Security Configuration

Perform the security configurations listed. See the Oracle Inventory Management Security Guide for more information and instructions on securing your application.
  1. Use the SecureConfig tool to create or import key container.
  2. Define the encryption key parameters.
  3. Encrypt configurations.