3 Prerequisite
This topic explains the list of prerequisites for this manual.
Operating Environment Security
Please refer to the vendor-specific documentation for making the environment more safe and secure.
Network Security
Please refer to the vendor-specific documentation for making the environment more safe and secure.
Oracle Database Security
Please refer to the Oracle Database Security specification document for making the environment more safe and secure.
This section contains security recommendations for the Database used for the Oracle FLEXCUBE Universal Banking Application.
Init.ora | REMOTE_OS_AUTHENT=FALSE | Authentication |
Init.ora | _TRACE_FILES_PUBLIC=FALSE | Authorization |
Init.ora | REMOTE_OS_ROLES=FALSE | Authorization |
Init.ora | O7_DICTIONARY_ACCESSIBILITY = FALSE | Authorization |
Init.ora | AUDIT_TRAIL = OS | Audit |
Init.ora | AUDIT_FILE_DEST = E:\logs\db\audit | Audit |
To audit sessions | SQL>audit sessions | Audit |
To audit schema changes |
SQL> AUDIT DATABASE LINK; -- Audit create or drop database links SQL> AUDIT PUBLIC DATABASE LINK; -- Audit create or drop public database links SQL> AUDIT SYSTEM AUDIT; -- Audit statements themselves SQL> AUDIT ALTER ANY ROLE by ACCESS; -- Audit alter any role statements SQL> AUDIT ALTER DATABASE by ACCESS; -- Audit alter database statements SQL> AUDIT ALTER SYSTEM by ACCESS; -- Audit alter system statements SQL> AUDIT CREATE ROLE by ACCESS; -- Audit create role statements SQL> AUDIT DROP ANY ROLE by ACCESS; -- Audit drop any role statements SQL> AUDIT PROFILE by ACCESS; -- Audit changes to profiles SQL> AUDIT PUBLIC SYNONYM by ACCESS; -- Audit public synonyms statements SQL> AUDIT SYSDBA by ACCESS; -- Audit SYSDBA privileges SQL> AUDIT SYSOPER by ACCESS; -- Audit SYSOPER privileges SQL> AUDIT SYSTEM GRANT by ACCESS; -- Audit System grant privileges |
Audit |
To audit the events, login through sqlplus as SYSTEM and issue the commands.
Application Server Security
Please refer to the Oracle Weblogic Security specification document for making the environment more safe and secure.
- Support for Single Sign on (SSO)
Oracle FLEXCUBE Universal Banking Solution supports Single sign-on capability with SAML (Security Assertion Markup Language) authentication.
For details on configuration, refer to the document FCUBS_V.UM_OAM_Integration_Enabling_SSO.zip.
- Support for LDAP (External Password Authentication)
FLEXCUBE UBS also supports authentication through LDAP/MSAD without the use of SSO.
Depending on the value of the property EXT_USERLOGIN in fcubs.properties file, the length of the User ID field in the login screen will change. If the value is Y, the user will be able to input up to 30 characters in the User ID field. Otherwise, the User ID field will allow only 12 characters.
Depending on the value PASSWORD_EXTERNAL in fcubs.properties file, the password will be validated with LDAP/MSAD or FCUBS Application.
For details on configuration of LDAP, refer to Oracle FLEXCUBE Universal Banking Installation Guide document (Sec 1.4) Oracle FLEXCUBE Universal Banking Installation Guide document.
- Support for SSL (Secure Transformation of Data)
The Oracle FLEXCUBE Universal Banking Installer allows a deployer to configure that all HTTP connections to the application are over SSL/TLS. In other words, all HTTP traffic in the clear will be prohibited; only HTTPS traffic will be allowed. It is recommended to enable this option in a production environment when WebLogic Server acts as the SSL terminator.
For details on configuration of SSL, refer to Oracle FLEXCUBE Universal Banking Installation Guide document (Sec 1.4.1 for Weblogic, Sec 1.4.2 for WebSphere) Oracle FLEXCUBE Universal Banking Installation Guide document
- Support for SMTPS (Mail communication)
Also, mail session configuration is required in an Application Server. Sample details for creating a mail session are listed in the below:
Name: FCUBSMailSession
JNDI Name: mail/FCUBSMail (The same need to be maintained in property file creation.)
For SMTPS protocol, refer to the below Java Mail Properties.- mail.host=<HOST_MAIL_SERVER>
- mail.smtps.port=<SMTPS_SERVER_PORT>
- mail.transport.protocol=smtps mail.smtps.auth=true
- mail.smtps.host==<HOST_SMTPS_MAIL_SERVER>
For details on configuration of Mail Session process, refer to the document Resource_Creation_WL.doc for weblogic.
Third-party Applications
Support for OWSM (Securing Web services)
Oracle FLEXCUBE Universal Banking supports to the WebLogic Server WS-Policies for enforcing security for Web services. Customer can implement any Oracle WSM WS-Security policies and use them with WebLogic Web services.
The Oracle WSM policies are documented in the Oracle Fusion Middleware Security and Administrator's Guide for Web Services < http://docs.oracle.com/cd/E21764_01/web.1111/b32511/toc.htm>
Choice of the SSL Cipher Suite
Oracle WebLogic Server allows for SSL clients to initiate an SSL connection with a null cipher suite. The null cipher suite does not employ any bulk encryption algorithm, thus resulting in the transmission of all data in clear text over the wire.
The default configuration of the Oracle WebLogic Server is to disable the null cipher suite. Ensure that the usage of the null cipher suite is disabled, preventing any client from negotiating an insecure SSL connection.
Furthermore, for installations having regulatory requirements requiring the use of only ‘high’ cipher suites, Oracle WebLogic Server can be configured to support only certain cipher suites. The restriction can be done in config.xml of the WebLogic domain. Provided below is an example config.xml restricting the cipher suites to those supporting 256-bit symmetric keys or higher and using RSA for key exchange.
<ssl>
<enabled>true</enabled>
<ciphersuite>TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256</ciphersuite>
</ssl>
- configuration of WebLogic Server to support the above defined cipher suites might also require an additional command line argument to be passed to WebLogic Server so that a FIPS 140-2 compliant crypto module is utilized. This is done by adding Dweblogic.security.SSL.nojce=true as a JVM argument.
- The restriction on cipher suites needs to be performed for every managed server.
- The order of cipher suites is important. Oracle WebLogic Server chooses the first available cipher suite in the list, which is also supported by the client.
- Cipher suites with RC4 are enabled despite it being second best to AES. This is primarily for older clients that do not support AES (for instance, Microsoft Internet Explorer 6, 7, and 8 on Windows XP).
- Secure the Oracle FLEXCUBE Universal Banking Application
This topic explains the guidelines to secure the Oracle FLEXCUBE Universal Banking Application. - Secure the Switch Integration Gateway
This topic explains the guidelines to secure the switch integration gateway. - Secure the Gateway Services
This topic explains the guidelines to secure the gateway services.