Go to main content
1/9
Contents
Title and Copyright Information
Preface
Audience
Related Documents
Accessing Oracle Communications Documentation
Documentation Accessibility
Document Revision History
1
BRM Security Overview
Basic Security Considerations
About Protecting Data
Recommended Deployment Configurations
Operating System Security
Oracle Database Security
2
Performing a Secure BRM Installation
Pre-Installation Tasks
Installing BRM Securely
Post-Installation Tasks
Lock and Expire Default User Accounts
Change Default User Passwords
Use Strong Passwords for BRM User Schema
Enable SSL/TLS for SQL*NET
Use Secure TLS Connections
Enforce Password Management
Tighten File Permissions
Configure Maximum Number of Invalid Login Attempts
Log Customer Service Representative Activities
Configure Session Timeout
Integrate Paymentech
Mask Sensitive Customer Data
3
Managing BRM Security
The Security Model
Configuring and Using Authentication
Authentication of Applications
Authentication of Accounts
Configuring and Using Access Control
Permissions
Roles
Managing CSR Passwords
Automatic Logout
Access Control in BRM Web Services Manager
Configuring and Using Security Audit
Encryption
Using Oracle ZT Encryption Scheme
Securing Sensitive Customer Data
Using Credit Card Tokenization
Masking Sensitive Data in Log Files
Securing BRM Network Ports
4
Security Considerations for Developers
5
Business Operations Center Security
About Installing Business Operations Center
About Implementing Business Operations Center Security
About Identity and Access Management
About Authentication
About Authorization
Creating Authorization Policies for Business Operations Center
A
Secure Deployment Checklist
Scripting on this page enhances content navigation, but does not change the content in any way.