JD Edwards Security Best Practices
|
|
|
- Gyles Lindsey
- 10 years ago
- Views:
Transcription
1
2 JD Edwards Security Best Practices Manish Somani Director, Software Engineering Oracle JD Edwards Marcelo Tamassia Founding Partner EmeraldCube Solutions October 01, 2014
3 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle s products remains at the sole discretion of Oracle.
4 Program Agenda Why do I care about Security? Oracle Software Security Assurance Security in EnterpriseOne: Built-in, Not Bolt-On!! Oracle Security Products OAM Case Studies
5 Security : Is it a choice? In 2004, it was discovered that crackers gained almost complete access to Nortel's systems. Thought to have originated in 2000, for nearly ten years they accessed documents including s, technical papers, research, development reports, and business plans. "I have no doubt that extensive cyber attacks contributed to our downfall and bankruptcy in Brian Shields, the former senior systems security adviser at Nortel
6 Multi-Dimensional Aspects Of Security IP theft and economic espionage Financial fraud and organized crime Sophisticated hackers Opportunistic insiders Today s threats What s at stake Intellectual property Customer, employee, citizen, corporate data Financial loss Reputational loss Fines & penalties Internal and external audits Supply chain security Changing regulatory landscape Data and systems consolidation Changing environments (mobile devices, cloud, etc.) Other challenges
7 Oracle Software Security Assurance
8 Oracle Software Security Assurance (OSSA) Encompasses all the continuously improving processes, procedures, and technologies Implemented by Oracle to ensure that Oracle s products are meeting our customers security requirements, while providing for the most cost-effective ownership experience.
9 Oracle Software Security Assurance Maintaining the security posture of ALL Oracle customers is one of the greatest priorities of Oracle Applies to ALL Oracle software products throughout their lifecycle, and constantly evolving to adapt to new technologies, threats, and product use cases Oracle security programs affect the entire product lifecycle
10 Secure Development Standards Coding guidelines Secure coding principles Examples of what not to do Requirements to use previously vetted security code Minimum secure design requirements Mandatory training for all employees
11 Product Definition Security requirements are expressed as early as design phase Security requirements Include requirements from Secure Coding Standards Product-specific requirements Established security criteria must be satisfied and reviewed at each step of process
12 Product Development Ongoing reviews to validate compliance with: Secure Coding Standards Additional design reviews for security Extensive use of scanning and testing tools to provide ongoing feedback to development team in regards to quality of produced code
13 Ongoing Assurance Security testing takes place throughout useful life of the product Pre-release security scanning and testing Post-release security activities: Ethical hacking Updated secure configuration recommendations are available online
14 Security in JD Edwards EnterpriseOne Built-in, Not Bolt-On!!
15 JD Edwards EnterpriseOne Security Deployment Server Windows Client Data across Data Data in trust at flight rest boundaries Business Services Server JAS/HTML Server Enterprise Server BI Publisher Server (OVR) Database Server Transaction Server
16 Secure Data in Flight Support HTTPS between Web Browser and HTML Server between E1 HTML Server and BI Server for One View Reports Support SSL between HTML Server and Enterprise Server Support SSL between Deployment Server and Enterprise Server
17 Secure Data at Rest Password in all configuration files Jas.ini, jdbj.ini, jde.ini and jdeinterop.ini Configured via server manager User passwords in Security Tables are encrypted using One-way Hash Application Business Table Data are encrypted using TripleDes
18 Secure Data Across Trust Boundary Secured File Upload Allowed only for a white list Validate File content Secured Download Security Prevents in line opening of file Prevent Click Jacking and HTML frame injection Prevent Cross Site Scripting and java script injection
19 Security Testing for EnterpriseOne Static Code Analysis HP Fortify tools is integrated in the build process to scan for security issues Dynamic Test Analysis HP Web Inspect is part of test cycle to scan for security issues for HTML client Fuzz Testing JDENET testing XML Parser Testing
20 Security Guide update for EnterpriseOne Update security guide as per OSSA standard Integrate Security Best practice into security admin guide Integrate database public shutdown paper for all supported databases.
