This document provides a high level introduction to security in Oracle Fusion Middleware.
This preface contains these sections:
After reading this document, you are able to:
become familiar with the broad security landscape in Oracle Fusion Middleware, including the role and scope of security, and have basic knowledge about where to find specific information
learn about Oracle Platform Security Services, which provide the foundation for a wide range of security features for administrators and developers
understand common security tasks and where to go for more information on implementing security tasks
This document is designed primarily to introduce the security capabilities of Oracle Fusion Middleware in general and Oracle Platform Security Services in particular; details about the standard security features of Oracle WebLogic Server are not in the scope of this document.
For more details about security in Oracle WebLogic Server, and how to implement specific security features see the section titled "Related Documents" and the references provided in subsequent chapters of this document.
This document is organized as follows:
Chapter 1, "Security in Oracle Fusion Middleware" explains the scope of security technologies in Oracle Fusion Middleware using an architecture diagram
Chapter 2, "About Oracle Platform Security Services" introduces Oracle Platform Security Services and its key components, and explains the role and features of the different components
Chapter 3, "Developing Secure Applications" explains how you can use Oracle Application Development Framework to develop secure applications
Chapter 4, "Infrastructure Hardening" takes a high-level look at key aspects of infrastructure security
Chapter 5, "Common Security Scenarios and Tasks" describes the most common security tasks, and where to find information about performing those tasks
Our goal is to make Oracle products, services, and supporting documentation accessible to all users, including users that are disabled. To that end, our documentation includes features that make information available to users of assistive technology. This documentation is available in HTML format, and contains markup to facilitate access by the disabled community. Accessibility standards will continue to evolve over time, and Oracle is actively engaged with other market-leading technology vendors to address technical obstacles so that our documentation can be accessible to all of our customers. For more information, visit the Oracle Accessibility Program Web site at
Screen readers may not always correctly read the code examples in this document. The conventions for writing code require that closing braces should appear on an otherwise empty line; however, some screen readers may not always read a line of text that consists solely of a bracket or brace.
This documentation may contain links to Web sites of other companies or organizations that Oracle does not own or control. Oracle neither evaluates nor makes any representations regarding the accessibility of these Web sites.
Oracle customers have access to electronic support through My Oracle Support. For information, visit
http://www.oracle.com/support/contact.html or visit
http://www.oracle.com/accessibility/support.html if you are hearing impaired.
Chapter 3, "Common Security Tasks," provides additional references for specific tasks.
The following text conventions are used in this document:
|boldface||Boldface type indicates graphical user interface elements associated with an action, or terms defined in text or the glossary.|
|italic||Italic type indicates book titles, emphasis, or placeholder variables for which you supply particular values.|
||Monospace type indicates commands within a paragraph, URLs, code in examples, text that appears on the screen, or text that you enter.|