I, J, K. Lightweight directory access protocol (LDAP), 162

Size: px
Start display at page:

Download "I, J, K. Lightweight directory access protocol (LDAP), 162"

Transcription

1 Index A Access Control, 183 Administration console, 17 home page, 17 managing instances, 19 managing requests, 18 managing workspaces, 19 monitoring activity, 19 Advanced security option (ASO), 58, 262 network encryption, 263 TDE, 263 APEX applications, 3 APEX export reports, 185 column restrictions interactive reports, 187 standard reports, 187 drawbacks, 185 maximum row count, 185 restricting records with PL/SQL (see Restricting records) with ROWNUM, 188 APEX instance APEX_ADMINISTRATOR_ROLE, 43 APEX_INSTANCE_ADMIN APIs, 43 configuration and management, 44 runtime mode, 42 APEX listener, 39 APEX security plan, 7 Application context, views, 203 Application Express (APEX), 15 administration console, home page, 18 managing instances, 19 managing requests, 18 managing workspaces, 19 monitoring activity, 19 application builder, 17 architecture jquery, 26 PL/SQL and JavaScript, 26 schemas, 27 database application, 16 definition, 15 developer tools, 15 export reports (see APEX export reports) foundation components, 16 infrastructure, 38 APEX listener, 39 embedded PL/SQL gateway (EPG), 38 Oracle HTTP server, 39 metadata-based architecture, 26 limitations, 26 views, 26 overview of, 15 schemas APEX_040200, 27, 29 APEX_PUBLIC_USER, FLOW_FILES, 31 FLOWS_FILES, 27 transactions, 32 fprocedure, 32 session state, 36 WWV_FLOW.ACCEPT procedure, 33 WWV_FLOW.SHOW, 33 workspaces, 20 components, 22 schema mappings, 22 users and roles, 20 Application settings, 101 availability attribute, 104 to developers only, 104 with edit links, 104 restricted access, 104 SET_FLOW_STATUS procedure, 105 settings,

2 Application settings (cont.) via SQL developer, 105 unavailable status, 104 build status, 106 compatibility mode attribute, 103 debugging, 102 definition section, 101 s address, 103 feedback, 102 global notification attribute, 107 logging, 101 security attribute, 108 authorization scheme, 109 cache, 113 cleanup PL/SQL code, 116 deep linking, 109 embed in frames, 113 HTML escaping mode, 114 initialization PL/SQL code, 115 parsing schema setting, 110 public user and authentication scheme, 108 run on public pages option, 109 session state protection option, 110 session timeout, 110 substitution strings, 107 user interface attributes, 117 Application threats, 129 Authentication scheme, 159 Application Express users, 160 components, 166 login processing settings, 167 post logout URL, 168 session cookie attributes, 168 session not valid settings, 167 source region, 166 custom, 163 database accounts, 160 HTTP header variable, 160 LDAP directory, 162 login page, 169 in APEX 4.0 and prior versions, 172 APEX 4.2, 172 companies, 174 developers, 171 get username cookie, 170 logout, 174 security attributes section, 169 session cookie, 173 set username cookie process, 172 user interfaces section, 169 no authentication scheme, 162 OASSSO, 163 open door credentials scheme, 163 Authorization inconsistency, 153 Authorization scheme, 177 access control, 183 attributes, 177 gatekeeper authorization scheme, 180 inconsistencies, methods, 178 page-level authorization scheme, 180 role location, 179 subscriptions, 179 table-based roles, 179 utilization report, 182 B Blacklisting, 225 C Clickjacking, 113 Column-level encryption, 263 Column masking and obfuscation reports, 215 types, 215 Cross-site scripting (XSS) attack, 129, 139 anatomy of, 140 data sanitization, 144 APEX_ESCAPE, 145 column formatting, 146 cookies, 152 frames, 152 HTML regions and items, 151 restricted characters attribute, 145 persistent XSS attacks, 143 reflexive XSS attacks, 140 Custom authentication scheme, 163 APIs, 165 APEX_AUTHENTICATION, 165 APEX_CUSTOM_AUTH, 165 APEX_LDAP, 165 APEX_UTIL, 165 SET_AUTHENTICATION_RESULT, 166 attributes, 163 invalid session procedure, 164 legacy attributes section, 164 restriction, 164 sentry function, 164 D DATA and SHADOW schemas, 226 Database access descriptor (DAD), 162 DBMS_CRYPTO package,

