Oracle Fusion Applications Security Leveraging Oracle Identity Management
|
|
|
- Patience Tucker
- 10 years ago
- Views:
Transcription
1 An Oracle White Paper September 2010 Oracle Fusion Applications Security Leveraging Oracle Identity Management
2 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle.
3 Introduction... 1 Oracle Fusion Applications Structure... 4 Oracle Fusion Applications Development Environment... 4 Oracle Fusion Applications Underpinnings... 6 Oracle Fusion Applications Security... 6 Service-Oriented Security... 7 Oracle Platform Security Services... 7 Identity As A Service Conclusion... 29
4 Introduction Oracle Fusion Applications are Oracle s next-generation enterprise resource planning applications including Financial Management; Human Capital Management; Customer Relationship Management; Supply Chain Management; Project Portfolio Management; Procurement; Governance, Risk, and Compliance. Figure 1: Oracle Fusion Applications Strategic Approach Oracle Fusion Applications are designed independently from current Oracle Applications such as Oracle E-Business Suite, Oracle PeopleSoft, Oracle Siebel, or Oracle JD Edwards; Oracle Fusion Applications combine the best of the Oracle business applications Oracle currently provides (and will continue to ship and enhance under the Applications Unlimited program). Oracle Fusion Applications deliver unsurpassed business performance: Productivity - Work smarter with intuitive, intelligent, and collaborative applications: what you need to know; what you need to do; whom you need to know; how to get it done. 1
5 Adaptability - Respond effectively to change with flexible, modular, user-driven business solutions powered by best-in-class business processes built on industry standards. Manageability - Deliver faster return on investment with tools for rapid setup and flexible deployment models (in-house or hosted software-as-a-service), and provide a rich environment that empowers end-users to effectively search, analyze, compare, and process enterprise information. Security - Provide standards-based, declarative, transparent, portable function and data security policies across all Oracle Fusion applications, defined independently from application code at design time. Oracle Fusion Applications are built from the ground up on Oracle Fusion Middleware thus creating a unified suite of components based on a Service-Oriented Architecture (SOA). Oracle Fusion Applications leverage the various foundation capabilities provided by Oracle Fusion Middleware, such as a standards-based application development framework (Oracle ADF), business intelligence, content management, enterprise performance management, SOA and process management, and security and identity management. As a result, the designers of Oracle Fusion Applications focused all their effort on the business value of applications, relying on Oracle Fusion Middleware services for everything else. This document describes how Oracle Fusion Applications leverage Oracle Identity Management for foundation security services; identity administration (identity life cycle management, self-service account request and password management, enterprise role management); authentication and trust management (single sign-on, identity federation, privacy); access control (risk-based authorization, fine-grained entitlements, web services security); identity and access governance (audit and compliance reporting, segregation of duties, conflict-resolution management, attestation, role mining and engineering, identity and 2
6 fraud-prevention analytics); and directory services (persistent storage, identity virtualization, synchronization, and database-user security). In the first part of this document, we show how the Oracle Fusion Applications designers use Service-Oriented Security (SOS), relying on the Oracle Platform Security Services (OPSS) environment to declaratively apply security to Oracle ADF projects (the core of Fusion Applications). In the second part of this document, we show how the identity services delivered by the Oracle Identity Management product stack combine with SOS to provide consistent security across Oracle Fusion Applications, seamless integration, high scalability, and centralized administration to multiple instances of Oracle Fusion Applications deployed across the enterprise. This document is primarily intended as general information for line-of-business managers, development managers, security architects, and identity and access management administrators. 3
7 Oracle Fusion Applications Structure Oracle Fusion Applications are Java Platform, Enterprise Edition (Java EE) applications. Oracle Fusion Applications are organized in pillars. A pillar is a standalone subset of Oracle Fusion Applications, for example Customer Relationship Management (CRM). A pillar can include multiple families or sub-groups. The pillar structure allows patching and upgrades to be performed at a granular level without impacting other pillars. For example, customers that want to upgrade their financials and supply chain management applications can do so without impacting the CRM applications. Technically, a pillar consists of a database, one or more Java EE applications, Oracle ADF Business Services (described in the next section), and SOA composites that connect to the database at runtime. Provision is made for interaction between pillars, such as table replication (Oracle Fusion Applications leverage Oracle Data Integrator to handle transformations if two pillars have different versions of the same table). Pillars can be co-located, i.e., a customer may choose to install more than one pillar in a single database instance. Oracle Fusion Applications provide essential functionality when a service provided by another pillar becomes unavailable. Oracle Fusion Applications Development Environment Oracle Fusion Applications are a particular instance of Fusion applications. Indeed, Oracle Fusion Middleware 11g components such as Oracle WebCenter, Oracle Identity Manager, etc., are also bona fide Fusion applications. Likewise, customers, integrators, and independent software vendors (ISVs) relying on Oracle Fusion Middleware at design time also develop Fusion applications. Oracle Application Development Framework (ADF) is the core of Oracle Fusion Applications. All Oracle Fusion Applications (and, for that matter, all of Oracle Fusion Middleware 11g components) follow Oracle ADF s development and deployment patterns. Oracle ADF is directly supported by the Oracle JDeveloper integrated development environment. Oracle ADF makes it easy to develop agile applications that expose data as services by coupling a service interface to built-in business services. This separation of business service implementation details is performed in Oracle ADF via metadata (XML files). Use of this metadata-driven architecture enables application developers to focus on the business logic and user experience, rather than the details of how services are accessed and secured. Oracle ADF implements the Model-View-Controller (MVC) design pattern. The Oracle ADF architecture is based on the following four layers. Business Services: The Business Services layer provides access to data from various sources and handles business logic. It also manages interaction with a data persistence layer providing such services as object-relational mapping, transaction management, and business logic execution. Oracle ADF s Business Services can be implemented in different ways: simple Java classes, Enterprise JavaBeans 4
8 (EJB), web services, Java Persistence Application Programming Interface (JPA) objects, and Oracle ADF Business Components (ADF BC). Oracle ADF BC is a key element of Oracle Fusion Applications. Oracle ADF BC is based on three main building blocks: Entity Objects (EO) representing rows in a database and acting as an application cache for table rows; View Objects (VO) representing SQL queries; and the Application Module, a container for VO instances that define the data model and transaction for a particular business task. Model: The Model layer provides an abstraction layer on top of the Business Services layer, enabling the View and Controller layers (described below) to work with different implementations of Business Services in a consistent way. The Model layer connects the business services to the objects that use them in the other layers. View: The View layer provides the user interface of the application. The View layer can be based on HTML, JavaServer Pages (JSP), JavaServer Faces (JSF), or rich Java components to render the user interface. The View layer can be a web (browser) client, a client-server, Swing-based desktop application, a Microsoft Excel spreadsheet, or a wireless device such as a smart phone. Controller: The Controller layer provides a mechanism to control the flow of a web application and handle user input. For example, when you click a Search button on a page, the Controller layer determines what action to perform (do a search) and where to navigate (the results page). Using Oracle ADF s Controller layer, you can break your application's flow into smaller, reusable task flows, include non-visual components such as method calls in your flow, and create "page fragment" flows that run inside a region of a single (containing) page. Oracle JDeveloper wizards provide design-time declarative security for Oracle Fusion Applications artifacts such as ADF Business Components and View and Controller objects, based on a serviceoriented security architecture (described later in this document). Oracle Fusion Applications Java EE Applications An Oracle Fusion Applications Java EE application is a standalone unit of deployment. In Oracle Fusion Middleware parlance, all Oracle ADF BC components, e.g., ADF Library Java Archives (JAR) and service client JARs are packaged into an enterprise archive (EAR) file. An Oracle Fusion Applications Java EE application is deployed against one pillar database and it may have dependencies on other pillars, but at runtime all referenced dependencies are executed within the Java EE application's own pillar. This means that any project containing Oracle ADF BC components referenced from a different pillar must be based on replicated tables, or service-based Entity Objects, or View Objects. At run time, when an Oracle Fusion Applications Java EE application is deployed, the application s EAR file contains all the Oracle ADF library and service client interface dependencies, i.e., all the public model and user interface projects referenced from other pillar families, as well as all the security metadata. 5
9 Oracle Fusion Applications Underpinnings Oracle Fusion Applications technical underpinnings also include many Oracle Fusion Middleware services such as SOA (composite SOA applications for web services to communicate among themselves and connect to the database), identity management (for security and access control the focus of this paper), content management, and a pervasive use of business intelligence and data integration. In addition, Oracle Fusion Applications are built on top of a single data model (one data schema for all applications). Figure 2: Oracle Fusion Applications User Interface (Human Capital Management Example) Oracle Fusion Applications Security As mentioned earlier, Oracle Fusion Applications designers focused their effort on the business value of each application, leaving the critical security and identity management requirements as well as other logistical needs to be handled by Oracle Fusion Middleware. Security is directly provided to Oracle Fusion Applications by a service-oriented security framework. 6
