Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint
Share this Page URL
Help

Oracle BAM 11gR1 Handbook > 6. Managing BAM Securities

6. Managing BAM Securities

Chapter 6. Managing BAM Securities BAM securities requirements vary from one system to another. Nevertheless, the basic things remain the same. For a BAM application, you have to ensure your resources, such as Data Objects, reports, and the BAM web applications, are securely protected, so that only authenticated and authorized users can access the information. Apart from these, you also need to consider the security issues during the data transmission between clients and servers. Keeping these security requirements in mind, the following key BAM securities concepts will be covered in this chapter: AuthenticationAuthorizationSecure Socket Layer (SSL) In this chapter, we will first discuss the topics related to client authentication, such as how to manage users and groups, and how to configure external LDAP servers for BAM. Then, you will learn how to manage security policies and application roles to control access to BAM resources. Finally, you will learn how to enable SSL for BAM.

  

You are currently reading a PREVIEW of this book.

                                                                                                                    

Get instant access to over $1 million worth of books and videos.

  

Start a Free Trial


  
  • Safari Books Online
  • Create BookmarkCreate Bookmark
  • Create Note or TagCreate Note or Tag
  • PrintPrint