1 An Oracle White Paper September 2012 Security and the Oracle Database Cloud Service 1
2 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database Cloud Service... 5 Cloud Identity Manager... 6 Signing up for a Database Cloud Service trial... 6 Database Cloud security measures... 7 Database Cloud Service security measures... 7 Database Cloud application security options... 7 RESTful Web Service security options... 8 Origin-based security... 9 OAUTH authentication... 9 Application-based access... 9 User-based access... 9 Logic-based access
3 Overview One of the key concerns for organizations as they move to a shared resource model on the Cloud is insuring the security of their data. The Oracle Database Cloud Service, like the Oracle Database that is the foundation of the Database Cloud, has been created from the beginning with the utmost concern for security. This paper will review several aspects of security and the Oracle Database Cloud The basic architecture of the security domains that are used for the Database Cloud Security measures that apply to the overall service Security measures that apply to individual Database Cloud Services Application security options and Security options for RESTful Web Services that access a Database Cloud Service 3
4 Security architecture To understand the security architecture of the Oracle Database Cloud, you need to understand several different types of users and how they interact in the provisioning and management of a Database Cloud Service. User areas There are three different areas where user types operate an account, which represents a business organization, an identity domain, which represents a set of users, and a Database Cloud Service, which users in an identity domain can access. Accounts An account is representation of a business organization. An account can contain multiple Identity Domains, and each Identity Domain can contain multiple Database Cloud Services. An account is created when the first Database Cloud Service is requested for a particular user. The initial requestor for an Account is identified as the Buyer. If the Buyer is requesting a Service through the Oracle Store, the Buyer can specify a different user as the Account Administrator; if the initial request is for a trial, the Buyer and the initial Account Administrator are the same user. Buyers and Account Administrators are authenticated through their Oracle.com identity. Any Account Administrator can grant or revoke the Account Administrator privilege for any other Oracle.com user. An Account Administrator has access to the My Account page in the Cloud user interface, which offers a readonly view of all users and Database Cloud Services within an account. This read-only access allows Account Administrators to monitor all users and Services in their Account, but Account Administrators do not have any other management capabilities for those areas. Account Administrators can create additional Identity Domains or Database Cloud Services for their accounts. An Account Administrator can assign a new Database Cloud Service to an existing Identity Domain within their account. Identity Domains An Identity Domain is a pool of users. An account can have one or more Identity Domains, but each Domain is separate and distinct. You must define an Identity Domain when you initially request an account, and the requestor is given a username within the Identity Domain. 4
5 Identity Domain membership and privileges are defined with the Cloud Identity Manager, which is described in more detail below. Members of an Identity Domain can have security roles for one or more of the Cloud Services associated with the Identity Domain. These roles are described in more detail below. Identity Domain Administrators can see all Database Cloud Services associated with the Identity Domain, and can assign and remove all security roles associated with these Cloud Services, including the Administrator role for any of the Services Database Cloud Service A Database Cloud Service is an individual Service within the Oracle Database Cloud. Data within an individual Database Cloud Service is completely separated from data in all other Services in the Oracle Database Cloud, as described in more detail below. Database Cloud Service administrators can define users for the Services that they administer. Database Cloud Service users can be defined with the Cloud Identity Manager or within the Administration area of the development platform for the Database Cloud Service itself. If a user is defined with the Cloud Identity Manager, they must use the same tool to manage their profile; if a user is defined through the Administration area of the development platform, they must manage their profile through that platform. Administrators and developers for a Database Cloud Service must be defined with the Cloud Identity Manager and given the appropriate security role. There are three roles for each Database Cloud Service - Service Administrator, who can create, modify and delete Database Cloud Service users and their privileges, both in the Cloud Identity Manager and the Administration area of the Database Cloud Service development platform Developers, who can use the development platform within a Database Cloud Service to create applications, but who cannot create, modify or delete users for that Database Cloud Service and End users, who can run applications within the Database Cloud Service When a Database Cloud Service is added to an Identity Domain, three individual roles which map to these levels are created within the Identity Domain. The Account Administrator and Identity Domain Administrator are automatically given the Service Administrator role for the initial Database Cloud Service, but all other roles have to be explicitly assigned through the Cloud Identity Manager. 5