10 Service-Oriented Security Key to Oracle Fusion Middleware is the concept of Service-Oriented Security (SOS). SOS provides a set of security services leveraged by all Oracle Fusion Middleware components and Oracle Fusion Applications. Figure 3: Service-Oriented Security Oracle s SOS applies SOA principles to security in order to promote better design (industry-standard security components ), deployment (appropriate level of security applied where necessary), and management (through a single point of administration). SOS is built upon Oracle Platform Security Services (OPSS), a security development framework described in the following section. Oracle Platform Security Services Oracle Fusion Applications designers leverage the Oracle Platform Security Services (OPSS) framework through Oracle JDeveloper security wizards. Figure 4: Oracle Platform Security Services (OPSS) in Context 7
11 Generally speaking, OPSS provides Oracle (as well as non-oracle) product development teams, systems integrators, and independent software vendors with a standards-based, portable, integrated, enterprise-grade security framework for Java Platform, Standard Edition (Java SE) and Java Platform, Enterprise Edition (Java EE) applications, such as Oracle Fusion Applications. OPSS insulates developers from the intricacies of tasks not directly related to application development by providing an abstraction layer in the form of standards-based application programming interfaces (API). Thanks to OPSS, Oracle Fusion Applications, in-house-developed applications, third-party applications, and integrated applications benefit from the same, uniform security, identity management, and audit services across the enterprise. As shown in Figure 4, OPSS is the security foundation for Oracle Fusion Middleware: all Oracle Fusion Middleware components and Oracle Fusion Applications consume the OPSS framework s services. OPSS is a self-contained, portable environment that runs on an application server such as Oracle WebLogic Server. At development time, OPSS services are directly invoked from the development environment (Oracle JDeveloper) through wizards. When the application is deployed to the runtime environment, systems and security administrators can access OPSS services for configuration purposes through Oracle Enterprise Manager Fusion Middleware (FMW) Control, command line tools such as WebLogic Scripting Tool (WLST), and more specifically Oracle Authorization Policy Manager (APM), described later in this document. OPSS complies with the following standards: Role Based Access Control (RBAC); Java Platform, Enterprise Edition (Java EE), Java Authorization and Authentication Services (JAAS), and Java Authorization Contract for Containers (JACC). OPSS includes Oracle WebLogic Server's internal security services consumed by a Security Services Provider Interface (SSPI), which is also part of OPSS. In addition, OPSS includes Oracle Fusion Middleware s security framework (formerly referred to as Java Platform Security (JPS) or JAZN). SSPI provides Java EE container security in permission-based (JACC) mode and in resource-based (non-jacc) mode. It also provides resource-based authorization for the environment, thus allowing customers to choose their security model. SSPI is a set of APIs designed to implement pluggable security providers in order to support multiple types of security services, such as custom authentication or a particular role mapping. JPS was first released with Oracle Application Server as a JAAS-compatible authentication and authorization service working with XML-based and Oracle Internet Directory providers. In 11g, JPS has been expanded to include the following services (described later in this section): Credential Store Framework (CSF), User and Role API, Oracle Fusion Middleware Common Audit Framework (CAF), and Oracle JDeveloper/ADF integration (application security life cycle support). In addition, OPSS includes Oracle Security Developer Tools (OSDT), a set of Java-based cryptographic libraries supporting XML signature, XML encryption, XML Key Management Specification (XKMS), Security Assertion Markup Language (SAML), WS-Security, and other non- 8
12 XML standards such as Secure / Multipurpose Internet Mail Extensions (S/MIME) and Online Certificate Status Protocol (OCSP). OSDT is used in many Oracle products including Oracle Fusion Middleware components and Oracle Fusion Applications. OPSS leverages OSDT for SSL configuration and Oracle Wallet (used by Oracle Identity Management products, Oracle Enterprise Manager, and Oracle Database). OPSS provides out-of-the-box support for (1) applications using WebLogic Server s internal security and SSPI, and (2) applications using JPS, such as Oracle Fusion Applications, Oracle WebCenter, Oracle SOA, and Oracle Web Services Manager. Developers can use OPSS APIs to build security features for all types of applications and integrate them with other security artifacts, such as Lightweight Directory Access Protocol (LDAP) servers, database systems, and custom security components. Administrators can use OPSS to deploy large enterprise applications with a small, uniform set of tools and administer all security in them. OPSS simplifies the maintenance of application security because it allows the modification of security configuration without changing the application code. OPSS s functional layers include: Authentication: OPSS uses WebLogic Server authentication providers, components that validate user credentials or system processes based on a user name-password combination or a digital certificate. Authentication providers include the Default Authenticator, external LDAP stores, and database systems to host data for enterprise applications. Identity Assertion: The WebLogic Identity Assertion providers support certificate authentication using X.509 certificates, Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO) tokens, SAML assertions, and CORBA Common Secure Interoperability version 2 (CSIv2) identity assertion. Figure 5: Oracle Platform Security Services Architecture 9
13 Single sign-on (SSO): Authentication providers can use different types of systems to store security data. The Authentication provider that WebLogic Server installs uses an embedded LDAP server. Oracle Fusion Middleware 11g also supports perimeter authentication and SSO through Oracle Access Manager (OAM), described later in this document. For small environments that don t need to be integrated with an enterprise SSO solution such as OAM, lightweight SSO is provided by a SAMLbased solution using WebLogic Server s SAML Credential Mapping Provider. Authorization: OPSS provides a Java policy provider that supports code-based and subject-based authorization. Note: A (Java) subject is a grouping of related security information that includes a collection of principals such as a name ( John Doe ), an address ( [email protected] ), together with (optional) security-related attributes (credentials) such as passwords or cryptographic keys. The Java class javax.security.auth.subject represents a subject and an instance of this class is created and populated with principals when authentication succeeds. OPSS authentication providers enable identity propagation across multiple components in a domain through subjects. OPSS supports application roles (logical roles specific to an application). Unlike Java EE s logical roles, OPSS supports role hierarchy. OPSS also provides an advanced policy model that includes elements such as resource types (e.g., an Oracle ADF task flow) and entitlement sets (authorized actions on a given resource instance) allowing complex authorization policies to be conveniently defined and managed. Using Oracle Enterprise Manager FMW Control or WLST, the administrator can manage an application s authorization policies, including mapping application roles to enterprise groups and users, or editing the permissions granted to an application role. OPSS also provides a policy management API allowing programmatic control over authorization policies. User and role: OPSS s User and Role API framework allows applications to access identity information (users and roles) in a uniform and portable manner regardless of the particular underlying identity repository. The User and Role API frees the application developer from the intricacies of particular identity sources. Role mapping: OPSS supports the mapping of application roles to enterprise groups in the domain Policy Store, no matter the kind of domain policy repository employed (file-based or LDAP-based). This mechanism allows users in enterprise groups to access application resources as specified by application roles. Security stores: The Identity Store is the repository of enterprise users and groups. The Policy Store is the repository of application and system policies. The Credential Store is the repository of domain credentials. Credentials are used during authentication when principals are populated in subjects, and during authorization when determining what actions the subject can perform. OPSS provides the Credential Store Framework (CSF), a set of APIs that applications can use to create, read, update, and manage credentials securely. OPSS uses one logical store to keep both policies and credentials. OPSS s security stores are virtualized through Oracle Virtual Directory (OVD). Audit: OPSS provides a common audit framework (CAF) for Oracle Fusion Middleware products. Customers using OPSS automatically get the benefit of audit without writing a single line of auditrelated code. CAF provides out-of-the-box customizable analytical reporting capabilities within Oracle Business Intelligence Publisher; data can be analyzed on multiple dimensions (e.g., Execution Context 10