3 E Embedded PL/SQL gateway (EPG), 38 Encryption, 247 APEX application computations, 260 collections, 256 data encryption, 255 DBMS_CRYPTO package, 255 encrypt_data and decrypt_data, 257 item-level attribute, 254 session state, 252 ASO (see Advanced security option (ASO)) HTTPS, 248 instance admin console/application development environment, 251 packet peeper, 248 secure cookie attributes section, 251 Enkitec esert, 107 F Fine-grained access control, 212 G Gatekeeper authorization scheme, 180 H Health Insurance Portability and Accountability Act (HIPAA), 6 HTTP Header Variable, 160 HTTPS, 248 I, J, K Instance administration console, 45 manage workspaces (see Manage Workspaces section) Monitor Activity (see Monitor Activity section) Manage Instance (see Manage Instance section) Instance settings, 41 APEX_ADMINISTRATOR_ROLE, 43 APEX_INSTANCE_ADMIN APIs, 43 configuration and management, 44 Manage instance section, 45 feature configuration, 47 main page, 46 runtime mode, 42 security, 41 workspace login, 44 L Lightweight directory access protocol (LDAP), 162 M Manage Instance section application activity log, 48 Database Monitoring, 48 demonstration objects, 47 enable application tracing, 48 enable service requests, 48 feature configuration packaged application, 47 PL/SQL program units, 47 SQL Workshop, 47 Websheet objects, 47 Instance Settings section, 56 delete uploaded files after (days) feature, 58 provisioning status, 57 section, 58 encrypted tablespaces, 57 message setting, 57 notification address, 57 provisioning status setting, 56 purge sessions region, 61 recent sessions report, 60 report printing options, 59 require new schema, 57 self service sign up, 64 session state, 59 session state statistics report, 62 verification code, 57 wallet password, 59 wallet path, 59 packaged application, 47 PL/SQL program units, 47 main page, 46 security attributes, 48 account password lifetime (days) setting, 53 allow public file upload setting, 49 allow RESTful Access, 50 disable administrator login, 49 disable workspace login, 49 domain names, 52 failed login, File Browser APEX, 49 HTTPS setting, 50 inbound proxy servers, 52 instance proxy setting, 50 login controls section, 52 maximum session length and idle time in seconds,

4 Manage Instance section (cont.) method for computing the delay setting, 52 Outbound HTTPS setting, 50 password reset and locking policy, 52 restrict access, IP address, 50 set workspace cookie option, 49 workspace password policy setting, 53 Session State, 59 logs and files section, 62 message setting, 63 Purge Sessions region, 61 Recent Sessions report, 60 Self Service Sign Up, 64 session state statistics report, 62 SQL workshop, 47 websheet objects, 47 workspace purge settings, 59 workspaces, 64 Manage workspaces section, 65 application attributes, status report, component availability, 75 create multiple workspaces, 68 create workspace option, 65 export and import, 76 lock workspace, 71 manage developers and users section, 73 APEX account types, 74 forgot passwords, 74 internal workspace, 74 users, 75 remove workspace, 70 reports, 76 existing workspace report, 76 workspace database privileges, 77 schema assignments, 72 Mobile applications, 127 HTML-based application, 127 native application development, 127 security, 127 shadow schema, 128 Monitor Activity section, 80, 99 archived activity reports, 87 dashboard reports, 87 realtime monitor reports, 80 calendar reports, 84 developer activity, 87 login attempts, 85 page views, 81 N Network encryption, 263 No authentication scheme, 162 O Open door credentials scheme, 163 Oracle Application Server Single Sign-On (OASSSO) authentication scheme, 163 Oracle Enterprise Manager (OEM), 222 registration, 223 security options, 222 Oracle HTTP Server, 39 P, Q Packet peeper, 248 Page-level authorization scheme, 180 Page settings, 118 authentication attribute, 119 authorization scheme, 119 browser cache, 122 deep linking attribute, 119 duplicate submission, 122 form auto complete attribute, 120 page access protection, 119 read only attribute, 118 server cache, 122 Persistent XSS attacks, 143 PL/SQL package, views, 203 Preventable threats, 4 cross-site scripting, 6 SQL injection, 5 URL tempering, 4 R Reflexive XSS attacks, 140 Region settings, 124 APEX conditions, 124 authorization schemes, 126 caching, 126 read only setting, 126 Report settings, 126 Restricting records with PL/SQL, 190 application item, 194 application process, 194 authorization checks, 197 custom_export procedure, 199 disable built-in export controls, 190 download link, 196 error handling, 197 error message, 198 fetching static ID, 197 p1_emp_classic procedure, 199 PL/SQL package, 195 shortcuts, 191 static ID, 193 with ROWNUM,

