Category: Security

A familiar constraint we encounter when using Oracle Service Bus (OSB) Business Services is that they are required to be configured with the Username Token policy, where the password should not be text-based; rather, it should be in binary format

Tagged with: , , , , ,

As part of best practices, a deployer responsible for deploying composites should not need to have the roles a privileges of an administrator; instead, they should be limited to deploying composites. Selecting the proper roles and privileges to grant deployment

Tagged with: , , ,

What are CSF Key Credentials? A credential store is a repository of security data (credentials). A credential can hold username and password combinations, tickets, or public key certificates. A Credential Store Framework (CSF) is a framework which provides a set of in-built

Tagged with: , , , , ,

The GTC (Generic Technology Connector) is used to build connectors for target systems like flat-file imports via FTP or SPML-based provisioning over Web Services. It can be used to integrate target systems that do not need complicated provisioning process flows

Tagged with: , , ,

It is sometimes necessary to change the password of the Oracle Identity Management (OIM) System Administrator, known as XELSYSADM.  As this user has many dependencies in OIM, we would need to change the XELSYSADM password using the WLS utility.  Previously

Tagged with: , , , , ,

As promised in an earlier blog post, we are continuing our exploration of Oracle Identity Cloud Service (IDCS) this week.  In this post, we’ll provide some insight on IDCS Integration with Salesforce to achieve Single Sign-On (SSO).  Herein are the

Tagged with: , , , ,

Oracle launched its Identity Cloud Service (IDCS) in the fall of 2016.  IDCS is designed on Microservice architecture, which aligns with the Cloud principles of Scalability, Elasticity, Resilience, Ease of Deployment, Functional Agility, Technical Adoption, and Organization Alignment.  Moreover, IDCS

Tagged with: , , , , ,

Recently, while working on an IAM project in which we needed to build an Enterprise Security Infrastructure using the 11gR2PS3 version of the IAM software, the requirement for Lifecycle Management (LCM) presented itself.  The LCM tool is designed to simplify

Tagged with: , , , , ,

Recently, we ran into an issue in which we had multiple users in BPM falling under the same group with similar access, and we needed to restrict the users’ access to the BPM Human Task claimed by another user.  In

Tagged with: , , , ,
Top