Skip Headers
Oracle Retail Store Inventory Management Security Guide
Release 14.1
E58658-01
Next
Contents
Title and Copyright Information
Send Us Your Comments
Preface
Audience
Documentation Accessibility
Customer Support
Improved Process for Oracle Retail Documentation Corrections
Oracle Retail Documentation on the Oracle Technology Network
Conventions
Part I Oracle Retail Applications
1
Pre-installation of Retail Infrastructure in WebLogic
Pre-installation - Steps for Secured Setup of Oracle Retail Infrastructure in WebLogic
Certificate Authority
Obtaining an SSL Certificate and Setting up a Keystore
Creating a WebLogic Domain
Configuring the Application Server for SSL
Configuring WebLogic Scripts if Admin Server is Secured
Additional Configuration for WLS_FORMS (For forms server)
Adding Certificate to the JDK Keystore for Installer
Enforcing Stronger Encryption in WebLogic
SSL protocol version configuration
Upgrading JDK to Use Java Cryptography Extension
Enabling Cipher in WebLogic SSL Configuration
Securing Nodemanager with SSL Certificates
Using Secured Lightweight Directory Access Protocol (LDAP)
Connecting from Forms Application to Secured Database
Enabling Access to Secured Database from Forms Oracle Home - Optional
Webservice Security Policies
Additional Pre-requisite for Oracle Retail Service Backbone (RSB) Security Policies
Advanced Infrastructure Security
2
Post Installation of Retail Infrastructure in Database
Configuring SSL Connections for Database Communications
Configuring SSL on the Database Server
Configuring SSL on an Oracle Database Client
Configuring SSL on a Java Database Connectivity (JDBC) Thin Client
Configuring the Password Stores for Database User Accounts
Configuring the Database Password Policies
Configuring SSL for Oracle Data Integrator (ODI)
Creating an Encrypted Tablespace in Oracle 12C Container Database
Additional Information
3
Post Installation of Retail Infrastructure in WebLogic
Retail Application Specific Post installation Steps for Security
Batch Set Up for SSL Communication
Oracle Business Intelligence (BI) Publisher - Disable Guest User - Optional
RMS - Forms Timeout Setting - Optional
Asynchronous Task JMS Queue Security
Verifying and Creating Required Async Task Job Role and User
Securing the Asynchronous Task JMS Queue
Allowing Publishing to a Secured Asynchronous Task JMS Queue
4
Troubleshooting
Java Version 7 SSL Handshake Issue while Using Self Signed Certificates
Importing the Root Certificate in Local Client JRE
Importing the Root Certificate to the Browser
Importing the Root Certificate through Internet Explorer
Importing the Root Certificate through Mozilla Firefox
Setup Secure Cookie
Changes to Web Application Descriptor
Launching Issues with RPM
Disabling Hostname Verification
Verifying the Certificate Content
Verifying the Keystore Content
Integration Issues
Errors in WLS_FORMS
HTTPS Service Encountering Redirect Loop After Applying Policy A
5
Importing Topology Certificate
Importing Certificates into Middleware and Repository of Oracle Retail Applications
6
Using Self Signed Certificates
Creating a Keystore through the Keytool in Fusion Middleware (FMW) 11g
Exporting the Certificate from the Identity Keystore into a File
Importing the Certificate Exported into trust.keystore
Configuring WebLogic
Configuring Nodemanager
Importing Self Signed Root Certificate into Java Virtual Machine (JVM) Trust Store
Disabling Hostname Verification
Converting PKCS7 Certificate to x.509 Certificate
Part II Oracle Retail Store Inventory Management
7
Overview of SIM Security
General Security Considerations
Software and Patches
Reducing the Scope for Security Breaches
General Principles
Securing the Environment
Separating Components
Network Access
User Access
Handheld Devices
Installation
Pre-Installation
Installation
Post Installation
Role Based Security and User Management
Web Based Security
8
Security Features
Overview of Security Features
Dependent Applications
Technical Overview of Security Features
Authentication
Authorization
Audit
User Management
Encryption and Hashing
9
Administration
Roles and Permissions
Common Application Administration
Extending/Customization
References