I tried to discuss about „perimeter authentication“ in one extra part of IT-Security“™s blogs, because this authentication“™s process is an essential approach in a heterogonous world of systems, applications and technologies that they need to trust and communicate to each other. Generally, we discussed about perimeter authentication, if a remote…
As I mentioned, JAAS is able for two important tasks: authentication and authorization of users. Now, let us see more…
Derzeit nutzen viele Mitarbeiter ihre privaten Geräte im Unternehmensumfeld und speichern Unternehmensdaten darauf. Der als „Bring Your Own Device“(BYOD) bezeichnete…
Es gab am 06. März 2014 in Hochschule für angewandte Wissenschaften München den DOAG Regionaltreffen München/Südbayern. Ich habe dort einen…
WebLogic Server and Java Security Features [1] WebLogic Server supports the Java SE and Java EE Security to protect the…
OPSS Architecture As we discussed (http://modj.org/home/aktueles/it-security-weblogic-server-and-oracle-platform-security-services-opss/e17330b741d0e387ead1a36591466a7c.html), OPSS is Oracle proposals regarding enterprise security services. It is as a framework that…
It is a frequently question that I receive from time to time: „I“™ve lost my password, how can I change…
OIM (Oracle Identity Management) consists of a large set of useful tools, grouped in three areas: Identity Governance, Access Management…