Book Image

Oracle BAM 11gR1 Handbook

By : Pete Wang
Book Image

Oracle BAM 11gR1 Handbook

By: Pete Wang

Overview of this book

An integral component of Oracle SOA and BPM Suite, Oracle BAM (Business Activity Monitoring) ultimately empowers business executives to react quickly to changing business situations. BAM enables business service and process monitoring through real-time data streaming and operational reports, and this book helps you to take advantage of this vital tool with best practice guidance for building a BAM project."Oracle BAM 11gR1 Handbook" is an essential companion for advancing your BAM knowledge, with troubleshooting and performance tuning tips to guide you in building BAM applications. The book uses step-by-step instructions alongside a real world demo project to steer you through the pitfalls of report and application development. Packed with best practices, you'll learn about BAM migration, HA configuration and much more."Oracle BAM 11gR1 Handbook" comprises a myriad of best practices for building real-time operational dashboards, reports and alerts. The book dives straight into the architecture of Oracle BAM 11g, before moving swiftly onto concepts like managing BAM server securities, populating Data Objects and performing load testing. Later on you'll also learn about BAM migration and building an ADF-based report, plus much more that you won't want to miss. For focusing in on best practices for this integral tool within Oracle SOA and BPM Suite, "Oracle BAM 11gR1 Handbook" is the perfect guide for the job.
Table of Contents (18 chapters)
Oracle BAM 11gR1 Handbook
Credits
Foreword
About the Author
Acknowledgement
About the Reviewers
www.PacktPub.com
Preface

Chapter 6. Managing BAM Securities

BAM securities requirements vary from one system to another. Nevertheless, the basic things remain the same. For a BAM application, you have to ensure your resources, such as Data Objects, reports, and the BAM web applications, are securely protected, so that only authenticated and authorized users can access the information. Apart from these, you also need to consider the security issues during the data transmission between clients and servers. Keeping these security requirements in mind, the following key BAM securities concepts will be covered in this chapter:

  • Authentication

  • Authorization

  • Secure Socket Layer (SSL)

In this chapter, we will first discuss the topics related to client authentication, such as how to manage users and groups, and how to configure external LDAP servers for BAM. Then, you will learn how to manage security policies and application roles to control access to BAM resources. Finally, you will learn how to enable SSL for BAM.

Managing...