Introduction This post discusses the different strategies customers have to migrate Identity Cloud Service (IDCS) artifacts to another IDCS instance. Now...
Introduction This post discusses the different strategies customers have to migrate Identity Cloud Service (IDCS) artifacts to another IDCS instance. Now with ‘multi-stripe' support more customers may have the need to migrate/sync artifacts between stripes. There are four methods described below each supporting specific use cases. Three of these methods will ‘copy’ the artifacts to the target system and one that will preserve the GUIDs which basically performs a clone....
Introduction This post discusses the different strategies customers have to migrate Identity Cloud Service (IDCS) artifacts to another IDCS instance. Now with ‘multi-stripe' support more customers...
Oracle CASB Cloud Service (hereafter referred to as CASB) quickly gives you visibility into security of your cloud applications and services to help ensure that...
Oracle CASB Cloud Service (hereafter referred to as CASB) quickly gives you visibility into security of your cloud applications and services to help ensure that your critical data is secure. CASB provides these capabilities by frequently pulling in audit log information from various supported cloud services, analyzing them, running machine learning algorithms on them and generating risk events. Customers’ SOC could view and analyze these risk events to take appropriate...
Oracle CASB Cloud Service (hereafter referred to as CASB) quickly gives you visibility into security of your cloud applications and services to help ensure that your critical data is secure....
Oracle recently introduced a Web Application Firewall (WAF) service to further enhance and secure its Oracle Cloud Infrastructure offerings. The Oracle Cloud...
Oracle recently introduced a Web Application Firewall (WAF) service to further enhance and secure its Oracle Cloud Infrastructure offerings. The Oracle Cloud Infrastructure WAF is based on Oracle Zenedge and Oracle Dyn technologies. It inspects all traffic destined to your web application origin and identifies and blocks all malicious traffic. WAF offers the following tools, which can be used on any website, regardless of where it is being hosted: Origin management. Bot...
Oracle recently introduced a Web Application Firewall (WAF) service to further enhance and secure its Oracle Cloud Infrastructure offerings. The Oracle Cloud Infrastructure WAF is based on...
Introduction Lift and shift of Oracle Applications from on premise to Oracle Cloud Infrastructure requires careful planning and enterprises want the same or...
Introduction Lift and shift of Oracle Applications from on premise to Oracle Cloud Infrastructure requires careful planning and enterprises want the same or higher level of security when moving their workloads to the cloud. OCI provides a number of features for securing application deployments/network and administrative access to these deployments. Check out the OCI security best practices white paper available here...
Introduction Lift and shift of Oracle Applications from on premise to Oracle Cloud Infrastructure requires careful planning and enterprises want the same or higher level of security when moving their...
Customers can use Oracle CASB Cloud Service (hereafter referred to as CASB) to monitor and gain deeper visibility into their OCI environments to protect against...
Customers can use Oracle CASB Cloud Service (hereafter referred to as CASB) to monitor and gain deeper visibility into their OCI environments to protect against security threats. CASB supports security monitoring of a rich set of cloud applications. This link describes the set of applications that CASB can monitor and how to prepare them for monitoring. This post is focused on OCI as a target application for CASB. CASB provides some capabilities out-of-the box for all the...
Customers can use Oracle CASB Cloud Service (hereafter referred to as CASB) to monitor and gain deeper visibility into their OCI environments to protect against security threats. CASB...
OCI provides a load balancing service which can be leveraged to distribute incoming traffic from clients amongst a set of servers. A simple example can...
OCI provides a load balancing service which can be leveraged to distribute incoming traffic from clients amongst a set of servers. A simple example can illustrate this feature. I have two compute instances in OCI running Apache HTTP Server. The Apaches are listening on port 80 for incoming requests. I have defined a Load Balancer in OCI which routes traffic to these two Backend servers. The Load Balancer accepts http requests over port 80 as shown in the figure above. From...
OCI provides a load balancing service which can be leveraged to distribute incoming traffic from clients amongst a set of servers. A simple example can illustrate this feature. I have two compute...
Introduction Compartments are a powerful feature in Oracle Cloud Infrastructure (OCI) for security isolation and access control. They accomplish that by...
Introduction Compartments are a powerful feature in Oracle Cloud Infrastructure (OCI) for security isolation and access control. They accomplish that by providing a global logical namespace where policies can be enforced, as folders in a file system. By being global, they stretch out to all OCI regions within a given tenancy. Through policy enforcement, they deliver the right access level according to the parameters defined by the organization for resource management and...
Introduction Compartments are a powerful feature in Oracle Cloud Infrastructure (OCI) for security isolation and access control. They accomplish that by providing a global logical namespace...
In a blog post a couple of months ago I described how the OAuth Device flow works and gave some general and hypothetical examples of when you might use it. Just...
In a blog post a couple of months ago I described how the OAuth Device flow works and gave some general and hypothetical examples of when you might use it. Just a couple of weeks ago I happened upon a real world use case for it and had a chance to put IDCS' Device Code support to actual use. In most cases when you log into a Unix server over SSH you should be using a key pair - you upload your public key to the server and then the ssh client uses your private key to prove to...
In a blog post a couple of months ago I described how the OAuth Device flow works and gave some general and hypothetical examples of when you might use it. Just a couple of weeks ago I happened upon a...
.cb11w1 ul li, .cb11w1 ol li { line-height: 1.4em; color: #404040 } Overview IDCS (Identity Cloud Service) is Oracle's next-gen Identity solution built in the...
.cb11w1 ul li, .cb11w1 ol li { line-height: 1.4em; color: #404040 } Overview IDCS (Identity Cloud Service) is Oracle's next-gen Identity solution built in the cloud for the cloud. It is fully standards-compliant and implements various standards like SAML (Security Assertion Markup Language), OAuth, OIDC (OpenID Connect), etc. Those standards help customers integrate with other products implementing that same standard. One use case that I came across, a few times recently, is...
.cb11w1 ul li, .cb11w1 ol li { line-height: 1.4em; color: #404040 } Overview IDCS (Identity Cloud Service) is Oracle's next-gen Identity solution built in the cloud for the cloud. It is...