O'Reilly logo

Oracle BAM 11gR1 Handbook by Pete Wang

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 6. Managing BAM Securities

BAM securities requirements vary from one system to another. Nevertheless, the basic things remain the same. For a BAM application, you have to ensure your resources, such as Data Objects, reports, and the BAM web applications, are securely protected, so that only authenticated and authorized users can access the information. Apart from these, you also need to consider the security issues during the data transmission between clients and servers. Keeping these security requirements in mind, the following key BAM securities concepts will be covered in this chapter:

  • Authentication
  • Authorization
  • Secure Socket Layer (SSL)

In this chapter, we will first discuss the topics related to client authentication, such as how ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required