6 Cloud Identity Manager This tool is used to administer all users and roles defined as part of the Cloud Identity Domain. A Identity Domain or Service administrator can add, delete and modify users with this tool, or to create, delete, assign or delete roles, as shown here. Identity Domain Administrators can use the Cloud Identity Manager to access all users defined within their Identity Domain and their roles. Service Administrators only get access to the users defined for their Service, and users of a service can only use the Cloud Identity Manager to modify their own user profile and reset their account password. For more details on the use of the Cloud Identity Manager, please refer to the documentation for this tool. Signing up for a Database Cloud Service trial You can understand the interaction of the different security domains as you go through the process of signing up for a trial of the Database Cloud Service. When you request a trial, the first step is to log in with your Oracle.com username and password. You are prompted for your mailing information and your credit card is validated, although nothing is charged against your card. The next page is the Service Details page, as shown here. You have two basic choices to create a trial with a new Identity Domain, or to use an existing Identity Domain. If you choose to create a new Identity Domain, you are assigned an Identity Domain name, as well as a Service Name. By default, the address for your Oracle.com account is used for the address of the Service Administrator and used as the default for the Username, but you can change the Username and the First and Last Name of the Service Administrator. You can also choose to use the same Username for the Identity Domain Administrator, or create a different Username for that role. Once you have completed this page, the users specified are created in your Identity Domain with the appropriate roles. If you choose to use an existing Identity Domain, you are given the choice of specifying any Identity Domain withing the account for which the requestor is an Account Administrator. You can specify a Username for the Service Administrator and this user is created in your Identity Domain. This user does not have any Identity Domain administration privileges. 6
7 Database Cloud security measures All security is based on well-thought out and implemented practices and procedures. The Oracle Database Cloud is implemented with rigorous security practices and procedures based on decades of experience. The security processes used for the overall Oracle Cloud include secure access to data centers, annual security audits by third parties to insure regulatory security compliance and full auditing of the entire Cloud stack on a quarterly basis. All data stored in the Oracle Database Cloud benefits from the use of Transparent Data Encryption. Transparent Data Encryption encrypts data stored on disk and in backups, protecting against unauthorized direct file access. The encryption and decryption of your data is handled automatically by the Oracle Database, so you do not have to add programmatic steps to use this powerful security feature. The Database Cloud has to be protected against the introduction of malicious code which could harm all users. To enforce this level of protection while still allowing users to load data into their Database Cloud Service, data loads are sent to a Secure FTP server, where they are scanned for viruses before the data in the files is loaded into the Database Cloud Service using your database account information. With this approach, malicious data can never be loaded in such a way that it affects other accounts or breaches the security isolation. This two step process also automatically compresses the actual data to be loaded, reducing the time needed to upload data to the Oracle Database Cloud. Database Cloud Service security measures The Database Cloud Service is built on a multi-tenant architecture, with database schemas providing the boundaries of tenant isolation. Schemas have been used in the Oracle Database as a method of separating data for decades. To enforce and protect the absolute security of tenants of the Database Cloud Service, some standard Oracle features have been locked down. For instance, access to any data dictionary view which allows a tenant to see the existence of other schemas has been prohibited. In addition, some SQL syntax is not allowed, such as GRANT or REVOKE, since these options are used to access objects between one schema to another schema owner. For a detailed list of syntax, objects and operations disallowed in the Database Cloud Service, please see the white paper on the security lockdown of the Database Cloud Service. Database Cloud application security options Your Database Cloud Service includes Application Express, which you can use to develop and deploy HTMLbased applications through a declarative process. Application Express has been in production since 2004, with 7
8 hundreds of thousands of enterprise applications deployed throughout the world. There are a number of features of Application Express that help you to develop secure applications in your Database Cloud Service. Application Express supports several authentication schemes, which are used to insure that a particular user is properly identified. Application Express gives developers the ability to use authorization schemes, which are ways of allowing access to specific pages, regions within pages or items within regions, based on user identity. As a developer, you have access to the identity of a user at all times, so you can implement procedural limitations based on user identity. Although Application Express includes robust monitoring tools, you can add in procedural logic to log application and session specific information for further security analysis. Application Express includes protection against cross-site scripting attacks by providing a way to reference values that automatically escapes special characters, which will not allow any type of script to be included in pages returned to users through the Database