Beruflich Dokumente
Kultur Dokumente
Change Record15
Date Author Version Change Reference
Reviewers
Name Position
Senior
Tim Wells Senior Principal Sales Consultant
Contents
1. Introduction..............................................................................................
1.1 Purpose..................................................................................................
1.2 Terminology...........................................................................................
1.1 Purpose
As business’s migrate to an e-business model, organisations are opening up their IT systems
to their employees, partners, suppliers and customers. Therefore a strong security policy is
essential to ensure data confidentiality is maintained.
The purpose of this document is to explain the strong security features embedded in the
Oracle e-Business Suite. The Oracle e-Business Suite builds upon the operating system
security to provide a strong, flexible security mechanism, with a pre-defined configuration
for rapid implementation.
1.2 Terminology
Term Meaning
LDAP Light Directory Access Protocol. A class of directory.
Analogous to a phone book.
2.1 Overview
Figure 1 depicts the user security features provided by the e-Business Suite to protect against
unauthorised users accessing the system, and limiting the scope of each authenticated user’s
access.
User Authentication
Username & Digital eye Enterprise
Fingerprints
Password Certificates scan Wide
Directory
User Authorisation
Responsibilities (roles) Users
Id
Name
Finance Finance Customer Telesales Password
Clerk Director Services Mgr Agent
Phone#
Pager#
Digital Certificate
System Privilages
Responsibilities
Finance Finance Customer Telesales
Menu Reports Services Stats Agent Screen
02/04/2001 1
Each user, whether internal or external to the organisation, must be authenticated before
gaining access to the Oracle e-Business Suite. As default this is achieved via a username and
password. However other mechanisms of authentication such as fingerprints and eye scans
can be used where appropriate. Authentication details provided by the user are compared
with the details stored in the Directory. This can either be the Oracle LDAP Internet
Directory (part of the Oracle Internet Platform), or the internal directory held in database
tables (FND_USER) on the data server. Other directories such as Microsoft Active Directory
and iPlanet can be synchronised with the Oracle Internet Directory to provide an Enterprise
wide directory.
Once authenticated, a user’s level of authorisation to the Oracle e-Business Suite is limited
via Responsibilities. Each user is allocated at least one Responsibility, one of which is active
at any one time. A user’s active Responsibility determines the scope of their access to the
Oracle e-Business Suite.
A Responsibility (or role) consists of a set of system privileges which typically enable a user
to be performed a business role within the system e.g. Finance Clerk, Customer Service
Manager. The type of system privileges that can be granted to a Responsibility by the
System Administrator are :
Creating generic Responsibilities and assigning them to users enables user administration
costs to be kept to a minimum.
Users maintain their own password and have the ability to alter their own security
preferences. Users can define notification rules that allow them to delegate, or automatically
respond to any one or more types of workflow notifications. A user can delegate a
notification, granting someone else permission to act on their behalf while still maintaining
ownership of the notification. Or, transferring complete ownership and responsibility for the
notification to another user.
2.2 Single Sign-on
The Oracle e-Business Suite provides a single sign-on capability using the Oracle Login
Server (part of the Oracle Internet Platform). Login Server provides a single sign-on
capability for two classes of application : partner applications, and external applications. The
e-Business Suite is a partner application.
Partner applications are those that have been designed or modified to work within the single
sign-on framework provided by Login Server. They delegate responsibility for user
authentication to the Login Server.
External applications are those which have not been modified to work within the single sign-
on framework, and retain responsibility for authenticating their own username and
passwords.
The sections below describe the process of authenticating both partner and external
applications.
Initial Login
A1 URL
Access
e-Business Suite Application
Request 1 9
Application A1 A1 Data
8
A1 Cookie
2 7
Encrypted
Token A1 Directory
3 Users
Login Id
Name
Page
4 Login Server 5 Password
Phone#
Pager#
Digital Certificate
SSO Cookie 6
02/04/2001 1
A2 URL
Access
e-Business Suite Application
Request 1 6
Application A2 A2 Data
5
A2 Cookie
2 4
A1 Cookie
Encrypted
SSO Cookie Directory
Token A2
SSO Cookie
Users
Id
Name
Login Server 3 Password
Phone#
Pager#
Digital Certificate
02/04/2001 1
B1 URL
Access
Application
Request 1
e-Business Suite 5
Application B1 B1 Data
A2 Cookie
2 4
A1 Cookie
Encrypted
B1 Username Directory
& Password
SSO Cookie
Users
Id
Name
Login Server 3 Password
Phone#
Pager#
Digital Certificate
02/04/2001 1
Logout
1. Login Server resets the SSO cookie in the user’s browser and marks it as expired.
Meanwhile PKI requirements can be satisfied by a complete, out of the box PKI solution that
incorporates our partnership between Entrust Corp. and Oracle. It utilises the Oracle Internet
Directory. For further information see the following information:
· http://www.oracle.com/tellmemore/?135501 and the press release
· http://www.oracle.com/cgi-bin/press/printpr.cgi?
file=200002070500.23232.html&mode=corp
· http://www.entrust.com
3. End To End Data Security
The Oracle e-Business Suite provides end-to-end data security, protecting data from access or
modification whilst in transit between the database and the desktop screen.