21 Oracle Security Products
22 Oracle Security OIM products Oracle Internet Directory (OID) LDAP directory server that stores its data in an Oracle database Oracle Access Manager (OAM) provides SSO, authentication, authorization, centralized policy administration. Oracle Identity Manager(OIM) provides provisioning, reconciliation, self-service, and integration with heterogeneous identity systems through connectors
23 Marcelo Tamassia Founding EmeraldCube Solutions Why Prism? 18 years of tech industry experience 13 years of EnterpriseOne consulting in South and North America Planned, designed, executed, and managed over 90 E1 implementations and upgrades worldwide
24 EmeraldCube Solutions Focus: JDE Technology, Business Intelligence & IoT JDE & OBI focused Managed Services team On Demand and Managed Services plans Unmatched proactive, monitoring, and alerting tools Experts in BI solutions for JDE On premises and cloud-based options Choice of BI tools and platforms Subscription and traditional software acquisition models EmeraldSensor for JDEdwards EnterpriseOne IoT platform for JDE customers Complete solution - sensors, gateway & analytics
25 Customer Case - I
26 Laser Technology Denver-based industry leader in the design and manufacturing of innovative laser-based speed and distance measurement instruments including laser rangefinders, speed guns & sensors JDE Footprint Release 9.1 Tools Users Financials/Manufacturing/Distribution Red Stack
27 Laser Technology: Needs IT & Auditors Inconsistent password policies between JDE and AD High number of password related helpdesk calls Convoluted on-boarding process for new employees/ids Users Too many passwords to remember
28 Laser Technology: Solution Oracle Access Manager LDAP/AD Identity Store Form Authentication End-user experience User types JDE URL User gets prompted by OAM login page User types their network/ad credentials User is inside JDE
29 Laser Technology: Benefits Consistent password policy Significant reduction of helpdesk calls Streamlined user on-boarding Users no longer need to remember their JDE password
30 Customer Case - II
31 Silgan Containers Largest provider of metal food packaging in the United States, Silgan Containers is trusted by America s most respected brands JDE Footprint Release 9.0 Tools Users Financials/Manufacturing/Distribution iseries / Windows
32 Silgan: Needs IT & Auditors Inconsistent password policies between JDE, OBIEE, and AD High number of password related helpdesk calls Convoluted on-boarding process for new employees/ids BI using long names and JDE using short names JDE usernames did not match AD usernames (10 character limitation) Users Too many usernames to remember Too many passwords to remember
33 Silgan: Solution Active Directory Custom field for E1 short username (work around JDE 10 characters limitation) Oracle Access Manager LDAP/AD User Identity Store Two application domains setup on OAM (JDE and OBIEE) User Mappings / responses Kerberos / Windows Native Authentication
34 Silgan: Solution End-user experience User types JDE URL and user is automatically on JDE User types BI URL and user is automatically on OBIEE No more password changes inside JDE / BI
35 Silgan: Benefits No more passwords / usernames to memorize. Happy users! True Single-Sign On Consistent password policy across JDE, BI, and AD Significant reduction of helpdesk calls
36 Lessons Learned
37 OAM Lessons Learned OAM single point of failure (cluster) Separate production and development OAM servers? Short/Long username options Native Authentication Browser settings VPN / External Users Fallback authentication Use multiple domain controllers on the setup Triple check your response mappings JDE Security guide
38 Contact
39 The Right Tool for the Task Strengthen Your JD Edwards EnterpriseOne JD Edwards Professionals My Oracle Support Communities JD Edwards The Right Tool for the Task Doc ID will help you find out! TheOracleJDEdwards LearnJDE.com JD Edwards Newsletters EnterpriseOne World
Addressing Cyber Security in Oracle Utilities Applications
Addressing Cyber Security in Oracle Utilities Applications Anthony Shorten Principal Product Manager Oracle Utilities Global Business Unit Sept, 2014 Safe Harbor Statement The following is intended to
A brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
Centrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
THE OPEN UNIVERSITY OF TANZANIA
THE OPEN UNIVERSITY OF TANZANIA Institute of Educational and Management Technologies COURSE OUTLINES FOR DIPLOMA IN COMPUTER SCIENCE 2 nd YEAR (NTA LEVEL 6) SEMESTER I 06101: Advanced Website Design Gather
Centralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan [email protected] Principal Security Consultant Kevin Moulton [email protected] Senior Manager,
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
NetIQ Access Manager 3.2 integration
KeyShield SSO NetIQ Access Manager 3.2 integration system integrator documentation ver. 1.0.1 (21. Mar. 2014) Na Pankráci 54, Praha 4 Introduction KeyShield SSO authenticates not only a browser session
Getting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