Cloud Service applications. In addition, Application Express gives you the option to automatically protect navigational URLs from being malicious modified. This option, referred to as Session State Protection, generates checksums which are included with any parameters passed as part of a URL to retrieve a page in an application. In addition, you can prevent a page from ever being accessed by a URL, only allowing access as the destination of a navigation link or branch from another page within the application. Application Express also includes reports which allow you to rapidly see the security options in force for a particular application, as well as to monitor usage of applications and individual pages in applications. RESTful Web Service security options The Oracle Database Cloud allows access to data within a Database Cloud Service through the use of RESTful Web Services, which can be defined with the RESTful Web Service Wizard. You can specify that access to RESTful calls use HTTPS, which secures communication between the client and the Database Cloud Service. You can also specify security on a RESTful Web Service in a number of ways. These ways are different from the traditional method of using schema users to implement security. An Oracle Database Cloud Service is based on a single schema, and all RESTful Web Services which access data in this schema are executed by the user who owns the schema. Without any specific security implementations on a RESTful Web Service, the services will return all data that satisfies an SQL statement or is collected by a PL/SQL block. There are four ways you can add security to your RESTful Web Services Based on the origin of the RESTful Web Service Based on the application using the RESTful Web Service 8
9 Based on the identity of the user calling the RESTful Web Service or Based on logic implemented in the RESTful Web Service call itself Origin-based security You can specify that a RESTful Web Service module and its templates and handlers can only be accessed for a specified list of origin domains. OAUTH authentication RESTful Web Services use the OAUTH2 model of authentication, as shown in this diagram. OAUTH2 authentication is one of the standard authentication flows used on the Internet. To understand how to implement application-based or user-based authentication, you need to understand how the OAUTH authentication process flow works. OAUTH authentication requires two different tokens a request token, which allows a client to request authorization, and an access token, which grants access to a specific user. You can use this process flow to implement access to a specific application or to a specific user, as described below. Application-based access To allow a specific application to access RESTful Web Services, you use the OAUTH Request token. To implement this, you would generate a specific token and hard code that token into a specific application client. You would then use OAUTH to check for the request token. This type of authentication allows you to use a single token to grant access to all of the RESTful Web Services defined in a module to one or more application clients. User-based access You can allow access to a RESTful Web Service based on the identity of the authenticated user. If you want access based only on user identity, you would not require an OAUTH Request token and use privileges defined in your Database Cloud Service to limit access to the Web Service. The process of defining and using these privileges is defined in the next section. Logic-based access The three methods of implementing security described above grant access to one or more specific RESTful Web Services calls, similar to allowing a connection to a database. In traditional database security, access is granted 9
10 based on the identity of the database user making the request. Since all RESTful Web Services in a specific Database Cloud Service are executed by the same database user, this option is not available for these Services. In recognition of this architecture, the SQL command GRANT is not supported in a Database Cloud Service. However, this does not mean that you cannot limit access to data based on user identity. The identity of a user is established through the Database Cloud Service authentication process, and this identity is available to developers as the OAM_REMOTE_USER parameter, kept securely in the header of all RESTful Web Service requests. You can use this value as part of a standard WHERE clause, which, for instance, could be used to limit the rows returned from a query to those for the same department as the current user. You could also use this value in more complex logic in either SQL or PL/SQL. Oracle Cloud Computing September 2012 Author: Rick Greenwald Oracle Corporation World Headquarters 500 Oracle Parkway Redwood Shores, CA U.S.A. Copyright 2012, Oracle and/or its affiliates. All rights reserved. This document is provided for information purposes only and the contents hereof are subject to change without notice. This document is not warranted to be error-free, nor subject to any other warranties or conditions, whether expressed orally or implied in law, including implied warranties and conditions of merchantability or fitness for a particular purpose. We specifically disclaim any liability with respect to this document and no contractual obligations are formed either directly or indirectly by this document. This document may not be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without our prior written permission. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Worldwide Inquiries: Phone: Fax: oracle.com AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. UNIX is a registered trademark licensed through X/Open Company, Ltd
An Oracle White Paper: November 2011 Installation Instructions: Oracle XML DB XFILES Demonstration Table of Contents Installation Instructions: Oracle XML DB XFILES Demonstration... 1 Executive Overview...