&(@%zQ* &(@%zQ*
HTTPS Sqlnet(SSL)
£1000 e-Business Suite
:&5%w*z
Application
^^}**px%z ^^}**px%z
HTTPS Sqlnet(SSL)
02/04/2001 1
There are plans to encrypt other sensitive applications data in a future release of the Oracle
e-Business Suite. This will be achieved by exploiting the encryption facilities in Oracle9i.
Meanwhile applications data encryption requirements can be satisfied via the Oracle 11I
encryption toolkit or via the Oracle partnership with Protegrity. Further information about
Protegrity can be found at http://www.protegrity.com/product.html.
4. Central Security Management
The Oracle e-Business Suite provides a comprehensive range of monitoring, control and
administration tools to centrally manage a business’s security policy. Thereby reducing
complexity, and minimising the cost of ownership.
4.1 Monitoring
The Oracle e-Business Suite provides a range of facilities for monitoring the usage of the
system.
AUDITING
User Auditing
The Oracle e-Business Suite audits user activity. The system allows each user access to be
recorded. The username, terminal id, the date and times of the user access is recorded, as
well as the Responsibility selected, screens and reports used and the concurrent processes
executed. The auditing facility allows the administrator to select the level of auditing
required. This may be dynamically changed at any time..
The Oracle e-Business Suite can monitor unauthorised user access. An audit log
( fnd_unsuccessful_logins table) is maintained of invalid authorisation attempts. The user
name, user id, terminal id, and data and time of the attempted login are logged.
Data Auditing
The Oracle e-Business Suite audits access to data. The system allows the auditing of data
insertion, updating and deletion to any column, in any table within the system. All data and
transactions within the Oracle e-Business Suite record the :
· creation date
· who created the record
· when it was last updated
· who updated the record
The auditing facility allows the System Administrator to dynamically set the level of auditing
per data table.
Security Reports
A range of security reports are provided with the system to produce formatted information
from the audit data. Example report include :
· Sign on Audit Concurrent Requests Report – audit of report request/access
· Sign on Audit Forms Report – audit of screens access
· Sign on Audit Responsibilities Report – audit of responsibilities usage
· Sign on Unsuccessful Logins Report – unsuccessful login activity
· Sign on Audit Users Report – audit of user access
Alerts
Alerts can be configured to fire when entries are added to an audit log. This facility can be
used to alert a System Administrator when a potential security breach occurs, and/or execute
actions to protect the system from further access.
Non Repudiation
The Oracle e-Business Suite will facilitate the use of digital signatures to authenticate a
transactions. This provides a means of auditing transactions so they cannot later be disputed
to have occurred.
4.2 Control
A System Administrator can change a user's system privileges be modified dynamically. E.g.
changing a users’s approval limits will take effect the next time the user performs that
function i.e. Receives a requisition for approval via Workflow. Changing a user’s privileges
to menus, screens and reports will take effect the next time the user logs into the application
or changes Responsibility
Account Management
The Oracle e-Business Suite provides a range of features to allow best practice account
password management policies to be implemented. Users maintain their own passwords,
however they must conform to a set of rules which are set by the System Administrator.
These rules can be set at the system or user levels. Password rules include:
Only a system administrator has the authority to (re)establish an account by (re)setting the
user’s password. Passwords are not visible to users or System Administrators at any time.
Passwords are stored in encrypted form, and password characters typed in by users during
authentication are replaced with the "*" character.
A System Administrator may disable a user account at any time. Disabling the user will no
longer allow the user to login or to perform any approvals. If the user is already logged in, or
is approving requisitions via email, setting that users approval limit to zero, will
immediately prevent workflow from approving any requisitions or responses received from
them.
The Oracle e-Business Suite can automatically disable a user account after a configurable
number of failed login attempts. This facility can be implemented using the Alert feature
described above.
Session Management
The System Administrator can set a parameter to terminate inactive sessions after a specific
period of time.
The System Administrator can also set a parameter to activate sign-on notification. Sign-on
notification shows the user any concurrent requests failed since the last session, and how
many times someone tried to log on to Oracle e-Business Suite with your username but an
incorrect password.
The Oracle e-Business Suite is shipped with several default administrative Responsibilities
to decrease the cost of implementing a business’s security policy. These defaults can be
extended and reconfigured to implement the selected security policy.
· PlanXOS-security (HPUX/NT)
· XDB-security (Oracle)XLDAP v3
· (e.g. Active Directory)XPKIOther
·
· Migrating from NT Domain to PKI & an Enterprise Directory.
Appendix A - Example e-Business Suite Security Architecture
Below is an example security architecture to provide external access to the e-Business Suite
from outside and inside the organisation.
External
Web Server Internal
eg. 192.168.1.1 e-Business
Suite
Access
Data
20/04/2001 1
Appendix B - Bibliography
· http://technet.oracle.com/docs/products/oid/doc_index.htm
· http://technet.oracle.com/products/oid/
· http://www.oracle.com/database/oid/