1/7
Contents
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
1
Overview
1.1
Product Architecture
1.1.1
Knowledge Base (KB) and Package Repository
1.1.2
Enterprise Controller
1.1.3
Proxy Controller
1.1.4
Agent Controller
1.1.5
Database
1.1.6
Securing the Architecture
1.1.7
Authentication Between the Proxy Controller and Agents
1.1.7.1
Authentication of Agent-Managed Asset
1.1.7.2
Authentication Transactions
1.2
General Principles of Security
1.2.1
Keep Software Up To Date
1.2.2
Restrict Network Access
1.2.3
Follow the Principle of Least Privilege
1.2.3.1
Role Requirement for Tasks
1.2.3.2
Assigning Roles and Privileges to a User
1.2.4
Monitor System Activity
1.2.4.1
Performance and Security
1.2.4.2
Diagnosing Problems
1.2.4.3
High Availability
1.2.4.4
Software Updates
1.2.4.5
Agents
1.2.4.6
Local Database
2
Secure Installation and Configuration
2.1
Planning the Deployment
2.1.1
High Availability
2.1.1.1
Requirements for Enterprise Controller High Availability
2.1.1.2
Limitations of High Availability
2.1.2
Network Configuration
2.1.3
Infrastructure and Operating Systems
2.1.4
Storage Configuration
2.1.5
Remote Database
2.1.6
Typical Deployment
2.2
Installing Oracle Enterprise Manager Ops Center
2.2.1
Control Access
2.2.2
Substitute the Certificates for Internal Communication
2.2.2.1
Viewing the Enterprise Controller's Truststore and Keystore
2.2.2.2
Obtaining a Certificate Authority's Certificate
2.2.2.3
Substituting a Certification Authority's Certificate for the Enterprise Controller in a High Availability Environment
2.2.2.4
Substituting a Certification Authority's Certificate for the Enterprise Controller
2.2.2.5
Substituting a Certification Authority's Certificate on the Proxy Controller
2.2.2.6
Substituting Certificates for the Glassfish Web Container
2.2.2.7
Substituting Certificates for the Apache UCE Container
2.2.3
Install a Remote Proxy Controller
2.3
Configuring Oracle Enterprise Manager Ops Center
2.3.1
Set the Connection Mode
2.3.2
Disable Multiple Logins
2.3.3
Secure the Log Files
2.3.4
Secure the Databases
2.3.4.1
Securing a Local Database
2.3.4.2
Securing a Remote Database
2.3.4.3
Changing the Database Credentials for the Ops Center User
2.3.4.4
Changing the Database Credentials for the Read-Only User
2.3.5
Disable the Domain Model Navigator
2.3.5.1
Enable the Domain Model Navigator on the Enterprise Controller
2.3.6
Using the Domain Model Navigator
2.3.6.1
Logging Into the Domain Model
2.3.6.2
Searching the Domain Model
2.3.6.3
Changing the Domain Model
2.3.6.4
Logging Out of the Domain Model Navigator
2.3.7
Secure the Agents
2.3.8
Secure the Web Browsers
2.3.9
Use Strong Cipher Encryption
2.4
Viewing the Enterprise Controller's Configuration
2.5
Editing the Configuration
2.6
Getting Access to the Database Data
2.6.1
Viewing Core Product Data Using Oracle SQL Developer
2.6.1.1
Modifying Oracle*Net Listener
2.6.1.2
Opening Oracle*Net to External Access
2.6.1.3
Creating the Connection to the Database
2.6.1.4
Viewing Data From the Database Using Oracle SQL Developer
2.6.2
Viewing Core Product Data Using SQL*Plus
3
Security Features
3.1
Configuring and Using Authentication
3.1.1
Identity Management for Users
3.1.1.1
Configuring an LDAP Server
3.1.1.2
Configuring PAM Authentication
3.1.2
Credentials for My Oracle Support
3.1.3
Credentials for IAAS and Cloud Deployments
3.2
Configuring and Using Authorization
3.2.1
Credential Management for Assets
3.2.1.1
Using SSH Key-Based Authentication
3.2.1.2
Creating Credentials for Access to the Serial Console or SSH Tunnel
3.2.1.3
Using the agentadm Command to Manage Assets
3.2.1.4
Changing Credentials of Managed Assets
3.2.1.5
Creating a Credential Plan
3.2.1.6
Applying the Credential Plan
3.2.2
Certificate Management
3.3
Configuring and Using Access Control
3.3.1
Protecting Session Data
3.3.1.1
Verifying Security of Session Cookies
3.3.1.2
Setting the Expiration Time for Sessions
3.3.2
Removing Code Examples
3.4
Configuring and Using Data Protection
3.4.1
Using an NFS Server
3.4.2
Backing Up and Restoring the Enterprise Controller
3.4.2.1
Backing Up an Enterprise Controller
3.4.2.2
Restoring an Enterprise Controller
Index
Scripting on this page enhances content navigation, but does not change the content in any way.