A Joint Oracle Teradata White Paper September 2011 Configuring Oracle Business Intelligence Enterprise Edition to Support Teradata Database Query Banding Introduction... 1 Step 1. Query Band Configuration
Creating Custom Project Administrator Role to Review Project Performance and Analyze KPI Categories Worked Example ORACLE PPM CLOUD SERVICES SOLUTION OVERVIEW MAY 2018 Disclaimer The following is intended
Oracle CIoud Infrastructure Load Balancing Connectivity with Ravello O R A C L E W H I T E P A P E R M A R C H 2 0 1 8 Oracle Cloud Infrastructure Ravello Cloud Service Oracle Cloud Infrastructure Ravello
An Oracle White Paper September 2010 Handling Memory Ordering in Multithreaded Applications with Oracle Solaris Studio 12 Update 2: Part 2, Memory Introduction... 1 What Is Memory Ordering?... 2 More About
October 2017 Oracle Application Express Statement of Direction Disclaimer This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle.
Veritas NetBackup and Oracle Cloud Infrastructure Object Storage ORACLE HOW TO GUIDE FEBRUARY 2018 0. Disclaimer The following is intended to outline our general product direction. It is intended for information
Oracle Data Masking and Subsetting Frequently Asked Questions (FAQ) S E P T E M B E R 2 0 1 6 Product Overview Q: What is Data Masking and Subsetting? A: Data Masking or Static Data Masking is the process
Tutorial on How to Publish an OCI Image Listing Publish an OCI Image Listing F13637-01 JANUARY 2019 DISCLAIMER The following is intended to outline our general product direction. It is intended for information
Oracle Database Vault DBA Administrative Best Practices ORACLE WHITE PAPER MAY 2015 Table of Contents Introduction 2 Database Administration Tasks Summary 3 General Database Administration Tasks 4 Managing
Generate Invoice and Revenue for Labor Transactions Based on Rates Defined for Project and Task O R A C L E P P M C L O U D S E R V I C E S S O L U T I O N O V E R V I E W D E C E M B E R 2017 Disclaimer
Oracle Cloud Applications Oracle Transactional Business Intelligence BI Catalog Folder Management Release 11+ ORACLE WHITE PAPER November 2017 ORACLE WHITE PAPER November 2017 Table of Contents Introduction
April 2013 Understanding Federated Single Sign-On (SSO) Process Understanding Federated Single Sign-On Process (SSO) Disclaimer The following is intended to outline our general product direction. It is
Oracle Database Vault Best Practices ORACLE WHITE PAPER MAY 2015 Table of Contents Executive Overview 2 Installation 3 Pre-Installation Notes 3 Separation of Duty 3 Separation of Duty Matrix 4 Oracle Database
Using the Oracle Business Intelligence Publisher Memory Guard Features August 2013 Contents What Are the Memory Guard Features?... 3 Specify a maximum data sized allowed for online processing... 3 Specify
An Oracle White Paper October 2013 Deploying and Developing Oracle Application Express with Oracle Database 12c Disclaimer The following is intended to outline our general product direction. It is intended
Loading User Update Requests Using HCM Data Loader Oracle Fusion Human Capital Management 11g Release 11 (11.1.11) Update 8 O R A C L E W H I T E P A P E R N O V E M B E R 2 0 1 7 Table of Contents Loading
Oracle Database 10g Release 2 Database Vault - Restricting the DBA From Accessing Business Data An Oracle White Paper August 2006 Oracle Database Vault Overview Oracle Database Vault enables you to Restrict
Overview Faced with ever increasing computing needs and budget constraints, companies today want to set up infrastructures that offer optimal value, can easily be re-purposed, and have reduced complexity.
