Additional Sources for Security Guidance

Previous TopicNext TopicContents

You should properly secure the databases, platforms, and servers that you use for P6 EPPM. You might find the links below helpful when planning your security strategy (not a comprehensive list).

Note: The URLs below might have changed after Oracle published this guide.

Oracle Database

http://download.oracle.com/docs/cd/B19306_01/network.102/b14266/toc.htm

Oracle Linux Security Guide

http://www.oracle.com/technetwork/articles/servers-storage-admin/secure-linux-env-1841089.html

Microsoft SQL Server 2008 Database

http://www.microsoft.com/sqlserver/2008/en/us/Security.aspx

Microsoft Windows 2008 Server

http://technet.microsoft.com/en-us/library/dd548350(WS.10).aspx

Oracle WebLogic

http://www.oracle.com/technetwork/middleware/weblogic/documentation/index.html

http://download.oracle.com/docs/cd/E12840_01/wls/docs103/secmanage/ssl.html

Oracle Fusion Middleware Security Guides

http://download.oracle.com/docs/cd/E12839_01/security.htm

Related Topics

Planning Your Implementation

Which Components Do I Need?

Client and Server Requirements

Security Guidance Overview

Safe Deployment of P6 EPPM

Authentication Options for P6 EPPM

Authorization for P6 EPPM

Confidentiality for P6 EPPM

Sensitive Data for P6 EPPM

Reliability for P6 EPPM

Cookies Usage in P6 EPPM



Legal Notices
Copyright © 1999, 2015, Oracle and/or its affiliates. All rights reserved.

Last Published Wednesday, July 29, 2015

PDF Library