Getting Started

This security guide provides an overview of the Oracle Utilities Live Energy Connect (LEC) security process and covers the following:

  • Establishing machine-level roles and security policies limiting access to the system on which LEC is deployed
  • Setting appropriate firewall rules to limit security vulnerabilities
  • Specific protocol security measures

On this page:

Audience

The audience for this guide includes system, network, and security administrators who install and maintain Oracle Utilities Live Energy Connect (LEC).

Back to Top

Prerequisite Knowledge

You must have administrative privileges on the host machine where you're installing or upgrading the software.

Back to Top

Related Documents

For more information about Oracle Utilities LEC, refer to the following Oracle resources:

Back to Top

Definitions

The following are terms used throughout this security guide.

Term Definition
LEC

Oracle Utilities Live Energy Connect

LEC Server

Oracle Utilities Live Energy Connect Server

LCM

An acronym for LEC Configuration Manager, which is a GUI application used to configure and monitor the LEC Server

Data Directory

LEC runtime directory where configuration files, Python script files, and log files are located; the default location is C:\Program- Data\LiveEnergyConnect, which can be modified during installing LEC installation.

Install Directory

Primary software installation directory; the default location is C:\Program Files\LiveEnergyConnect, which can be modified during LEC installation.

Log Directory

A subdirectory of Data Directory named Logs

Config Directory

A subdirectory of Data Directory named Config

Scripts Directory

A subdirectory of Data Directory named Scripts

Stunnel Directory

Directory containing Stunnel program and configuration files located at C:\Program Files (x86)\Stunnel

Service Account

Any account used to run LEC as a Windows services; the default service account is the Windows LocalSystem account

Back to Top

Conventions

The following are text conventions used throughout this security guide.

Convention Meaning

Boldface

Boldface type indicates graphical user interface elements associated with an action, or terms defined in text or the glossary.

Italic

Italic type indicates book titles, emphasis, or placeholder variables for which you supply particular values.

Monospace

Monospace type indicates commands within a paragraph, URLs, code in examples, text that appears on the screen, or text that you enter.

Back to Top