| Oracle® Retail Home Oracle Retail Home Security Guide Release 19.0.001.1 F29399-01 |
|
![]() Previous |
![]() Next |
Retail Home has several security features that protect the system and its data. See the following sections for more information.
Retail Home's security requirements come from the need to protect application data from unauthorized changes. This is accomplished by the following security features:
Authentication - Retail Home services restrict access to users that have been authenticated by the configured security provider.
Authorization - Retail Home uses enterprise roles to limit what features individual users can access.
Origin Control - Retail Home services implement the Cross-Origin Resource Sharing (CORS) protocol using a domain whitelist to limit where requests may be made from.
Transport Security - The Retail Home client and services communicate via REST calls from the client. The services also make SOAP calls if configured to use an OBIEE instance. These communications need to be secured.
The authentication mechanism for Retail Home depends on whether it is being run inside a hosted container or on a Weblogic Server instance.
When running in a hosted container, Retail Home is deployed behind an Oracle WTSS instance configured to authenticate users against Oracle IDCS. WTSS authenticates with a single sign on for all applications protected by it, which should include all RGBU applications Retail Home is configured for. WTSS and IDCS configuration are covered in their respective documentation.
Retail Home checks for authentication against the same IDCS instance used for authorization.
When running in Weblogic Server, Retail Home can be configured to use authentication and authorization from any supported security provider. This includes running a WTSS instance authenticating via IDCS in front of the Weblogic Server instance. Refer to the appropriate documentation for securely configuring your chosen security provider.
The Retail Home REST services restrict access to clients being served by trusted hosts. This is accomplished using a whitelist of allowed domains. Domains that are not on the whitelist will result in requests being rejected and no CORS headers will be applied to responses.
To ensure the security of service calls made by Retail Home, follow the following rules when configuring endpoints:
Always use TLS encryption. Endpoints should be HTTPS URLs and the servers should be configured to use trusted certificates.
Route access through WTSS or equivalent. Make sure all URLs are to the location exposed on WTSS or will otherwise be independently authenticated.