Oracle IDM Integration with E-Business Suite & Middleware Technologies
Oracle IDM Integration with E-Business Suite & Middleware Technologies Session ID#: 14251 Prepared by: Scott Brinker IDM Security Specialist CAP Deepak Sharma Sr. Consultant AST Corporation REMINDER Check
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture
Compliance & Data Protection in the Big Data Age - MongoDB Security Architecture Mat Keep MongoDB Product Management & Marketing [email protected] @matkeep Agenda Data Security Landscape and Challenges
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service
An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,
IBM Connections Cloud Security
IBM Connections White Paper September 2014 IBM Connections Cloud Security 2 IBM Connections Cloud Security Contents 3 Introduction 4 Security-rich Infrastructure 6 Policy Enforcement Points Provide Application
SchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
Application Security Testing
Tstsec - Version: 1 09 July 2016 Application Security Testing Application Security Testing Tstsec - Version: 1 4 days Course Description: We are living in a world of data and communication, in which the
Trust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager ([email protected]) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
Query JD Edwards EnterpriseOne Customer Credit using Oracle BPEL Process Manager
Query JD Edwards EnterpriseOne Customer Credit using Oracle BPEL Process Manager 1 Overview In this tutorial you will be querying JD Edwards EnterpriseOne for Customer Credit information. This is a two
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1
Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2
[1]JD Edwards EnterpriseOne Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2 E61545-01 October 2015 Describes the configuration of the Application
PortWise Access Management Suite
Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s
JD Edwards EnterpriseOne 9.1 Clustering Best Practices with Oracle WebLogic Server
JD Edwards EnterpriseOne 9.1 Clustering Best Practices with Oracle WebLogic Server An Oracle JD Edwards EnterpriseOne Red Paper December 2012 PURPOSE STATEMENT AND DISCLAIMER This document provides considerations
Securing Data in Oracle Database 12c
Securing Data in Oracle Database 12c Thomas Kyte http://asktom.oracle.com/ Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes
Passing PCI Compliance How to Address the Application Security Mandates
Passing PCI Compliance How to Address the Application Security Mandates The Payment Card Industry Data Security Standards includes several requirements that mandate security at the application layer. These
Microsoft Enterprise Mobility Suite
Microsoft Enterprise Mobility Suite Standalone - overview Peter Daalmans http://configmgrblog.com, [email protected] IT-Concern John Marcum Enterprise Client Management Architect / [email protected]
ManageEngine ADSelfService Plus. Evaluator s Guide
ManageEngine ADSelfService Plus Evaluator s Guide Table of Contents Document Summary:...3 ADSelfService Plus Overview:...3 Core Features & Benefits:...4 ADSelfService Plus Architecture:...5 Admin Portal:...
Intelligent Security Design, Development and Acquisition
PAGE 1 Intelligent Security Design, Development and Acquisition Presented by Kashif Dhatwani Security Practice Director BIAS Corporation Agenda PAGE 2 Introduction Security Challenges Securing the New
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
RSA SecurID Two-factor Authentication
RSA SecurID Two-factor Authentication Today, we live in an era where data is the lifeblood of a company. Now, security risks are more pressing as attackers have broadened their targets beyond financial
Employee Active Directory Self-Service Quick Setup Guide
Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:
Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach [email protected]
R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach [email protected] The following is intended to outline our general product direction. It is intended for information purposes
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
WordPress Security Scan Configuration
WordPress Security Scan Configuration To configure the - WordPress Security Scan - plugin in your WordPress driven Blog, login to WordPress as administrator, by simply entering the url_of_your_website/wp-admin
Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5
Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Disclaimer The following is intended to outline our general product
Hayri Tarhan, Sr. Manager, Public Sector Security, Oracle Ron Carovano, Manager, Business Development, F5 Networks
EXTENDING ACCESS WHILE ENHANCING CONTROL FOR YOUR ORGANIZATION S DATA LEVERAGE THE POWER OF F5 AND ORACLE TO DELIVER SECURE ACCESS TO APPLICATIONS AND DATABASES Hayri Tarhan, Sr. Manager, Public Sector
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
Long User ID and Password Support In JD Edwards EnterpriseOne
Long User ID and Password Support In JD Edwards EnterpriseOne An Oracle JD Edwards EnterpriseOne Red Paper November 2007 PURPOSE STATEMENT This document outlines the steps that existing JD Edwards EnterpriseOne
