prateek Mishra. "This is the key reason why it has proven so difficult to transition away from passwords."
posted Wed, 14 Jan 2015 16:55:17 +0000
Resilience: Bouncing Back When Bad Things Happen
"From an IT perspective, the next time you design a solution or a system, stop and think about how your solution or system could be designed for greater resilience. You'd be amazed how simple and inexpensive it can be once you invest a little brain power."
posted Mon, 12 Jan 2015 14:51:33 +0000
Minecraft and Identity Management: What an Identity Management guy learned from managing a world populated by tweens and teens
In the span of two years, Oracle Identity Management and Mobile Security product management VP Clayton Donley, has learned a lot about managing a system where the bulk of the users have pre-teen or early teen levels of maturity. He shares lessons learned in this informative and entertaining article.
posted Mon, 05 Jan 2015 18:16:00 +0000
BPM Workspace Login with libOVD and LDAP, Part 2: Login
Part 2 in solution architect Siming Mu's series examines what happens inside libOVD when you actually click on the login button in BPM Workspace.
posted Fri, 19 Dec 2014 15:47:22 +0000
Securing Access with OAuth2: How to deal with OAuth Scopes
Oracle uses OAuth2 to secure access to Web Services exposed by Oracle Public Cloud services. While the standard itself is relatively straightforward, there are a couple of areas that each implementation must address on its own. Vadim Lander's article looks at one such area: OAuth scopes.
posted Wed, 10 Dec 2014 14:27:36 +0000