Getting Started
This security guide provides an overview of the Oracle Utilities Live Energy Connect (LEC) security process and covers the following:
- Establishing machine-level roles and security policies limiting access to the system on which LEC is deployed
- Setting appropriate firewall rules to limit security vulnerabilities
- Specific protocol security measures
On this page:
Audience
The audience for this guide includes system, network, and security administrators who install and maintain Oracle Utilities Live Energy Connect (LEC).
Prerequisite Knowledge
You must have administrative privileges on the host machine where you're installing or upgrading the software.
Related Documents
For more information about Oracle Utilities LEC, refer to the following Oracle resources:
- Oracle Utilities Live Energy Connect Release Notes
- Oracle Utilities Live Energy Connect Installation Guide
- Oracle Utilities Live Energy Connect Licensing Information User Manual
- Oracle Utilities Live Energy Connect Asset ID Manager User Guide
- Oracle Utilities Live Energy Connect Configuration Manager User Guide
- Oracle Utilities Live Energy Connect Certificate Deployment Procedure for Using Secure ICCP
Definitions
The following are terms used throughout this security guide.
Term | Definition |
---|---|
LEC |
Oracle Utilities Live Energy Connect |
LEC Server |
Oracle Utilities Live Energy Connect Server |
LCM |
An acronym for LEC Configuration Manager, which is a GUI application used to configure and monitor the LEC Server |
Data Directory |
LEC runtime directory where configuration files, Python script files, and log files are located; the default location is C:\Program- Data\LiveEnergyConnect, which can be modified during installing LEC installation. |
Install Directory |
Primary software installation directory; the default location is C:\Program Files\LiveEnergyConnect, which can be modified during LEC installation. |
Log Directory |
A subdirectory of Data Directory named Logs |
Config Directory |
A subdirectory of Data Directory named Config |
Scripts Directory |
A subdirectory of Data Directory named Scripts |
Stunnel Directory |
Directory containing Stunnel program and configuration files located at C:\Program Files (x86)\Stunnel |
Service Account |
Any account used to run LEC as a Windows services; the default service account is the Windows LocalSystem account |
Conventions
The following are text conventions used throughout this security guide.
Convention | Meaning |
---|---|
Boldface |
Boldface type indicates graphical user interface elements associated with an action, or terms defined in text or the glossary. |
Italic |
Italic type indicates book titles, emphasis, or placeholder variables for which you supply particular values. |
|
|