14 Identifier (ECID) or user ID) across multiple components or products involved in a single transaction. ECID is basically used to track the flow of a particular request through the various layers of the product stack. The ECID value for a particular request is generated at the first layer and is passed down to the subsequent layers. The ECID value is logged (and auditable) in each product involved in the transaction. ECID allows an administrator to track the end-to-end flow of a particular request across the product stack. The administrator can search the logs using a particular ECID value from Oracle Enterprise Manager FMW Control or using WLST. Audit logs can be queried for a given ECID through Oracle BI Publisher s audit reports. For example, if you send an LDAP request to Oracle Virtual Directory front-ending Oracle Internet Directory, an ECID associated with the LDAP request is present in the OVD diagnostic logs and audit logs; similarly, when the query reaches OID, OID includes the same ECID in its diagnostic logs and audit reports. If the OPSS layer is also involved in the flow, the same ECID is passed on to the OPSS audit reports and diagnostics logs. Application life cycle support: OPSS provides support for all the phases of an application s life cycle. OPSS is integrated with Oracle JDeveloper, which allows an Oracle Fusion Applications or a custom application designer to model security into the application when building Oracle ADF task flows. Oracle JDeveloper also provides an authorization editor that allows developers to create authorization policies for ADF task flows and pages without writing a single line of code. Typically a developer deploys her application to a WebLogic Server domain embedded in JDeveloper. The developer can then deploy the application to a remote WebLogic Server domain using Oracle Enterprise Manager FMW Control. OPSS is integrated with FMWControl to allow application security policies and credentials migration to be configured during application deployment. Post deployment, an administrator uses FMWControl to manage the application s security policies, e.g., edit authorization policies, or change audit policies. All such changes are transparent to the application and do not require any application code change. In any non-trivial application scenario, an application normally goes from development to a staging (or test) environment before being put in full-blown production. OPSS supports this model by providing migration tools that move security policies from a test domain into a production domain. For example, audit policies configured in a test domain can be exported into the target production domain. Oracle Authorization Policy Manager Oracle Authorization Policy Manager (APM) is a graphical user-interface console for managing OPSSbased authorization policies. APM was specifically designed to support Oracle Fusion Applications security policies using a centrally managed approach (see Figure 6). APM is designed for customers relying on Oracle Fusion Middleware products consuming OPSS services, such as Oracle Fusion Applications, or OPSS used by in-house custom applications. APM is a standards-based environment (JAAS permissions and enterprise Role Based Access Control) that supports delegated administration, advanced life cycle management, and identity store access through Identity Governance Framework (IGF) / ArisID (described later in this document). 11
15 APM-Administered Artifacts APM administers both global and application-specific artifacts. Global artifacts include users, external roles, and system policies. Global artifacts apply to all application stripes (an application stripe is a logical subset of the domain Policy Store where the application policies are kept). Application-specific artifacts include the resource catalog, application policies, application roles, and role categories. Application-specific artifacts apply to a single application stripe. Figure 6: Oracle Authorization Policy Manager for Oracle Fusion Applications OPSS Authorization Policy Model Concepts Resource Type: A template of secured artifacts is represented as a Resource Type. An Oracle ADF task flow is a good example of a Resource Type. Resource Instance: Each secured resource of a given type is represented as a Resource Instance (e.g., orderentrytaskflow) and points to a physical resource. Entitlement: Aggregates resources and allowable actions, and encapsulates privileges sufficient for a task (e.g., CreatePOTaskFlow). External Role: A collection of users and other groups, synonymous with enterprise role or enterprise group, typically implemented as an LDAP group in the Identity Store. Application Role: A logical and hierarchical role that exists in the Policy Store. An Application Role is tagged via the Role Catalog. Application Policy: A collection of entitlement and resource permissions granted to a principal (an Application Role or an External Role are examples of principals). System Policy: A global policy that grants an application access to OPSS s APIs. 12
16 Role Mapping: Role mapping allows users to access protected application resources. Application Roles are mapped to External Roles. Oracle Fusion Applicationsʼ Security Reference Implementation From an administrator s point of view, Oracle Fusion Applications includes multiple roles in function security and data security categories. Function security privileges are used to control access to a page or specific functionality within a page. Data security includes privileges conditionally granted to a role. Data security privileges are used to control access to data. Figure 7: Oracle Fusion Applications Role Hierarchies In accordance to RBAC standard principles, roles are designed based on jobs, and permissions to resources are associated to roles. Users are assigned roles based on the duties they need to perform. Within Oracle Fusion Applications the role, role memberships, and privilege and data security policies are authored at design time. The seeded content for function and data security can subsequently be changed by customers. Oracle Fusion Applications RBAC roles are as follows: Job Role: Defines the job that a person is hired to do, for example Buyer, Lawyer, etc.; Job roles are decomposed into their constituent duties and are provisioned to a user. 13
17 Duty Role: Defines a logical grouping of tasks that a user with a particular job must perform, for example, Manage Purchase Order duty. Duties should be recognizable as a line on a job description. Abstract Role: Associated with a user irrespective of their job and duty roles, for example, Employee, Contractor, etc. Fusion data roles are authored by the customer that grants conditional access to application data (during customer implementation). A data role grants one or more data security privileges on an object or attribute group for a condition. These grants then enumerate the data privileges that are enabled for the provisioning of that data role. Identity Governance Framework and ArisID As previously mentioned, OPSS leverages its User and Role API to provide developers with simple methods to manage identities. However, developers will still be inclined to map the User and Role API to business objects. To simplify this development process, Oracle has created the Identity Governance Framework (IGF) project, now hosted by the Liberty Alliance ( IGF is designed to help enterprises control how identity-related information (e.g., attributes and entitlements) is used, stored, and propagated between applications. ArisID (the open source implementation of the IGF standard, described later in this section) allows developers to build Oracle Fusion Applications (as well as in-house applications) that access identityrelated data from a wide range of sources, and administrators and deployers to define, enforce, and audit policies concerning the use of identity-related data. The IGF specification s functional layers include: Client Attributes Markup Language (CARML): A specification built by the developer during the development process. CARML indicates the required and optional attributes, operations, and indexes the application will use when deployed (CARML is to an application what WSDL is to a web service). The application developer uses the CARML API to both declare the attribute data needed for the application and the operations needed to support the application (the CARML API uses SAML and SOAP-based protocols to communicate with attribute services). Attribute Authority Policy Markup Language (AAPML): An Extensible Access Control Markup Language (XACML) profile designed to allow attribute authorities to specify conditions under which information under management may be used (and possibly modified) by other applications. Attribute service: A web service that reads the CARML file in order to configure views of one or more attribute authorities that meet the requested data requirements of the application specified in the CARML document (ArisID is a typical example of such a service). ArisID Identity Beans (ArisID for short) is an Apache-licensed project hosted by the Kantara Initiative at ArisID is a genuine open source project where anyone is welcome to participate in and contribute to the development of this new technology (you can download ArisID from 14
18 ArisID is designed for developers to access identity information using a single API. ArisID enables access and management of identity information stored in different types of repositories accessed using different protocols. ArisID enables developers to create their own virtual identity database while retaining the ability to interconnect with enterprise identity services (more on this later in this document). ArisID uses a declarative, multifunction API that depends on provider services to do the work of data mapping, protocol transformation, and connectivity. The Oracle Virtual Directory (OVD) Provider for ArisID is an example of an ArisID provider service. The OVD Provider for ArisID is a library that enables OVD to provide identity services to an application using the ArisID API. In this way, OVD plus the OVD Provider library for ArisID and the ArisID API library comprise a complete set of libraries that can be used by applications to access identity services. In the current release of ArisID, Oracle provides a set of beans known as UserRole Beans (used by Oracle Fusion Applications) replacing the User and Role API mentioned earlier in this document. Not only are ArisID-based beans 100% open source, they offer true de-coupling of client beans from physical infrastructure dependencies and physical data models. For customers, this means that Oracle Fusion products (including Oracle Fusion Applications) have vastly improved flexibility to deploy in varied computing infrastructure environments. For example, whether an enterprise is using Microsoft Active Directory or Oracle Directory Server Enterprise Edition (DSEE), the functionality is the same, despite a different underlying data model for these directory products. The UserRole Bean API also offers relationship functionality that makes it easy to pull information based on identity relationships, e.g., pull the User bean for the manager of the currently authenticated user. Oracle Fusion Applications share a common "User" profile bean as defined by OPSS (Note: user information is authored from within the Human Capital Management (HCM) systems and is made available to OPSS). This is used to define both a credential and typical user profile using more than 70 standardized attributes across all of Oracle Fusion Applications. In this way, Oracle Fusion Applications continue to have separation between application data and user credential information (as expressed in the User bean). In the future, ArisID s Java language binding will be enhanced. For example, Oracle Fusion Applications designers will be able to create annotated Java objects that are managed using injection and/or entity managers. As this happens, the use of CARML by Oracle Fusion Applications will become more and more specific to each individual product, providing the following advantages: Identity programming will be similar to typical handling of objects persisted in a database, providing for wider development tool support, and reducing or completely eliminating the special knowledge that developers currently need to have in order to build applications that integrate well with Oracle s identity management services. Each product will have its own CARML manifest, which can be used by customer privacy or regulatory officers to understand how personal information is used and propagated within Oracle products. 15
