8 Security Information

This chapter includes important information regarding some security aspects of this environment and its configuration. Although various security considerations were taken into account when this environment was created, it is important that a thorough security review be completed before using this environment in production.

Default Settings

All installations/configurations include default settings unless noted otherwise. Any dependencies required by the included software for installation have also been installed.

VNC

Tiger VNC has been installed and configured to start automatically, and to provide access to the Desktop as the "opc" user. Tunneling through an SSH connection is recommended to access using VNC.

Refer to this Cloud documentation for details: https://docs.cloud.oracle.com/iaas/Content/Compute/References/serialconsole.htm.

SSL/TLS

When installed, the local Oracle Database and Fusion Middleware installations include a "demo" SSL/TLS certificate. This certificate should be replaced with an appropriate one, as the demo is not intended for anything beyond demonstrating how to configure and use SSL/TLS.

For more information about Oracle Fusion Middleware security, refer to the documentation available from the Secure the Environment page of the Oracle Fusion Middleware site.

Listener Ports

Most inbound ports are blocked by the Linux firewall. However, several ports have been opened in order to make the Fusion Middleware software easier to use. If having these ports accessible by other nodes is not desirable, the firewall settings can be changed in order to block them. The firewall-cmd command can be used to make the needed changes. Refer to the Oracle Linux Security Guide for more information.

For a list of TCP ports opened as part of the Fusion Middleware software installed in this instance, refer to Server Information.