An Oracle White Paper December, 3 rd 2014 Oracle Metadata Management v22.214.171.124.1 Oracle Metadata Management version 126.96.36.199.1 - December, 3 rd 2014 Disclaimer This document is for informational purposes.
Oracle DIVArchive Storage Plan Manager Feature Description ORACLE TECHNICAL WHITE PAPER UPDATED MAY 2015 Introduction: What Is a Storage Plan? Storage plans are policies managing the lifecycle of objects
Oracle Secure Backup Getting Started with Cloud Storage Devices O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 8 Disclaimer The following is intended to outline our general product direction. It
Oracle Fusion Configurator Configurator Modeling Walk Through O R A C L E W H I T E P A P E R M A R C H 2 0 1 8 Table of Contents Introduction 1 Assumptions 1 Product Information Management Setup 2 Item
JD Edwards EnterpriseOne Licensing Disabling Client Licensing for Various Tools Releases O R A C L E W H I T E P A P E R O C T O B E R 2 0 1 5 Disclaimer The following is intended to outline our general
Migrating VMs from VMware vsphere to Oracle Private Cloud Appliance 2.3.1 O R A C L E W H I T E P A P E R O C T O B E R 2 0 1 7 Table of Contents Introduction 2 Environment 3 Install Coriolis VM on Oracle
Oracle Data Provider for.net Microsoft.NET Core and Entity Framework Core O R A C L E S T A T E M E N T O F D I R E C T I O N F E B R U A R Y 2 0 1 8 Disclaimer The following is intended to outline our
Oracle Enterprise Performance Reporting Cloud What s New in September 2016 Release (16.09) August 2016 TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 4 Give Us Feedback... 4 RELEASE FEATURE SUMMARY...
Technical White Paper August 2010 Recovering from Catastrophic Failures Using Data Replicator Software for Data Replication. Recovering from Catastrophic Failures Using Data Replicator Software for Data
ACSLS Manager Software Overview and Frequently Asked Questions Overview Management of distributed tape libraries is both timeconsuming and costlyinvolving multiple libraries, multiple backup applications,
An Oracle White Paper February 2012 Benefits of an Exclusive Multimaster Deployment of Oracle Directory Server Enterprise Edition Disclaimer The following is intended to outline our general product direction.
An Oracle White Paper January 2013 Oracle Hyperion Planning on the Oracle Database Appliance using Oracle Transparent Data Encryption Executive Overview... 3 Introduction... 3 Hyperion Planning... 3 Oracle
Oracle Enterprise Data Quality 188.8.131.52 New Features Overview Integrated Profiling, New Data Services, New Processors O R A C L E W H I T E P A P E R J U L Y 2 0 1 6 Table of Contents Executive Overview
An Oracle White Paper September 2010 Handling Memory Ordering in Multithreaded Applications with Oracle Solaris Studio 12 Update 2: Part 1, Compiler Introduction... 1 What Is Memory Ordering?... 2 Compiler
An Oracle White Paper June 2011 Oracle Service Registry - Oracle Enterprise Gateway Integration Guide 1 / 19 Disclaimer The following is intended to outline our general product direction. It is intended
An Oracle White Paper September, 2011 Oracle Real User Experience Insight Server Requirements Executive Overview Oracle Enterprise Manager is Oracle s integrated enterprise IT management product line and
An Oracle White Paper June 2011 (EHCC) Introduction... 3 : Technology Overview... 4 Warehouse Compression... 6 Archive Compression... 7 Conclusion... 9 Introduction enables the highest levels of data compression
Oracle Financial Services Regulatory Reporting for US Federal Reserve Lombard Risk Integration Pack Installation Guide Release 184.108.40.206.0 July 2017 Executive Summary This document includes the necessary
RAC Database on Oracle Ravello Cloud Service O R A C L E W H I T E P A P E R A U G U S T 2017 Oracle Ravello is an overlay cloud that enables enterprises to run their VMware and KVM applications with data-center-like
An Oracle White Paper October 2010 Minimizing Planned Downtime of SAP Systems with the Virtualization Technologies in Oracle Solaris 10 Introduction When business-critical systems are down for a variety
AUGUST 6, 2018 DISCLAIMER The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment
