This document provides IT users and Agile PLM administrators with the information needed securely set up and deploy Agile PLM.
This document is written for IT users and Agile PLM administrators who will be setting up Agile PLM. It is assumed that those reading this documentation have a solid understanding of security concepts. The audience should also have basic knowledge of roles and privileges in Agile PLM.
This guide provides information needed to help you to securely set up and configure Agile PLM.
The guide is organized as follows:
"Agile PLM Overview" gives an overview of Agile PLM and its modules.
"Overview of Security Fundamentals" provides an overview of basic security principles which should be considered while setting up Agile PLM.
"Performing a Secure Agile PLM Installation" provides guidance on how to securely install the Oracle Database Server, Oracle Fusion Middleware Infrastructure, Agile PLM, and the Agile PLM Database.
"Protecting Agile PLM Data" provides information on how to use Agile PLM's security features to securely configure your deployment. User authentication and authorization is discussed in this chapter. Additionally, application-level configuration properties used to secure the application are discussed here.
"Performing a Secure Agile PLM Installation" and "Enabling Security for Web Services" provide details on how to secure your environment SSL only or SSL and Web Services security.
Appendix B, "Checklist for Configuring Web Services Security" and Appendix B, "Checklist for Configuring Web Services Security" provide information needed for developers to extend the Agile PLM application or produce applications using Agile PLM as a platform.