Preface

This document describes security considerations and procedures for a traditional deployment of Oracle Communications Order and Service Management (OSM).

For details about security considerations for an OSM cloud native deployment, see OSM Cloud Native Deployment Guide.

Audience

This document is intended for system administrators, system integrators, database administrators, and other individuals who are responsible for managing OSM and ensuring that the software is operating in a secure manner. This guide assumes that you have a working knowledge of OSM, the relevant operating system, Oracle Database, Oracle WebLogic Server, and Java J2EE software.

Documentation Accessibility

For information about Oracle's commitment to accessibility, visit the Oracle Accessibility Program website at http://www.oracle.com/pls/topic/lookup?ctx=acc&id=docacc.

Access to Oracle Support

Oracle customers that have purchased support have access to electronic support through My Oracle Support. For information, visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=info or visit http://www.oracle.com/pls/topic/lookup?ctx=acc&id=trs if you are hearing impaired.