View Presentation - Volpe Center | Innovation in Multimodal ...


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • The build shows how organisations have tended to integrate their apps using a variety of technologies and techniques. This has resulted in what is known application “stove-piping”, that is, applications designed to meet a specific business function. The problem caused by this is that if functionality needs to be shared across applications it is necessary to integrate which can be costly and difficult to maintain. Integration tends to be implemented tactically at different parts of the application architecture leading to further inflexibility in the overall architecture.
  • Again, We’re trying to go from this….to…
  • As this slide shows, a Service Oriented Architecture can integrate applications at the business process level. This allows a re-use of existing application functionality and the possibility of creating new – composite – applications. The tangible benefits which result from such an approach are the following: The business is able to respond much more quickly, even dynamically, to business change. IT and Business become aligned because business analysts become involved with IT in the Enterprise Architecture decision process The existing IT estate can be run more efficiently with virtualised access to many underlying and legacy applications which previously would have required separate security, management and adminstration Integration development and maintenance costs are driven down with the use of highly-productive, open-standards based business process modelling software. Seamless Integration between applications Easier to modify, change and extend your applications Adapt our Applications to your Processes Deeper more Adaptive Applications Support for Cross Functional / System Process Flows Process Insight & Optimization Understanding of where you are in a process Instance and aggregate metric to drive improvement
  • So, what are the benefits of Middleware in your environment. Notice the little blue boxes…they are web services..Why Web Services? Why not another technology like a Corba? Corba is complex, its api-based…where Web Services are message based..The XML messages allot applications to communicate easily across languages and platforms… Talk to the points of Middleware. Simplified Administration – centralized console Simplified, rapid integration and development Drag and Drop Total Visibility Elegant Error handling Monitor – Dashboards Standards-Based / plug and play interoperability Runtime Changes Security – reduce risk and comply with regulations
  • Our information architecture principals manifest themselves within the complete Oracle product set. We have three major product families within Oracle. 1. Oracle database products cover a spectrum of capabilities. From large enterprise deployments for the “back office” to light weight, realtime database for embedded devices and mobile platforms. 2. The “Oracle Fusion Middleware” is our newest product suite. Essentially this suite of products is the “glue” connecting data to users and systems. The major product pieces include: 2.1 Decision making tools also know as Business intelligence tools 2.2 Security products for network centric applications (SOA) 2.3 Portal applications to enable users to access data spread across many systems 2.4 Integration technologies to enable systems to “speak with each other” 2.5 Our data “Hubs” allowing organizations to define and deliver a “central source of truth” for major data elements, such as the definition of people and assets. 3. Information Age Applications based upon our design and development principals outlined in the previous slide. These suites of applications enable enterprise’s across the world to track financial, logistical and human capital via internet based applications. As you can see; Oracle has a major investment across all the major enterprise software spectrum required by any large enterprise such as the US Marine Corps.
  • Drilling down a bit you now see the various Database Security products that Oracle offers in the 4 areas. Today, we're primarily going to focus on the areas of Access Control, Data protection and Monitoring. However, we'll start by taking a look at User Management first and talk about how the database can leverage Identity Management for efficient user provisioning across enterprise databases.
  • Here we see just a few of the security features and products that Oracle has released over the years going back to Oracle8i. We continue to be the industry leader in the area of data security. This isn't a comprehensive list, but as you can see we continue to add new security features and products with every release, making it even easier to protect your data.
  • This slide should be used to ensure that the audience understands what RAC is and how it is architected. Oracle RAC is a cluster database with a shared cache architecture that overcomes the limitations of traditional shared-nothing and shared-disk approaches to provide a highly scalable and available database solution for all your business applications. Oracle RAC provides the foundation for enterprise grid computing. Starting at the bottom, RAC is a shared disk architecture which means we have a single database to manage. All nodes in the cluster must see the disk. We require a shared disk subsystem which usually means a SAN (Storage Area Network) or a Network attached Storage (NAS). Oracle supports many servers clustered together with Oracle Clusterware. Up to 100 servers are supported in the cluster. How many nodes should you have in your cluster? It is up to you but think about the availability, if you only have 2 servers, then a node failure will affect 50% of the users, you will lose 50% of processing power. IF you have 10 nodes, then only 10% of users are affected, 10% of your processing power. RAC was architected to have many servers support applications so that the loss of one server does not affect the application throughput. With RAC database, each node in the cluster will have an instance to the database. We say we have shared cache since if data is in memory for instance 1 and another instance needs it, it is faster to ship the block from memory then to ship it from disk to memory.
