No results found

Your search did not match any results.

We suggest you try the following to help find what you’re looking for:

  • Check the spelling of your keyword search.
  • Use synonyms for the keyword you typed, for example, try “application” instead of “software.”
  • Try one of the popular searches shown below.
  • Start a new search.
Trending Questions


Oracle delivers secure infrastructure through a wide range of products, processes, and technologies to help prevent unauthorized access to confidential information, reduce the cost of managing users, and facilitate privacy management. (Note: Oracle does not validate the information on any third-party sites or content you may see here.)

View the most recent Critical Patch Update Advisory

Read the Oracle Software Security Assurance Blog


Automating the Installation of Oracle IAM Suite [September 2015]
by Ricardo Gutierrez
This article describes the steps to use the new Life Cycle Management (LCM) tools to automate the deployment of the Oracle IAM Suite 11g R2 PS3 in Oracle Linux 7.1

Oracle Identity Manager 11gR2PS2 UI Bulk Role Operations [September 2015]
by Eduardo Ludovico
This article by Oracle senior consultant Eduardo Ludovico illustrates how to modify Oracle Identity Manager to prodvide a user-friendly way to perform a bulk removal of users via a graphical interface.

Yes, Oracle API Gateway Can Protect Your Web Application, Too [May 2015]
by Marcelo Parisi
This article examines basic concepts of web application security using Oracle API Gateway, using an XSS Injection issue and an SQL Injection issue to demonstrate how Oracle API Gateway can bring value to these scenarios.

Oracle Identity Manager 11gR2 PS2 - LOBs Migration to SecureFile [May 2015]
by Lokesh Gupta
Compared to the storage structure of Large Objects (LOBs), that of SecureFiles delivers substantially improved performance along with optimized storage for unstructured data that resides in Oracle Database. Lokesh Gupta's article explains how to make the move.

Mobile Application Framework Security [May 2015]
by Namit Kakkar
This article provides an overview of the security framework within the Oracle Mobile Application Framework (MAF), and describes the steps for configuring a mobile application to participate in security.

Protecting and Accessing Resources with OAuth in Oracle Access Manager [March 2015]
by Ronaldo Fernandes
Oracle principal consultant Ronaldo Fernandes demonstrates how to configure OAM to protect a service hosted on WebLogic Server (WLS) as well as a Web Application (also hosted on WebLogic) consuming it, using 3-legged OAuth flow.

Oracle Identity Manager 11G R2 PS2 Catalog Cart Items Customization [March 2015]
by Venkata Siva Rami Reddy Kurri
Venkat Kurri's article shows you step-by-step how to use Oracle Identity Manager's (OIM) user interface customization capabilities to customize OIM Catalog Cart Items.

Externalize the Security of Oracle ADF Applications Using Oracle Entitlements Server [February 2015]
by Ganesh Kamble
This article discusses how you can use Oracle Entitlements Server (OES) to secure the resources of Oracle Application Development Framework (ADF) applications, with a focus on creating policies for securing an ADF application, and then storing those policies in Oracle Internet Directory.

Building a Scalable, Highly Available Oracle API Gateway 11g Infrastructure in a Cloud Environment [January 2015]
by Marcelo Parisi
With its focus on service protection, and its authentication mechanisms, message encryption, and security/policy functionalities, Oracle API Gateway (OAG) 11g can be a very powerful tool in the secure provisioning of services in the cloud. This article shows you how to create a cloud-based OAG infrastructure, with high-availability and scalability support.

Virus-Proofing Oracle WebCenter Content 11g with Oracle API Gateway 11g [June 2014]
by Marcelo Parisi
Marcelo Parisi's article is a proof-of-concept for a basic infrastructure re-architecture and software configuration needed to implement a basic virus-checking routine on files before they get to Oracle WebCenter Content.

Oracle Identity Manager 11gR2 Catalog: Domain Index Best Practices and FAQs [May 2014]
by Lokesh Gupta
This technical how-to guide provides information on the Access Request Catalog feature in Oracle Identity Management (OIM), including optimizations required for domain-based indexing used in cataloging.

Oracle Identity Manager: Implementing Additional Request Information [April 2014]
by Nitin Patel
Nitin Patel's article offers detailed step-by-step technical instructions for implementing the Additional Request Information feature in Oracle Identity Manager.

Oracle Identity Manager UI Customizations [February 2014]
by Gaurav Singh
Tips, tricks, and technical insight into customizations for the Oracle Identity Manager user interface.

Diagnosing Intermittent Authentication Failures and User Lock Outs in Oracle WebLogic [February 2014]
by Shailesh K. Mishrah
How login failures in WebLogic can be diagnosed with the help of available debug flags and log files.

Flexible Manipulation of Session Timeout for Oracle Identity Manager Web Applications [January 2014]
by Firdaus Fraz
Oracle Fusion Middleware Identity Management solution architect Firdaus Fraz's concise article focuses on session timeout configuration for Oracle Identity Manager 11gR2PS1 using an Oracle WebLogic deployment plan.

Working with Oracle Security Token Service in an Architecture Involving Oracle WebLogic Server and Oracle Service Bus [January 2014]
by Rolando Fernandes
A step by step guide to creating a single sign-on between Oracle WebLogic and Oracle Service Bus using Oracle Security Token Service (OSTS) to generate SAML tokens.

Hide from Prying Eyes [January 2014]
by Arup Nanda
Use Data Redaction in Oracle Database 12c to hide sensitive data automatically.

Programmatic Identity Assertion with Oracle Platform Security Services [December 2013]
by Shailesh K. Mishra
This short article from a member of the Oracle Identity Manager team shows how programmatic identity assertion can be performed using OPSS APIs in cases where code must run under the security context of a runtime identity.

Oracle Identity Manager 11gR2 Reconciliation Events Processing [December 2013]
by Firdaus Fraz
Available options and the associated limitations for reconciliation and the sequencing of reconciliation events in Oracle Identity Manager.

Enterprise Grade Deployment Considerations for Oracle Identity Manager AD Connector [October 2013]
by Firdaus Fraz
Oracle Fusion Middleware solution architect Firdaus Fraz illustrates provides best practice recommendations for setting up an enterprise deployment environment for the OIM connector for Microsoft Active Directory.

Multi-Factor Authentication in Oracle WebLogic [October 2013]
by Shailesh K. Mishra
Using multi-factor authentication to protect web applications deployed on Oracle WebLogic.

Protecting IDPs from Malformed SAML Requests [July 2013]
by Steffo Weber
Using Oracle API Gateway as an XML firewall to protect Oracle Identity Federation from receiving malformed SAML requests.

More Security Articles...

Documentation and Best Practices

White Papers