5 S Secure views, 201 in APEX, 201 benefits and drawbacks, 208 components, 202 application context, 203 attributes, 206 PL/SQL procedure, 203 SQL, 204 Security plan, 7 assessments access control, 8 application management, 9 auditing and monitoring, 9 data access, 9 risk analysis, 8 breach simulation, 12 categories, 7 contingency, 10 design phase, 9 development, 10 review process automated, 11 manual, 12 Shadow schema, 225 components APEX application, 226, 231 database, 226 data schema, 226, 228 DML APIs and processes, grants and synonyms, 238 revoke system privileges, 229 system and user event triggers function, 230 table API processes, 238 concept of, 225 securing data, 242 application context, 242 PL/SQL initialization code, 245 synonym, 244 views, 244 SQL injection attack, 129 anatomy of, 130 in APEX, bind variables and dynamic SQL, 133, 136 ename, 133 EXECUTE IMMEDIATE, 133 PL/SQL procedure, 130, 132 value KING, 131 SYS_CONTEXT procedure, views, 204 T Tablespace-level encryption, 263 Threats, 1 assessment, 1 application security, 2 data and privileges, 3 home security, 1 categories, 1 preventable threats, 4 cross-site scripting, 5 SQL injection, 5 URL tempering, 4 unpreventable threats, 6 Transparent data encryption (TDE), 57, 263 column-level encryption, 263 tablespace-level encryption, 263 U Unpreventable threats, 6 URL tampering, 129, 153 authorization inconsistency, 153 page and item protection, 154 Virtual Private Database and secure views, 157 User authentication, 159 User authorization, 177 Users and groups management, 95, 98 account privileges section, 96 attribute developer/administrator password, 97 developers, 95 end users, 95 expire password, 97 password region, 97 user groups region, 98 user identification section, 96 workspace administrators, 95 V Views. See also Secure views Application context, 203 PL/SQL package, 203 SYS_CONTEXT procedure, 204 Virtual private database (VPDs), 158, 211, 225 APEX integration, 212 column masking and obfuscation, 215 VPD policy function, 213 column-level policies, 212 evolution of, 211 in OEM,

6 W, X, Y, Z Whitelisting, 225 Workspace(s), 20 components, 22 application builder, 23 SQL workshop, 23 team development, 24 websheets, 24 drawbacks, 25 schema mappings, 22 subscriptions, 25 technical benefits, 25 users and roles, 20 developers, 21 end user, 20 workspace administrator, 22 Workspace administrators best practices, 100 Manage Service, 89 manage users and groups (see Users and groups management) monitor activity, 99 Workspace settings, 89 manage meta data, 92 build status report, 94 session state section, 92 troubleshooting process, 94 service requests, accessible schemas, workspace preferences account login control, 91 module access,

Administration Guide Release 5.0

Administration Guide Release 5.0 [1]Oracle Application Express Administration Guide Release 5.0 E39151-06 November 2015 Oracle Application Express Administration Guide, Release 5.0 E39151-06 Copyright 2003, 2015, Oracle and/or its affiliates.

More information

Oracle Database 11g: Security Release 2

Oracle Database 11g: Security Release 2 Oracle University Contact Us: 001-855-844-3881 & 001-800-514-06-97 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, you'll learn how to use Oracle Database features

More information

Oracle Database 11g: Security Release 2

Oracle Database 11g: Security Release 2 Oracle University Contact Us: + 38516306373 Oracle Database 11g: Security Release 2 Duration: 5 Days What you will learn In this course, students learn how they can use Oracle Database features to meet

More information

Oracle Application Express Administration Guide. Release 18.1

Oracle Application Express Administration Guide. Release 18.1 Oracle Application Express Administration Guide Release 18.1 E86884-02 May 2018 Oracle Application Express Administration Guide, Release 18.1 E86884-02 Copyright 2003, 2018, Oracle and/or its affiliates.

More information

Oracle Application Express 5 New Features

Oracle Application Express 5 New Features Oracle Application Express 5 New Features 20th HrOUG conference October 16, 2015 Vladislav Uvarov Software Development Manager Database Server Technologies Division Copyright 2015, Oracle and/or its affiliates.

More information

Oracle Application Express

Oracle Application Express Oracle Application Express Administration Guide Release 5.1 E64918-04 June 2017 Oracle Application Express Administration Guide, Release 5.1 E64918-04 Copyright 2003, 2017, Oracle and/or its affiliates.

