Skip Headers
Agile Product Lifecycle Management Security Guide
Release 9.3.3
E39280-01
  Go To Table Of Contents
Contents

Previous
Previous
 
Next
Next
 

1 Document Scope

This document provides IT users and Agile PLM administrators with the information needed securely set up and deploy Agile PLM.

1.1 Documentation Audience

This document is written for IT users and Agile PLM administrators who will be setting up Agile PLM. It is assumed that those reading this documentation have a solid understanding of security concepts. The audience should also have basic knowledge of roles and privileges in Agile PLM.

1.2 Guide to this Document

This guide provides information needed to help you to securely set up and configure Agile PLM.

The guide is organized as follows:

  • Overview of Agile PLM on page 3 gives an overview of Agile PLM and its modules.

  • Overview of Security Fundamentals on page 5 provides an overview of basic security principles which should be considered while setting up Agile PLM.

  • How to Perform a Secure Agile PLM Installation on page 7 provides guidance on how to securely install the Oracle Database Server, Oracle WebLogic Server, Agile PLM, and the Agile PLM Database.

  • How to Securely Configure Agile PLM on page 13 provides information on how to use Agile PLM's security features to securely configure your deployment. User authentication and authorization is discussed in this chapter. Additionally, application-level configuration properties used to secure the application are discussed here.

  • Security Considerations for Developers on page 17 provides information needed for developers to extend the Agile PLM application or produce applications using Agile PLM as a platform.