Oracle Open World S308250  Securing Your People Soft Application Via Idm


Published on

Oracle Open World S308250 Securing Your People Soft Application using Identity Management Technologies

1 Like
  • Be the first to comment

No Downloads
Total views
On SlideShare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide
  • Owner: All Speaker: Program Management
  • In particular take a look at Appendix A of the System and Server Administration PeopleBooks.
  • Wrap up
  • Note: The Best Practice Center is where you can go to download JDeveloper and the SOA Suite.
  • Oracle Open World S308250  Securing Your People Soft Application Via Idm

    1. 2. S308250  Securing Your PeopleSoft Application Greg Kelly Product Strategy Manager, PeopleTools Edwin Lorenzana IDM Program Manager, City of Boston
    2. 3. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
    3. 4. Agenda <ul><li>City of Boston Experience </li></ul><ul><li>New Security Features in PeopleTools 8.50 </li></ul>
    4. 5. City of Boston PeopleSoft /Identity Management Implementation
    5. 6. Definitions <ul><li>Identity Management (IDM): IDM is the process by which various components in an identity management system manage the account life cycle for network entities in an organization, and most commonly refers to the management of an organization’s application users </li></ul><ul><li>Provisioning refers to a technology and process based solution for enforcing and managing the creation, read, update, and deletion of user accounts based on a defined security policy. Provisioning is also a means of propagating security policy, for example by setting access rights on management systems based on group memberships and/or role assignments </li></ul><ul><li>Authentication : The process of verifying the identity claimed by an entity based on its credentials </li></ul><ul><li>Authorization : Authorization is the process of determining if a user has the right to access a requested resource </li></ul><ul><li>Authorization Policies : Declarations that define entitlements of a security principal and any constraints related to that entitlement </li></ul><ul><li>Account Life Cycle : The steps that are taken to provision access for a user to a given system resource </li></ul><ul><li>RBAC – Role based access: Providing access to a system resource based on programmatic logic based on roles </li></ul><ul><li>Authoritative Resource: System of reference for employment status and position description </li></ul><ul><li>Target System Resource: System/application where the automated provisioning will occur </li></ul><ul><li>LDAP: The Lightweight Directory Access Protocol is an application protocol for querying and modifying directory services running over TCP/IP </li></ul><ul><li>Single Sign On: is a property of access control of multiple, related, but independent software systems. With this property a user logs in once and gains access to all systems without being prompted to log in again at each of them. Single sign-off is the reverse property whereby a single action of signing out terminates access to multiple software systems </li></ul>
    6. 7. What is IDM ? Identity and Access as a Service Policy Managers DBAs Self- Service Delegated Administration Identity & Role Lifecycle Management Identity Analytics Authentication & Authorization Monitoring Fraud Prevention Workflow RBAC & SoD End Users Apps & Services Benefits Trusted and reliable security Efficient regulatory compliance Lower administrative and dev costs Enable online business networks Better end-user experience
    7. 8. Account Life Cycle What are we capturing?? Manual-New Hire-Employee Provisioning Process
    8. 9. Account Life Cycle What about removal of access? Manual – Employee De-Provisioning Process
    9. 10. Phase 1 PeopleSoft Integration <ul><li>In an IDM Integration PeopleSoft plays two roles </li></ul><ul><li>Authoritative Resource </li></ul><ul><li>Target System/Resource </li></ul>
