Go to main content
1/8
Contents
Title and Copyright Information
Preface
Audience
Related Documentation
Documentation Accessibility
1
UIM Security Overview
Basic Security Considerations
Understanding the UIM Environment
Overview of UIM Security
Recommended Deployment Scenarios
Operating System Security
Firewall Port Configuration
Oracle Database Security
Data Encryption
Secure Database Connections
SSL Authentication
WebLogic Server Security
Authorization
WebLogic Resources
Security Policies
Secure Sockets Layer (SSL)
Logging Security
Oracle Security Documentation
2
Performing a Secure UIM Installation
Installing UIM Securely
About Password Policies
Post-Installation Configuration
Setting Up User Accounts to Lock and Expire
3
Implementing UIM Security
Configuring and Using Authentication
Java Authentication and Authorization Service
About Callback Handlers
Configuring and Using Access Control
Configuring and Using Security Audit Logs
Secure Access to UIM Web Services
Managing UIM Security
4
Security Considerations for Developers
About UIM Security Policies
About Securing UIM APIs
About Securing Entity Data
About Securing Web Services
A
UIM Secure Deployment Checklist
Secure Deployment Checklist
Scripting on this page enhances content navigation, but does not change the content in any way.