database security

Security

Oracle delivers secure infrastructure through a wide range of products, processes, and technologies to help prevent unauthorized access to confidential information, reduce the cost of managing users, and facilitate privacy management. (Note: Oracle does not validate the information on any third-party sites or content you may see here.)

 View the most recent Critical Patch Update Advisory
  Read the Oracle Software Security Assurance Blog

What's New

Untitled Document
Understanding OAM 11g ASDK Configuration and Cert Requirements
Oracle provides documentation on developing an Access Client for the OAM 11g ASDK, but getting it to work can be challenging when running the Access Servers in Simple or Cert Mode. Tim Melander's article describes the correct structure of the Access Client configuration including all the required files and code snippets to hopefully save you a lot of time.
posted Tue, 29 Jul 2014 14:07:56 +0000
Why Oracle Big Data SQL Potentially Solves a Big Issue with Hadoop Security
A technical analysis from Oracle ACE Director and business intelligence expert Mark Rittman.
posted Mon, 28 Jul 2014 11:39:21 +0000
Introduction to Fusion Applications Roles Concepts
This post from the Fusion Middleware A-team reviews the definition of %E2%80%9CFunctional Roles%E2%80%9D and provides introductory internals on the technical implementation of these %E2%80%9CRoles%E2%80%9D within Fusion Applications.
posted Mon, 28 Jul 2014 11:09:21 +0000
Tech Article: Playing with ZFS Encryption
Oracle Solaris 11 supports native encryption on ZFS so that it can protect critical data without depending on external programs. It's also integrated with the Cryptographic Framework. Alexandre explains the benefits of these and other Oracle Solaris encryption capabilities, and the different methods for encrypting and decrypting files, file systems, and pools.
posted Wed, 16 Jul 2014 17:25:33 +0000
OIM: Catalog Metadata Based Tagging
Oracle Identity Manager can be customized to enable filtered catalog searches based on Catalog Item%E2%80%99s Metadata (CIM). A-team architect Alex Lopez's article discusses the details of the API%E2%80%99s that can be used to retrieve the metadata from a Catalog Item and set the user defined tags value.
posted Thu, 26 Jun 2014 14:58:46 +0000
Monitoring OIM R2 PS2 Orchestration
A-Team solution architect Daniel Gralewski illustrates how to use the new feature in Oracle Identity Manager R2 PS2 (11.1.2.2.0) that allows monitoring of OIM orchestration processes through Enterprise Manager console.
posted Thu, 26 Jun 2014 14:48:21 +0000
More...
Left Curve
Popular Downloads
Right Curve
Untitled Document