    10. 11. Business Requirement <ul><li>In fiscal year 2007-2008 the City of Boston (COB) contracted Oracle Identity Management consultants, KPMG auditors and independent security consultants to assess COB’s various MIS environments. One of the focused areas was the current lifecycle of user identities across the enterprise and the existence of data security controls on COB’s user stores and applications. The findings developed two sets of goals: </li></ul><ul><li>The first set goals are driven by business demands to provide a single sign on solution that will streamline the account lifecycle by providing an automated provisioning solution along with improvements of the current authentication and authorization methods </li></ul><ul><li>A secondary set of goals have been set by the regulatory and audit findings from the 07 KPMG audit of COB’s Financial and MIS systems. These audit findings require COB to establish a security and risk management strategy that provides controls that will satisfy regulatory compliance requirements. The solution needs to safeguard the privacy data of City of Boston residents and employees found in the various user account repositories and applications managed by the COB MIS teams </li></ul>
    11. 12. PeopleSoft/IDM Integration Goals <ul><li>Address the City of Boston’s tactical need to provision PeopleSoft HCM user accounts to support its rollout of PeopleSoft Portal and Employee Self-Service by implementing the following solutions: </li></ul><ul><li>An Authoritative Resource for user data </li></ul><ul><li>Centrally managed LDAP directory </li></ul><ul><li>Automated provisioning of PeopleSoft user accounts </li></ul><ul><li>Access control to PeopleSoft Portal/Self-Service </li></ul>
    12. 13. PeopleSoft Integration Challenges <ul><li>Define an Authoritative Resource for user data </li></ul><ul><li>Discover which user directory/user store contains all user data </li></ul><ul><li>The directory must provide data that is related to the users employment status and describe the users position </li></ul><ul><li>Define the account life cycle for employees and non-employees </li></ul><ul><li>Data required for an IDM integration is usually not collected by an organization in a centralized location </li></ul><ul><li>The directory/user store must be able to communicate with the IDM suite </li></ul>
    13. 14. PeopleSoft Integration Challenges <ul><li>Centrally Managed LDAP Directory </li></ul><ul><li>An enterprise user directory containing all users does not exist </li></ul><ul><li>The current Active Directory LDAP environment is highly decentralized and accounts are managed independently across departments within City of Boston. Active Directory domain trusts are not implemented. </li></ul><ul><li>Decentralization, while sensible within the distributed, autonomous culture of the City’s departments, inevitably leads to inconsistent levels of security across the Active Directory domain. </li></ul><ul><li>The absence of a centrally managed LDAP directory will need to be addressed before a Single sign-on solution could be implemented. </li></ul>
    14. 15. PeopleSoft Integration Challenges <ul><li>Automated provisioning of PeopleSoft user accounts </li></ul><ul><li>The primary obstacle to the initial rollout is the fact that thousands of new user accounts must be provisioned in a secure and efficient manner </li></ul><ul><li>Ensure that access to employee data is limited to the given employee </li></ul><ul><li>Provide non-employee access to the portal </li></ul><ul><li>Ensure that accounts are disabled at termination of employment </li></ul><ul><li>Provide a roadmap to meeting audit & compliance goals </li></ul>
    15. 16. PeopleSoft Integration Challenges <ul><li>Access control to PeopleSoft Portal/Self-Service </li></ul><ul><li>Integrate with existing PeopleSoft authentication </li></ul><ul><li>Provide Web Single Sign On </li></ul><ul><li>Centralize Password Self Service </li></ul><ul><li>Delegate Administration by non IT/MIS staff </li></ul><ul><li>Integrate with the Enterprise Directory </li></ul><ul><li>Provide enforcement of the password policy </li></ul>
    16. 17. Proposed Architecture IDM/PeopleSoft Integration - Server Topology Diagram
