Oracle Hospitality OPERA Property Management Security Guide Versions: Part Number: E

Similar documents
Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E June 2016

Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 18.1 E

Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E

Oracle Hospitality Cruise Meal Count System Security Guide Release 8.3 E

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017

Oracle Hospitality Cruise AffairWhere Security Guide Release E April 2017

Oracle Hospitality Cruise Fine Dining System Security Guide Release E

Oracle Hospitality OPERA Exchange Interface Cloud Authentication. October 2017

Oracle Hospitality Inventory Management Security Guide Release 9.1 E

Oracle Communications Services Gatekeeper

Oracle Hospitality RES 3700 Security Guide Release 5.5 E May 2016

Oracle Hospitality e7 Point-of-Sale. Security Guide

Oracle Hospitality MICROS Commerce Platform Release Notes Release Part Number: E December 2015

Oracle Hospitality Suite8 Export to Outlook User Manual Release 8.9. July 2015

Oracle Hospitality e7 Point-of-Sale Release Notes. Release 4.2

Security Guide Release 4.0

General Security Principles

StorageTek Linear Tape File System, Library Edition

Oracle Communications Configuration Management

Oracle Hospitality RES 3700 Server Setup Guide Release 5.5 E May 2016

Oracle Hospitality Query and Analysis Languages and Translation Configuration Guide. March 2016

Oracle Hospitality Cruise Fleet Management Security Guide Release 9.0 E

Oracle Communications WebRTC Session Controller

What s New for Cloud at Customer What's New for the Cloud Services on Oracle Cloud at Customer New Documentation for Oracle Cloud at Customer

Oracle Payment Interface Installation and Reference Guide Release E April 2018

Oracle Enterprise Manager Ops Center

Oracle Database Mobile Server

Oracle Hospitality Suite8 XML Export of Invoice Data for Hungarian Tax Authority Release and Higher E November 2016

Oracle. Field Service Cloud Using Android and ios Mobile Applications 18B

Database Change Reference Release 6.3

What s New for Oracle Cloud Stack Manager. Topics: July Oracle Cloud. What's New for Oracle Cloud Stack Release

Oracle Cloud What's New for Oracle WebCenter Portal Cloud Service

Microsoft Active Directory Plug-in User s Guide Release

Oracle Hospitality Materials Control Release Notes. Release 8.32

Oracle Hospitality BellaVita Hardware Requirements. June 2016

Oracle Utilities Opower Custom URL Configuration

Oracle Enterprise Manager Ops Center. Introduction. What You Will Need. Installing and Updating Local Software Packages 12c Release

JavaFX. JavaFX System Requirements Release E

Oracle MICROS Simphony Server Setup Guide Server Version 1. April 2015

Oracle Hospitality Cruise Shipboard Property Management System Topaz Signature Device Installation Guide Release 8.00 E

Oracle Hospitality Simphony First Edition Venue Management (SimVen) Installation Guide Release 3.8 Part Number: E

Report Management and Editor!

Defining Constants and Variables for Oracle Java CAPS Environments

Oracle Linux. UEFI Secure Boot Signing Key Update Notice

Oracle Hospitality Simphony Venue Management Installation Guide Release 3.10 E March 2018

Oracle Enterprise Manager Ops Center. Introduction. What You Will Need. Creating vservers 12c Release 1 ( )

Oracle Hospitality e7 Point-of-Sale Release Notes. Release 4.4 Global

Materials Control. Account Classes. Product Version Account Classes. Document Title: Joerg Trommeschlaeger

Oracle Payment Interface Oracle Hospitality OPERA Property Management System Installation Guide Release 6.1 E

PeopleSoft Fluid Required Fields Standards

Oracle Communications Order and Service Management. OSM New Features

User's Guide Release

Oracle Hospitality Simphony Engagement Cloud Service Release Notes Release 2.0 E January 2016

Oracle Retail MICROS Stores2 Functional Document Sales - Receipt List Screen Release September 2015

Oracle Simphony Venue Management (SimVen) Installation Guide Release Part Number: E

Oracle Health Sciences Information Gateway. 1 Introduction. Security Guide Release 2.0.1

Recipe Calculation Survey. Materials Control. Copyright by: MICROS-FIDELIO GmbH Europadamm 2-6 D Neuss Date: August 21 st 2007.

