Welcome to Scribd. Sign in or start your free trial to enjoy unlimited e-books, audiobooks & documents.Find out more
Download
Standard view
Full view
of .
Look up keyword or section
Like this
5Activity

Table Of Contents

Chapter 1 - Introduction
STRUCTURE OF THIS RED PAPER
RELATED MATERIALS
Chapter 2 - Security Model
REQUIRED READING
SECURITY MODEL – A CONCEPT
SECURITY THREATS
SECURITY: A DEFENSE-IN-DEPTH APPROACH
Defense-in-Depth Summary
Chapter 3 - Securing Network Infrastructure
SECURE SETUPS
NAT DMZ Infrastructure
Publicly Addressed DMZ Infrastructure
Additional Security DMZ
Firewall Application Server
ADDITIONAL NETWORK PROTECTION
Intrusion Detection Systems
Intrusion Prevention Systems
Web Application Firewalls
Oracle Adaptive Access Manager
Chapter 4 - Securing PeopleSoft Internet Architecture
HOW TO SECURITY HARDEN THE WEB SERVER
WebLogic
WebSphere
HOW TO ENABLE SSL ON A WEB SERVER FOR HTTPS
HOW TO DISABLE HTTP ON A WEB SERVER
HOW TO CHANGE THE DEFAULT PASSWORD OF PSKEY
HOW TO DISABLE CONFIGURATION RE-INITIALIZATION
HOW TO DISABLE BROWSER CACHING
HOW TO CONFIGURE A FORWARD PROXY SERVER FOR THE PORTAL AND INTEGRATION GATEWAY
Setting a Forward Proxy Server for WebLogic
Setting a Forward Proxy Server for WebSphere
HOW TO BYPASS A FORWARD PROXY FOR LOCAL HOSTS
How to Bypass Forward Proxy for Local Hosts for WebLogic
How to Bypass Forward Proxy for Local Hosts for WebSphere
HOW TO ENABLE MUTUAL AUTHENTICATION FOR INTEGRATION
HOW TO ENABLE LDAPS FOR DIRECTORY INTEGRATION
HOW TO ENABLE TUXEDO ENCRYPTION
USEFUL HARDENING LOCKDOWN LINKS
Chapter 5 - PeopleTools Security Hardening
DELETE OR DISABLE UNUSED USER IDS
ENABLE PASSWORD CONTROLS
EXPIRE PASSWORD AT NEXT LOGON
ALLOW PASSWORD TO BE EMAILED
REVIEW SIGN-IN AND TIME-OUT SECURITY
LIMIT ABILITY TO START APPLICATION SERVER
REVIEW QUERY SECURITY
ENABLE SQL ERROR MESSAGE SUPPRESSION
TRACK USERS’ LOGIN AND LOGOUT ACTIVITY
DECOUPLING PS_HOME AND PS_CFG_HOME
Understanding PS_HOME and PS_CFG_HOME
Securing PS_HOME and PS_CFG_HOME
CONSIDER AUDITING
Oracle Audit Vault
Chapter 6 - Securing Customized PeopleSoft Applications
CONFIGURE EVERY COMPONENT FOR ROW-LEVEL SECURITY
ISOLATE ALL USER-ENTERED DATA TO A BIND VARIABLE
ESCAPE ALL USER-ENTERED HTML
Understanding WS-Security
PROTECTING PDF FILES AND XDO.CFG
Appendix A - Implementing Self Service or Gateway
0 of .
Results for:
No results containing your search query
P. 1
Securing Your People Soft Application - July 2010

Securing Your People Soft Application - July 2010

Ratings: (0)|Views: 456|Likes:
Published by nchhajed

More info:

Published by: nchhajed on Jun 01, 2012
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

01/23/2013

pdf

text

original

You're Reading a Free Preview
Pages 4 to 47 are not shown in this preview.
You're Reading a Free Preview
Pages 51 to 63 are not shown in this preview.

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->