    17. 18. PeopleSoft Integration Solutions <ul><li>Define an Authoritative Resource for user data </li></ul><ul><li>PeopleSoft HR </li></ul><ul><li>The PeopleSoft HR database will serve as the authoritative source for all identity data within the City of Boston as it contains all employee data </li></ul><ul><li>Programmatic authentication/access decisions will be made by the IDM system based on user status & job data received from PeopleSoft </li></ul><ul><li>PeopleSoft will be responsible for triggering the updates of an account status within the IDM provisioning system </li></ul><ul><li>PeopleSoft can be configured to maintain the account lifecycle for employees and non-employees </li></ul><ul><li>PeopleSoft can be configured to collect user & job data required by an IDM implementation </li></ul><ul><li>PeopleSoft is compatible with the messaging and LDAP requirements of the IDM suite </li></ul>
    18. 19. PeopleSoft Integration Solutions <ul><li>Centrally managed LDAP directory </li></ul><ul><li>Oracle Internet Directory (OID) </li></ul><ul><li>OID is the enterprise directory for all user accounts </li></ul><ul><li>OID provides a secure industry standard protocol (LDAP) for authentication </li></ul><ul><li>A centralized enterprise directory simplifies the integration of applications </li></ul><ul><li>The enterprise directory provides applications the ability to authenticate all users that currently exist across the various Active Directory environments </li></ul><ul><li>Provides integration with Oracle Identity Management (OIM) for automated account provisioning employees and non-employees </li></ul><ul><li>Integration with Oracle Access Manager will lead to single sign on </li></ul>
    19. 20. PeopleSoft Integration Solutions <ul><li> Automated provisioning of PeopleSoft user accounts </li></ul><ul><li>Oracle Identity Management (OIM) </li></ul><ul><li>OIM provides automated account provisioning of users/employees </li></ul><ul><li>OIM receives real time user status messages from PeopleSoft </li></ul><ul><li>The access logic is based on user job data from PeopleSoft </li></ul><ul><li>Automated provisioning targets the HCM, Portal & OID system </li></ul><ul><li>Non-employees are created manually & given role based access in OIM </li></ul><ul><li>Integration with OIM provides the ability to enforce IDM policies & controls </li></ul><ul><li>Integration with OIM lays the foundation for audit and compliance </li></ul><ul><li>OIM can be configured to maintain the account lifecycle for employees and non-employees based on PeopleSoft data </li></ul>
    20. 21. PeopleSoft Integration Solutions <ul><li>Access control to PeopleSoft Portal/Self-Service </li></ul><ul><li>Oracle Access Manager (OAM) </li></ul><ul><li>Application single sign-on allows users who have been authenticated by OAM to access applications without being re-authenticated. </li></ul><ul><li>OAM integrates with PeopleSoft’s Single Sign technology via secured headers and/or cookies </li></ul><ul><li>OAM when integrated with OID also provides an option for LDAP authentication for PeopleSoft applications </li></ul><ul><li>Self service password reset can be provided by OAM or OIM </li></ul><ul><li>OAM allows for delegated administration </li></ul>
    21. 22. Implementation Issues <ul><li>Governance </li></ul><ul><ul><li>IT Security Policies </li></ul></ul><ul><ul><li>Data Standards </li></ul></ul><ul><ul><li>Account Standards </li></ul></ul><ul><li>Business Process </li></ul><ul><ul><li>Account Lifecycle </li></ul></ul><ul><ul><li>Data Standards </li></ul></ul><ul><li>Technology </li></ul><ul><ul><li>Architecture (deployment of firewalls & web-gates) </li></ul></ul><ul><ul><li>Introduction of Reverse Proxy </li></ul></ul><ul><ul><li>Database Encryption for account data </li></ul></ul><ul><ul><li>Role Based Access – (AD groups vs OVD groups) </li></ul></ul><ul><ul><li>Software Development Lifecycle </li></ul></ul><ul><li>Support </li></ul><ul><ul><li>Internal IDM Support </li></ul></ul><ul><ul><li>Knowledge Transfer from implementation </li></ul></ul><ul><ul><li>Help Desk Support </li></ul></ul><ul><ul><li>Branding </li></ul></ul><ul><ul><li>Training </li></ul></ul>
