3 Security Features

This chapter provides a high-level overview of the security features of the Plug-in.

The critical security features that provide protection are:

  • Authentication – The Plug-in runs in Oracle Enterprise Manager Cloud Control 12c. The users must log in to Oracle Enterprise Manager before they can view any information from the Plug-in. Additionally, to access an Oracle Key Manager cluster, the Plug-in requires the credentials from the credentials stored in Oracle Enterprise Manager Cloud Control 12c.

  • Authorization – The Plug-in requires that the users specified in the resource accounts have the appropriate privileges to gather configuration and performance information from the Oracle Key Manager cluster.

  • Confidentiality – Credentials for the Oracle Key Manager cluster are stored in Oracle Enterprise Manager Cloud Control 12c in a secure database. Additionally, all interactions between the Plug-in and the Oracle Key Manager cluster are through secure communication channels.