Securing the Pricing Application

The security considerations of the production environment of an enterprise application must be planned carefully and in advance. In this chapter, we will go through the most important areas of consideration for securing the environment of the pricing application, as described in Chapter 8. We will also identify the specific steps required for addressing these considerations. The topology of the application’s environment will remain the same as that depicted in Figure 8-3 in Chapter 8, with only one major change: To allow for the configuration of Single-Sign-On (SSO) for the application’s web interfaces, we will assume the existence of a new host, named “idm2,” that contains an existing installation of the Oracle ...

Get Oracle Fusion Middleware 11g Architecture and Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.