  • In prior releases, each OPMN instance had to be configured with the host and port values of the other ONS servers that it communicated with. This list was maintained in the ons.conf file that was maintained by DCM. Whenever this file changed, restarting OPMN was necessary to reflect the change. OPMN can now optionally discover other ONS servers dynamically. Instead of configuring a list of all other servers to connect to, a discovery mechanism consisting of a multicast address or list of discovery servers is used by OPMN. ONS uses the discovery mechanism to announce new servers and join them into the ONS topology dynamically. This reduces the amount of configuration necessary for each Oracle Application Server instance, eliminates the need to restart OPMN when the topology changes, and removes configuration changes when the topology changes. Explicitly configuration of all nodes is still supported if desired.
  • View Presentation - Volpe Center | Innovation in Multimodal ...

    1. 1. IT Modernization with Oracle Thanikai Sokka Senior Sales Consultant Oracle Fusion Middleware
    2. 2. Agenda <ul><li>Common Business Drivers & Challenges </li></ul><ul><li>Industry Solutions </li></ul><ul><li>What is SOA? </li></ul><ul><li>What is Enterprise Security? </li></ul><ul><li>What is Grid Computing? </li></ul><ul><li>Realizing SOA, Enterprise Security, and Grid Computing with Oracle </li></ul><ul><li>Q&A </li></ul>
    3. 3. Business Drivers & Challenges <ul><li>While trying to: </li></ul><ul><ul><li>Leverage existing systems and assets </li></ul></ul><ul><ul><li>Integrate stove piped applications </li></ul></ul><ul><ul><li>Deal with heterogeneous environments (Interoperate) </li></ul></ul><ul><ul><li>Meet performance, scale, and high availability requirements </li></ul></ul><ul><ul><li>Consistently implement security and other infrastructure services </li></ul></ul><ul><li>How do we: </li></ul><ul><ul><li>Enable IT to efficiently implement new initiatives </li></ul></ul><ul><ul><li>Lower development and maintenance costs </li></ul></ul><ul><ul><li>Meet compliance regulations (HSPD-12) </li></ul></ul><ul><ul><li>Gain better visibility and insight </li></ul></ul><ul><ul><li>Automate and streamline processes </li></ul></ul><ul><ul><li>Share information </li></ul></ul><ul><ul><li>Closer align business and IT </li></ul></ul>Challenges Business Drivers
    4. 4. Industry Solutions to Consider <ul><li>Service Oriented Architecture (SOA) </li></ul><ul><li>Enterprise Security </li></ul><ul><li>Grid Computing </li></ul>PROCESS receive getSSN invoke invoke FLOW select SCOPE receive receive review end getRating
    5. 5. <Insert Picture Here> What is SOA?