19 As more products use declarative CARML, Java middleware will become more powerful and substantially easier to configure and manage in addition to continued support for varied identity services environments. Oracle Fusion Applicationsʼ Platform Security Oracle Fusion Applications designers develop instances of resources such as Oracle ADF task flows (e.g., submit_cash_in_transit_report or add_capitalized_asset task flows) and they leverage the OPSS framework to secure these resources (permissions are granted to application roles). In other words, Oracle Fusion Application designers use OPSS to link entitlements to privileges and security administrators grant privileges to application roles. These operations result into corresponding entitlement grants in the OPSS Policy Store. At runtime, Oracle Fusion Applications resolve the task flow instance and action into a checkpermission call. The OPSS framworks s authorization service uses assigned policies to check whether the user is authorized to perform an operation. Oracle Fusion Applications are designed to run off-line if necessary, for example the CRM applications can run on a laptop disconnected from the network. Security in off-line mode consists in storing and applying a local version of Oracle Fusion Applications security as well as user policies, and synchronizing the possible server-level security changes with the local copy of the user policies to make sure the latest version of these policies is enforced. Typically, Oracle Fusion Applications invoke OPSS to get a copy of the user s authorization information (OPSS queries the LDAP directory to get the user s group membership which it uses to extract the user s policies from the OPSS Policy Store and provide the authorization privileges across all the Oracle Fusion Applications for which the user is provisioned). Oracle Fusion Applications upload the transactional and authorization data onto the end user s machine via an on-demand synchronization process. Oracle Fusion Applications and Oracle Identity Management In the first part of this document, we saw how Oracle Fusion Applications designers leverage the OPSS framework (platform security) to make Oracle Fusion Applications secure. In this second part, we look at how the various Oracle identity services and Oracle Identity Management components support Oracle Fusion Applications (product security). Platform Security Versus Product Security Platform security (the OPSS framework) is an integral part of Oracle Fusion Middleware ensuring functional security. It runs on Oracle WebLogic Server, and will soon support other Java EE containers such as IBM WebSphere and Red Had JBoss. Product security, on the other hand, is delivered by the identity and access control services provided by Oracle Identity Management. Because Oracle Identity Management, like any other Oracle Fusion 16
20 Middleware component, consumes OPSS framework services, product security includes platform security plus enterprise identity services. Product security is designed to meet the requirements of centralized management and high scalability. Whereas platform security requires that an instance of the solution be installed per deployment, product security allows for administration of policies and identities across multiple deployments through a single instance of the Oracle Identity Management suite s components (i.e., a single point of administration for the whole Oracle Fusion Applications environment deployed across the enterprise). Identity As A Service Oracle Identity Management leverages the OPSS framework to provide identity as a service. Identity services take the functionality of an identity management solution that would otherwise be bolted onto Oracle Fusion Applications and make the set of identity services available in a SOA environment. Because Oracle Fusion Applications follow SOA guidelines, they are able to leverage these services without any concern about how these services are provided. Shared identity services enable enterprises to make identity a reusable, standard, transparent, and ubiquitous part of their applications. Oracle Identity Managementʼs Key Services Oracle Identity Management 11g provides a comprehensive set of services as shown in Figure 8: Identity administration; access management; directory services; identity and access governance; platform security; operational manageability. Instead of cobbling together a heterogeneous environment from diverse, separate products, each service (for example user on-boarding) works with other identity services through standard interfaces to provide a complete, homogeneous environment. Figure 8: Oracle Identity Management 11g Services 17
21 A SOA environment allows each service to leverage the environment within and outside identity management. For example, the workflow engine used in user provisioning approvals is the same, standards-based workflow engine used by Oracle SOA Suite. Likewise, the same standard cryptographic libraries are used throughout the identity management environment and other Oracle Fusion Middleware components. Figure 9: Oracle Identity Management Architecture The following tables summarize Oracle s identity services and components by category. Platform Security Services COMPONENTS DESCRIPTION COMMENTS Oracle Platform Security Services (OPSS) Standards-based, enterprise-grade framework exposing security services through pluggable abstraction layers. OPSS provides a Service-Oriented Security approach for Oracle Fusion Middleware. Security foundation for Oracle Fusion Middleware: all Oracle Fusion Middleware components and Oracle Fusion Applications consume OPSS services. Oracle Authorization Policy Manager (APM) APM is a graphical user interface console for administering OPSS-based authorization policies. APM is intended for customers relying on Oracle Fusion Middleware products based on OPSS, custom or in-house applications built with Oracle ADF, and Oracle Fusion Applications. Identity Governance Framework (IGF) The IGF standard specification is designed to help enterprises control how identity-related information (e.g., attributes and entitlements) is used, stored, and propagated between Originally started by Oracle, IGF is an open-source project hosted by The Liberty Alliance. ArisID is an open source 18
22 applications. implementation of the IGF standard specification. Authorization API (OpenAz) Oracle Web Services Manager (OWSM) Oracle s Authorization API provides a standard interface between an application and a general authorization service. It also provides an effective way to enable authorization providers to plug in client-side authorization functionality. OWSM secures standards-compliant web services (Java EE, Microsoft.NET, PL/SQL, etc.), SOA composites, and Oracle WebCenter s remote portlets. Authorization API is a public project started by Oracle. As part of OPSS, it will become the sole authorization API for Oracle Fusion Middleware. Standards-based, policy-centric security lynchpin for Oracle Fusion Middleware web services. Directory Services COMPONENTS DESCRIPTION COMMENTS Oracle Internet Directory (OID) LDAP directory server and directory integration platform implemented on top of Oracle Database technology providing unsurpassed level of scalability, high-availability, and information security. OID includes Oracle Directory Services Manager (ODSM), a web-based administration user interface for server configuration. Highly scalable LDAP directory integrated with Oracle Fusion Middleware and Oracle Fusion Applications. Oracle Directory Server Enterprise Edition (ODSEE) Oracle Virtual Directory (OVD) Enterprise identity services including the LDAP Directory Server, Directory Proxy, Directory Synchronization, web-based management user interface and deployment tools. ODSEE is the industry s leading carrier-grade directory. Java-based environment designed to provide real-time identity aggregation and transformation without data copying or data synchronization. OVD includes two primary components: the OVD Server to which applications connect, and ODSM (described above). Small-footprint, best-of-breed LDAP directory, recommended for heterogeneous application deployments. Integrated with ODSM and Data Integration Platform (DIP). OVD provides a single standard interface to access identity data no matter where it resides while hiding the complexity of the underlying data infrastructure (OVD does not store information, this role is left to the persistence systems used for that purpose, such as OID and ODSEE). Access Management COMPONENTS DESCRIPTION COMMENTS Oracle Access Manager (OAM) OAM provides centralized, policy driven services for web applications authentication, web single sign-on (SSO), and identity OAM integrates with a broad array of authentication mechanisms, third-party web servers and application servers, 19
23 assertion. and standards-based federated SSO solutions to ensure maximum flexibility and a well-integrated, comprehensive web access control solution. Oracle Identity Federation (OIF) Oracle OpenSSO Fedlet Oracle OpenSSO Security Token Service (STS) OIF is a self-contained solution enabling browser-based, cross-domain single sign-on using industry standards (SAML, Liberty ID-FF, WS-Federation, Microsoft Windows CardSpace). A lightweight federation extension allowing a service provider to immediately federate with an identity provider without requiring a fullblown federation solution in place. Oracle s STS establishes a trust relationship between online partners through web services. STS provides both standard and proprietary security token issuance, validation, and exchange. OIF seamlessly integrates with thirdparty identity and access management solutions. OIF is specifically designed for identity providers. Oracle s Fedlet is specifically designed for service providers and fully integrated with OIF. STS is currently available with the Oracle Access Management Suite Plus. Going forward, Oracle s STS will be integrated with OAM. Oracle Enterprise Single Oracle esso is a Microsoft Windows desktop- Using Oracle esso, enterprise users Sign-On (esso) based set of components providing unified benefit from single sign-on to all of their authentication and single sign-on to both thick- applications, whether users are and thin-client applications with no modification connected to the corporate network, required to existing applications. traveling away from the office, roaming between computers, or working at a shared workstation. Oracle Entitlement Server (OES) OES is a fine-grained authorization engine that externalizes, unifies, and simplifies the management of complex entitlement policies. OES provides a centralized administration point for complex entitlement policies across a diverse range of business and IT systems. Oracle Adaptive Access Manager (OAAM) OAAM provides resource protection through real-time fraud prevention, software-based multifactor authentication, and unique authentication strengthening. OAAM consists of components that create one of the most powerful and flexible weapons in the war against fraud. Identity Management, Identity and Access Governance COMPONENTS DESCRIPTION COMMENTS Oracle Identity Manager (OIM) OIM is designed to administer both intranet and extranet user access privileges across a company's resources throughout the entire identity management life cycle, from initial onboarding to final de-provisioning of an identity. In extranet environments, OIM s superior scalability allows enterprises to support millions of customers accessing the company s resources using traditional clients (e.g., browsers) or smart phones. 20
