Welcome to Oracle Coherence Security Guide. This document explains key security concepts and provides instructions for implementing various levels of security for both Coherence clusters and Coherence*Extend clients.
This guide is intended for the following audiences:
Primary Audience – Application Developers and Operations who want to secure a Coherence cluster and secure Coherence*Extend client communication with the cluster.
Secondary Audience – System Architects who want to understand the options and architecture for securing a Coherence cluster and Coherence*Extend clients.
The audience must be familiar with Coherence and Coherence*Extend to use this guide. In addition, users must be familiar with Java and SSL to use this guide. The examples in this guide require the installation and use of the Oracle Coherence product, including Coherence*Extend. The use of an IDE is not required to use this guide, but is recommended to facilitate working through the examples.
For information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program website at
Oracle customers have access to electronic support through My Oracle Support. For information, visit
http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit
http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.
For more information, see the following documents that are included in the Oracle Coherence documentation set:
The following text conventions are used in this document:
|boldface||Boldface type indicates graphical user interface elements associated with an action, or terms defined in text or the glossary.|
|italic||Italic type indicates book titles, emphasis, or placeholder variables for which you supply particular values.|
||Monospace type indicates commands within a paragraph, URLs, code in examples, text that appears on the screen, or text that you enter.|