    6. 6. IT Challenge Stove-Piped, Monolithic Applications Channels Presentation rendering Business processes Data Integration & transformation Data schemas Business rules & logic Application n     Application 1     Application 2     Application 3     Inflexible, Inefficient, Hard to Maintain <ul><li>Hard to adapt to changing business requirements </li></ul><ul><li>Duplication of functionality means wasted resources </li></ul><ul><li>Small fixes require large investments of time and labor </li></ul><ul><li>Integration represents 80% of IT Budget </li></ul>
    7. 7. Heterogeneous Environment DCPDS BAM Batch Processing Data Aggregation/Synch Database Warehouse Mainframe Portal Wireless / Mobile 3 rd Party
    8. 8. IT Solution: Service Oriented Architecture Build Applications Effectively PROCESS receive getSSN invoke invoke FLOW select SCOPE receive receive review end getRating SOA Application Stove Piping Flexible Architecture <ul><li>Two basic concepts: </li></ul><ul><li>Services : also known as components, business functions, or “web services” </li></ul><ul><ul><li>Examples: </li></ul></ul><ul><ul><li>Create Invoice </li></ul></ul><ul><ul><li>Delete Account </li></ul></ul><ul><li>Orchestration : the combining of services into business processes </li></ul><ul><ul><li>Advantages: </li></ul></ul><ul><ul><li>Build and integrate quickly - without software coding/development </li></ul></ul><ul><ul><li>Handle errors easily and elegantly </li></ul></ul>               
    9. 9. SOA Today Leverages Open Standards Rooted from XML ERP/ Legacy Apps Custom Apps & Services Web services WSDL/WSIF XML/XML Schema SOAP JCA JMS BUSINESS SERVICES More Interoperable Process Flow Logic XSLT/XQuery BPEL More Adaptable PROCESS ORCHESTRATION PORTAL JSR-168 USER INTERFACE Struts/JSF Portal Web Application API WS Richer Experience PKI Dashboards BAM MONITORING JMX Fusion Effect WS-Security SERVICE BUS Security Reliability Logging Failover Dynamic Routing WS-Policy, SAML Web Services Mgmt
    10. 10. SOA Enabled System Environment <ul><li>Simplified and common: </li></ul><ul><ul><li>Integration / Automation </li></ul></ul><ul><ul><li>Administration </li></ul></ul><ul><ul><li>Security </li></ul></ul><ul><li>Total visibility </li></ul><ul><li>Enable runtime changes </li></ul><ul><li>Standards-based plug&play </li></ul><ul><ul><li>Web Services & “SOA” </li></ul></ul>Middleware BAM Batch Processing Data Aggregation/Synch Database Warehouse Mainframe Portal Wireless / Mobile DCPDS 3 rd Party Web services
    11. 11. Promise of SOA <ul><li>Greater enterprise flexibility and agility </li></ul><ul><li>Automate end-to-end processes </li></ul><ul><li>Share and integrate while maintaining ownership control </li></ul><ul><li>Improved visibility </li></ul><ul><li>Increase IT efficiency </li></ul><ul><ul><li>Greater interoperability </li></ul></ul><ul><ul><li>Increase reuse and leverage existing system assets </li></ul></ul><ul><ul><li>Enable graceful migration from legacy systems </li></ul></ul><ul><li>Reduce integration, maintenance, and operational cost </li></ul><ul><li>Smaller business IT gap </li></ul>
    12. 12. <Insert Picture Here> What is Enterprise Security?
    13. 13. <ul><li>Q: How do you control access to your sensitive applications? </li></ul><ul><li>a – Usernames and passwords </li></ul><ul><li>b – Contextual authentication </li></ul><ul><li>c – Hardware token </li></ul>
    14. 14. <ul><li>Q: What determines your employee’s access? </li></ul><ul><li>a – Give Alice whatever Wally has </li></ul><ul><li>b – Base on her business roles </li></ul><ul><li>c – Whatever her manager says </li></ul>
    15. 15. <ul><li>Q: Who is the most privileged user in your enterprise? </li></ul><ul><li>a – Security administrator </li></ul><ul><li>b – CFO </li></ul><ul><li>c – The 3-peat summer intern who is now working for your competitor </li></ul>
    16. 16. <ul><li>Q: How secure is your identity data? </li></ul><ul><li>a – It is in 18 different secured stores </li></ul><ul><li>b – We protect the admin passwords </li></ul><ul><li>c – Privacy? We don’t hold credit card numbers </li></ul>
