Skip Headers
Oracle® Fusion Applications Enterprise Deployment Guide
11g Release 1 (11.1.2)

Part Number E16684-04
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
PDF · Mobi · ePub

1 Enterprise Deployment Overview

This chapter provides an overview of the enterprise topology for Oracle Fusion Customer Relationship Management.

This chapter includes the following topics:

1.1 What is an Enterprise Deployment?

An enterprise deployment is an Oracle guidelines blueprint based on proven Oracle high-availability and security technologies and recommendations for Oracle Fusion Applications. The guidelines described in these blueprints span all Oracle products across the entire technology stack: Oracle Database, Oracle Fusion Middleware, Oracle Fusion Applications, and Fusion Middleware Control.

An Oracle Fusion Applications enterprise deployment:

Note:

This document focuses on enterprise deployments in Linux environments. Enterprise deployments can also be implemented in UNIX and Windows environments.

1.2 About Oracle Fusion Applications

Oracle Fusion Applications are a unified suite of business applications designed to unify personal and enterprise processes. It unifies transactional Oracle SOA Suite and business processes, business intelligence, and collaborative technologies in a seamless user experience. Oracle Fusion Applications can be easily integrated into a service-oriented architecture and made available as software as a service.

Oracle Fusion Applications offer a strong functional value by providing:

Oracle Fusion Applications incorporate best practice business processes, including those from Oracle E-Business Suite, PeopleSoft, Oracle On Demand, JD Edwards, and Siebel.

Oracle Fusion Applications are standards-based, making them highly adaptable. This standards-based technology allows you to respond effectively to change with flexible, modular, user-driven business software that is powered by best-in-class business capabilities built on open standards. Its technology framework includes the following products:

For more information, see the Oracle Fusion Applications Concepts Guide.

1.3 Benefits of Oracle Recommendations

The Oracle Fusion Applications configurations discussed in this guide are designed to ensure security of all invocations, maximize hardware resources, and provide a reliable, standards-compliant system for enterprise computing with a variety of applications.

The security and high-availability benefits of the Oracle Fusion Applications configurations are realized through isolation in firewall zones and replication of software components.

1.3.1 Built-in Security

The enterprise deployment architectures are secure because every functional group of software components is isolated in its own demilitarized zone (DMZ), and all traffic is restricted by protocol and port. The following characteristics ensure security at all needed levels, as well as a high level of standards compliance:

  • Configure external load balancers to redirect all external communication received on port 80 to port 443.

    Note:

    The Oracle Technology Network (http://www.oracle.com/technology/index.html) provides a list of validated load balancers and their configuration at http://www.oracle.com/technology/products/fusionapps/ias/hi_av/Tested_LBR_FW_SSLAccel.html.

  • Communication from external clients does not go beyond the Load Balancing Router (LBR) level.

  • Components are separated in different protection zones: the Oracle Web Tier, application tier, and the data tier. Moreover, Oracle Identity Management (IDM) has its own protection zones like Oracle Web Tier, Applications tier and Data tier

  • No direct communication from the Load Balancing Router to the data tier is allowed.

  • Direct communication between two firewalls at any one time is prohibited.

  • If a communication begins in one firewall zone, it must end in the next firewall zone.

  • Oracle Internet Directory (OID) is isolated in the data tier.

  • All communication between components across protection zones is restricted by port and protocol, according to firewall rules.

1.3.2 High Availability

The enterprise deployment architectures are highly available, because each component or functional group of software components is replicated on a different computer, and configured for component-level high availability.

1.4 Terminology

The following terminology is used in this enterprise deployment guide:

1.5 Reference Enterprise Deployment Topology

The instructions and diagrams in this guide describe a reference enterprise deployment topology for Oracle Fusion Applications:

1.5.1 Overall Reference Enterprise Deployment Topology

Figure 1-1 shows the overall Oracle Fusion Customer Relationship Management reference enterprise deployment topology, to which variations may be applied. The graphic illustrates how all components are deployed together.

In the topology, the primary node (also known as a host, and is CRMHOST1 in the diagram) is actively running the Oracle Fusion Applications instance. The secondary node (CRMHOST2) is the redundant (HA) node for the Oracle Fusion Applications instance. The primary node consists of an Administration Server and applications that have been deployed to Managed Servers. Managed Servers can be grouped together in clusters to provide scalability and high availability for applications. Together, the primary and secondary nodes form a domain.