More information

Real Application Security Administration

Real Application Security Administration Oracle Database Real Application Security Administration Console (RASADM) User s Guide 12c Release 2 (12.2) E85615-01 June 2017 Real Application Security Administration Oracle Database Real Application

More information

WELCOME. APEX Security Primer. About Enkitec. About the Presenter. ! Oracle Platinum Partner! Established in 2004

WELCOME. APEX Security Primer. About Enkitec. About the Presenter. ! Oracle Platinum Partner! Established in 2004 WELCOME APEX Security Primer Scott Spendolini Executive Director!1!2 About the Presenter About Enkitec! Scott Spendolini! Oracle Platinum Partner! scott.spendolini@enkitec.com! Established in 2004! @sspendol!

More information

Oracle Application Express: Administration 1-2

Oracle Application Express: Administration 1-2 Oracle Application Express: Administration 1-2 The suggested course agenda is displayed in the slide. Each lesson, except the Course Overview, will be followed by practice time. Oracle Application Express:

More information

Oracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites

Oracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites Oracle Database Real Application Security Administration 12c Release 1 (12.1) E61899-04 May 2015 Oracle Database Real Application Security Administration (RASADM) lets you create Real Application Security

More information

Oracle Application Express: Administration Student Guide

Oracle Application Express: Administration Student Guide Oracle Application Express: Administration Student Guide D56361GC10 Edition 1.0 June 2011 D73408 Author Salome Clement Technical Contributors and Reviewers Veerabhadra Rao Putrevu Manish Pawar Chaitanya

More information

Secure your APEX application

Secure your APEX application Secure your APEX application APEX World, Rotterdam, 22 & 23 March, 2018 Aljaž Mali, @AljazMali, Abakus Plus, d.o.o. Me IT Solutions Architect at Abakus plus, d.o.o Oracle ACE Associate SIOUG - Vice President

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

1 Copyright 2013, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Oracle Application Express 2 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Fully supported no-cost feature of Oracle

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

Installation Guide. Version Last updated: August tryfoexnow.com 1 of 3

Installation Guide. Version Last updated: August tryfoexnow.com 1 of 3 Installation Guide Version 4.0.1 @FOEXplugins Last updated: August 2018 tryfoexnow.com 1 of 3 FOEX Installation Guide, version 4.0.1 Copyright 2018, FOEX GmbH. All rights reserved. Authors: Peter Raganitsch,

More information

Oracle Application Express Installation Guide. Release 18.1

Oracle Application Express Installation Guide. Release 18.1 Oracle Application Express Installation Guide Release 18.1 E86879-02 May 2018 Oracle Application Express Installation Guide, Release 18.1 E86879-02 Copyright 2003, 2018, Oracle and/or its affiliates. All

More information

Installation Guide. Version Last updated: November. tryfoexnow.com 1 of 3

Installation Guide. Version Last updated: November. tryfoexnow.com 1 of 3 Installation Guide Version 3.1.0 @FOEXplugins Last updated: November tryfoexnow.com 1 of 3 FOEX Installation Guide, version 3.1.0 Copyright 2017, FOEX GmbH. All rights reserved. Authors: Peter Raganitsch,

More information

AppSpider Enterprise. Getting Started Guide

AppSpider Enterprise. Getting Started Guide AppSpider Enterprise Getting Started Guide Contents Contents 2 About AppSpider Enterprise 4 Getting Started (System Administrator) 5 Login 5 Client 6 Add Client 7 Cloud Engines 8 Scanner Groups 8 Account

More information

Oracle Application Express Installation Guide. Release 5.1

Oracle Application Express Installation Guide. Release 5.1 Oracle Application Express Installation Guide Release 5.1 E64907-06 October 2017 Oracle Application Express Installation Guide, Release 5.1 E64907-06 Copyright 2003, 2017, Oracle and/or its affiliates.

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

Administering Jive Mobile Apps for ios and Android

Administering Jive Mobile Apps for ios and Android Administering Jive Mobile Apps for ios and Android TOC 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios...3 Custom App Wrapping for ios...3 Authentication with Mobile

More information

Solutions Business Manager Web Application Security Assessment

Solutions Business Manager Web Application Security Assessment White Paper Solutions Business Manager Solutions Business Manager 11.3.1 Web Application Security Assessment Table of Contents Micro Focus Takes Security Seriously... 1 Solutions Business Manager Security

More information

Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide

Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide Policy Manager for IBM WebSphere DataPower Configuration Guide SOAPMDP_Config_7.2.0 Copyright Copyright 2015 SOA Software, Inc. All rights

More information

OWASP Thailand. Proxy Caches and Web Application Security. OWASP AppSec Asia October 21, Using the Recent Google Docs 0-Day as an Example