    17. 17. <ul><li>Q: How much are manual compliance controls costing your organization? </li></ul><ul><li>a – Nothing, no new headcount </li></ul><ul><li>b – Don’t ask </li></ul><ul><li>c – Don’t know </li></ul>
    18. 18. Today’s IT Challenges <ul><li>More Agile Business </li></ul><ul><li>More accessibility for employees, customers and partners </li></ul><ul><li>Higher level of B2B integrations </li></ul><ul><li>Faster reaction to changing requirements </li></ul><ul><li>More Secured Business </li></ul><ul><li>Organized crime </li></ul><ul><li>Identity theft </li></ul><ul><li>Intellectual property theft </li></ul><ul><li>Constant global threats </li></ul><ul><li>More Compliant Business </li></ul><ul><li>Increasing regulatory demands </li></ul><ul><li>Increasing privacy concerns </li></ul><ul><li>Business viability concerns </li></ul>
    19. 19. State Of Security In Enterprise <ul><li>Incomplete </li></ul><ul><ul><li>Multiple point solutions from many vendors </li></ul></ul><ul><ul><li>Disparate technologies that don’t work together </li></ul></ul><ul><li>Complex </li></ul><ul><ul><li>Repeated point-to-point integrations </li></ul></ul><ul><ul><li>Mostly manual operations </li></ul></ul><ul><li>‘ Non-compliant’ </li></ul><ul><ul><li>Difficult to enforce consistent set of policies </li></ul></ul><ul><ul><li>Difficult to measure compliance with those policies </li></ul></ul><ul><li>Business ‘un-friendly’ </li></ul><ul><ul><li>Solutions not user-centric but technology-centric </li></ul></ul><ul><ul><li>Processes not end-user friendly </li></ul></ul>
    20. 20. How can an enterprise security solution help? <ul><li>Establish Enterprise Identity & Roles </li></ul><ul><li>Enforce Strong And Granular Security Policies </li></ul><ul><li>Automate Security Related Processes </li></ul><ul><li>Compliance & Fraud Mgmt. </li></ul><ul><li>Centralized Security And Administration </li></ul><ul><li>Ensure Data Privacy </li></ul><ul><li>Flexible Risk Based Security </li></ul><ul><li>Define Audit And Control Framework </li></ul><ul><li>Security And Control For Enterprise Applications </li></ul><ul><li>Manageability and Security For Databases </li></ul><ul><li>Deploy A Scalable and Flexible Integration Architecture </li></ul>? ! X
    21. 21. Promise of an Enterprise Security Solution <ul><li>Trusted and reliable security </li></ul><ul><li>Efficient regulatory compliance </li></ul><ul><li>Lower administrative and development costs </li></ul><ul><li>Enable online business networks </li></ul><ul><li>Better end-user experience </li></ul>
    22. 22. <Insert Picture Here> What is Grid Computing?
    23. 23. Grid Vision <ul><li>Computing as a utility </li></ul><ul><ul><li>A network of clients and service providers </li></ul></ul><ul><li>Client-side: Simplicity </li></ul><ul><ul><li>Request computation or information and receive it </li></ul></ul><ul><li>Server-side: Sophistication </li></ul><ul><ul><li>Availability, load balancing, utilization </li></ul></ul><ul><ul><li>Information sharing, data management </li></ul></ul><ul><li>Virtualization </li></ul><ul><ul><li>Nothing more virtual than a utility </li></ul></ul><ul><ul><li>Massive potential </li></ul></ul>
    24. 24. Benefits of the Grid <ul><li>Better information faster </li></ul><ul><ul><li>Perform more work with fewer resources </li></ul></ul><ul><ul><li>Spread work across resources </li></ul></ul><ul><ul><li>Access to resources on demand </li></ul></ul><ul><li>Faster response to changing business priorities </li></ul><ul><ul><li>Instantly and dynamically realign IT resources as business needs change </li></ul></ul><ul><li>Reduced IT costs </li></ul><ul><ul><li>Improve utilization of existing resources </li></ul></ul><ul><ul><li>Utilize less expensive commodity platforms </li></ul></ul>
    25. 25. <Insert Picture Here> So how do we get there? How do we realize SOA, Enterprise Security, and Grid Computing?