24 Oracle Identity Analytics OIA helps enterprises address regulatory Integrates with OIM for role (OIA) mandates, automate processes, and quickly administration and role-based make compliance a repeatable and sustainable part of business. OIA provides a provisioning automation as part of Oracle remediation. comprehensive solution for attestation (access certification), role governance, and enterpriselevel segregation-of-duties enforcement. Operational Manageability COMPONENTS DESCRIPTION COMMENTS Oracle Identity Navigator (OIN) OIN is an SSO-enabled launch pad for all of Oracle Identity Management services administrative consoles. OIN acts as a user experience consolidation point for Oracle Identity Management. Oracle Management Pack for Identity Management Oracle Management Pack for Identity Management leverages Oracle Enterprise Manager's broad set of capabilities to control end-to-end identity management components. Support for service-level configuration, dashboard-based user interaction, environment monitoring, performance automation, and patch management. Oracle Identity Management Components In Oracle Fusion Applications Oracle Fusion Applications ship with Oracle Identity Management and use a subset of the Oracle Identity Management services described above to meet the specific use cases of multiple Oracle Fusion Applications deployed across the enterprise: Oracle Directory Services (ODS), including Oracle Internet Directory (OID) and Oracle Virtual Directory (OVD) Oracle Identity Manager (OIM) Oracle Access Manager (OAM) Oracle Entitlement Server (OES) Oracle Authorization Policy Manager (APM) Oracle Web Services Manager (OWSM) The following sections describe the deployment topologies for Oracle Fusion Application use cases together with a description of the Oracle Identity Management components used to meet the requirements of each use case. Oracle Directory Services Identity data in an Oracle Fusion Applications environment can be stored in Oracle Internet Directory (OID) or in the customer s existing LDAP directory servers (e.g., Microsoft Active Directory or Oracle Directory Server, Enterprise Edition (DSEE), via Oracle Virtual Directory (OVD). 21
25 Customers benefit most using both OVD and OID: OVD to abstract access to identity data and OID to store the policy, role, and entitlement information used by other identity management components. In addition, OVD can be used to abstract access to a relational database containing information necessary for authentication or authorization. Figure 10: Oracle Fusion Applications and ODS Oracle Identity Manager Oracle Identity Manager (OIM) is designed to administer both intranet and extranet user access privileges across a company's resources throughout the entire identity management life cycle, from initial on-boarding to final de-provisioning of an identity. OIM exposes Service Provisioning Markup Language (SPML) interfaces that allow Oracle Fusion Applications to make direct calls to manage identity data, which avoids sending users to the OIM user interface to perform this type of operation. OIM s functional layers include: New metadata model: All configurations in various components of OIM are stored centrally in an XML store (Metadata Store MDS) common to the various services provided by Oracle Fusion Middleware (Oracle SOA, WebCenter, etc.). This new medatada model allows you to run multiple jobs performing different types of reconciliation against the same target. User provisioning: Provisioning provides outward flow of user information from OIM to a target system (e.g., Oracle Fusion Applications). Provisioning is the process by which an action to create, modify, or delete user information in a resource is started from OIM and passed into the resource (or target). The provisioning system communicates with the resource and specifies changes to be made to the account. User administration: User administration includes self-service profile management (users can view and edit their own profile), administrative profile management (one can view and manage the profiles of other users subject to access permissions), request management (enables users to create provisioning requests for resources with fine-grained entitlements, profile management requests, and role 22
26 membership requests approvers use the same user interface to process requests), delegated administration (by moving administration points as close to the user as possible, an organization can achieve tighter control and better security). Policy Management: OIM enables policy-based automated provisioning of resources with fine-grained entitlements. For any set of users, administrators can specify access levels for each resource to be provisioned, granting each user only the exact level of access required to complete the job. These policies can be driven by user roles or attributes, enabling implementation of role based access control (RBAC) as well as attribute based access control (ABAC). Figure 11: Oracle Fusion Applications and OIM Workflow Management: OIM supports the separation of approval and provisioning workflows. An approval workflow enables an organization to model its preferred approval processes for managing resource access requests. A provisioning workflow enables an organization to automate IT tasks for provisioning resources with the most complex of provisioning procedures. OIM provides a Workflow Visualizer that allows business users, administrators, and auditors to visualize task sequences and dependencies to understand process flow, and a Workflow Designer to edit and manage the process flow. OIM s workflow leverages Oracle SOA s BPEL engine and Oracle JDeveloper at design time. Password management: Password management includes self-service (users can reset their own passwords), advanced password policies (password length, alphanumeric and special characters usage, etc.), password synchronization (OIM can synchronize or map passwords across managed resources and enforce differences in password policies among these resources). OIM is tightly integrated with Oracle Access Manager to support password management. Audit and compliance management: Audit and compliance management includes identity reconciliation (OIM tracks the creation, update, and deletion of account across all managed resources reconciliation is performed by the reconciliation engine described in the following paragraph), rogue and orphan account management (A rogue account is an account created "out of process" or beyond the control of 23
27 the provisioning system; an orphan account is an operational account without a valid owner), attestation (also referred to as recertification, attestation is mandated by the Sarbanes-Oxley Act -- OIM offers an attestation feature that can be deployed quickly to enable an organization-wide attestation process that provides automated report generation, delivery, and notification). Reconciliation: The reconciliation process involves generation of events to be applied to OIM. These events reflect atomic changes in the target system, and contain the data that has changed, the type of change, along with other information. The reconciliation events that are generated as a result of changes occurring in the target system must be managed in such a way that they meet various business requirements. OIM s event management APIs, the reconciliation APIs, and the UI to manage reconciliation events are protected by using authorization policies controlled by Oracle Entitlement Server. Segregation of Duties: The concept of Segregation of Duties (SoD) is aimed at applying checks and balances on business processes. Each stage of a business process may require the involvement of more than one individual. An organization can convert this possibility into a requirement for all IT-enabled business processes by implementing SoD as part of its user provisioning solution. The overall benefit of SoD is the mitigation of risk arising from intentional or accidental misuse of an organization's resources. In the OIM implementation of SoD, IT privilege (entitlement) requests submitted by a user are checked and approved by an SoD engine and other users. Multiple levels of system and human checks can be introduced to ensure that even changes to the original request are vetted before the request is cleared. This preventive simulation approach helps identify and correct potentially conflicting assignment of entitlements to a user, before the requested entitlements are granted to the user. Approval and request management: With OIM, account request and approval processes can be automated to meet your organization s needs. In intranet and extranet deployments, administrators, peers, or users themselves can initiate requests for access to resources and track the status of their requests through web applications and notifications. OIM 11g features a new request model based on Oracle SOA s (BPEL) approval workflow (design and orchestration). Approval workflows are highly configurable to accommodate multiple approval processes and stakeholders. OIM 11g provides Request Templates for persona-specific request catalogs. Policy-based entitlement management: OIM s policy engine controls fine-grained, attribute-level entitlements across managed applications through Oracle Entitlement Server-based authorization policies, automating IT processes and enforcing security and compliance requirements such as segregation of duties. Policy-based management of entitlements allows multiple-request and approval processes to be implemented and refined over time in parallel, reducing the total cost of implementation. Universal Delegated Administration is provided through the embedded Oracle Entitlement Server. Adapter Factory: OIM integrates with any application or resource through highly configurable, agentless interface technology. Oracle provides a growing library of pre-configured connectors to popular applications and user repositories. Each connector supports a wide range of identity management functions and uses the most appropriate method of integration recommended for the target resource, whether it s proprietary or based on open standards (e.g., SPML). Connecting to proprietary systems might be difficult. OIM s Adapter Factory eliminates the complexity associated with creating and 24
