O'Reilly logo

Oracle Fusion Middleware 11g Architecture and Management by Gangadhar Konduri, Stephen Lee, Reza Shafii

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Overall Flow of Events for Securing the Deployment

The sections of this chapter go through some of key steps for securing the pricing application’s environment. Although these steps are discussed in a particular sequence, they can be carried out separately because they are mostly independent considerations, unless mentioned otherwise. Table 9-1 provides a summary of these steps.

Image

TABLE 9-1. Pricing Application Security Configuration Steps

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required