1 / 40

Brent Mosher Senior Sales Consultant Applications Technology Oracle Corporation

Brent Mosher Senior Sales Consultant Applications Technology Oracle Corporation. Oracle E-Business Suite Security Management. Agenda. Security Guidelines Secure Architectures 11i.10 User Management Questions and Answers. Security Guidelines. Security Policy.

rinaldo
Télécharger la présentation

Brent Mosher Senior Sales Consultant Applications Technology Oracle Corporation

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Brent MosherSenior Sales Consultant Applications Technology Oracle Corporation

  2. Oracle E-Business Suite Security Management

  3. Agenda • Security Guidelines • Secure Architectures • 11i.10 User Management • Questions and Answers

  4. SecurityGuidelines

  5. Security Policy Not just for the paranoid any more! • Authentication • Authorization • Auditing

  6. Patching • Security Alerts • Oracle Quarterly Critical Patch Update (CPU) • Middle of January, April, July, October • Covers all Oracle products • http://www.oracle.com/technology/deploy/security • Also monitor alerts for your Hardware platform. • Operating System • Java • Management tools, …

  7. 11i Security Best Practices • MetaLink article 189367.1 • Maintained continuously, check periodically for updated advice (see change log) • Major document update released 12/06/2004 • Assumes current patch level • 11.5.9 + Recommended Patch Level or 11.5.10 • Most advice is now automated via latest AutoConfig and OAM

  8. Oracle Database • Get to recommended database: 9.2.0.5+ • Harden the database and server machine… • Check privileges on APPLSYSPUB/PUB • $FND_TOP/patch/115/sql/afpub.sql • Change default passwords for Apps accounts • Listed in FND_ORACLE_USERID • Use FNDCPASS

  9. Oracle Database • Do not expose APPS password • Create alternate accounts • Named accounts per human/system • Limited grants to APPS, according to role • Audit changes to database security and setup • Heavy auditing on human accounts, less on APPS • Restrict access to audit information

  10. OAM Trusted Host Registration

  11. OAM Security Dashboard

  12. OAM Page Flow Logging

  13. SecureArchitectures

  14. Application Server • Use SSL (HTTPS) for Web Listener • Recommended for internal use as well • New SSL Setup wizard in OAM 11.5.10 • Manual Setup: Metalink 123718.1, 277574.1 • Performance considerations • mod_ssl: about 15% increase in CPU load • Hardware accelerators now supported

  15. OAM SSL Configuration Wizard

  16. External Server Security External PC External Server Internal PC Internal Server Control which responsibilities are externally available. Users accessing from outside your firewall will see a restricted set of Responsibilities in the Navigator.

  17. External Server Security • Mark External Servers • Node Trust Level (Server Profile Option) • Set to "External" for externally facing servers • Set to "Normal" at Site level • Mark Externally available Responsibilities • Responsibility Trust Level (Profile Option) • Set to "External" for externally available resps • Set to "Normal" at Site level' • External access restricted by security system

  18. DMZ Reverse Proxy (future) • Relays valid requests to Application Server • Apache or WebCache • No Applications Code on this tier • URL filtering limits access to specific pages • External product teams will supply URL patterns • Mitigates the "unnecessary code" problem • Certification in progress • Look for white paper in process note 287176.1

  19. E-Business Suite Configuration • Harden EBS Security Setup • Check GUEST user privileges • Review access to powerful forms (Security, SQL) • Check settings of critical profile options • Enable Auditing • Sign-on Audit at the "Form" level • Audit Trail for key security tables

  20. 11i.10UserManagement

  21. 11i Basic Security • Responsibility  User • Menu(s) • Function(s) Resp Resp Resp Resp Resp

  22. New Model: User Management • Optional 11i.10 permission repository • Full registry of what is available • Administration at the business level • Roles simplify administration • Grants to Roles represent policy, rarely change • Hierarchical Roles reuse common setup • Allows for delegated administration • Security Administrator defines Role Permissions • Role Administrators manage Role Membership

  23. Role Based Access Control • A Role is the actions and activities assigned to a person or group. • A role can be modeled using • Responsibilities • Permissions • Function Security Policies • Data Security Policies • A user can be assigned several roles. • A role can be assigned to several users.

  24. Role Based Access Control Description Permissions Responsibilities Roles Data Security Rules Function Security Rules

  25. User Management Key Features • Role Based Management • Role Inheritance • Self Service Registration • Delegated User Management

  26. Role Based Management

  27. Registration ProcessDescription Types of Registration Processes • Self Service Account Requests • Requests for Additional Access • Account Creation and Access Role Assignment by Administrators

  28. Registration Process Link generated using User Management’s registration link generator

  29. Request Access

  30. Delegated Administration • Create a role that that represents a set of local administrators • Identify the subset of users the admin can manage and the administrative functions that can performed on this user set • Identify the organizational relationships the admin can manage • Choose roles that the administrator can administer • Grant any other permissions if necessary

  31. Delegated Administration Create Role

  32. Delegated Administration

  33. Delegated Administration Org A Reseller of Partner Admin Of Org A Org B

  34. Delegated AdministrationHow to Setup this Feature

  35. Resources

  36. User Management Strategic Implementation Program • Ensure smooth implementations for new products • Requires willingness and commitment • Discuss with local applications sales team

  37. Oracle Metalink Notes • Note 258281.1 - About User Management • Note 189367.1 – Security Best Practices • Note 287176.1 – DMZ Configuration • RBAC http://csrc.nist.gov/rbac/rbac-std-ncits.pdf

  38. Q & Q U E S T I O N S A N S W E R S A

More Related