System Deployment

Network Security in OIPA Environment

When deploying OIPA on a network there are many security issues to take into consideration, especially the use of firewall and VPN technologies. A firewall will permit or deny network permissions based on configured rules, to protect the internal network from unauthorized access while permitting legitimate communications. Firewalls perform the following functions in a typical OIPA environment:

The OIPA user interface is browser-based and allows home-office users to access the application services. It is recommended that the users access the application from within the company network, secured behind the outside firewall. Virtual Private Network (VPN) technology should be used to allow employees working remotely to access the OIPA application. A VPN tunnels outside traffic through the firewall, placing outside clients virtually inside the firewall.

It may be required to provide access to the OIPA web services for external clients that are not allowed inside the company firewall. In that case, the web services must only be accessed through HTTP secured with SSL. OIPA web services support WS-Security standards, enabling web service user authentication using OIPA user accounts.

Please make sure that the firewalls used to secure an OIPA environment support the HTTP 1.1 protocol. This enables browser cookies and inline data compression for improved performance.

Firewalls in the OIPA environment

 

Typical OIPA environment usually has the following security zones:

Database

Appropriate database users for the OIPA application should be set up as per the instructions in the associated version of the OIPA Database Install Instructions, which is located on the Oracle Technology Network. OIPA expects a Read-Only database user to be set up so that additional restrictions can be enforced on certain operations.

 

 

 

 

 

Copyright © 2017, Oracle and/or its affiliates. All rights reserved. About Oracle Insurance | Contact Us