Spend less on file attachment storage space Reliably back up your data or file attachments Use your OpenAir data in your reporting tools

Secure Configuration Guide

Microsoft Internet Information Services (IIS) Plug-in User s Guide Release

Oracle Hospitality Materials Control. Server Sizing Guide

Oracle Enterprise Manager Ops Center. Introduction. What You Will Need. Hardware and Software Configuration

Acme Packet ETC NIU Memory Upgrade Guide. Formerly Net-Net 4500

Release for Microsoft Windows

Oracle Fusion Middleware Oracle Cloud Adapters Postinstallation Configuration Guide. 12c Release ( )

Export generates an empty file

Oracle Communications Convergent Charging Controller. Sample Message Flows Reference Guide Release 6.0.1

Contents About Connecting the Content Repository... 5 Prerequisites for Configuring a Content Repository and Unifier... 5

Oracle Hospitality BellaVita Adding a New Language Release 2.7. September 2015

Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved.

Oracle Utilities Opower Solution Extension Partner SSO

Oracle Hospitality Cruise Fleet Management Release Notes Release 9.0 E

MySQL Port Reference

Oracle Utilities Smart Grid Gateway

Oracle Identity Manager Connector Guide for Dropbox. Release

Oracle Banking Channels Bank User Base

Oracle Hospitality Hotel Mobile OPERA Web Services Server Installation Guide Release 1.1 E May 2017

1 Understanding the Cross Reference Facility

Oracle Fusion Middleware Oracle Stream Analytics Release Notes. 12c Release ( )

Oracle Utilities Customer Care and Billing

Oracle WebCenter Portal. Starting Points for Oracle WebCenter Portal Installation

Oracle. Field Service Cloud Using the Parts Catalog

Secure Configuration Guide

Oracle Retail MICROS Stores2 Functional Document Stores2 for Portugal Disaster Recovery Release

Oracle Hospitality Materials Control Mobile Solutions. Installation and Configuration Guide

Oracle Human Capital Management Cloud Using the HCM Mobile Application. Release 13 (update 18C)

Oracle Enterprise Manager

Oracle Hospitality Simphony Cloud Services Post-Installation or Upgrade Guide Release 2.10 E July 2018

Oracle Hospitality 9700 Point-of-Sale Server Setup Guide - Server Version 2 Release 4.0 Part Number: E July 2016

Oracle Hospitality Cruise Shipboard Property Management System DESKO Penta Installation Guide Release 8.00 F

Oracle Configuration Manager

Documentation Accessibility. Access to Oracle Support

Oracle mymicros.net, icare, myinventory and mylabor Self Host Release Notes Release v April 2015

Oracle Enterprise Manager Ops Center. Introduction. What You Will Need

Quick Start for Coders and Approvers

JD Edwards EnterpriseOne Licensing

Taleo Enterprise Deep Linking Configuration Guide Release 17

Oracle Argus Safety. 1 Configuration. 1.1 Configuring a Reporting Destination for the emdr Profile. emdr Best Practices Document Release 8.0.

Oracle Cloud. Oracle Cloud Adapters Postinstallation Configuration Guide E

Oracle Fusion Middleware Creating Domain Templates Using the Domain Template Builder. 12c ( )

Transcription:

Oracle Hospitality OPERA Property Management Security Guide Versions: 5.0.05.00 Part Number: E67891-01 May 2016