28 maintaining these connections. The Adapter Factory provided by OIM is a code-generation tool that enables you to create Java classes. Integration with Governance, Risk, and Compliance: Oracle Identity Manager is part of the multiple products making up Oracle s Governance, Risk, and Compliance (GRC) infrastructure controls. Oracle Application Access Controls Governor, a key product in the Oracle GRC platform, allows customers to manage, remediate, and enforce enterprise resource planning SoD policies (the reference implementation that comes with Oracle Fusion Applications was built with these SoD policies). Enterprise resource planning roles and responsibilities are effectively segregated, thus minimizing the risk of fraud and ensuring regulatory compliance. Oracle Application Access Controls Governor also provides a comprehensive library of real-world, best-practice SoD controls for Oracle Fusion Applications. Oracle Identity Manager integrates with Oracle Application Access Controls Governor by performing real-time SoD validation prior to provisioning roles to Oracle Fusion Applications. Oracle Access Manager Oracle Fusion Applications support single sign-on (SSO) through the use of Oracle Access manager (OAM). Figure 12: Oracle Fusion Applications and OAM OAM provides centralized, policy-driven services for authentication, single sign-on (SSO), and identity assertion. OAM integrates with a broad array of authentication mechanisms, third-party web servers and application servers, and standards-based federated SSO solutions to ensure maximum flexibility and a well-integrated, comprehensive web access control solution. 25
29 OAM provides authentication and SSO services in the web tier and integrates with applications and data providers by asserting authenticated identities to application access control systems. OAM s functional layers include: Authentication: OAM's Access Server, Policy Manager, and out-of-the-box web server plug-ins called WebGates (or AccessGates for integration with application servers, packaged applications, and other enterprise resources) work together to intercept access requests to resources, check for a pre-existing authentication, validate credentials, and authenticate users. Single Sign-On: Typically, when a browser user attempts to access Oracle Fusion Applications, OAM first checks whether the applications are protected. If they are, OAM (through a WebGate) challenges the user for credentials (e.g., simple username / password, X.509 certificates, smart cards, etc.). Based on these credentials, OAM enforces its security policies to authenticate the user against a user store and creates a session ticket (in the form of an HTTP (browser) cookie) enabling single sign-on or repeated access to the same Oracle Fusion Applications without re-logging. Access control: OAM allows coarse-grained authorization to resources based on user roles and access policies. Typically, following successful authentication, OAM provides access to a specific resource (e.g., an Oracle Fusion Applications main page) based on the authenticated user s role. For example, a basic user and an administrator authorized to the same web application may have access to different levels of functionality through a personalized web page based on their role s attributes. Support for Windows Native Authentication: OAM enables Microsoft Internet Explorer users to automatically authenticate to their web applications using their desktop credentials. This is known as Windows Native Authentication (WNA). Cross-platform authentication is achieved by emulating the negotiate behavior of native Windows-to-Windows authentication services that use the Kerberos protocol. In order for cross-platform authentication to work, non-windows servers (in this case, OAM) must parse SPNEGO tokens in order to extract Kerberos tokens subsequently used for authentication. With OAM single sign-on combined with WNA, a Kerberos session ticket is generated that contains the user s log-in credentials (this Kerberos session ticket is not visible to the user). With WNA implemented, the user can click on a web application without another challenge for credentials; the Kerberos session ticket including the user s credentials is passed through the browser to OAM. OAM validates the credentials by checking them against the Key Distribution Center (KDC) server on the Windows domain server. Compliance Reporting: OAM includes unified and centralized audit reporting for all OAM components, with all operations stored and correlated in a secure database for analysis. OAM comes with pre-built reports and the ability to create custom reports through Oracle Business Intelligence Publisher in order to provide greater visibility and reporting on common events such as user access attempts, successful or failed authentications, and single sign-on events. These features improve an organization's ability to meet common governmental and industry regulations. Thanks to its tight integration with OPSS, OAM is able to make calls to container-managed applications (such as Oracle Fusion Applications) in order to invoke authentication events that are 26
30 enforced by OAM. In this case, the application makes the decision to authenticate by calling OPSS for log-in. Oracle Entitlement Server Oracle Fusion Applications that require support for fine-grained authorization leverage Oracle Entitlement Server (OES). OES is an authorization engine that externalizes, unifies, and simplifies the management of complex entitlement policies. OES secures access to application resources and software components (such as URLs, Enterprise JavaBeans, and JavaServer Pages) as well as arbitrary business objects (such as customer accounts or patient records in a database). OES s unique architecture allows Security Modules to be combined as a single policy decision point and policy enforcement point that runs in process with Oracle Fusion Applications to vastly increase the performance and reduce latency of runtime authorization decisions. OES presents advantages over OPSS. As mentioned before, Oracle Fusion Applications can make standard authorization calls to OPSS and use APM to define authorization policies. However, OES has advanced features that OPSS doesn t have such as a comprehensive policy language, obligations (responses), or constraints (e.g., if x is greater than 3, then perform some action ). As a result, OES supports a richer set of authorization models. OES also directly supports data security, and has the Security Modules for various target systems with policy distribution and local decision caching, policy simulation, resource discovery, and a richer resource model. Oracle Web Services Manager Oracle Web Services Manager (OWSM) is designed to protect access to multiple types of resources including standards-compliant web services (Java EE, Microsoft.NET, PL/SQL, etc.); SOA composites including BPEL and enterprise service bus (ESB) processes; Oracle WebCenter s remote portlets, and web services exposed by Oracle Fusion Applications. OWSM 11g is installed as part of Oracle SOA 11g and Oracle WebCenter 11g. In addition, OWSM 11g is the runtime policy governance component for the Oracle SOA Governance solution. In this case, OWSM provides production assurance for deployed SOA artifacts through policy-based security and participates at various stages of the closed-loop life cycle control. OWSM 11g includes a policy manager and interceptors or enforcement points (also known as agents). Both policy manager and agents run on Oracle WebLogic Server. Agents can be on the service requester side (client) and/or the service provider side (endpoint server). Typically, a request made to a web service is intercepted by an OWSM agent that enforces security policies defined in the OWSM policy manager. OWSM s policy model, based on the WS-Policy and WS-SecurityPolicy standards, is the security lynchpin for Oracle Fusion Middleware s web-services-based components. 27
31 Oracle Fusion Applications Security Process Flow Figure 13 summarizes Oracle Fusion Applications security process flow. Figure 13: Oracle Fusion Applications Security Process Flow Putting It All Together Figure 14 represents a logical view of Oracle Fusion Applications security including all of the Oracle Identity Management components involved. Figure 14: Oracle Fusion Applications Security Logical View 28
32 Other Oracle Identity Management components can optionally be used, such Oracle Adaptive Access Manager (OAAM) for resource protection through real-time fraud prevention, software-based multifactor authentication, unique authentication strengthening, offline risk analysis and proactive actions to prevent fraud at critical log-in and transaction checkpoints, and Oracle Identity Federation in cases where Oracle Fusion Applications require single sign-on across multiple Internet domains. In addition, Oracle Identity Analytics (OIA) is used to complement Oracle Identity Manager in the area of identity and access governance. OIA provides a comprehensive solution for certification, role governance, enterprise-level SoD enforcement, a 360-degree view of user access (Cert360), and an Identity Warehouse designed to consolidate identities, resources, and entitlement information. Conclusion Oracle Fusion Applications are Oracle s Java EE-based, next-generation enterprise resource planning applications. Oracle Fusion Applications leverage Oracle Fusion Middleware s service-oriented security to protect access to resources. For large-scale enterprise environments, Oracle Fusion Applications take advantage of Oracle Identity Management s services, thus abstracting security from the applications, and administering the enterprise environment from a single point of control. 29
33 White Paper Title September 2010 Author: Marc Chanliau, Oracle Identity Mgt Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA U.S.A. \ Copyright 2010, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Worldwide Inquiries: AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. Intel Phone: and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are Fax: trademarks or registered trademarks of SPARC International, Inc. UNIX is a registered trademark licensed through X/Open oracle.com Company, Ltd. 0410
An Oracle White Paper July 2010. Oracle Identity Management 11g
An Oracle White Paper July 2010 Oracle Identity Management 11g Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be
Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010
Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,
Oracle Fusion Middleware 11g Release 1 IDM Suite
Oracle Fusion Middleware 11g Release 1 IDM Suite Rodger King Senior Principal Support Engineer The following is intended to outline our general product direction. It is intended for information purposes
Oracle Application Development Framework Overview
An Oracle White Paper June 2011 Oracle Application Development Framework Overview Introduction... 1 Oracle ADF Making Java EE Development Simpler... 2 THE ORACLE ADF ARCHITECTURE... 3 The Business Services
1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.
