Title | Summary | File | |
---|---|---|---|
Splunk DB Connect Tail for Oracle E-Business Sign-on Audit |
Integrigy has received a lot of great feedback about our Framework for logging and auditing the Oracle E-Business Suite. The Framework is... |
Oracle Security Blog | |
Kerberos Authentication for Oracle - Benefits and Recommendations |
Kerberos authentication support in the Oracle Database is now included with all editions of the Oracle Database. Previously, Kerberos... |
Oracle Security Blog | |
Oracle E-Business Suite Denial of Service Attacks and Locking the APPS Password |
My wake-up call one day last week came from an acquaintance. Somebody at his company typed the APPS password in wrong too many times and locked... |
Oracle Security Blog | |
How To Stop Insiders from Stealing Your Secrets – Recommendations on Rings of Security |
For those of you who attended our webinar on 15-May-2014 on how to secure privileged users,... |
Oracle Security Blog | |
Oracle E-Business Suite Security - Signed JAR Files - What Should You Do |
Until recently the Oracle E-Business Suite allowed self-designed certificates to assure the validity of Java code run within end-users’ browsers.... |
Oracle Security Blog | |
Securing Oracle E-Business Suite Privileged Accounts: APPS, SYSADMIN, oracle |
In an Oracle E-Business Suite environment, there are a number of generic, privileged accounts at the database, application, and operating system... |
Security Resources | File |
PreInstall RPM Makes Oracle Database Installation Easy |
Last week I had to build an Oracle 11gR2 database in the lab. Usually this process involves selecting one of several VirtualBox VM images for an... |
Oracle Security Blog | |
OBIEE Authentication Using the Oracle E-Business Suite |
There are two primary options for sharing authentication solutions with the Oracle E-Business Suite. The Oracle E-Business Suite and OBIEE both... |
Oracle Security Blog | |
OBIEE Security: Questions IT Security and Audit Should Ask |
This blog series so far has reviewed the basics of OBIEE security, the following questions should be included in any discussion of about the... |
Oracle Security Blog | |
OBIEE Security: Catalogs, Access Control Lists and Permission Reports |
The presentation catalog (Web Catalog) stores the content that users create within OBIEE. While the Catalog uses the presentation layer objects,... |
Oracle Security Blog |