Go to main content
1/10
Contents
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
1
About EDQ Security
1.1
Introducing EDQ Security
1.1.1
Authentication
1.1.2
Authorization
1.1.3
Encryption
1.1.4
Auditing
1.2
EDQ User Groups
1.3
EDQ Permissions
1.3.1
Application Permissions
1.3.2
Functional Permissions
1.3.3
Dynamic Permissions (in Case Management)
1.3.4
Project Permissions
1.4
Default EDQ Groups and Permissions
1.5
Default Administrator User Accounts
1.6
Mapping External Groups to EDQ Groups
1.7
Terms Used in this Guide
2
Applying Recommended Security Settings
2.1
Configuring SSL with WebLogic
2.2
Configuring SSL with Tomcat
2.3
Processor Security
2.3.1
Default Permissions
2.3.2
Giving Scripts More Permissions
2.4
Encrypting LDAP Connections
2.5
Encrypting Database Connections
2.6
Limit Concurrent Logins
2.7
Disable FTP/SFTP Access
2.8
Exclude Configuration Area from FTP/SFTP
2.9
Account with Minimal Permissions for Service Integration
2.10
Protect JNDI Data Sources
3
User Authentication
3.1
The EDQ login.properties File
3.1.1
Static Groups Mapping in login.properties
3.2
WebLogic Installations
3.3
Enabling the internal realm
3.4
Tomcat Installations
4
Integrating External User Management (LDAP) using WebLogic and OPSS
4.1
Understanding Security Realms, Providers and Control Flags
4.2
Configuring WebLogic to use LDAP
4.2.1
Prerequisites
4.2.2
Integrating with Active Directory
4.2.3
WebLogic Configuration
4.2.4
EDQ Configuration
4.2.4.1
User Group
4.2.4.2
Permissions
4.2.5
Filtering Groups
4.2.6
Using SSL to connect to LDAP
5
Configuring External User Management (LDAP) directly with EDQ
5.1
Integrate EDQ with LDAP
5.1.1
Prerequisites
5.1.2
Integrating with Active Directory
A
Configuring EDQ to support Windows Integrated Authentication (Kerberos)
A.1
EDQ running as Windows service using local system account
A.2
EDQ running on Unix
A.2.1
What is in the keytab?
A.2.2
Creating keytabs using existing tools
A.2.3
Creating keytabs using winktab
A.2.4
Check the Unix Kerberos configuration
A.2.5
Java Encryption
A.2.6
Changes to login.properties
A.3
Kerberos Shared Libraries
B
Configuring Single Sign On with Oracle Access Manager (OAM)
B.1
Prerequisites
B.2
OAM configuration
B.3
WebLogic plugin configuration
B.4
WebLogic Configuration
Scripting on this page enhances content navigation, but does not change the content in any way.