OWASP Thailand. Proxy Caches and Web Application Security. OWASP AppSec Asia October 21, Using the Recent Google Docs 0-Day as an Example Proxy Caches and Web Application Security Using the Recent Google Docs 0-Day as an Example Tim Bass, CISSP Chapter Leader, Thailand +66832975101, tim@unix.com AppSec Asia October 21, 2008 Thailand Worldwide

More information

Enterprise Access Gateway Management for Exostar s IAM Platform June 2018

Enterprise Access Gateway Management for Exostar s IAM Platform June 2018 Enterprise Access Gateway Management for Exostar s IAM Platform June 2018 Copyright 2018 Exostar LLC All rights reserved. 1 Version Impacts Date Owner Enterprise Access Gateway (EAG) Guide Revised June

More information

Extend EBS Using Applications Express

Extend EBS Using Applications Express Extend EBS Using Applications Express John Peters JRPJR, Inc. Abstract Few people know about Oracle Applications Express (APEX) an actual free Oracle Tool included with your Oracle DB Licenses. How many

More information

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server... Oracle Access Manager Configuration Guide for On-Premises Version 17 October 2017 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing

More information

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) You can find the most up-to-date technical documentation

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

W H IT E P A P E R. Salesforce Security for the IT Executive

W H IT E P A P E R. Salesforce Security for the IT Executive W HITEPAPER Salesforce Security for the IT Executive Contents Contents...1 Introduction...1 Background...1 Settings Related to Security and Compliance...1 Password Settings... 1 Session Settings... 2 Login

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Distribute Call Studio applications to Unified CVP VXML Servers.

Distribute Call Studio applications to Unified CVP VXML Servers. is one of the Cisco Unified Customer Voice Portal (CVP) components and a web-based interface using which you can configure other Unified CVP components and devices in the Unified CVP solution. Use to perform

More information

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...

More information

Oracle Application Express Student Guide

Oracle Application Express Student Guide www.oracle.com/academy Oracle Application Express Student Guide Contents 1. Introduction... 2 2. Logging in to Oracle Application Express... 2 3. Oracle Application Express Components... 3 4. How to add

More information

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2 VMware Identity Manager Administration MAY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

An Oracle White Paper September Security and the Oracle Database Cloud Service

An Oracle White Paper September Security and the Oracle Database Cloud Service An Oracle White Paper September 2012 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database

More information

HIPAA Compliance. with O365 Manager Plus.

HIPAA Compliance. with O365 Manager Plus. HIPAA Compliance with O365 Manager Plus www.o365managerplus.com About HIPAA HIPAA, the Health Insurance Portability and Accountability Act, sets the standard for protecting sensitive patient data. Any

More information

Table of Contents Chapter 1: Migrating NIMS to OMS... 3 Index... 17

Table of Contents Chapter 1: Migrating NIMS to OMS... 3 Index... 17 Migrating from NIMS to OMS 17.3.2.0 User Guide 7 Dec 2017 Table of Contents Chapter 1: Migrating NIMS to OMS... 3 Before migrating to OMS... 3 Purpose of this migration guide...3 Name changes from NIMS

More information

StreamSets Control Hub Installation Guide

StreamSets Control Hub Installation Guide StreamSets Control Hub Installation Guide Version 3.2.1 2018, StreamSets, Inc. All rights reserved. Table of Contents 2 Table of Contents Chapter 1: What's New...1 What's New in 3.2.1... 2 What's New in

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

Checklist for Testing of Web Application

Checklist for Testing of Web Application Checklist for Testing of Web Application Web Testing in simple terms is checking your web application for potential bugs before its made live or before code is moved into the production environment. During

More information

Logging into the Firepower System

Logging into the Firepower System The following topics describe how to log into the Firepower System: Firepower System User Accounts, on page 1 User Interfaces in Firepower Management Center Deployments, on page 3 Logging Into the Firepower

More information

Google Sync Integration Guide. VMware Workspace ONE UEM 1902

Google Sync Integration Guide. VMware Workspace ONE UEM 1902 Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

Securing ArcGIS Services

Securing ArcGIS Services Federal GIS Conference 2014 February 10 11, 2014 Washington DC Securing ArcGIS Services James Cardona Agenda Security in the context of ArcGIS for Server Background concepts Access Securing web services

More information

Security context. Technology. Solution highlights

Security context. Technology. Solution highlights Code42 CrashPlan Security Code42 CrashPlan provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the enterprise need for

More information

Pulse Workspace Appliance. Administration Guide

Pulse Workspace Appliance. Administration Guide Pulse Workspace Appliance Administration Guide Product Release 2.0, 1743.1 Document Revisions 1.0 Published Date January 2018 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 The Pulse

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

Protection! User Guide. A d m i n i s t r a t o r G u i d e. v L i c e n s i n g S e r v e r. Protect your investments with Protection!

