To ensure security throughout your IT environment, you have to decide how you are going to deploy the components of the overall environment. This section covers some of the considerations you need to keep in mind when implementing a secure deployment of Oracle Application Server 10 g , including the use of DMZs, the delegation of security privileges, and the use of Oracle Enterprise Manager 10 g to manage security. 4.3.1 DMZ DeploymentOracle Application Server 10 g enables deployment using a DMZ topology. In the context of computer networking, a DMZ is a server placed between two firewalls and thus separated from the Internet and intranet(s). Its placement means that the server exists in a secure buffer zone.
In one typical deployment, you might want to use a DMZ to separate an OracleAS Portal repository database from the database containing business data. The DMZ prevents a hacker from gaining access to the OracleAS Portal password in Oracle Application Server and then using the OracleAS Portal's DBA privileges to wreak havoc on corporate data. In another typical deployment, you might use the DMZ topology for intrusion containment. Figure 4-2 shows a typical DMZ deployment in an Oracle Application Server environment. Figure 4-2. Oracle Application Server typical DMZ deploymentFor details about DMZ deployment strategies, see the Oracle Application Server 10g Security Guide , a part of the standard Oracle Application Server documentation set. (That manual, and many others, are referenced in the Appendix.) In that guide, Oracle provides the following recommendations:
4.3.2 Delegation of PrivilegesAn Oracle Internet Directory infrastructure may be shared by administrators of applications in different business areas or with different responsibilities. A delegation model provided in Oracle Application Server enables the delegation of appropriate levels of privileges within a shared infrastructure. Delegation is structured as follows :
4.3.3 Security Management Through Oracle Enterprise Manager 10 gOracle Enterprise Manager 10 g provides a single interface for managing multiple Oracle Application Servers through the Application Server Control tool installed for each application server being monitored . We discussed Oracle Enterprise Manager 10 g , Application Server Control, and other system management tools in more detail in Chapter 3. You can use Application Server Control for a number of different security management activities. For example, through Application Server Control you can configure application security resources, including JAAS provider services. You can also configure and modify the Oracle Internet Directory and OracleAS Single Sign-On. You can use the Application Server Control Infrastructure page to change infrastructure services if you change the Oracle HTTP Server OracleAS Single Sign-On port number on an identity management installation, the Oracle Internet Directory port number (non-SSL or SSL), the Oracle Internet Directory Mode ( dual-mode or SSL), or the host on which Oracle Identity Management or the OracleAS Metadata Repository resides. If you do this, you must perform a variety of manual command-line tasks to prepare the new infrastructure services before using Application Server Control to make the change (those tasks are described in the Oracle Application Server 10g Administrator's Guide ). |