Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Save to My Library
Look up keyword or section
Like this
3Activity

Table Of Contents

0 of .
Results for:
No results containing your search query
P. 1
BestPractices4SecuringOracleEbusinessSuite

BestPractices4SecuringOracleEbusinessSuite

Ratings: (0)|Views: 183 |Likes:
Published by rehankalsekar
Best Practices for securing Oracle eBusiness Suite
Best Practices for securing Oracle eBusiness Suite

More info:

Published by: rehankalsekar on Sep 11, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

11/12/2011

pdf

text

original

 
 Best Practices for SecuringOracle E-Business Suite
Oracle Corporation
Version 3.0.1
 
ii
 Best Practices for Securing Oracle E-Business Suite
 Latest version of this document available under  Metalink Note 189367.1.
Revision History
VersionRelease DateDescriptions
1.2May 2002Version 1.2 of the Best Practices for Security E-Business Suite.2.0May 2003Update for new features.2.1Jan 2004Minor Edits.3.0Dec 2004Major Rewrite, new sections, expanded advice, focus on 11.5.9 and above.Copyright © 2002, 2003, 2004, Oracle. All rights reserved.Primary Authors: Andy Philips, Ashok SubramanianContributors: David Kerr, George Buzsaki, Erik Graversen, Deepak Louis, Rajiv Muthyala, Remi Aimsupha-nimit, Emily Nordhagen.Excerpts of documents [IntA, IntB] reproduced with permission from Integrigy Corporation.This document is provided for informational purposes only and the information herein is subject to changewithout notice. Please report any errors herein to Oracle Corporation by filing a documentation bug againstproduct code 510, component SEC_COMP. Oracle Corporation does not provide any warranties covering andspecifically disclaims any liability in connection with this document.Oracle is a registered trademark.Oracle Corporation World Headquarters500 Oracle ParkwayRedwood Shores, CA 94065U.S.A.Worldwide Inquiries:650.506.7000Fax 650.506.7200Worldwide Support:http://www.oracle.com/support
 
Table of Contents
iii
Overview ..............................................................................................................................................................1
System Wide Advice 2
Oracle TNS Listener Security...............................................................................................................................3
Hardening 3Network 3Authentication 4Authorization 5Audit 5
Oracle Database Security......................................................................................................................................7
Hardening 7Authentication 7Authorization 9Audit 10
Oracle Application Tier Security........................................................................................................................13
Hardening 13Authorization 15Audit 18
E-Business Suite Security...................................................................................................................................19
Hardening 19Network 20Authentication 21Authorization 24Audit 26Advanced Audit 28
Desktop Security.................................................................................................................................................31
Hardening 31
Operating Environment Security........................................................................................................................33
Hardening 33Network 34Authentication 35Authorization 36Maintenance 36
Extras for Experts...............................................................................................................................................39
Detect and Prevent Duplicate User Sessions 39Customize Password Validation 39Advanced Security/Networking Option (ASO/ANO) 39Configure Listener on a Non-Default
.dbc
Port 40Multi-Node Topology 40Hardening External Procedure (EXTPROC) Services 40
Appendix A: Security Setup Forms....................................................................................................................45Appendix B: Security Setup Forms That Accept SQL Statement......................................................................47Appendix C: Processes Used by E-Business Suite.............................................................................................49Appendix D: Ports Used by E-Business Suite....................................................................................................51Appendix E: Sample Linux Hardening of the Application Tier.........................................................................53Appendix F: References & More Resources......................................................................................................57

Activity (3)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
payakkamron liked this

You're Reading a Free Preview

Download
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->