Protection! User Guide. A d m i n i s t r a t o r G u i d e. v L i c e n s i n g S e r v e r. Protect your investments with Protection! jproductivity LLC Protect your investments with Protection! User Guide Protection! L i c e n s i n g S e r v e r v 4. 9 A d m i n i s t r a t o r G u i d e tm http://www.jproductivity.com Notice of Copyright

More information

2018 GLOBALSCAPE TRAINING OVERVIEW

2018 GLOBALSCAPE TRAINING OVERVIEW 2018 GLOBALSCAPE TRAINING OVERVIEW TABLE OF CONTENTS COURSE... 3 EFT ESSENTIALS COURSE...4 EFT ADMINISTRATOR COURSE... 5 EFT ADMINISTRATOR COURSE (CONT.)... 6 EFT AUTOMATION COURSE... 7 EFT SECURITY COURSE...8

More information

Oracle Eloqua HIPAA Advanced Data Security Add-on Cloud Service

Oracle Eloqua HIPAA Advanced Data Security Add-on Cloud Service http://docs.oracle.com Oracle Eloqua HIPAA Advanced Data Security Add-on Cloud Service Configuration Guide 2018 Oracle Corporation. All rights reserved 07-Jun-2018 Contents 1 HIPAA 3 1.0.1 What is HIPAA?

More information

1z0-479 oracle. Number: 1z0-479 Passing Score: 800 Time Limit: 120 min.

1z0-479 oracle. Number: 1z0-479 Passing Score: 800 Time Limit: 120 min. 1z0-479 oracle Number: 1z0-479 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 What is the role of a user data store in Oracle Identity Federation (OIF) 11g when it is configured as an Identity

More information

epldt Web Builder Security March 2017

epldt Web Builder Security March 2017 epldt Web Builder Security March 2017 TABLE OF CONTENTS Overview... 4 Application Security... 5 Security Elements... 5 User & Role Management... 5 User / Reseller Hierarchy Management... 5 User Authentication

More information

EasyCrypt passes an independent security audit

EasyCrypt passes an independent security audit July 24, 2017 EasyCrypt passes an independent security audit EasyCrypt, a Swiss-based email encryption and privacy service, announced that it has passed an independent security audit. The audit was sponsored

More information

SkyFormation for Salesforce. Cloud Connector

SkyFormation for Salesforce. Cloud Connector SkyFormation for Salesforce Cloud Connector Overview Salesforce provides a broad set of customers and sales automation and management services delivered as a cloud service. Salesforce helps organizations

More information

McAfee epolicy Orchestrator Release Notes

McAfee epolicy Orchestrator Release Notes Revision B McAfee epolicy Orchestrator 5.3.3 Release Notes Contents About this release Enhancements Resolved issues Known issues Installation instructions Getting product information by email Find product

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Contents. xvii xix xxiil. xxvii

Contents. xvii xix xxiil. xxvii Contents FOREWORD INTRODUCTION INDUSTRY ANALYSIS PREFACE ACKNOWLEDGMENTS BIOGRAPHY XV xvii xix xxiil XXV xxvii PART I CHAPTER 1 INTRODUCTION TO MOBILE SECURITY DEVELOPMENT Understanding Secure Web Development

More information

Cloudy with a chance of hack. OWASP November, The OWASP Foundation Lars Ewe CTO / VP of Eng. Cenzic

Cloudy with a chance of hack. OWASP November, The OWASP Foundation  Lars Ewe CTO / VP of Eng. Cenzic Cloudy with a chance of hack November, 2010 Lars Ewe CTO / VP of Eng. Cenzic lars@cenzic.com Copyright The Foundation Permission is granted to copy, distribute and/or modify this document under the terms

More information

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29 Oracle Access Manager Configuration Guide 16 R1 March 2016 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 8 Installing Oracle HTTP Server...

More information

Support for the HIPAA Security Rule

Support for the HIPAA Security Rule white paper Support for the HIPAA Security Rule PowerScribe 360 Reporting v1.1 healthcare 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe

More information

Oracle APEX 18.1 New Features

Oracle APEX 18.1 New Features Oracle APEX 18.1 New Features May, 2018 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

Access Gateway 9.3, Enterprise Edition

Access Gateway 9.3, Enterprise Edition Access Gateway 9.3, Enterprise Edition 2015-05-03 05:23:10 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Access Gateway 9.3, Enterprise Edition...

