"Threats", "Hacking", "Attacks" are commonplace in many business cases for security related projects. Keeping out the bad guys and stopping the malicious behaviour have been the key drivers of security projects for a long time. Whilst these issues are still very real and need to be addressed, we are at a key milestone for Information Security. The explosion in the use of mobile devices, cloud computing and social media gives organisations a fantastic opportunity to better engage their prospects and customers. Join this webcast to see how Information Security can help you take advantage of these trends and exploit them to accelerate the delivery of projects and business growth.
OPSS 11gR1 Lesson 2: Administration Concepts and Configuration shows you how to use OPSS features. This includes the main administrative tasks of OPSS, the tools available for each task, and instruction on how to use FMW Control and WLST OPSS scripts to configure OPSS security. This prepares you for administering OPSS environments.
OPSS 11gR1 Lesson 4: Advanced Administration shows you how to migrate one working FMW environment to another environment, such as from test to production. This lesson shows you how to use the FMW cloning utilities to copy FMW products and Java and System components, and how to modify settings between environments. It also shows you how to migrate identities, policy artifacts, and credentials manually. This prepares you for migrating your own OPSS-enabled FMW environments.
OPSS 11gR1 Lesson 3: Application Deployment shows you how to deploy OPSS-enabled applications to WebLogic Server environments. This lesson covers what happens when an application is deployed, how to manage data migration during deployment, and the life cycle of OPSS security artifacts from the application package to the server. This prepares you for deploying your own OPSS-enabled applications.
In this tutorial, you learn how to register partners so that the Service Provider and the Identity Provider trust each other. You also learn how to configure two kinds of federations: a transient federation and a mapped federation.
In this tutorial, you learn how to configure a linked federation across security domains between one Service Provider and one Identity Provider.
In this tutorial, you learn how to verify prerequisites and install the Oracle Identity Federation software. You also learn how to add users to the LDAP-enabled Oracle Internet Directory (OID) that is installed as part of installing OIF. These sample users will be used in later OIF exercises. Configuration is not covered in this OBE.
In this tutorial, you learn how to configure a role-based federation across security domains between one Service Provider and one Identity Provider.