    26. 26. Oracle - The Information Company Oracle Fusion Middleware Information Age Applications <ul><li>Oracle E-Business Suite </li></ul><ul><li>PeopleSoft Enterprise </li></ul><ul><li>JD Edwards Enterprise One </li></ul><ul><li>JD Edwards World </li></ul><ul><li>Siebel </li></ul><ul><li>Retek </li></ul><ul><li>ProfitLogic </li></ul><ul><li>G-Log </li></ul><ul><li>Application Server </li></ul><ul><li>Integration / SOA </li></ul><ul><li>Hot-Pluggable </li></ul><ul><li>Business Intelligence </li></ul><ul><li>Identity Management </li></ul><ul><li>Data Hubs </li></ul><ul><li>Collaboration Services </li></ul><ul><li>Process Orchestration </li></ul><ul><li>Java Development Tools </li></ul><ul><li>Database </li></ul><ul><li>Real Application Clusters (RAC) </li></ul><ul><li>Enterprise Manager </li></ul><ul><li>Partitioning </li></ul><ul><li>OLAP </li></ul><ul><li>Security </li></ul><ul><li>Lite </li></ul><ul><li>Times Ten </li></ul>Oracle Database 10g Grid Computing
    27. 27. Oracle Fusion Middleware <ul><li>Oracle SOA Suite </li></ul><ul><ul><li>Oracle Enterprise Service Bus (ESB) </li></ul></ul><ul><ul><li>Oracle BPEL Process Manager (BPEL PM) </li></ul></ul><ul><ul><li>Oracle Business Activity Monitor (BAM) </li></ul></ul><ul><ul><li>Oracle Web Services Manager (WSM) </li></ul></ul><ul><ul><li>Oracle Business Rules Engine </li></ul></ul><ul><ul><li>Oracle Integration Adapters </li></ul></ul><ul><ul><li>Oracle Service Registry </li></ul></ul><ul><li>Oracle BPA Suite </li></ul><ul><ul><li>IDS Scheer ARIS Business Process Architect </li></ul></ul><ul><ul><li>IDS Scheer ARIS Business Process Simulator </li></ul></ul><ul><ul><li>IDS Scheer ARIS Business Process Publisher </li></ul></ul><ul><ul><li>Oracle SOA Integration Extensions </li></ul></ul><ul><li>Oracle Web Center Suite </li></ul><ul><ul><li>Oracle Application Development Framework (ADF) </li></ul></ul><ul><ul><li>Oracle Web Center Framework </li></ul></ul><ul><ul><li>Oracle Web Center Services </li></ul></ul><ul><ul><li>Oracle Web Center Anywhere </li></ul></ul><ul><ul><li>Oracle JDevelopor </li></ul></ul><ul><li>Oracle Identity Management Suite </li></ul><ul><ul><li>Oracle Internet Directory </li></ul></ul><ul><ul><li>Oracle Virtual Directory </li></ul></ul><ul><ul><li>Oracle Identity Manager </li></ul></ul><ul><ul><li>Oracle Identity Federation </li></ul></ul><ul><ul><li>Oracle Enterprise Single Sign On </li></ul></ul><ul><ul><li>Oracle Access Manager </li></ul></ul><ul><li>Oracle Business Intelligence </li></ul><ul><ul><li>Oracle BI Standard Edition </li></ul></ul><ul><ul><li>Oracle Reports </li></ul></ul><ul><ul><li>Oracle BI Discoverer </li></ul></ul><ul><ul><li>Oracle BI Publisher </li></ul></ul><ul><li>Oracle Application Server </li></ul><ul><ul><li>Oracle Business Rules Engine </li></ul></ul><ul><ul><li>Oracle Service Registry </li></ul></ul><ul><ul><li>Oracle Sensor Edge Server </li></ul></ul><ul><ul><li>Oracle TopLink </li></ul></ul><ul><ul><li>Oracle Containers for J2EE (OC4J) </li></ul></ul><ul><ul><li>Oracle HTTP Server </li></ul></ul><ul><ul><li>Oracle Enterprise Manager </li></ul></ul><ul><ul><li>Oracle Web Cache </li></ul></ul><ul><ul><li>Oracle Wireless </li></ul></ul><ul><li>Oracle Data Integrator </li></ul><ul><li>Oracle Enterprise Content Management </li></ul><ul><ul><li>Information Rights Management </li></ul></ul><ul><ul><li>Universal Records Management </li></ul></ul><ul><ul><li>Imaging Server </li></ul></ul><ul><ul><li>Content Server </li></ul></ul><ul><ul><li>Content DB </li></ul></ul><ul><li>Oracle Portal </li></ul><ul><li>Oracle Coherence </li></ul>
