Skip Headers
Oracle® Application Server Best Practices Guide
10g (10.1.4.0.1)

Part Number B31762-02
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
View PDF

Index

A  B  C  D  E  F  G  I  J  L  M  N  O  P  R  S  T  V  W  X 

A

Access API clients, 2.2.9
access control policies, 3.8
Access Systems
Access API clients, 2.2.9
API-based plug-ins, 2.2.8
avoiding login errors, 2.2.7
best practices, 2.2
document protection policies, 2.2.6
dynamic groups, 2.2.3
mitigating risk of cookie reply attack, 2.2.1
nested groups, 2.2.2
ObMyGroups groups, 2.2.4
WebGates, 2.2.5
ActiveX Data Objects to query Oracle Virtual Directory, 5.5
attribute flows of adapters, 5.3
audit log, 3.5
auditing Oracle Internet Directory, 3.5
authentication, 4.1.8, 4.3.2
authorization, 4.1.8

B

backups
Application Server Control to perform, 6.5.1
image, 6.5.3
incremental, 6.5.4, 6.5.4
instance-level, 6.5.2, 6.5.2
Oracle Internet Directory, 3.4
OracleAS Backup and Recovery Tool for, 6.5.1
bulkload.sh utility, 3.1

C

certificates, 4.1.5
confidentiality mode, 3.3
cookie reply attacks, 2.2.1
cookies, 4.1.3
ObSSOCookie, 2.2.1

D

directory privileges, 3.7
dsa.conf file, 6.4.2
dynamic groups, 2.2.3

E

encryption, 4.1.1, 4.1.8

F

fault containment, 4.1.2
firewalls
security best practices, 4.1.7

G

globalparams.xml file, 2.2.2
global-web-application.xml file, 4.3.6.4

I

Identity Event API plug-ins, 2.3.6
Identity Systems
avoiding searches, 2.3.1
best practices, 2.3
cleaning up workflow tickets, 2.3.5
Identity Event API plug-ins, 2.3.6
JavaScript in PresentationXML, 2.3.10
Manage Members page, 2.3.2
PresentationXML, 2.3.7
single idle timeout, 2.3.3
style sheets, 2.3.9
WfInstanceNotRequired parameter, 2.3.4
XML or XSL editors, 2.3.8
Inventory.xml file, 6.4.1

J

Java Messaging Service (JMS), 4.3.6.9

L

load balancers
configuring for automatic failover, 6.2.1
monitoring services, 6.2.2
setting idle timeouts, 6.2.3

M

Manage Members page, 2.3.2
mapping scripts, 5.4
MaxActiveQueries parameter, 2.1.6
MaxConnections parameter, 2.1.6
MaxConnIdleTime parameter, 2.1.6
MaxPageSize parameter, 2.1.6
MaxPoolThreads parameter, 2.1.6
MaxQueryDuration parameter, 2.1.6
method authentication, 4.1.3
monitoring Oracle Internet Directory, 3.5

N

namespaces for adapters, 5.1

O

ObMyGroups group, 2.2.4
ObSSOCookie cookie, 2.2.1
OC4J
authentication, 4.3.2
best practices, 4.3
HTTP session inactivity parameter, 4.3.5
Permission class, 4.3.3
security, 4.3.6
UserManager class, 4.3.1
Oracle Access Manager
audit trails, 2.1.10
best practices, 2
deploying, 2.1.1
deploying with Microsoft Active Directory
domain controller, 2.1.4
LDAP over SSL, 2.1.5
Microsoft Active Directory parameters, 2.1.6
hosting administration interfaces, 2.1.8
J2EE security, 4.3
Microsoft Active Directory
MaxActiveQueries parameter, 2.1.6
MaxConnections parameter, 2.1.6
MaxConnIdleTime parameter, 2.1.6
MaxPageSize parameter, 2.1.6
MaxPoolThreads parameter, 2.1.6
MaxQueryDuration parameter, 2.1.6
OC4J security, 4.3
OracleAS JAAS Provider, 4.2
OracleAS Single Sign-On, 4.4
simplifying management, 2.1.11
sizing and tuning the environment, 2.1.7
SSL encryption transport, 2.1.9
storing configuration and policy data, 2.1.2, 2.1.3
timeout for, 2.3.3
Oracle Directory Integration Platform
best practices, 3.12.1
Oracle HTTP Server
authentication, 4.1.8
authorization, 4.1.8
encryption, 4.1.8
Oracle Internet Directory
access control policies, 3.8
backup and recovery, 3.4
best practices, 3
builkload.sh utility, 3.1
directory privileges, 3.7
monitoring and auditing, 3.5
OPMN to manage, 3.6
replication, 3.2
securing traffic with TLS/SSL, 3.3
Oracle Virtual Directory
attribute flows, 5.3
best practices, 5
mapping scripts, 5.4
Microsoft schema for queries to, 5.5
namespaces for adapters, 5.1
searches, 5.2
OracleAS Backup and Recovery Tool
performing incremental backups, 6.5.4
performing instance-level backups, 6.5.2
recovering from loss of host scenarios, 6.5.3
viewing operational log files, 6.5.1
OracleAS Cluster (Identity Management) configuration tips, 6.1
OracleAS Cold Failover Cluster
allocating ports, 6.3.4
attaching Oracle home to oraInventory, 6.3.2
disk redundancy, 6.3.3
shared drive to simplify administration, 6.3.1
OracleAS Guard
invalid Oracle software, 6.4.1
labelling and positioning command shells, 6.4.3
logging, 6.4.4
port usage for primary and standby sites, 6.4.2
OracleAS High Availability Solutions best practices, 6
OracleAS JAAS Provider best practices, 4.2
OracleAS Single Sign-On
best practices, 4.4
primary point of security, 4.4.2
orion-web.xml file, 4.3.6.4, 4.3.6.5

P

PresentationXML, 2.3.7

R

recovery
image backup, 6.5.3
incremental backups, 6.5.4
Oracle Internet Directory, 3.4
OracleAS Backup and Recovery Tool for loss of host scenarios, 6.5.3
Remote Method Invocation (RMI), 4.3.6.9
replication, 3.2
rmi.xml file, 4.3.6.9

S

searches
Identity Servers, 2.3.1
Oracle Virtual Directory adapters, 5.2
Secure Socket Layer (SSL), 4.1.11
server and client authentication mode, 3.3
server authentication, 3.3
SSL encryption, 4.1.11
SSLSessionCacheTimeout, 4.1.12
stateful inspection, 4.1.7
style sheets, 2.3.9
system-jazn-data.xml file, 4.3.6.7

T

timeout for Oracle Access Manager deployment, 2.3.3
TLS/SSL protocol, 3.3
TurnOffNestedGroupEvaluation parameter, 2.2.2

V

Visual Basic Scripting to query Oracle Virtual Directory, 5.5
Visual Basic to query Oracle Virtual Directory, 5.5

W

WebGates, 2.2.5
WfInstanceNotRequired parameter, 2.3.4
workflow tickets, 2.3.5

X

XML or XSL editors, 2.3.8
XMLSpy editor, 2.3.8