This is a text description of asoag038.gif, an image which shows the Oracle
Security Architecture and where Enterprise User Security fits in. The image
depicts three layers as follows:
The Application Security layer is at the top and it includes the following
elements:
- Third-Party Applications, which provide Authorization and Auditing
- Oracle E-Business Suite, which provides Responsibilities and Roles
- Oracle Collaboration Suite, which provides S-MIME (secure e-mail), Interpersonal
Rights, and File Privileges
- OracleAS Portal and OracleAS Wireless, which provide Roles and Privilege
Groups
The Oracle Platform Security layer is in the middle and it includes the following
elements:
- Oracle Application Server, which provides JAAS Roles, Web Services Security,
and Java 2 Permissions
- Oracle Database, which provides Enterprise User Security, Virtual Private
Database, Encryption, and Label Security
The Oracle Identity Management Infrastructure layer is on the bottom and it
includes the following elements:
- OracleAS Certificate Authority
- Oracle Delegated Administration Services
- OracleAS Single Sign-On
- Oracle Directory Integration Service
- Oracle Internet Directory (which is at the very bottom, signifying that
all the other identity management elements use the directory as their foundation)
The Oracle Identity Management Infrastructure communicates with External Security
Services, which are located adjacent to the infrastructure to signify that the
external services are at the same layer. External Security Services include
the following elements:
- Access Management
- Directory Services
- Provisioning Services