    28. 28. Realizing SOA with Oracle <ul><li>Service Oriented Architecture (SOA) </li></ul><ul><li>Enterprise Security </li></ul><ul><li>Grid Computing </li></ul>PROCESS receive getSSN invoke invoke FLOW select SCOPE receive receive review end getRating
    29. 29. Oracle’s SOA Platform <ul><li>Key Features </li></ul><ul><li>100% BPEL Support </li></ul><ul><li>Extensible Human Workflow </li></ul><ul><li>Flexible Rules Integration </li></ul><ul><li>Integrated Business Activity Monitor </li></ul><ul><li>JCA/WSIF Binding Framework </li></ul><ul><li>Integrated ESB, Registry, WSM </li></ul><ul><li>SOA enabled user interaction layer </li></ul><ul><li>Unified enterprise management </li></ul><ul><li>Integrated development environment </li></ul>Oracle Business Activity Monitor (BAM) Oracle BPEL Process Manager BPEL Process Workflow Rules fx Biz Partners RN, EDI Oracle Enterprise Service Bus Transformation | Routing | Messaging | Registry Registry Metadata store Java, Other services In Memory JCA CLR .Net, C# REST SOAP JCA Mainframe, IMS, CICS Yahoo! Amazon Oracle Apps, Siebel, SAP, Peoplesoft Oracle WebCenter Suite Oracle JDev Oracle BPA Suite Oracle Application Server / Oracle Enterprise Manager
    30. 30. SOA with Oracle Strategy / Value Proposition <ul><li>Comprehensive and Integrated </li></ul><ul><ul><li>Complete & Integrated Application Architecture, Single Vendor </li></ul></ul><ul><li>Service Oriented Architecture & BPM Enabled </li></ul><ul><ul><li>Flexible and Extensible Architecture that is Standards Based </li></ul></ul><ul><ul><li>BPM integration for true top down modeling </li></ul></ul><ul><li>Full SOA Life Cycle Support </li></ul><ul><ul><li>Plan, Design & Develop, Integrate, Orchestrate, Secure, Manage, Monitor, and Change </li></ul></ul><ul><li>Integrated, Intelligent and Secured Applications </li></ul><ul><ul><li>Increase Business Agility and Employee Productivity </li></ul></ul><ul><li>Increase Scalability and Reliability </li></ul><ul><ul><li>Lower Cost, Flexible Hardware Architecture (Grid) </li></ul></ul>BPM Lifecycle Develop Orchestrate Deploy Access Integrate Secure, Monitor & Manage Plan, Change Monitor Optimize Business Process Monitoring (BAM) Implement Deploy Execute Business Process Execution (BPE) Model Simulate Business Process Analysis (BPA)
    31. 31. Realizing Enterprise Security with Oracle <ul><li>Service Oriented Architecture (SOA) </li></ul><ul><li>Enterprise Security </li></ul><ul><li>Grid Computing </li></ul>PROCESS receive getSSN invoke invoke FLOW select SCOPE receive receive review end getRating
    32. 32. Oracle Enterprise Security Identity And Access Management Data Security User Management Application Security Access Management Directory Management Platform Security Identity Audit Multi-level Access Control Encryption Monitoring & Alert DBA Security Operating System Security Authentication Service User Management Governance Risk Compliance Policy & Process Management Enterprise Control Compliance Analysis & Reporting Audit Automation Information Rights
    33. 33. Data Security: Oracle Products Realize regulatory compliance and protect against internal and external threats Core Platform Security <ul><li>User Management </li></ul><ul><li>Oracle Identity Management </li></ul><ul><li>Enterprise User Security </li></ul><ul><li>Data Protection </li></ul><ul><li>Oracle Advanced Security </li></ul><ul><li>Oracle Secure Backup </li></ul><ul><li>Access Control </li></ul><ul><li>Oracle Database Vault </li></ul><ul><li>Oracle Label Security </li></ul><ul><li>Virtual Private Database </li></ul><ul><li>Monitoring </li></ul><ul><li>Database Auditing </li></ul><ul><li>Oracle Audit Vault </li></ul><ul><li>EM Configuration Pack </li></ul>
