6 Security Considerations for Developers

Learn how developers can extend Oracle Communications Billing and Revenue Management (BRM) without compromising security.

Topics in this document:

Using the BRM SDK

The frameworks provided in the BRM SDK have the same level of security built into them as exists in the standard BRM product. All extensions developed for BRM should use the framework to ensure the security features detailed in this guide are included in the extensions' design.

Security Considerations for ECE Developers

ECE requires that all Java processes that join its cluster have a correct set of configuration settings. When using the ECE secure mode, having the correct Coherence properties is not sufficient to join the cluster. Any direct access to Coherence APIs should not be used by developers engaged in writing any extensions of plug-ins to ECE. They must use the Spring and Template framework provided by ECE. Any direct access to Coherence resources including its caches will throw security exceptions.