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
Extranet Access Management Web Access Control for New Business Services
Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control
Dell World Software User Forum 2013
Dell World Software User Forum 2013 December 9-12 Austin, TX SaaS Mobile Management Overview of Cloud Client Manager and integration with KACE K1000 Introducing Dell Enterprise Mobility Management Your
Detecting Web Application Vulnerabilities Using Open Source Means. OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008
Detecting Web Application Vulnerabilities Using Open Source Means OWASP 3rd Free / Libre / Open Source Software (FLOSS) Conference 27/5/2008 Kostas Papapanagiotou Committee Member OWASP Greek Chapter [email protected]
Cisco Cloud Web Security
Data Sheet Today s highly connected and fast-moving world is filled with complex and sophisticated web security threats. Cisco delivers the strong protection, complete control, and investment value that
Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management
Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309
Assuring Application Security: Deploying Code that Keeps Data Safe
Assuring Application Security: Deploying Code that Keeps Data Safe Assuring Application Security: Deploying Code that Keeps Data Safe 2 Introduction There s an app for that has become the mantra of users,
DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success Manvendra Kumar AST Corporation, IL Scott Brinker College of American Pathologist, IL August
Network Security Audit. Vulnerability Assessment (VA)
Network Security Audit Vulnerability Assessment (VA) Introduction Vulnerability Assessment is the systematic examination of an information system (IS) or product to determine the adequacy of security measures.
Arisant s Identity Management (IdM) for K-12 Education
Arisant s Identity Management (IdM) for K-12 Education IMPLEMENTING A NEW IDENTITY FOR ONLINE EDUCATION Top IdM Drivers Security/Privacy 81% Increase User Services & Access Disparate Systems 57% Regulatory
An Oracle White Paper September 2013. Directory Services Integration with Database Enterprise User Security
An Oracle White Paper September 2013 Directory Services Integration with Database Enterprise User Security Disclaimer The following is intended to outline our general product direction. It is intended
Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Security Inside-Out with Oracle Database 12c Denise Mallin, CISSP Oracle Enterprise Architect - Security The following is intended to outline our general product direction. It is intended for information
Using Foundstone CookieDigger to Analyze Web Session Management
Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.
Install and Configure Fusion Applications - DBA perspective. Masthan Babu Phani Kottapalli AST Corporation August 14, 2014
Install and Configure Fusion Applications - DBA perspective Masthan Babu Phani Kottapalli AST Corporation August 14, 2014 Specialized. Recognized. Preferred. The right partner makes all the difference.
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development A RapidValue Solutions Whitepaper Contents Executive Summary... 03 Oracle Mobile Application Framework (MAF): The Complete Development
NCSU SSO. Case Study
NCSU SSO Case Study 2 2 NCSU Project Requirements and Goals NCSU Operating Environment Provide support for a number Apps and Programs Different vendors have their authentication databases End users must
IT Security & Compliance. On Time. On Budget. On Demand.
IT Security & Compliance On Time. On Budget. On Demand. IT Security & Compliance Delivered as a Service For businesses today, managing IT security risk and meeting compliance requirements is paramount
Certified Identity and Access Manager (CIAM) Overview & Curriculum
Identity and access management (IAM) is the most important discipline of the information security field. It is the foundation of any information security program and one of the information security management
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG)
SAFE-T RSACCESS REPLACEMENT FOR MICROSOFT FOREFRONT UNIFIED ACCESS GATEWAY (UAG) A RSACCESS WHITE PAPER 1 Microsoft Forefront Unified Access Gateway Overview 2 Safe-T RSAccess Secure Front-end Overview
SECURITY AND REGULATORY COMPLIANCE OVERVIEW
Powering Cloud IT SECURITY AND REGULATORY COMPLIANCE OVERVIEW Executive Summary BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms. As
Copyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific [email protected]. Developments in Web Application and Cloud Security
Vladimir Yordanov Director of Technology F5 Networks, Asia Pacific [email protected] Developments in Web Application and Cloud Security Forces of Change Workforce and IT trends 2 Applications 3 Web Application
Seven Things To Consider When Evaluating Privileged Account Security Solutions
Seven Things To Consider When Evaluating Privileged Account Security Solutions Contents Introduction 1 Seven questions to ask every privileged account security provider 4 1. Is the solution really secure?