Copyright 2015, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this software or related documentation is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs. No other rights are granted to the U.S. Government. This software or hardware is developed for general use in a variety of information management applications. It is not developed or intended for use in any inherently dangerous applications, including applications that may create a risk of personal injury. If you use this software or hardware in dangerous applications, then you shall be responsible to take all appropriate fail-safe, backup, redundancy, and other measures to ensure its safe use. Oracle Corporation and its affiliates disclaim any liability for any damages caused by use of this software or hardware in dangerous applications. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. Intel and Intel Xeon are trademarks or registered trademarks of Intel Corporation. All SPARC trademarks are used under license and are trademarks or registered trademarks of SPARC International, Inc. AMD, Opteron, the AMD logo, and the AMD Opteron logo are trademarks or registered trademarks of Advanced Micro Devices. UNIX is a registered trademark of The Open Group. This software or hardware and documentation may provide access to or information about content, products, and services from third parties. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to third-party content, products, and services unless otherwise set forth in an applicable agreement between you and Oracle. Oracle Corporation and its affiliates will not be responsible for any loss, costs, or damages incurred due to your access to or use of third-party content, products, or services, except as set forth in an applicable agreement between you and Oracle. Oracle Hospitality OPERA Property Management Page 2

Contents Preface... 5 Audience... 5 Related Documentation... 5 PCI Security Standards Council Reference Documents... 5 Revision History... 6 Chapter 1: OPERA Property Management Security Overview... 7 Basic Security Considerations... 7 Overview of OPERA Property Management Security... 8 OPERA Property Management Network... 8 OPERA Property Management Database Server Components... 8 Understanding the OPERA Property Management Environment... 9 Recommended Deployment Configurations... 10 Credit/Debit Cardholder Dataflow... 10 OPERA Property Management Component Security... 11 Networking Security... 11 Oracle Database Security... 11 WebLogic Server Security... 11 Chapter 2: Performing a Secure OPERA Property Management Installation... 12 The 12 Requirements of the PCI DSS... 12 Installing OPERA Property Management Securely... 13 Post-Installation Configuration... 15 Setting up Passwords... 16 Chapter 3: Implementing OPERA Property Management Security... 17 Oracle Hospitality OPERA Property Management

OXI... 17 SETUP CONFIG... 17 PROPERTY CONFIG... 17 UTILITIES... 17 EXPORT... 17 Global Application Parameters in an ASP Environment... 18 PERMISSIONS... 18 LDAP Configuration... 18 Appendix A: Secure Deployment Checklist... 19 Oracle Hospitality OPERA Property Management Page 4

Preface Audience OPERA Customers Oracle Installers Oracle Dealers Oracle Customer Service Oracle Training Personnel MIS Personnel Related Documentation PCI Security Standards Council Reference Documents The following documents provide additional detail for the Payment Applications - Data Security Standard (PA-DSS) and related security programs, such as Payment Card Industry Data Security Standard (PCI DSS) and Open Web Application Security Project (OWASP): PA-DSS https://www.pcisecuritystandards.org/security_standards/index.php PCI DSS https://www.pcisecuritystandards.org/security_standards/index.php OWASP http://www.owasp.org Center for Internet Security (CIS) Benchmarks (used for OS Hardening) https://benchmarks.cisecurity.org/downloads/multiform/ For Oracle products documentation, visit the Oracle Help Center website at http://docs.oracle.com. Oracle Hospitality OPERA Property Management

Revision History Date 01-Oct-2015 13-May-2016 Description of Change Initial publication. LDAP Configuration Oracle Hospitality OPERA Property Management Page 6

Chapter 1: OPERA Property Management Security Overview This chapter provides an overview of Oracle Hospitality OPERA Property Management security and explains the general principles of application security. Basic Security Considerations The following principles are fundamental to using any application securely: Keep software up to date. This includes the latest product release and any patches that apply to it. Limit privileges as much as possible. Users should be given only the access necessary to perform their work. Organizations should review user privileges periodically to determine relevance to current work requirements. Monitor system activity. Establish who should access which system components, and how often, and monitor those components. Install software securely. For example, use firewalls, secure protocols using Transport Layer Security (TLS)/ Secure Sockets Layer (SSL) and secure passwords. For more information, see Chapter 2. Learn about and use the OPERA Property Management security features. For more information, see Chapter 3. Use secure development practices. For example, take advantage of existing database security functionality instead of creating your own application security. Keep up to date on security information. Oracle regularly issues security-related patch updates and security alerts. You must install all security patches as soon as possible. For more information, visit the Oracle Critical Patch Updates and Security Alerts website at http://www.oracle.com/technetwork/topics/security/alerts-086861.html Oracle Hospitality OPERA Property Management

