database security

Security

Oracle delivers secure infrastructure through a wide range of products, processes, and technologies to help prevent unauthorized access to confidential information, reduce the cost of managing users, and facilitate privacy management. (Note: Oracle does not validate the information on any third-party sites or content you may see here.)

 View the most recent Critical Patch Update Advisory
  Read the Oracle Software Security Assurance Blog

What's New

Untitled Document
A Beginner’s How-To on Social Federation with OAM Mobile & Social
Want to leverage identities in Social Network providers in your applications? This article by Andre Correa examines the necessary configuration in Oracle Access Manager Mobile and Social server to enable Java Web applications to leverage Google and LinkedIn identities.
posted Wed, 15 Oct 2014 12:30:10 +0000
Oracle Access Manager Post Authentication Operation
A concise, illustrated technical post from Fusion Middleware A-Team solution architect Kiran Thakkar
posted Wed, 15 Oct 2014 12:29:52 +0000
Prepare Your Fusion Applications for Security Audits – Part 1
The underlying identity management components in Fusion Apps -- Oracle Identity Manager (OIM) and Oracle Access Manager (OAM) -- come with predefined reports that provide a good starting point for your security audits. This is the first of three articles that cover how to extend your Fusion Applications environment with these pre-packaged reports.
posted Tue, 07 Oct 2014 13:09:01 +0000
Managing the performance impact of OID last login tracking
Having last login tracking enabled in Oracle Internet Directory can have a substantial performance cost. But don't worry! A-Team solution architect simon Kissane has a cure for that headache that's better than aspirin.
posted Thu, 18 Sep 2014 16:03:19 +0000
Integrating With Fusion Application Using Services (SoapUi - SSL) (Fusion Applications Developer Relations)
Part of a series of articles by Jani Rautianen that describes how to invoke SOAP web services provided by Fusion Applications using various technologies, this article focuses on a call to service secured with an SSL policy.
posted Tue, 09 Sep 2014 15:19:44 +0000
One-Way Authentication Policies in OSB
This article by Jess Stephens describes the steps to create a WLS 9 policy and attach it to an OSB proxy service so that it is only enforced on the outbound request.
posted Tue, 02 Sep 2014 17:08:23 +0000
More...