1 Copyright 2011, Oracle and/or its affiliates. All rights ORACLE PRODUCT LOGO Session ID: 17202 Oracle Fusion Applications - Technology Essentials Overview Nadia Bendjedou Senior Director Product Strategy,
1 What Are Web Services?
Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1) E14294-04 January 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include: What
E-Business Suite Oracle SOA Suite Integration Options
Specialized. Recognized. Preferred. The right partner makes all the difference. E-Business Suite Oracle SOA Suite Integration Options By: Abhay Kumar AST Corporation March 17, 2014 Applications Software
Oracle Identity Management 11gR2 Sizing and Capacity Planning
An Oracle White Paper October 2012 Oracle Identity Management 11gR2 Sizing and Capacity Planning Disclaimer The following is intended for information purposes only, and may not be incorporated into any
Oracle Identity Analytics Architecture. An Oracle White Paper July 2010
Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
1 What Are Web Services?
Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1.6) E14294-06 November 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include:
ORACLE FUSION MIDDLEWARE PROFILE
ORACLE FUSION MIDDLEWARE PROFILE Corporate Addvantum, is a global service provider of Information Technology consulting and services, to customers in GCC region. Addvantum has technical delivery centers
G-Cloud Framework. Service Definition. Oracle Fusion Middleware Design and Implementation
Fusion Middleware G-Cloud Framework Service Definition Oracle Fusion Middleware Design and Implementation Prepared for: G-Cloud Document: Fusion Middleware Version: 0.1 Issue Date: 06/09/2013 1 OVERVIEW
Clouds on the Horizon: What s the Best Oracle Fusion Strategy for Those Still on Oracle 11i or R12.0?
Clouds on the Horizon: What s the Best Oracle Fusion Strategy for Those Still on Oracle 11i or R12.0? Gustavo Gonzalez -Oracle ACE at IT Convergence Abstract The general availability of Oracle Fusion,
Monitoring Oracle Fusion Middleware
Monitoring Oracle Fusion Middleware Very important task for an Administrator Methods for Monitoring 1. Oracle WebLogic Server Administration Console 2. Fusion Middleware console 3. Command Line opmnctl
Secure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities
PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to
Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach [email protected]
R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach [email protected] The following is intended to outline our general product direction. It is intended for information purposes
<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
An Oracle White Paper July 2012. Oracle Identity Federation
An Oracle White Paper July 2012 Oracle Identity Federation Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
Management. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill.
ORACLE Oracle Press Oracle Fusion Middleware 11 g Architecture and Management Reza Shafii Stephen Lee Gangadhar Konduri Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan
Oracle Access Manager. An Oracle White Paper
Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any
Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007
Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...
Oracle SOA Suite: The Evaluation from 10g to 11g
KATTA Durga Reddy TATA Consultancy Services. Oracle SOA Suite: The Evaluation from 10g to 11g Introduction Oracle SOA Suite is an essential middleware layer of Oracle Fusion Middleware. It provides a complete
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
White paper December 2008. Addressing single sign-on inside, outside, and between organizations
White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli
Sun and Oracle: Joining Forces in Identity Management
Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
ORACLE DATA INTEGRATOR ENTERPRISE EDITION
ORACLE DATA INTEGRATOR ENTERPRISE EDITION ORACLE DATA INTEGRATOR ENTERPRISE EDITION KEY FEATURES Out-of-box integration with databases, ERPs, CRMs, B2B systems, flat files, XML data, LDAP, JDBC, ODBC Knowledge
<Insert Picture Here> Building a Complex Web Application Using ADF and Siebel
Building a Complex Web Application Using ADF and Siebel Nishit Rao Group Product Manager Fusion Middleware Oracle Dhiraj Soni Technical Architect GIT Apps Engineering Oracle The following
OWB Users, Enter The New ODI World
OWB Users, Enter The New ODI World Kulvinder Hari Oracle Introduction Oracle Data Integrator (ODI) is a best-of-breed data integration platform focused on fast bulk data movement and handling complex data
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Manvendra Kumar AST Corporation, IL Scott Brinker College of American Pathologist, IL August
Oracle Data Integrator 11g New Features & OBIEE Integration. Presented by: Arun K. Chaturvedi Business Intelligence Consultant/Architect
Oracle Data Integrator 11g New Features & OBIEE Integration Presented by: Arun K. Chaturvedi Business Intelligence Consultant/Architect Agenda 01. Overview & The Architecture 02. New Features Productivity,
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development A RapidValue Solutions Whitepaper Contents Executive Summary... 03 Oracle Mobile Application Framework (MAF): The Complete Development
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere.
OpenAM All-In-One solution to securely manage access to digital enterprise and customer services, anytime and anywhere. OpenAM, the only all-in-one open source access management solution, provides the
The Oracle Fusion Development Platform
The Oracle Fusion Development Platform Juan Camilo Ruiz Senior Product Manager Development Tools 1 The preceding is intended to outline our general product direction. It is intended for information purposes
Service management White paper. Manage access control effectively across the enterprise with IBM solutions.
Service management White paper Manage access control effectively across the enterprise with IBM solutions. July 2008 2 Contents 2 Overview 2 Understand today s requirements for developing effective access
Oracle IDM Integration with E-Business Suite & Middleware Technologies
Oracle IDM Integration with E-Business Suite & Middleware Technologies Session ID#: 14251 Prepared by: Scott Brinker IDM Security Specialist CAP Deepak Sharma Sr. Consultant AST Corporation REMINDER Check
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management
An Oracle White Paper October 2013. Oracle Data Integrator 12c New Features Overview
An Oracle White Paper October 2013 Oracle Data Integrator 12c Disclaimer This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should
ORACLE WEBCENTER PORTAL
ORACLE WEBCENTER PORTAL A MODERN ENTERPRISE PORTAL WITH INTUITIVE TOOLS FOR COMPOSING CONTENT-RICH SELF- SERVICE PORTALS WITH INTEGRATED SOCIAL AND COLLABORATION SERVICES KEY FEATURES Enterprise-Grade
Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.
Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009
Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications
Oracle SOA Suite Then and Now:
Oracle SOA Suite Then and Now: The Evolution from 10g to 11g Shane Goss Impac Services Agenda SOA Suite 11g New Features Highlight new features of SOA 11g Some products have added features and functionality
Groot, Groter, Groots(t)
Groot, Groter, Groots(t) Evelyn Gerritsen FMW Sales Consultant Oasis of the Seas Oracle Fusion Middleware Applications Middleware Database Infrastructure & Management Oracle Fusion
Applications. Oracle WebCenter 11 g Handbook: Build Rich, Customizable Enterprise 2.0. Oracle Press ORACLE. Philipp Weckerle.
ORACLE Oracle Press Oracle WebCenter 11 g Handbook: Build Rich, Customizable Enterprise 2.0 Applications Frederic Desbiens Peter Moskovits Philipp Weckerle Mc Graw Hill New York Chicago San Francisco Lisbon
Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.
PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading
SOA and Web Services. Larry Kramer Principal Applied Technologist June 9, 2006. A PeopleTools and Fusion perspective
"This presentation is for informational purposes only and may not be incorporated into a contract or agreement." SOA and Web Services A PeopleTools and Fusion perspective Larry Kramer Principal Applied
How Can Agile Customers Benefit from Oracle Fusion Middleware Today?