Overview of OPERA Property Management Security OPERA Property Management Network The network diagram below shows connection directly through the Internet. However, most deployments use the preferred private network connection configuration. OPERA Property Management Database Server Components Oracle 11gR2 Oracle Linux 6.x Windows Server 2012r2 You can use either Oracle Linux 6.x or Windows Server 2012r2 for hosting the Oracle 11gR2 Database. Oracle Hospitality OPERA Property Management Page 8

Understanding the OPERA Property Management Environment When planning your OPERA Property Management implementation, consider the following: Which resources need protection? You need to protect customer data, such as credit-card numbers. You need to protect internal data, such as proprietary source code. You need to protect system components from being disabled by external attacks or intentional system overloads. Who are you protecting data from? For example, you need to protect your subscribers data from other subscribers or tenants (ASP mode), but someone in your organization (Data Center Administrators) might need to access that data to manage it. You can analyze your workflows to determine who needs access to the data; for example, it is possible that a system administrator can manage your system components without needing to access the system data. What will happen if protections on a strategic resource fail? In some cases, a fault in your security scheme is nothing more than an inconvenience. In other cases, a fault might cause great damage to you or your customers. Understanding the security ramifications of each resource will help you protect it properly. Oracle provides functionality within the OPERA Property Management application for Personal Information (that is passport, date of birth, and credit card). Placing this information in fields other than the designated areas, such as Notes or Comments fields, is open for PCI review and does not comply with PA-DSS rules and regulations. Oracle Hospitality OPERA Property Management

Recommended Deployment Configurations This section describes recommended deployment configurations for OPERA Property Management. Credit/Debit Cardholder Dataflow For more information, see Oracle Hospitality OPERA Property Management Implementation Guide. Oracle Hospitality OPERA Property Management Page 10

OPERA Property Management Component Security Use only HTTPS or Transport Layer Security (TLS) security with a certification authority for the OPERA Property Management application. Networking Security For information on networking security, visit the Oracle Help Center website at http://docs.oracle.com/cd/b19306_01/network.102/b14266/checklis.htm#i1009371 Oracle Database Security For the Oracle Database Security Guide 11.2, visit the Oracle Help Center website at http://docs.oracle.com/cd/e25054_01/network.1111/e16543/toc.htm WebLogic Server Security For the Oracle Fusion Applications Administrator's Guide 11.1.2., visit the Oracle Help Center website at http://docs.oracle.com/cd/e25054_01/fusionapps.1111/e14496/securing.htm Oracle Hospitality OPERA Property Management

Chapter 2: Performing a Secure OPERA Property Management Installation This chapter presents planning information for your OPERA Property Management installation. For information about implementing OPERA Property Management, visit the Oracle Help Center website at https://docs.oracle.com/cd/e53533_01/index.html The 12 Requirements of the PCI DSS Build and Maintain a Secure Network and Systems 1. Install and maintain a firewall configuration to protect cardholder data. 2. Do not use vendor-supplied defaults for system passwords and other security parameters. Protect Cardholder Data 3. Protect stored cardholder data. 4. Encrypt transmission of cardholder data across open, public networks. Maintain a Vulnerability Management Program 5. Protect all systems against malware and regularly update anti-virus software or programs. 6. Develop and maintain secure systems and applications. Implement Strong Access Control Measures 7. Restrict access to cardholder data by business need-to-know. 8. Identify and authenticate access to system components. 9. Restrict physical access to cardholder data. Regularly Monitor and Test Networks 10. Track and monitor all access to network resources and cardholder data. 11. Regularly test security systems and processes. Maintain an Information Security Policy 12. Maintain a policy that addresses information security for all personnel. For more information, see Oracle Hospitality OPERA Property Management Implementation Guide. Oracle Hospitality OPERA Property Management Page 12

