During the installation and configuration process for P6 Analytics and P6 Reporting Database, several options are available that impact security. Depending on your organization's needs, you might need to create a highly secure environment for P6 Analytics and P6 Reporting Database. Use the following guidelines to plan your security strategy for P6 Analytics and P6 Reporting Database:
Review all security documentation for applications and hardware components that interact or integrate with P6 Analytics and P6 Reporting Database. Oracle recommends you harden your environment.
Read through the summary of considerations for P6 Analytics and P6 Reporting Database included in this document. Areas covered include: safe deployment, authentication options, authorization, confidentiality, sensitive data, and reliability.
Throughout this documentation, the Security Guidance icon helps you to quickly identify security-related content to consider during the installation and configuration process. Once you begin the installation and configuration of your P6 Analytics and P6 Reporting Database environment, use the Security Guidance icon as a reminder to carefully consider all security options.
Tips
As with any software product, be aware that security changes made for third-party applications might affect P6 Analytics and P6 Reporting Database applications.