More information

Database Administration and Management

Database Administration and Management Database Administration and Management M.Sc. Information Technology BS Information Technology Umair Shafique (Gold Medalist) Lecturer Oracle Enterprise Manager This presentation introduces you to the Oracle

More information

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities

Ethical Hacking and Countermeasures: Web Applications, Second Edition. Chapter 3 Web Application Vulnerabilities Ethical Hacking and Countermeasures: Web Chapter 3 Web Application Vulnerabilities Objectives After completing this chapter, you should be able to: Understand the architecture of Web applications Understand

More information

Certified Secure Web Application Secure Development Checklist

Certified Secure Web Application Secure Development Checklist www.certifiedsecure.com info@certifiedsecure.com Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands About Certified Secure Checklist Certified Secure exists to encourage and fulfill

More information

AccessEnforcer Version 4.0 Features List

AccessEnforcer Version 4.0 Features List AccessEnforcer Version 4.0 Features List AccessEnforcer UTM Firewall is the simple way to secure and manage your small business network. You can choose from six hardware models, each designed to protect

More information

1Z Oracle WebLogic Server 12c - Administration I Exam Summary Syllabus Questions

1Z Oracle WebLogic Server 12c - Administration I Exam Summary Syllabus Questions 1Z0-133 Oracle WebLogic Server 12c - Administration I Exam Summary Syllabus Questions Table of Contents Introduction to 1Z0-133 Exam on Oracle WebLogic Server 12c - Administration I... 2 Oracle 1Z0-133

More information

User Manual. Admin Report Kit for IIS 7 (ARKIIS)

User Manual. Admin Report Kit for IIS 7 (ARKIIS) User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...

More information

Using the vrealize Orchestrator Operations Client. vrealize Orchestrator 7.5

Using the vrealize Orchestrator Operations Client. vrealize Orchestrator 7.5 Using the vrealize Orchestrator Operations Client vrealize Orchestrator 7.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Oracle Access Manager Configuration Guide

Oracle Access Manager Configuration Guide Oracle Access Manager Configuration Guide 16 R2 September 2016 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

More information

Enhanced OpenID Protocol in Identity Management

Enhanced OpenID Protocol in Identity Management Enhanced OpenID Protocol in Identity Management Ronak R. Patel 1, Bhavesh Oza 2 1 PG Student, Department of Computer Engg, L.D.College of Engineering, Gujarat Technological University, Ahmedabad 2 Associate

More information

Guest Management. Overview CHAPTER

Guest Management. Overview CHAPTER CHAPTER 20 This chapter provides information on how to manage guest and sponsor accounts and create guest policies. This chapter contains: Overview, page 20-1 Functional Description, page 20-2 Guest Licensing,

More information

ACS 5.x: LDAP Server Configuration Example

ACS 5.x: LDAP Server Configuration Example ACS 5.x: LDAP Server Configuration Example Document ID: 113473 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Directory Service Authentication Using

More information

A. Kishore

A. Kishore http://www.appsdba.info A. Kishore In this document we shall see steps to Integrate Oracle Application express (Apex 4.0.2) with Oracle Applications R12.1.3 on Linux Platform. Table of Contents: About

More information

Security Benefits of Implementing Database Vault. -Arpita Ghatak

Security Benefits of Implementing Database Vault. -Arpita Ghatak Security Benefits of Implementing Database Vault -Arpita Ghatak Topics to be covered Why Do we need Database Vault? The Benefits Components of Database Vault Oracle Database access control Components Other

More information

SECURITY DOCUMENT. 550archi

SECURITY DOCUMENT. 550archi SECURITY DOCUMENT 550archi Documentation for XTM Version 10.3 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of this publication may be reproduced or

More information

Oracle Database 11g: Administration Workshop I

Oracle Database 11g: Administration Workshop I Oracle Database 11g: Administration Workshop I Duration: 5 Days What you will learn This course is designed to give students a firm foundation in basic administration of Oracle Database 11g. In this class,

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration.

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. Administrator Guide Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. The information and content in this document is provided for informational purposes

More information

Unified CCX Administration Web Interface

Unified CCX Administration Web Interface The Unified CCX provides a multimedia (voice, data, and web) IP-enabled customer-care application environment, using VoIP technology that allows your Cisco Unified Communications network to share resources

More information

FISMA Compliance. with O365 Manager Plus.