Installing OPERA Property Management Securely You must review the following security topics in the OPERA User Guide before installing OPERA Property Management: OPERA Property Management Implementation Credit Card Encryption Key Utility Configuring OPERA for SSL Communication IPsec Configuration Changing Passwords in an OPERA System OPERA ASP Implementation To view the OPERA User Guide, visit the Oracle Help Center website at https://docs.oracle.com/cd/e53533_01/index.html# Oracle strongly recommends that all systems containing sensitive information (servers, databases, wireless access points) reside behind a firewall to protect its data. Firewalls are computer devices that control computer traffic allowed into a company s network from outside, as well as traffic into more sensitive areas within a company s internal network. All systems must be protected from unauthorized access from the Internet, whether for e-commerce, employees Internet based access via desktop browsers, or employees email access. Often, seemingly insignificant paths to and from the Internet can provide unprotected pathways into key systems. Firewalls are a key protection mechanism for any computer network. OPERA Property Management installation media prompts you to change passwords upon installation. You should not use default or well-known passwords and you should frequently rotate your passwords. Oracle recommends that you secure all sensitive information transmitted over the Internet using a form of encryption such as TLS Protocols; this includes all wireless transmissions, email, and services such as Telnet and SFTP. Oracle recommends using IPSec between the application and database servers to secure communications. The IPSEC tunnel is also the proposed solution for all other servers that connect directly to the database (OWS, ADS, GDS, OXI). For more information on the configuration of this feature, see IPsec Configuration. When using our web-based credit card interface, we suggest configuring it to use TLS1.2 Protocol for communication. To configure this, do the following: Select Configuration > Setup > Property Interfaces > Interface Configuration and edit the active EFT Interface. There is a section on the screen to configure the URL for connecting to the interface. Be sure Oracle Hospitality OPERA Property Management

that the URL starts with HTTPS. This ensures a secure TLS1.2 Protocol connection is made to the vendor prior to transmitting credit card data. For backend access for third-party systems, you must use the Oracle Service Bus (OSB), and you must not grant direct access to the database. Oracle Hospitality OPERA Property Management Page 14

Post-Installation Configuration Remove or disable components that are not needed in a given type of deployment. Follow OPERA Property Management installation media prompts to change passwords upon installation. Use complex passwords and frequently change them. Configure communications security. Only configure secure protocols such as SFTP and HTTPS. Use Transport Layer Security (TLS). Protect sensitive data: restrict access to Log files under \MICROS\OPERA\LOGS. Close Port 1521. Secure Export Directories (UNC) from unauthorized access. Revoke certain database permissions when manually installing the Database. For more information, see Oracle Database Security Guide. Database Permissions that must be revoked: REVOKE EXECUTE ON UTL_FILE FROM PUBLIC; REVOKE EXECUTE ON UTL_HTTP FROM PUBLIC; REVOKE EXECUTE ON UTL_TCP FROM PUBLIC; REVOKE EXECUTE ON UTL_SMTP FROM PUBLIC; REVOKE EXECUTE ON DBMS_LOB FROM PUBLIC; REVOKE EXECUTE ON DBMS_SQL FROM PUBLIC; REVOKE EXECUTE ON DBMS_JOB FROM PUBLIC; REVOKE EXECUTE ON DBMS_RANDOM FROM PUBLIC; REVOKE EXECUTE ON DBMS_OBFUSCATION_TOOLKIT FROM PUBLIC; REVOKE SELECT ANY TABLE FROM PUBLIC; REVOKE CREATE ANY TABLE FROM PUBLIC; REVOKE CREATE ANY DIRECTORY FROM PUBLIC; REVOKE SELECT ON ALL_USERS FROM PUBLIC; REVOKE SELECT ON ALL_TAB_PRIVS FROM PUBLIC; REVOKE SELECT ON ALL_SOURCE FROM PUBLIC; REVOKE SELECT ON ALL_DB_LINKS FROM PUBLIC; Oracle Hospitality OPERA Property Management

