O'Reilly logo

Oracle Fusion Middleware 11g Architecture and Management by Gangadhar Konduri, Stephen Lee, Reza Shafii

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing the Pricing Application

The security considerations of the production environment of an enterprise application must be planned carefully and in advance. In this chapter, we will go through the most important areas of consideration for securing the environment of the pricing application, as described in Chapter 8. We will also identify the specific steps required for addressing these considerations. The topology of the application’s environment will remain the same as that depicted in Figure 8-3 in Chapter 8, with only one major change: To allow for the configuration of Single-Sign-On (SSO) for the application’s web interfaces, we will assume the existence of a new host, named “idm2,” that contains an existing installation of the Oracle ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required