Securing Physical Host

In Chapter 8, we performed the installation of all of the pricing application’s Fusion Middleware components through a single user with ID, “oracle.” Here are some important considerations concerning how to grant and protect access to the physical hosts of any Fusion Middleware deployment:

Image Accounts on the host You should not create too many user accounts on any Fusion Middleware hosts. A general recommendation is to create two sets of users—one set with system privileges on the operating system, and the other set with sufficient privileges to install, deploy, and maintain Fusion Middleware components—acting as Fusion Middleware ...

Get Oracle Fusion Middleware 11g Architecture and Management now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.