Introduction
This security guide provides guidelines and recommendations for installing, configuring, and monitoring Oracle TMS to make them more secure in customer environments. This is a practical guide for technical users, installers, and system administrators who implement and maintain the Oracle TMS system. This document discusses guidelines for hardening of the Oracle TMS security application, and other system hardening configuration recommendations.
This document cannot address every security scenario that might be applicable to a particular implementation and environment; however, it provides basic recommendations for securing Oracle TMS. Oracle recommends that you fully test the security setup in a non-production environment to ensure proper functionality and integrity before you install the software.
This guide will help you ensure that Oracle TMS and the various components involved in the setup are properly secured. Oracle recommends that you secure the Oracle TMS environment in alignment with your company's enterprise security policies.
This guide is not intended to replace the Oracle TMS technical documentation (Installation Guide and User's Guide) delivered with the product. It provides references to relevant information in Installation and User's Guides. Readers of this guide should have a good understanding of Oracle TMS. Implementing Oracle TMS security requires an in-depth understanding of many disciplines, including WebLogic Server administration, Oracle Database security administration, and network security administration.
This guide presents the following security guidelines and recommendations:
In addition, see the following documents for security configuration instructions:
- Oracle Fusion Middleware Understanding Security for Oracle WebLogic Server
- Oracle Fusion Middleware Securing Oracle WebLogic Server
- Oracle Fusion Middleware Information Roadmap for Oracle WebLogic Server
- Oracle Application Server Web Services Security Guide
Parent topic: Security Guide