Go to primary content
Oracle® Retail Merchandising Security Guide
Release 16.0
E76966-03
Next
Contents
List of Examples
List of Figures
List of Tables
Title and Copyright Information
Send Us Your Comments
Preface
Audience
Documentation Accessibility
Customer Support
Oracle Retail Documentation on the Oracle Technology Network
Conventions
Part I Oracle Retail Applications
1
Pre-installation of Retail Infrastructure in WebLogic
JDK Hardening for Use with Retail Applications
Upgrading JDK to Use Java Cryptography Extension
Disabling Weak SSL Protocols and Obsolete Ciphers in JDK7
Pre-installation - Steps for Secured Setup of Oracle Retail Infrastructure in WebLogic
Certificate Authority
Obtaining an SSL Certificate and Setting up a Keystore
Creating a WebLogic Domain
Configuring the Application Server for SSL
Configuring WebLogic Scripts if Admin Server is Secured
Adding Certificate to the JDK Keystore for Installer
Enforcing Stronger Encryption in WebLogic
SSL protocol version configuration
Enabling Cipher in WebLogic SSL Configuration (For Weblogic 10.3.6 Domains)
Securing Nodemanager with SSL Certificates
Using Secured Lightweight Directory Access Protocol (LDAP)
Enabling Access to Secured Database from Forms Oracle Home - Optional
Webservice Security Policies
Additional Pre-requisite for Oracle Retail Service Backbone (RSB) Security Policies
Advanced Infrastructure Security
2
Post Installation of Retail Infrastructure in Database
Configuring SSL Connections for Database Communications
Configuring SSL on the Database Server
Configuring SSL on an Oracle Database Client
Configuring SSL on a Java Database Connectivity (JDBC) Thin Client
Configuring the Password Stores for Database User Accounts
Configuring the Database Password Policies
Configuring SSL Connection for Oracle Data Integrator (ODI)
Creating an Encrypted Tablespace in Oracle 12c Container Database
Additional Information
3
Post Installation of Retail Infrastructure in WebLogic
Retail Application Specific Post installation Steps for Security
Batch Set Up for SSL Communication
Oracle Business Intelligence (BI) Publisher - Disable Guest User - Optional
Asynchronous Task JMS Queue Security
Verifying and Creating Required Async Task Job Role and User
Securing the Asynchronous Task JMS Queue
Allowing Publishing to a Secured Asynchronous Task JMS Queue
Hardening Use of Headers and Transport Layer Security
Virtual Host Configuration
Retail Applications web.xml Configurations
Update weblogic.jdbc.remoteEnabled in setStartupEnv.sh
4
Installing the Merchandise Operations Management Security Applications
Installing the ReIM Application
Installing the RPM Application
Installing the RMS Application
Installing the ReSA Application
Installing the Allocation Application
5
Troubleshooting
Enabling TLS1.1 and 1.2 Protocols in Internet Explorer 11
Hardening Local JRE for Use with Retail Applications
Java Version 7/8 SSL Handshake Issue while Using Self Signed Certificates
Importing the Root Certificate in Local Client JRE
Importing the Root Certificate to the Browser
Importing the Root Certificate through Internet Explorer
Importing the Root Certificate through Mozilla Firefox
Setup Secure Cookie
Changes to Web Application Descriptor
Launching Issues with RPM
Disabling Hostname Verification
Verifying the Certificate Content
Verifying the Keystore Content
Integration Issues
HTTPS Service Encountering Redirect Loop After Applying Policy A
6
Importing Topology Certificate
Importing Certificates into Middleware and Repository of Oracle Retail Applications
7
Using Self Signed Certificates
Creating a Keystore through the Keytool in Fusion Middleware (FMW) 11g
Exporting the Certificate from the Identity Keystore into a File
Importing the Certificate Exported into trust.keystore
Configuring WebLogic
Configuring Nodemanager
Importing Self Signed Root Certificate into Java Virtual Machine (JVM) Trust Store
Disabling Hostname Verification
Converting PKCS7 Certificate to x.509 Certificate
8
Functional Security for Applications Using Fusion Middleware
Understanding the Security Model
Key Security Elements
Permission Grants and Inheritance
Managing Authorization
Accessing Oracle Enterprise Manager Fusion Middleware Control
To display the Security menu in Fusion Middleware Control
Managing the Policy Store Using Fusion Middleware Control
Modifying Application Roles Using Fusion Middleware Control
To add or remove members from an application role
Creating Application Roles Using Fusion Middleware Control
To create a new application role
To create an application role based on an existing one
Customizing the Default Security Configuration
Customizing the Policy Store
Session Timeout
9
ReST Services Security Consideration
One Way SSL
One Way SSL - ReST Services
Part II Oracle Retail Merchandising System (RMS)
10
Understanding Security
Security Features of the Application
Database-level security
Application-level security
Data-level security
SEC_GROUP
SEC_USER_GROUP
SEC_USER
RMS Users and Data Security
Encryption and Hashing
Purchase Order Approval Amount
11
Post Installation - Application Administration
Application Security Configuration
Data Security Views
Other Common Application Administration
File Permissions
Data Access Schema (DAS) - Overview
Post Installation Steps for Webservice Security
Applying Policy A
Enabling the HTTPS servers
Creating the Webservice User
Securing services
Updating the Webservice deployment
Webservice Clock Skew setting
Applying Policy B
Creating the Webservice user
Securing services
Updating the Webservice deployment
ReSTful Services
12
Extending/Customization
Part III Oracle Retail Sales Audit (ReSA)
13
ReSA Security Considerations
Default Security Configuration
Data Security
Securing ReSA Tables
Credit Card Information and Check Account Number Information Processing
ReSTful Web Services
Part IV Oracle Retail Invoice Matching (ReIM)
14
General Security Considerations
15
Understanding Security
Security Features Overview
Dependent Applications
ReIM Web Application Deployment
Technical Overview of the Security Features
Security Features of the Application
Authentication
Authorization
Audit
User Management
Encryption and Hashing
16
Post Installation - ReIM Application Administration
Roles and Permissions
Other Common Application Administration
17
Extending/Customization
18
Securing the Database
Application Schema Owners
Database Security Considerations
Restricted Access to Purge Batches
19
Data Security
Location Security
Reason Code Security
Part V Oracle Retail Price Management (RPM)
20
General Security Considerations
21
Understanding Security
Security Features Overview
Dependent Applications
Discussion of Dependencies on Underlying Platform
Technical Overview of the Security Features
Security Features of the Application
Authentication
Authorization
Audit
User Management
Encryption and Hashing
22
Post Installation - Application Administration
Roles and Permission Grants
Other Common Application Administration
23
Extending/Customization
24
Securing the Database
Application Schema Owners
Database Security Considerations
Restricted Access to Purge Batches
Part VI Oracle Retail Allocation
25
Allocation Security Considerations
Technical Overview of the Security Features
Security Features of the Application
Authentication
Authorization
Audit
User Management
Security Configuration
JMS Security
Security in Allocation Reports Launching RMS Screens