everythingOracle.bizhat.com

 

'Everything you wanted
to know about Oracle'

Training References Syntax Tell A Friend Contact Us

 

 

Application Server

01 02 03 04 05 06 07 08 09 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28

<< Previous

Chapter # 13

Next >>




How to plan to deploy an Oracle Identity management (Planning Oracle Identity management Deployment)


Common Logical deployment models

- A central identity management system
- A model serving internal and external user
- A model of providing administrative autonomy for departmental applications
- A model of integrating OIM in a Windows environment


When do you deploy two identity management realms?
- Security isolation: It provides security environment isolation between groups of applications that require isolation among them, such as extranet and internet environment.
- Accessibility: Applications are accessible to internal and external users and are served by two identity management infrastructures.
- Data synchronization: Application-required data is synchronized between the two identity management infrastructures.
- Availability: A separate identity management infrastructure is available for internal and external users.


Why do you need to have OID multi-master replication?

Multi-master OID replication provides the following benefits:
- No single point of failure: Multiple identical replicas prevent the directory service from becoming a single point of failure for applications In the network.
- Transparent failover: Achieved by front-ending the network of replicas with appropriate load balancers or routing elements that can be configured such that if any Oracle Internet Directory node becomes unavailable, the applications are transparently failed-over to alternative nodes In the network
- Load balnce: Achieved by employing load balancers to distribute application and user access requests among Oracle Internet Directory nodes In the replication network so that no one node is overloaded leading to performance degradation

What security mechanisms should you use to secure your OCA deployment?

The OracleAS Certificate Authority host system should be secured with at least the following mechanisms, such as:

- Physical access to the OracleAS Certificate Authority system must be strictly controlled.
- The operating system must be hardened, and user accounts In the system must be limited.
- The repository for OracleAS Certificate Authority must be secured with database securing guidelines.
- Oracle Application Server must be secured.
- Repository database auditing must be turn on.
     Reviews and Templates for FrontPage
     

Copyright � everythingOracle.bizhat.com 2006 All Rights Reserved.