Oracle delivers secure infrastructure through a wide range of products, processes, and technologies to help prevent unauthorized access to confidential information, reduce the cost of managing users, and facilitate privacy management. (Note: Oracle does not validate the information on any third-party sites or content you may see here.)
Using OAAM Risk Evaluation in OAM Authorization Policies
Oracle A-Team solution architect Kuldeep Shah shares the details of an interesting use case in this how-to technical article.
posted Wed, 15 Apr 2015 13:14:26 +0000
Avoiding LibOVD Connection Leaks When Using OPSS User and Role API
For new development, we no longer recommend the use of the OPSS User and Role API – use the Identity Governance Framework (IGF) APIs instead. However, if you already have code which uses the User and Role API, that code is still supported for the time being. A-Team solution architect Simon Kissane provides the details.
posted Fri, 10 Apr 2015 16:49:18 +0000
Java EE Security API (JSR 375) Update (The Aquarium)
posted Mon, 23 Mar 2015 14:53:52 +0000
Protecting and Accessing Resources with OAuth in Oracle Access Manager
Oracle principal consultant Ronaldo Fernandes demonstrates how to configure OAM to protect a service hosted on WebLogic Server as well as a Web Application (also hosted on WebLogic) consuming it, using 3-legged OAuth flow.
posted Fri, 20 Mar 2015 20:53:30 +0000
Oracle Identity Manager 11G R2 PS2 Catalog Cart Items Customization
Venkat Kurri's article shows you step-by-step how to use Oracle Identity Manager's (OIM) user interface customization capabilities to customize OIM Catalog Cart Items.
posted Fri, 13 Mar 2015 14:40:07 +0000
Securing Oracle MAF Applications with HTTP Basic Authentication |
Ganesh Kamble's detailed, illustrated post walks you step by step through the process of securing a MAF application using HTTP Basic Authentication.
posted Fri, 06 Mar 2015 17:20:15 +0000