Setting up Passwords The OPERA Property Management installation media prompts you to change passwords. When creating the first property in a Schema, the application prompts and forces the change of the OPERA Supervisor password. Use Complex Passwords and frequently change those passwords. Do not grant a regular user access to the OPERA 5 Supervisor Group. This group or members from this group must only be used by authorized Data Center Administrators. Oracle Hospitality OPERA Property Management Page 16

Chapter 3: Implementing OPERA Property Management Security If OPERA Property Management is deployed in ASP mode, you must follow the OPERA ASP Implementation Guide. When in ASP mode, you should never grant a property user access to certain areas of the application. This includes, but is not limited to, the following: OXI OXI COMMUNICATION METHODS OXI Communication Methods setup OXI DELETE ERROR LOG OXI DELETE System Error Log OXI DELETE INTERFACE OXI Delete Interface Setup OXI LICENSE OXI License Setup OXI START PROCESS OXI Start / Stop Process OXI SYSTEM ERROR LOG OXI Show System Error Log SETUP CONFIG BUSINESS EVENTS CONFIGURATION Business Events Configuration BUSINESS EVENTS EXTERNAL SYSTEMS Business Events External Systems Configuration BUSINESS EVENTS QUEUE STATUS Business Queue Status Configuration SCREEN DESIGN Screen Painter SCREEN PAINTER UNDOALL Screen Painter Undo All Changes PROPERTY CONFIG PROPERTY NEW Create New Properties UTILITIES The complete UTILITIES Permission group EXPORT BACK OFFICE Back Office Configuration COUNTRY EXPORTS Country Export Configuration EXPORT FILE Export Files Configuration SALES CATERING Sales and Catering Configuration EXTERNAL SC EXPORT External SC Export Configuration MEMBERSHIP EXPORT Membership Export Configuration Oracle Hospitality OPERA Property Management

Global Application Parameters in an ASP Environment All Global application parameters should have the DISPLAY_YN flag in the application_parameters table set to N. PERMISSIONS Do not grant access by any user to the OPERA SUPERVISOR and OPERA Supervisor groups. These accounts are reserved for authorized Data Center Administrators only. Do not give the OPERA Supervisor password to any user. Grant the CREDIT CARD INFORMATION EDIT permission to users only as needed. You should configure users with the least amount of privileges/permissions. By default, the system sets User Login and Password change and Password complexity parameters to a secure level. You should regularly check Security Advisories on the Oracle website. Implement security fixes in a timely manner. Apply the latest certified CPU updates. LDAP Configuration The User on the LDAP System screen (select Configuration, Setup, LDAP Configuration, and then New) must be a low level LDAP user and must not be a user in OPERA or have any OPERA roles assigned. This User is only needed for the LDAP Cleanup function. For more information, see the OPERA Property Management User Guide on the Oracle Help Center website at http://docs.oracle.com/en/industries/hospitality/?tab=2. Oracle Hospitality OPERA Property Management Page 18

Appendix A: Secure Deployment Checklist The following security checklist includes guidelines that help secure your database: Install only what is required. Lock and expire default user accounts. Enforce password management. Enable data dictionary protection. Practice the principle of least privilege. o Grant necessary privileges only. ii. Revoke unnecessary privileges from the PUBLIC user group. iii. Restrict permissions on run-time facilities. Enforce access controls effectively and authenticate clients stringently. Restrict network access. Apply all security patches and workarounds. o Use a firewall. o Never poke a hole through a firewall. o Protect the Oracle listener. o Monitor listener activity. o Monitor who accesses your systems. o Check network IP addresses. o Encrypt network traffic. o Harden the operating system. You must review the following security topics in the OPERA User Guide before installing OPERA Property Management: OPERA Property Management Implementation Credit Card Encryption Key Utility Configuring OPERA for SSL Communication IPsec Configuration Changing Passwords in an OPERA System OPERA ASP Implementation To view the OPERA User Guide, visit the Oracle Help Center website at https://docs.oracle.com/cd/e53533_01/index.html# Oracle Hospitality OPERA Property Management