    34. 34. Release wide map of Security Products Solution Virtual Private Database Fine Grained Auditing Network Encryption Oracle 8i Oracle Database 9iR2 Oracle Database 10g R1 Oracle Database 11gR1 Oracle Database 10g R2 Transparent Data Encryption Privileged User Controls Command Rules / Factors Oracle Database 9iR1 Tablespace Encryption Database Auditing Label Security Enterprise User Security Client Identifier Encryption API
    35. 35. Oracle Identity Management Suite Access Manager Adaptive Access Manager Enterprise Single Sign-On Identity Federation Web Services Manager Authentication Service for OS Access Management Identity Manager Role Manager Identity Admin. Internet Directory Virtual Directory Directory Services Identity Management Suite Audit & Compliance Enterprise Manager Identity Management Pack Suite Management Platform Security For Java Platform Security
    36. 36. Oracle’s Comprehensive IdM Solutions Strong authentication Risk based authorization Single sign-on Federation Web Services security Operating systems security Access Management Identity lifecycle Role management & mining Organization management Provisioning Reconciliation Password management Identity Admin. Storage Virtualization Synchronization Directory Services Audit Reporting Analytics Fraud Attestation Segregation of duties Audit & Compliance Service levels Performance Configuration Automation Suite Management Application server security Fusion Applications security Platform Security
    37. 37. Oracle’s Comprehensive IdM Solutions Info. Sec, Auditor End Users Administrator Reporting & Analytics Attestation Segregation of Duties Fraud Detection Strong Authentication Risk Based Authorization Federation Self-Service Identity Admin Account Admin Organization Admin Role Management Delegated Admin Business Apps, HR Provisioning Reconciliation Password Mgmt. WS Security Directories, DB LDAP Storage LDAP Synchronization LDAP Virtualization DB User Security App Server, OS Java Platform Security Authentication For Operating Systems Oracle Identity Management & Security Platform
    38. 38. Oracle Identity Solution Set HR System user info Oracle Identity Manager / Oracle Role Management Business Unit * Administration of users is delegated to the downstream organization Dealer Internal Employees 1,000,000’s of Internet Users Key supplier or benefits partner Oracle Access Manager / Oracle Adaptive Access Manager Web Services Manager App with Web Service App with Web Service Virtual Directory Directory B Directory A Delegation * 1,000’s of External Users Manages changes to user status (occasional) Manages user access (daily) Alternative or complement to meta-directories Secures BPEL / Web Services SSO across company boundaries Any App on Any Platform Federation Federation Oracle eSSO
    39. 39. Realizing Grid Computing with Oracle <ul><li>Service Oriented Architecture (SOA) </li></ul><ul><li>Enterprise Security </li></ul><ul><li>Grid Computing </li></ul>PROCESS receive getSSN invoke invoke FLOW select SCOPE receive receive review end getRating
