O'Reilly logo

Oracle Fusion Middleware 11g Architecture and Management by Gangadhar Konduri, Stephen Lee, Reza Shafii

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Securing Physical Host

In Chapter 8, we performed the installation of all of the pricing application’s Fusion Middleware components through a single user with ID, “oracle.” Here are some important considerations concerning how to grant and protect access to the physical hosts of any Fusion Middleware deployment:

Image Accounts on the host You should not create too many user accounts on any Fusion Middleware hosts. A general recommendation is to create two sets of users—one set with system privileges on the operating system, and the other set with sufficient privileges to install, deploy, and maintain Fusion Middleware components—acting as Fusion Middleware ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required