An Oracle Technical Article August 2017 Certification with Oracle Linux 7 Oracle Technical Article Certification with Oracle Linux 7 Introduction... 1 Comparing Oracle Linux 7 and Red Hat Enterprise Linux
Deploying Custom Operating System Images on Oracle Cloud Infrastructure O R A C L E W H I T E P A P E R M A Y 2 0 1 8 Table of Contents Purpose of This White Paper 3 Scope and Assumptions 3 Access Requirements
An Oracle White Paper October 2012 Release Notes - V220.127.116.11.0 Oracle Utilities Application Framework Introduction... 2 Disclaimer... 2 Deprecation of Functionality... 2 New or Changed Features... 4 Native
MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service
Load Project Organizations Using HCM Data Loader O R A C L E P P M C L O U D S E R V I C E S S O L U T I O N O V E R V I E W A U G U S T 2018 Disclaimer The following is intended to outline our general
Establishing secure connections between Oracle Ravello and Oracle Database Cloud O R A C L E W H I T E P A P E R N O V E M E B E R 2 0 1 7 Table of Contents APPLICATION ARCHITECTURE OVERVIEW 2 CONNECTING
Oracle Social Network Release 11 Release Content Document December 2015 TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 4 UPDATES TO SOCIAL IN ORACLE APPLICATIONS CLOUD... 4 DESKTOP CLIENT IMPROVEMENTS...
An Oracle White Paper July 2011 Oracle WebCenter Portal: Copying a Runtime-Created Skin to a Portlet Producer Introduction This white paper describes a method for copying runtime-created skins from a WebCenter
An Oracle White Paper March 2012 How to Define an Importer Returning Error Messages to the Oracle Web Applications Desktop Integrator Document Disclaimer The following is intended to outline our general
ORACLE DATABASE LIFECYCLE MANAGEMENT PACK ORACLE DATABASE LIFECYCLE MANAGEMENT PACK KEY FEATURES Auto Discovery of hosts Inventory tracking and reporting Database provisioning Schema and data change management
An Oracle White Paper June 2011 Oracle Access Manager 10g - Oracle Enterprise Gateway Integration Guide 1/26 Disclaimer The following is intended to outline our general product direction. It is intended
Oracle Financial Consolidation and Close Cloud What s New in the November Update (16.11) November 2016 TABLE OF CONTENTS REVISION HISTORY... 3 ORACLE FINANCIAL CONSOLIDATION AND CLOSE CLOUD, NOVEMBER UPDATE...
Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E96343-01 May 2018 Copyright 2010, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation
Siebel CRM Applications on Oracle Ravello Cloud Service ORACLE WHITE PAPER AUGUST 2017 Oracle Ravello is an overlay cloud that enables enterprises to run their VMware and KVM applications with data-center-like
Implementing Fibre Channel SAN Boot with the Oracle ZFS Storage Appliance January 2014 By Tom Hanvey; update by Peter Brouwer Version: 2.0 This paper describes how to implement a Fibre Channel (FC) SAN
An Oracle White Paper February 2017 Combining Siebel IP 2016 and native OPA 12.x Interviews Purpose This whitepaper is a guide for Siebel customers that wish to take advantage of OPA 12.x functionality
INTEGRATION CLOUD SERVICE Accelerate Your Application Across the Cloud and On Premises With Oracle Cloud Service you can innovate at a faster pace. Oracle Cloud Service gives you a powerful and intuitive
An Oracle White Paper June 2011 Oracle Virtual Directory 11g Oracle Enterprise Gateway Integration Guide 1 / 25 Disclaimer The following is intended to outline our general product direction. It is intended
ERP CLOUD Subledger Accounting ing Journals s Oracle Financials for EMEA Table of Contents 1. Purpose of the document 3 2. Assumptions and Prerequisites 3 3. Feature Specific Setup 4 Implementation 4 Assign
An Oracle White Paper June 2013 Enterprise Database Cloud Deployment with Oracle SuperCluster T5-8 Introduction Databases form the underlying foundation for most business applications by storing, organizing,
Technical White Paper August 2010 Migrating to Oracle 11g Using Data Replicator Software with Transportable Tablespaces Migrating to Oracle 11g Using DRS with Transportable Tablespaces Contents Contents...
