This chapter describes the most important changes introduced in this and previous 12c releases.
The updated items in this document refresh includes the following:
The Interoperability table has been introduced in Chapter 3, "Compatibility Matrix for 11g and 12c Versions."
The updated items in this document refresh includes the following:
Book version number has been corrected.
The updated items in this document refresh includes the following:
All topic titles brought to 12c standards.
The Java API for Identity Directory Service. See Section G.1, "OPSS API References."
The new features and major changes introduced in release 12.1.3.0.0 follow.
OPSS and audit schemas support EBR. See EBR references at the end of Section 7.5.2, "Upgrading a DB-Based Security Store."
Datasources are created automatically in domains created with the JRF Template. See Note 2 in Section 7.3.1, "Using a New Database Instance."
Ability to upgrade component audit definitions to the dynamic metadata model. See Section 7.7.
Naming conventions and other guidelines for auditing. See Section 14.7.
New audit events. See Table C-2.
The OPSS diagnostic framework. See Section J.2, "The OPSS Diagnostic Framework."
New arguments (migrate and skip) to reassociateSecurityStore
. See Section 10.4.1, "reassociateSecurityStore."
New argument (skip) to migrateSecurityStore
. See Section 9.6.2, "Migrating with the Script migrateSecurityStore."
Enhancements to the class JpsStartup. See Section 25.1.1, "The Class JpsStartup."
Ability to export or import keystores to and from wallets. See Section 12.1.2.
Support for FIPS-140. See Appendix P.
The features and documentation changes introduced in release 12.1.2.0.0 follow.
The features introduced in this release include the following:
The use of templates to seed security artifacts at domain creation or extension, and a new procedure to upgrade to 12.1.2. For details, see Chapter 7, "Lifecycle of Security Artifacts."
The documentation changes introduced in this release include the following:
Reference information about WLST commands has been removed from the guide. This content now resides in the Oracle Fusion Middleware Infrastructure Security WLST Command Reference.
The different options for audit reporting are explained. See Section 15.1.
Reference details are available for audit system attributes and events. See Table C-1 and Table C-5.