Oracle delivers secure infrastructure through a wide range of products, processes, and technologies to help prevent unauthorized access to confidential information, reduce the cost of managing users, and facilitate privacy management. (Note: Oracle does not validate the information on any third-party sites or content you may see here.)
Securing Access with OAuth2: How to deal with OAuth Scopes
Oracle uses OAuth2 to secure access to Web Services exposed by Oracle Public Cloud services. While the standard itself is relatively straightforward, there are a couple of areas that each implementation must address on its own. Vadim Lander's article looks at one such area: OAuth scopes.
posted Wed, 10 Dec 2014 14:27:36 +0000
Mass Reset Password - Part1: Oracle Internet Directory
Need to simultaneously reset multiple passwords? Fusion Middleware solution architect Thiago Leonicio shows you how in this concise, illustrated how-to.
posted Mon, 24 Nov 2014 20:10:25 +0000
Secure Oracle MAF applications with Oracle Mobile Security Suite (The Oracle Mobile Platform Blog)
This article by Kundan Vyas illustrates how to containerize and secure the content of an Oracle Mobile Application Foundation app using Oracle Mobile Security Suite (OMSS).
posted Thu, 20 Nov 2014 20:05:50 +0000
Automated Policy Synchronization (APS) for OAM Clone Environment
Automated Synchronization between Master and Clone OAM Environments is supported in Oracle Access Manager R2PS2. In this article, Kiran Thakkar walks you step-by-step through the configuration process.
posted Wed, 19 Nov 2014 19:04:16 +0000
Integrating Oracle Access Management platform with Mobile Application Framework | Identity, Security & Me
Paul Toal shows you how to use your existing Oracle Identity and Access Management platform as the security layer within your mobile applications.
posted Tue, 18 Nov 2014 15:17:20 +0000
Managing WebLogic Server and Deployed Applications in DMZ and Other Complicated Network Setups
WebLogic Server comes out of the box with a general configuration that should satisfy most applications. But DMZ setups and other special environments require additional configuration, communication and security. This article by Martin Heinzl focuses on options for various DMZ setups.
posted Thu, 13 Nov 2014 20:47:07 +0000