database security


Oracle delivers secure infrastructure through a wide range of products, processes, and technologies to help prevent unauthorized access to confidential information, reduce the cost of managing users, and facilitate privacy management. (Note: Oracle does not validate the information on any third-party sites or content you may see here.)

 View the most recent Critical Patch Update Advisory
  Read the Oracle Software Security Assurance Blog

What's New

Untitled Document
Java EE Security API (JSR 375) Update (The Aquarium)

posted Mon, 23 Mar 2015 14:53:52 +0000
Protecting and Accessing Resources with OAuth in Oracle Access Manager
Oracle principal consultant Ronaldo Fernandes demonstrates how to configure OAM to protect a service hosted on WebLogic Server as well as a Web Application (also hosted on WebLogic) consuming it, using 3-legged OAuth flow.
posted Fri, 20 Mar 2015 20:53:30 +0000
Oracle Identity Manager 11G R2 PS2 Catalog Cart Items Customization
Venkat Kurri's article shows you step-by-step how to use Oracle Identity Manager's (OIM) user interface customization capabilities to customize OIM Catalog Cart Items.
posted Fri, 13 Mar 2015 14:40:07 +0000
Securing Oracle MAF Applications with HTTP Basic Authentication |
Ganesh Kamble's detailed, illustrated post walks you step by step through the process of securing a MAF application using HTTP Basic Authentication.
posted Fri, 06 Mar 2015 17:20:15 +0000
Oracle Mobile Application Framework (MAF) Authentication
Oracle MAF offers a robust Authentication and Authorization framework. When used in combination with Oracle Access Management products such as Oracle Mobile and Social Server and Oracle Adaptive Access Manager, you can get the best of the breed security for your application. This article by Ganesh Kample explores the authentication features provided by MAF.
posted Fri, 06 Mar 2015 17:09:29 +0000
Oracle Weblogic SAML2 Authorization
Luis Rodriguez illustrates how to authorize your users in Oracle Weblogic once they have been authenticated by creating the objects from the SSO response.
posted Wed, 25 Feb 2015 14:47:13 +0000
Left Curve
Popular Downloads
Right Curve
Untitled Document