How Can Agile Customers Benefit from Oracle Fusion Middleware Today? Devendra Singh VP, Development, Agile PLM Gnani Palanikumar Product Management Director, Agile PLM Markus Zirn
These requirements led to several challenges in deploying identity related applications within the enterprise:
2 3 Directory services are key building blocks for secure identity-enabled business applications and the underlying enterprise identity management (IdM) architecture. Well-structured and organized directory
FREQUENTLY ASKED QUESTIONS. Oracle Applications Strategy
FREQUENTLY ASKED QUESTIONS Oracle Applications Strategy The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
IBM Tivoli Federated Identity Manager
IBM Tivoli Federated Identity Manager Employ user-centric federated access management to enable secure online business collaboration Highlights Enhance business-to-business and business-to-consumer collaborations
OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com
OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and
Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003
Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
ORACLE BUSINESS INTELLIGENCE SUITE ENTERPRISE EDITION PLUS
Oracle Fusion editions of Oracle's Hyperion performance management products are currently available only on Microsoft Windows server platforms. The following is intended to outline our general product
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
IBM WebSphere Application Server Family
IBM IBM Family Providing the right application foundation to meet your business needs Highlights Build a strong foundation and reduce costs with the right application server for your business needs Increase
OracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
Security solutions Executive brief. Understand the varieties and business value of single sign-on.
Security solutions Executive brief Understand the varieties and business value of single sign-on. August 2005 2 Contents 2 Executive overview 2 SSO delivers multiple business benefits 3 IBM helps companies
Integrating SharePoint Sites within WebSphere Portal
Integrating SharePoint Sites within WebSphere Portal November 2007 Contents Executive Summary 2 Proliferation of SharePoint Sites 2 Silos of Information 2 Security and Compliance 3 Overview: Mainsoft SharePoint
How To Develop A Mobile Application On An Android Device
Disclaimer: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver
Software Development Kit
Open EMS Suite by Nokia Software Development Kit Functional Overview Version 1.3 Nokia Siemens Networks 1 (21) Software Development Kit The information in this document is subject to change without notice
Reporting component for templates, reports and documents. Formerly XML Publisher.
Fusion Middleware Product TLA Description Comments Access Manager OAM Offers single-sign on, access policy creation and enforcement, self-service, delegated administration, password management, reporting
An Oracle White Paper February 2014. Oracle Data Integrator 12c Architecture Overview
An Oracle White Paper February 2014 Oracle Data Integrator 12c Introduction Oracle Data Integrator (ODI) 12c is built on several components all working together around a centralized metadata repository.
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
<Insert Picture Here> Oracle Mobile Enterprise Application Platform Overview
Oracle Mobile Enterprise Application Platform Overview Oracle Tools Product Development The following is intended to outline our general product direction. It is intended for information
Oracle Fusion Applications
Oracle Fusion Applications Concepts Guide 11g Release 1 (11.1.4) E15525-04 March 2012 Documentation for system administrators and developers that describes the core infrastructure components for Oracle
SERVICE ORIENTED ARCHITECTURE
SERVICE ORIENTED ARCHITECTURE Introduction SOA provides an enterprise architecture that supports building connected enterprise applications to provide solutions to business problems. SOA facilitates the
White paper December 2008. IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview
White paper December 2008 IBM Tivoli Access Manager for Enterprise Single Sign-On: An overview Page 2 Contents 2 Executive summary 2 The enterprise access challenge 3 Seamless access to applications 4
ORACLE BUSINESS INTELLIGENCE SUITE ENTERPRISE EDITION PLUS
ORACLE BUSINESS INTELLIGENCE SUITE ENTERPRISE EDITION PLUS PRODUCT FACTS & FEATURES KEY FEATURES Comprehensive, best-of-breed capabilities 100 percent thin client interface Intelligence across multiple
<Insert Picture Here> Oracle Web Services Manager (WSM)
Oracle Web Services Manager (WSM) Marc Chanliau Director, Product Management Outline Introduction Product Overview Typical Use-Case Scenarios Roadmap Q & A Introduction
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
identity management in Linux and UNIX environments
Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual
Veritas Enterprise Vault for Microsoft Exchange Server
Veritas Enterprise Vault for Microsoft Exchange Server Store, manage, and discover critical business information Trusted and proven email archiving Veritas Enterprise Vault, the industry leader in email
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options
Federated Identity and Single Sign-On using CA API Gateway
WHITE PAPER DECEMBER 2014 Federated Identity and Single Sign-On using Federation for websites, Web services, APIs and the Cloud K. Scott Morrison VP Engineering and Chief Architect 2 WHITE PAPER: FEDERATED
IBM Maximo technology for business and IT agility
IBM Software Tivoli March 2010 IBM Maximo technology for business and IT agility IBM asset and service management solutions 2 IBM Maximo technology for business and IT agility Contents 2 Executive summary
Oracle Fusion Middleware
Oracle Fusion Middleware Integration Overview for Oracle Identity Management Suite 11g Release 1 (11.1.1) E15477-02 June 2011 Oracle Fusion Middleware Integration Overview for Oracle Identity Management
Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience
Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience This document is for informational purposes. It is not a
Federated Identity and Trust Management
Redpaper Axel Buecker Paul Ashley Neil Readshaw Federated Identity and Trust Management Introduction The cost of managing the life cycle of user identities is very high. Most organizations have to manage
Office SharePoint Server 2007
Top 10 Benefits of WSS 3.0 Office SharePoint Server 2007 1. Improve team productivity with easy-to-use collaborative tools Connect people with the information and resources they need. Users can create
Oracle Fusion Middleware
Oracle Fusion Middleware Administrator's Guide for Oracle Business Intelligence Publisher 11g Release 1 (11.1.1) E22255-01 December 2011 Explains how to administer Oracle Business Intelligence Publisher,
ORACLE APPLICATION EXPRESS 5.0
ORACLE APPLICATION EXPRESS 5.0 Key Features Fully supported nocost feature of the Oracle Database Simple 2-Tier Architecture Develop desktop and mobile applications 100% Browserbased Development and Runtime
enterprise^ IBM WebSphere Application Server v7.0 Security "publishing Secure your WebSphere applications with Java EE and JAAS security standards
IBM WebSphere Application Server v7.0 Security Secure your WebSphere applications with Java EE and JAAS security standards Omar Siliceo "publishing enterprise^ birmingham - mumbai Preface 1 Chapter 1:
Collaboration solutions for midsized businesses Buyer s guide
Collaboration solutions for midsized businesses Buyer s guide Increase productivity by improving collaboration across and beyond your business. Give employees access to the information, people and resources
Maximum Availability Architecture. Oracle Best Practices For High Availability. Backup and Recovery Scenarios for Oracle WebLogic Server: 10.
Backup and Recovery Scenarios for Oracle WebLogic Server: 10.3 An Oracle White Paper January, 2009 Maximum Availability Architecture Oracle Best Practices For High Availability Backup and Recovery Scenarios
Oracle Fusion Applications Security Guide. 11g Release 5 (11.1.5) Part Number E16689-05
Oracle Fusion Applications Security Guide 11g Release 5 (11.1.5) Part Number E16689-05 June 2012 Oracle Fusion Applications Security Guide Part Number E16689-05 Copyright 2011-2012, Oracle and/or its affiliates.
JD Edwards EnterpriseOne Mobile Solutions
Specialists ORACLE / JD Edwards JD Edwards EnterpriseOne Mobile Solutions 1 Agenda Mobile Computing Smart Phones Oracle ADF Overview Tablets Industrial Mobile Applications Summary 2 Mobile Computing 3
Why IBM WebSphere Application Server V8.0?
Why IBM Application Server V8.0? Providing the right application foundation to meet your business needs Contents 1 Introduction 2 Speed the delivery of new applications and services 3 Improve operational
NetIQ Identity Manager Setup Guide
NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Copyright 2012, Oracle and/or its affiliates. All rights reserved.
1 Oracle WebCenter Strategy and Vision Rob Schootman Principal Sales Consultant Oracle Fusion Middleware 2 Insert Information Protection Policy Classification from Slide 13 Let s introduce myself... 3
Applications Licensing Table
Applications Licensing Table The Applications Licensing Table provides an overview of Oracle s licensing rules and restrictions for use of specific Oracle Applications with specific Oracle Technology.
Oracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
<Insert Picture Here> Oracle Security Developer Tools (OSDT) August 2008
Oracle Security Developer Tools (OSDT) August 2008 Items Introduction OSDT 10g Architecture Business Benefits Oracle Products Currently Using OSDT 10g OSDT 10g APIs Description OSDT