Figure 1-1 Oracle Fusion CRM Reference Enterprise Deployment Topology

Surrounding text describes Figure 1-1 .

As shown in Figure 1-1, the overall Oracle Fusion Applications reference enterprise deployment topology comprises several domains:

  • Oracle Fusion Customer Relationship Management Domain

  • Oracle Fusion Common Domain

  • Oracle Fusion Financials Domain

  • Oracle Fusion Human Capital Management Domain

  • Oracle Fusion Supply Chain Management Domain

  • Oracle Fusion Incentive Compensation Domain

  • Oracle Business Intelligence Domain

Figure 1-2 shows each of the domains in detail.

Figure 1-2 Domain Details

Surrounding text describes Figure 1-2 .

The scale out of these domains is described in the chapters that follow.

For information about installing the Oracle Identity Management stack for Oracle Fusion Applications, see Section 4.2, "Prerequisites for Using the Provisioning Process."

1.5.2 Oracle Web Tier

Nodes in the Oracle Web Tier are located in the demilitarized zone (DMZ) public zone. In this tier, two nodes WEBHOST1 and WEBHOST2 run Oracle HTTP Server configured with WebGate and FusionVirtualHost_domain.conf.

Through FusionVirtualHost_domain.conf, which allows requests to be proxied from Oracle HTTP Server to WebLogic Server, Oracle HTTP Server forwards the requests to WebLogic Server running in the application tier.

WebGate (which is an Oracle Access Manager component) in Oracle HTTP Server uses Oracle Access Protocol (OAP) to communicate with Oracle Access Manager running on OAMHOST1 and OAMHOST2, in the Identity Management DMZ. WebGate and Oracle Access Manager are used to perform operations such as user authentication.

The Oracle Web Tier also includes a load balancer router to handle external requests. External requests are sent to the virtual host names configured on the load balancer. The load balancer then forwards the requests to Oracle HTTP Server.

The WebGate module in Oracle HTTP Server uses Oracle Access Protocol (OAP) to communicate with Oracle Access Manager to perform operations such as querying user groups.

On the firewall protecting the Oracle Web Tier, only the HTTP ports are open: 443 for HTTPS and 80 for HTTP.

Load Balancer Requirements

This enterprise topology uses an external load balancer. This external load balancer should have the following features:

  • Ability to load-balance traffic to a pool of real servers through a virtual host name: Clients access services using the virtual host name (instead of using actual host names). The load balancer can then load-balance requests to the servers in the pool.

  • Port translation configuration should be possible so that incoming requests on the virtual host name and port are directed to a different port on the back-end servers.

  • Monitoring of ports on the servers in the pool to determine availability of a service.

  • Virtual servers and port configuration: Ability to configure virtual server names and ports on your external load balancer, and the virtual server names and ports must meet the following requirements:

    • The load balancer should allow configuration of multiple virtual servers. For each virtual server, the load balancer should allow configuration of traffic management on more than one port. For example, for Oracle HTTP Server in the Oracle Web Tier, the load balancer needs to be configured with a virtual server and ports for HTTP and HTTPS traffic.

    • The virtual server names must be associated with IP addresses and be part of your DNS. Clients must be able to access the external load balancer through the virtual server names.

  • Ability to detect node failures and immediately stop routing traffic to the failed node.

  • Fault-tolerant mode: It is highly recommended that you configure the load balancer to be in fault-tolerant mode.

  • It is highly recommended that you configure the load balancer virtual server to return immediately to the calling client when the back-end services to which it forwards traffic are unavailable. This is preferred over the client disconnecting on its own after a timeout based on the TCP/IP settings on the client computer.

  • Sticky routing capability: Ability to maintain sticky connections to components. Examples of this include cookie-based persistence, IP-based persistence, and so on.

  • The load balancer should be able to terminate SSL requests at the load balancer and forward traffic to the back-end real servers using the equivalent non-SSL protocol (for example, HTTPS to HTTP). Typically, this feature is called SSL acceleration and it is required for this enterprise deployment.

1.5.3 Application Tier

Nodes in the application tier are located in the DMZ secure zone.

CRMHOST1 and CRMHOST2 run all the managed servers in the Oracle Fusion Customer Relationship Management, Oracle Business Intelligence, Oracle Incentive Compensation, Oracle Fusion Financials, Oracle Fusion Supply Chain Management, and Oracle Fusion Human Capital Management domains.

