6 Security Considerations for Developers

Learn how developers can extend Oracle Communications Billing and Revenue Management (BRM) without compromising security.

Topics in this document:

Using the BRM SDK

The frameworks provided in the BRM SDK have the same level of security built into them as exists in the standard BRM product. All extensions developed for BRM should use the framework to ensure the security features detailed in this guide are included in the extension’s design.

Security Considerations for ECE Developers

ECE requires that all Java processes joining its cluster have the correct configuration settings. When using ECE secure mode, having only the correct Coherence properties is not sufficient to join the cluster. Developers writing extensions or plug-ins for ECE should not use direct access to Coherence APIs. They must use the Spring and Template framework provided by ECE. Any direct access to Coherence resources, including its caches, causes security exceptions.