    40. 40. Grid Computing with Oracle <ul><li>Storage </li></ul><ul><ul><li>Automatic Storage Management </li></ul></ul><ul><li>Database Servers </li></ul><ul><ul><li>Real Application Clusters (RAC) </li></ul></ul><ul><li>Application Servers </li></ul><ul><ul><li>Application Server Clustering </li></ul></ul><ul><li>Grid Control </li></ul><ul><ul><li>Enterprise Manager Grid Control </li></ul></ul>
    41. 41. ASM: Storage Grid <ul><li>Oracle Automatic Storage Manager (ASM) </li></ul><ul><ul><li>Provisions storage capacity automatically to Oracle 10 g as needed </li></ul></ul><ul><ul><li>Stripes and Balances I/O </li></ul></ul><ul><ul><li>Mirrors: Immune to disk failure </li></ul></ul><ul><li>Oracle Automatic Backup and Recovery </li></ul><ul><ul><li>Single backup area for all Grid databases </li></ul></ul><ul><ul><li>Archive to tape </li></ul></ul>
    42. 42. RAC: The Database Grid Clustered Database Servers Mirrored Disk Subsystem High Speed Switch or Interconnect Hub or Switch Fabric Network Centralized Management Console Drive and Exploit Industry Advances in Clustering Users No Single Point Of Failure Interconnect Shared Cache Storage Area Network
    43. 43. Oracle Middleware Grid Support OC4J OC4J Web Client HTTP SOAP/ HTTP Web Cache OHS HTTP mod_oc4j AJP OC4J JDBC Process Monitoring and Notification Service with DRM <ul><li>Up/Down </li></ul><ul><li>Invalidation </li></ul><ul><li>Health </li></ul><ul><li>Up/Down </li></ul><ul><li>New </li></ul><ul><li>Health </li></ul><ul><li>Up/Down </li></ul><ul><li>Up/Down </li></ul>Web Services Application RAC
    44. 44. Scaling Behind Oracle HTTP Server OC4J OC4J OC4J OC4J OracleAS H4 OC4J OC4J OC4J OC4J OracleAS H3 OC4J OC4J OC4J OC4J OracleAS H5 OracleAS H1 OHS Router (mod_oc4j) OracleAS H2 OHS Router (mod_oc4j) <ul><li>Load balancing Between OHS/OC4J </li></ul><ul><li>Customized routing for Isolation </li></ul>HW Router
    45. 45. Scaling on Single Node: Multiple JVM Per OC4J OC4J Instance Configuration OracleAS Instance JVM JVM JVM JVM <ul><li>Simple. Turn on multiple JVM by setting numprocs > 1 </li></ul><ul><li>Identical configuration on each runtime instance </li></ul>
    46. 46. Distributed, In Memory Oracle Coherence Data Grid Service Coherence Data Grid Service Applications Distributed, In Memory Oracle Coherence Data Grid Coherence Clients For Data Access, Analytics, Transactions, Events Real Time Clients Application Servers Databases SOA Infrastructure
    47. 47. Enterprise Manager Grid Control Grid Management - Breadth of Capabilities Configuration Management Lifecycle Automation Application Performance Management Extensibility and Interoperability (Open Standards, Open Interfaces) Dashboards and Reports System Monitoring Service Level Management CMDB (Discover & Reconcile) Enterprise Manager Oracle Infrastructure Management Application Management Extended Infrastructure Management
    48. 48. Oracle Grid Computing <ul><li>Dynamic resource provisioning </li></ul><ul><ul><li>Realign IT resources as business needs change </li></ul></ul><ul><li>The most cost effective platform </li></ul><ul><ul><li>Commodity blade servers </li></ul></ul><ul><ul><li>Linux OS </li></ul></ul><ul><ul><li>Networked storage accessible via Infiniband, FibreChannel, or Ethernet </li></ul></ul><ul><li>Software to enable the platform </li></ul><ul><ul><li>Oracle Automatic Storage Manager (ASM) </li></ul></ul><ul><ul><li>Oracle Database </li></ul></ul><ul><ul><li>Oracle Application Server </li></ul></ul><ul><ul><li>Oracle Coherence </li></ul></ul><ul><ul><li>Oracle Enterprise Manager Grid Control </li></ul></ul>
    49. 49. A Q & Q U E S T I O N S A N S W E R S