CRMHOST1 and CRMHOST2 run the managed and C/C++ servers from different domains in an active-active or active-passive implementation. C/C++ components are managed by Oracle Process Manager and Notification Server (OPMN), and all the managed servers are managed by Administration Server within the domain.

CRMHOST1 and CRMHOST2 also run the Oracle WebLogic Server Administration Console and Oracle Enterprise Manager Fusion Middleware Control, but in an active-passive configuration. You also can fail over the Administration Server manually. Alternatively, you can configure the Oracle WebLogic Server Administration Console with CFC/CRS to fail over automatically on a separate hardware cluster.

Oracle Web Services Manager (Oracle WSM) provides a policy framework to manage and secure Web services in the enterprise deployment topology. WSM Policy Manager also runs in active-active configuration in every Fusion domain where Web Services are hosted.

On the firewall protecting the application tier, the HTTP ports, OAP port, and proxy port are open. The OAP port is for the WebGate module running in Oracle HTTP Server in the Oracle Web Tier to communicate with Oracle Access Manager. Applications requiring external HTTP access use Oracle HTTP Server as the proxy. (The proxy on the Oracle HTTP Server must be enabled to allow this access.)

1.5.4 Data Tier

Nodes in the data tier are located in the most secured network zone (the intranet).

In this tier, an Oracle RAC database runs on the nodes FUSIONDBHOST1 and FUSIONDBHOST2. The database contains the schemas needed by the Oracle Fusion Applications components. The components running in the application tier access this database.

On the firewall protecting the data tier, the database listener port (typically, 1521) is required to be open. The LDAP ports (typically, 389 and 636) are also required to be open for the traffic accessing the LDAP storage in the IDM enterprise deployment.

1.6 Hardware Requirements

This section provides recommended hardware for the Oracle Fusion Applications reference enterprise deployment topology on Linux operating systems.

The recommended hardware for the Oracle Fusion Applications reference enterprise deployment topology consists of six 96 GB Intel Westmere, six dual-core CPU servers (excluding Oracle HTTP Server and Oracle Database servers). Table 1-1 describes the typical hardware requirements.

Table 1-1 Example Hardware Requirements - 200 Concurrent Users

Server Processor Memory TMP SWAP

CRMHOST1

6 core 2 CPU Westmere

96 GB

default

default

CRMHOST2

6 core 2 CPU Westmere

96 GB

default

default

WEBHOST1

2 core 2 CPU

4 GB

default

default

WEBHOST2

2 core 2 CPU

4 GB

default

default

FUSIONDBHOST1

4 core 4 CPU

48 GB

default

default

FUSIONDBHOST2

4 core 4 CPU

48 GB

default

default


1.7 Installation Prerequisite

The Oracle Identity Management stack for Oracle Fusion Applications should already be installed prior to starting a deployment. Note, however, that the provisioning process described in Chapter 4, "Using the Provisioning Process to Install Components for an Enterprise Deployment," cannot proceed without it. Follow the instructions in Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Identity Management to install and configure these components.

1.8 Implementing the Topology

Oracle recommends the following approach when implementing the Oracle Fusion Applications topology outlined in Section 1.5, "Reference Enterprise Deployment Topology":

  1. Network Configuration

  2. Setting Up the Database Tier

  3. Using the Provisioning Process to Install Components for an Enterprise Deployment

  4. Scaling Out Oracle HTTP Server

  5. Configuring Node Manager

  6. Scaling Out the Oracle Fusion Customer Relationship Management Domain

  7. Scaling Out the Oracle Fusion Common Domain

  8. Scaling Out the Oracle Fusion Human Capital Management Domain

  9. Scaling Out the Oracle Fusion Supply Chain Management Domain

  10. Scaling Out the Oracle Fusion Financials Domain

  11. Scaling Out the Oracle Fusion Incentive Compensation Domain

  12. Scaling Out the Oracle Business Intelligence Domain

  13. Additional Configuration Procedures for Scaling Out Oracle SOA Suite Server

  14. Configuring Administration Server High Availability

  15. Configuring Server Migration

  16. Configuring Oracle Business Intelligence Applications

  17. Managing the Topology

Oracle recommends this modular approach in order to facilitate the verification of individual components one by one. This building block approach simplifies the troubleshooting during the setup process and facilitates the configuration in smaller steps.