Es gab am 20. Juni in Nürnberg den DOAG 2014 Konferenz. Mein Kollege Frank Burkhardt und ich haben dort einen Vortrag über „IT-Sicherheit und OFM: Eine Herkulesaufgabe?“. Hier finden Sie unser Abstract und unsere Präsentation: Die Anforderungen, die heute an IT-Sicherheitsexperten gestellt werden, erinnern mitunter an die scheinbar unlösbaren Aufgaben…
Using HTTP Basic authentication is a common mechanism to check user’s authenticity, when creating REST-enabled API’s to prevent applications and…
Configure ADF12c application to work with log4j2 One of our customers had the requirement to use log4j 2 in his ADF…
Posted by: Sven Bernhardt, Danilo Schmiedel The Oracle SOA Suite and Oracle Business Process Management Suite offers different domain configuration…
Last week the Oracle Fusion Middleware summer camps took place in Lisbon. More than 100 participants attended the event, learning…
Key words: IT-Security, WebLogic Server, Authorization, authorization process, Role Mapping, Roles and XACML Role Mapping Provider Let“™s continue with Authorization…
Key words: IT-Security, WebLogic Server, WebLogic Security Framework, Authorization, authorization process, Role Mapping, Roles, Adjudication Process, Security Service Provider Interfaces…
One of the most challenging things, apart from test definition, during the process of testing an application is to keep…
In an integration project we are currently replacing an available integration platform using Oracle Service Bus 11g. Different incoming and…