FISMA Compliance. with O365 Manager Plus. FISMA Compliance with O365 Manager Plus www.o365managerplus.com About FISMA The Federal Information Security Management Act (FISMA) is a United States federal law passed in 2002 that made it a requirement

More information

Developer. 1 enterprise. Professional Guide. Oracle Advanced PL/SQL. example questions for 1Z0-146 examination

Developer. 1 enterprise. Professional Guide. Oracle Advanced PL/SQL. example questions for 1Z0-146 examination Oracle Advanced PL/SQL Developer Professional Guide Master advanced PL/SQL concepts along with plenty of example questions for 1Z0-146 examination Saurabh K. Gupta [ 1 enterprise I professional expertise

More information

Contents About the P6 EPPM Post Installation Administrator's Guide P6 Setup Tasks... 13

Contents About the P6 EPPM Post Installation Administrator's Guide P6 Setup Tasks... 13 P6 EPPM Post Installation Administrator's Guide Release 8.4 November 2014 Contents About the P6 EPPM Post Installation Administrator's Guide... 11 P6 Setup Tasks... 13 Accessing P6 from Client Browsers...

More information

TIBCO Cloud Integration Security Overview

TIBCO Cloud Integration Security Overview TIBCO Cloud Integration Security Overview TIBCO Cloud Integration is secure, best-in-class Integration Platform as a Service (ipaas) software offered in a multi-tenant SaaS environment with centralized

More information

Enterprise Manager: Scalable Oracle Management

Enterprise Manager: Scalable Oracle Management Session id:xxxxx Enterprise Manager: Scalable Oracle John Kennedy System Products, Server Technologies, Oracle Corporation Enterprise Manager 10G Database Oracle World 2003 Agenda Enterprise Manager 10G

More information

McAfee Web Gateway Administration

McAfee Web Gateway Administration McAfee Web Gateway Administration Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction to the tasks crucial

More information

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training

McAfee Web Gateway Administration Intel Security Education Services Administration Course Training McAfee Web Gateway Administration Intel Security Education Services Administration Course Training The McAfee Web Gateway Administration course from Education Services provides an in-depth introduction

More information

Development Security Guide Oracle Banking Credit Facilities Process Management Release [July] [2018]

Development Security Guide Oracle Banking Credit Facilities Process Management Release [July] [2018] Development Security Guide Oracle Banking Credit Facilities Process Management Release 14.1.0.0.0 [July] [2018] Security Guide Table of Contents 1. ABOUT THIS MANUAL... 1-1 1.1 INTRODUCTION... 1-1 1.2

More information

Development Security Guide Oracle Banking Virtual Account Management Release July 2018

Development Security Guide Oracle Banking Virtual Account Management Release July 2018 Development Security Guide Oracle Banking Virtual Account Management Release 14.1.0.0.0 July 2018 Oracle Banking Virtual Account Management Development Security Guide Oracle Financial Services Software

More information

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date

More information

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.

More information

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE Guide to Deploying VMware Workspace ONE with VMware Identity Manager SEP 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Contents About the P6 EPPM Post Installation Administrator's Guide P6 Setup Tasks... 13

Contents About the P6 EPPM Post Installation Administrator's Guide P6 Setup Tasks... 13 P6 EPPM Post Installation Administrator's Guide Release 15.1 October 2015 Contents About the P6 EPPM Post Installation Administrator's Guide... 11 P6 Setup Tasks... 13 Accessing P6 from Client Browsers...

More information

CA SiteMinder Federation

CA SiteMinder Federation CA SiteMinder Federation Legacy Federation Guide 12.52 SP1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

LastPass Enterprise Recommended Policies Guide

LastPass Enterprise Recommended Policies Guide LastPass Enterprise Recommended Policies Guide This document will help guide you through common scenarios and selecting policies to enable on your LastPass Enterprise account. We will not cover all policies

More information

Oracle Database 12c R2: Administration Workshop Ed 3 NEW

Oracle Database 12c R2: Administration Workshop Ed 3 NEW Oracle Database 12c R2: Administration Workshop Ed 3 NEW Duration: 5 Days What you will learn The Oracle Database 12c R2: Administration Workshop Ed 3 course is designed to provide you with a firm foundation

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry

More information

Oracle Database 12c R2: New Features for 12c R1 Administrators Ed 1

Oracle Database 12c R2: New Features for 12c R1 Administrators Ed 1 Oracle University Contact Us: Local: 0180 2000 526 Intl: +49 8914301200 Oracle Database 12c R2: New Features for 12c R1 Administrators Ed 1 Duration: 5 Days What you will learn The Oracle Database 12c

More information