This guide describes how to secure traffic between mobile devices and back-end URLs using Mobile Security Access Server. It describes how to create, manage, and configure logical MSAS instances, how to secure URLs using MSAS applications, and how to manage access policies and assertion templates and the MSAS repository.
This document is intended for system administrators using Mobile Security Access Server to secure traffic from mobile devices to back-end resources.
For information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program website at http://www.oracle.com/pls/topic/lookup?ctx=acc&id=docacc
.
Oracle customers that have purchased support have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info
or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs
if you are hearing impaired.
For more information, see the following documents in the Oracle Mobile Security Suite and Oracle Identity Management documentation sets:
The following text conventions are used in this document:
Convention | Meaning |
---|---|
boldface | Boldface type indicates graphical user interface elements associated with an action, or terms defined in text or the glossary. |
italic | Italic type indicates book titles, emphasis, or placeholder variables for which you supply particular values. |
monospace |
Monospace type indicates commands within a paragraph, URLs, code in examples, text that appears on the screen, or text that you enter. |