OBIEE 11g Security it s as easy as 1-2-3!
OBIEE 11g Security it s as easy as 1-2-3! Antony Heljula BI Architect @aheljula Peak Indicators Limited Agenda Aim of Presentation 10g Security Model 11g Security Model What is Supported Identity Providers
Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience
Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience This document is for informational purposes. It is not a
Client Security Guide
Client Security Guide NEXT GENERATION CLOUD-SECURITY www.exacttarget.com NEXT GENERATION CLOUD-SECURITY Companies across the globe are facing continuously evolving threats focused on obtaining an individual
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8
WHAT S NEW IN WEBSENSE TRITON RELEASE 7.8 Overview Global organizations are constantly battling with advanced persistent threats (APTs) and targeted attacks focused on extracting intellectual property
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Sun and Oracle: Joining Forces in Identity Management
Sun and Oracle: Joining Forces in Identity Management The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
MatriXay WEB Application Vulnerability Scanner V 5.0. 1. Overview. (DAS- WEBScan ) - - - - - The best WEB application assessment tool
MatriXay DAS-WEBScan MatriXay WEB Application Vulnerability Scanner V 5.0 (DAS- WEBScan ) - - - - - The best WEB application assessment tool 1. Overview MatriXay DAS- Webscan is a specific application
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Configuring Salesforce
Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
ITAR Compliant Data Exchange
ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/
FORBIDDEN - Ethical Hacking Workshop Duration
Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
Identity as a Service Powered by NetIQ IdentityAccess Service Configuration and Administration Guide
Identity as a Service Powered by NetIQ IdentityAccess Service Configuration and Administration Guide December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers,
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Using Voltage SecureMail
Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.
SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology
SaaS at Pfizer Challenges, Solutions, Recommendations Agenda How are Cloud and SaaS different in practice? What does Pfizer s SaaS footprint look like? Identity is the Issue: Federation (SSO) and Provisioning/De-provisioning
Configuring SuccessFactors
Chapter 117 Configuring SuccessFactors The following is an overview of the steps required to configure the SuccessFactors Enterprise Edition Web application for single sign-on (SSO) via SAML. SuccessFactors
DreamFactory on Microsoft SQL Azure
DreamFactory on Microsoft SQL Azure Account Setup and Installation Guide For general information about the Azure platform, go to http://www.microsoft.com/windowsazure/. For general information about the
Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk
Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk John Hawley VP, Security CA Technologies September 2015 Today s Theme: Preparing for the Adversary How to Prepare Your Organization
Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010
Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,
Managed Security Services
Managed Security Services 1 Table of Contents Possible Security Threats 3 ZSL s Security Services Model 4 Managed Security 4 Monitored Security 5 Self- Service Security 5 Professional Services 5 ZSL s
Connected Data. Connected Data requirements for SSO
Chapter 40 Configuring Connected Data The following is an overview of the steps required to configure the Connected Data Web application for single sign-on (SSO) via SAML. Connected Data offers both IdP-initiated
Leading The World Into Connected Security. Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA
Leading The World Into Connected Security Dipl.-Inform., CISSP, S+ Rolf Haas Enterprise Technology Specialist Content Lead EMEA History of Defining Largest Dedicated Delivering a Next Generation Architecture
IDENTITY & ACCESS. Privileged Identity Management. controlling access without compromising convenience
IDENTITY & ACCESS Privileged Identity Management controlling access without compromising convenience Introduction According to a recent Ponemon Institute study, mistakes made by people Privilege abuse
FireEye App for Splunk Enterprise
FireEye App for Splunk Enterprise FireEye App for Splunk Enterprise Documentation Version 1.1 Table of Contents Welcome 3 Supported FireEye Event Formats 3 Original Build Environment 3 Possible Dashboard
<Insert Picture Here> Oracle WebCenter Spaces and Oracle BI Applications Configuration
Oracle WebCenter Spaces and Oracle BI Applications Configuration Christina Kolotouros Enterprise 2.0 Product Management May 4, 2011 Versions & Pre-requisites Oracle WebCenter Version
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
