Security Technology Center


 最新の Critical Patch Update Advisory を見る
 Oracle Software Security Assurance Blog を読む(US)

What's New

Untitled Document
Oracle Weblogic SAML2 Authorization
Luis Rodriguez illustrates how to authorize your users in Oracle Weblogic once they have been authenticated by creating the objects from the SSO response.
posted Wed, 25 Feb 2015 14:47:13 +0000
Protect JMX Access against Anonymous Access
Jie Chen shows you how to authenticate JMX access with a file-based password and a customized JMXAuthenticator.
posted Wed, 25 Feb 2015 14:43:00 +0000
Externalise the Security of Oracle ADF Applications Using Oracle Entitlements Server
Ganesh Kamble's technical article shows you how you can use Oracle Entitlements Server (OES) to secure the resources of Oracle Application Development Framework (ADF) applications, with a focus on creating policies for securing an ADF application, and then storing those policies in Oracle Internet Directory.
posted Mon, 16 Feb 2015 14:36:36 +0000
Configuring OAM SSO for ATG BCC and Endeca XM
This article by Fusion Middleware A-Team solution architect Jim Prantzalos demonstrates how to use Oracle Access Manager to enable SSO between the ATG Business Control Center (BCC) and Endeca Experience Manager (XM).
posted Tue, 10 Feb 2015 16:17:36 +0000
Fusion Applications User, Role Identity Flow and Initial Bulk Load
When implementing Fusion Applications (FA), enterprise user and role identity data from various HR applications must be migrated to FA so that the users can become part of FA system and be able to use the application. This article by Veer Natarajan covers the important steps in the process and offers helpful tips for a successful user and role load.
posted Thu, 29 Jan 2015 17:01:03 +0000
Building a Scalable, Highly Available Oracle API Gateway 11g Infrastructure in a Cloud Environment
With its focus on service protection, and its authentication mechanisms, message encryption, and security/policy functionalities, Oracle API Gateway (OAG) 11g can be a very powerful tool in the secure provisioning of services in the cloud. This article shows you how to create a cloud-based OAG infrastructure, with high-availability and scalability support.
posted Mon, 26 Jan 2015 14:14:36 +0000


Critical Patch Updateの実装 (PDF)
Database Vault ベスト・プラクティス (PDF)
Oracle Security Overview
Oracle Database Security Guide
Oracle Application Server セキュリティ・ガイド
Oracle Identity Managementによる米国サーベンス・オクスリー(Sarbanes-Oxley, SOX)法への 対応 (PDF)


Learn Database Security Best Practices: Project Lockdown
How To Encrypt Data in Oracle Using PHP
Securing a .NET Application on the Oracle Database
Understanding Transparent Data Encryption
Database Security: Beyond the Password
Using VPD in an Oracle HTML DB Application
Encrypt Your Data Assets
Fine-Grained Auditing in Oracle Database 10g (3-part series)
Oracle 10g Virtual Private Database in Action
More Security Articles...