database security

Security

Oracle delivers secure infrastructure through a wide range of products, processes, and technologies to help prevent unauthorized access to confidential information, reduce the cost of managing users, and facilitate privacy management. (Note: Oracle does not validate the information on any third-party sites or content you may see here.)

 View the most recent Critical Patch Update Advisory
  Read the Oracle Software Security Assurance Blog

What's New

Untitled Document
How Oracle Identity Manager Uses MDS
Do you really understand how Oracle Identity Manager (OIM), uses the Oracle Metadata Services (MDS) XML configuration store? You will after you read solution architect Simon Kissane's detailed explanation.
posted Thu, 24 Apr 2014 13:36:08 +0000
How Oracle Identity Manager Uses MDS
Do you really understand how Oracle Identity Manager (OIM), uses the Oracle Metadata Services (MDS) XML configuration store? You will after you read solution architect Simon Kissane's detailed explanation.
posted Thu, 24 Apr 2014 13:34:14 +0000
OIM Clustering: Keeping separate environments separate
For testing and development purposes, it is common to have multiple distinct OIM environments co-existing on the same subnet. In that scenario, it is essential that the distinct environments utilize separate multicast addresses, so that they do not talk to each other. How-to from solution architect Simon Kissane.
posted Thu, 17 Apr 2014 13:00:28 +0000
OUD External change log and rootDSE search
Sylvain Duloutre shares the command to run on Oracle Unified Directory servers to disable the external changelog without disabling the underlying replication changelog used by the replication.
posted Tue, 08 Apr 2014 19:31:48 +0000
Blog: Integrating ADFS 2.0 with OIF: Pre-Requisites
In this article, the first in a 3-part series, Damien Carru describes how to integrate OIF (11.1.2.2.0 or later) with ADFS 2.0 for Federation SSO using the SAML 2.0 protocol.
posted Mon, 07 Apr 2014 14:44:33 +0000
Analyzing How Blog: MDM and MAM Stack Up Against Your Mobile Security Requirements
"As the mobile access landscape changes...there is also a seismic shift taking place in the underlying mobile security models, " says Matt Flynn. He explores some of those models in this post.
posted Thu, 03 Apr 2014 15:36:26 +0000
More...
Left Curve
Popular Downloads
Right Curve
Untitled Document