Oracle Database Security Assessment Tool With data breaches growing every day along with the evolving set of data protection and privacy regulations, protecting business sensitive and regulated data is
Oracle Mobile Application Framework Oracle Mobile Application Framework (Oracle MAF) is a hybrid-mobile development framework that enables development teams to rapidly develop single-source applications
Pricing Cloud: Upgrading to R13 - Manual Price Adjustments from the R11/R12 Price Override Solution O R A C L E W H I T E P A P E R A P R I L 2 0 1 8 Disclaimer The following is intended to outline our
Repairing the Broken State of Data Protection April 2016 Oracle s modern data protection solutions address both business continuity and disaster recovery, reducing IT costs and simplifying data protection
Technical Upgrade Guidance SEA->SIA migration Oracle Siebel Customer Relationship Management Applications Siebel Industry-Driven CRM November 2011 This document is intended to outline our general product
Automatic Data Optimization with Oracle Database 12c O R A C L E W H I T E P A P E R S E P T E M B E R 2 0 1 7 Table of Contents Disclaimer 1 Introduction 2 Storage Tiering and Compression Tiering 3 Heat
Oracle Grid Infrastructure 12c Release 2 Cluster Domains O R A C L E W H I T E P A P E R N O V E M B E R 2 0 1 7 Table of Contents Introduction 2 Clustering with Oracle Clusterware 12c Release 2 3 Oracle
An Oracle White Paper June 2011 SonicMQ - Oracle Enterprise Gateway Integration Guide 1 / 24 Disclaimer The following is intended to outline our general product direction. It is intended for information
Oracle Learn Cloud What s New in Release 15B.1 August 2015 TABLE OF CONTENTS OVERVIEW... 3 RELEASE FEATURE SUMMARY... 3 BUTTON LABELS CHANGED FOR ADDING ENROLLMENTS... 4 CUSTOMER TICKETS... 4. 2 OVERVIEW
NOSQL DATABASE CLOUD SERVICE Flexible Data Models. Zero Administration. Automatic Scaling. Application development with no hassle... Oracle NoSQL Cloud Service is a fully managed NoSQL database cloud service
Bastion Hosts Protected Access for Virtual Cloud Networks O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 8 Disclaimer The following is intended to outline our general product direction. It is intended
Oracle Database Vault with Oracle Database 12c ORACLE WHITE PAPER MAY 2015 Table of Contents Introduction 1 Controls for Privileged Accounts 2 Privilege User Access Controls on Application Data with Realms
Oracle Enterprise Performance Reporting Cloud What s New in the November Update (16.11) November 2016 TABLE OF CONTENTS REVISION HISTORY... 3 ORACLE ENTERPRISE PERFORMANCE REPORTING CLOUD, NOVEMBER UPDATE...
Oracle Financial Consolidation and Close Cloud What s New in the February Update (17.02) February 2017 TABLE OF CONTENTS REVISION HISTORY... 3 ORACLE FINANCIAL CONSOLIDATION AND CLOSE CLOUD, FEBRUARY UPDATE...
An Oracle White Paper October 2011 Advanced Compression with Oracle Database 11g Oracle White Paper Advanced Compression with Oracle Database 11g Introduction... 3 Oracle Advanced Compression... 4 Compression
SecureFiles Migration O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 8 Table of Contents Disclaimer 1 Introduction 2 Using SecureFiles 2 Migration Techniques 3 Migration with Online Redefinition