    22. 23. Lessons Learned <ul><li>Governance </li></ul><ul><ul><li>IT Security Policies </li></ul></ul><ul><ul><li>Assign a Data Steward </li></ul></ul><ul><li>Business Process </li></ul><ul><ul><li>Account Lifecycle </li></ul></ul><ul><ul><li>Development Lifecycle </li></ul></ul><ul><ul><ul><li>Uses cases </li></ul></ul></ul><ul><ul><ul><li>Test Scripts </li></ul></ul></ul><ul><li>Technology </li></ul><ul><ul><li>Architecture (deployment of firewalls & web-gates) </li></ul></ul><ul><ul><li>Group assignment (roles) (AD groups vs OVD groups) </li></ul></ul><ul><ul><li>Architecture Security (firewall/web gates) </li></ul></ul><ul><ul><li>Data & Password encryption (OIM/OID) </li></ul></ul><ul><li>Support </li></ul><ul><ul><li>Oracle Support / Integration Partner </li></ul></ul><ul><ul><li>Architecture direction – stay on the oracle roadmap </li></ul></ul><ul><ul><li>Proper internal support </li></ul></ul><ul><ul><ul><li>Java developer </li></ul></ul></ul><ul><ul><ul><li>LDAP admin </li></ul></ul></ul><ul><ul><ul><li>Integration support (web) </li></ul></ul></ul><ul><ul><ul><li>Integration support (servers </li></ul></ul></ul>
    23. 24. Next Steps Continuous Improvement <ul><li>Infrastructure Expansion </li></ul><ul><li>Enhanced authentication and single sign-on for applications authenticated via the Enterprise Directory </li></ul><ul><li>Oracle Virtual Directory </li></ul><ul><ul><li>Provides real time change of access as employees change positions </li></ul></ul><ul><li>Active Directory Integration </li></ul><ul><ul><li>Automated Account Provisioning for windows logins </li></ul></ul><ul><ul><li>Active Directory Password Sync </li></ul></ul><ul><li>Audit & Compliance </li></ul><ul><ul><li>Attestation/Recertification for non-employee accounts </li></ul></ul><ul><ul><li>Attestation/Recertification for service accounts </li></ul></ul>
    24. 25. Next Steps – Enterprise Directory Colors By Jessie
    25. 26. Next Steps – Enterprise Directory Service Model
    26. 27. PeopleTools Security
    27. 28. <Insert Picture Here> PeopleTools 8.50 Security
    28. 29. New Security Picture
    29. 30.
    30. 31. Market Drivers/Business Needs Security Administration <ul><li>Market Drivers </li></ul><ul><ul><li>Industry Requirements </li></ul></ul><ul><ul><li>Government Mandates </li></ul></ul><ul><li>Business Need </li></ul><ul><ul><li>Customer Adoption of Standards </li></ul></ul><ul><ul><li>Reduce Audit Impact </li></ul></ul><ul><li>Value Proposition </li></ul><ul><ul><li>With every release of PeopleTools, we strengthen existing, or add new, security features . </li></ul></ul>
    31. 32. New and Changed Features Security Administration <ul><li>We are taking steps to increase the infrastructure security for those customer who have invested in Oracle and are able to take advantage of Oracle Technology security features. Auditors are requiring and customers are requesting the capability of protecting data at rest in the database, establishing segregation of duties in database administration and more granular auditing of PeopleSoft across the enterprise. </li></ul><ul><li>Support for Transparent Data Encryption (TDE) and Oracle Data Vault (ODV) </li></ul><ul><li>Support for Oracle Audit Vault </li></ul>
    32. 33. New and Changed Features Security Administration <ul><li>We are also extending the available resources for the Identity Lifecycle by facilitating the adoption of resources and disciplines to protect user access and file transfer and to reduce the cost of deployment. </li></ul><ul><li>Preconfigured integration with Oracle Access Manager </li></ul><ul><li>Support for FTPS (FTP security) </li></ul><ul><li>Support for Microsoft ADAM (AD LDS) </li></ul><ul><li>Use of JNDI libraries for LDAP support </li></ul>
    33. 34. New and Changed Features Security Administration <ul><li>We continue to deliver increased protection for system to system or services based communication by extending the web service security option available. This protection is also based on open standards. </li></ul><ul><li>SAML for web services security (note: NOT federated identity) </li></ul><ul><li>Extended WS-Security support </li></ul>
    34. 35. New and Changed Features Security Administration <ul><li>In PeopleTools 8.50 we have added additional hardening features to mitigate abusive access attempts and to reduce data leakage. </li></ul><ul><li>Decoupled PS_HOME </li></ul><ul><li>Server based anti-virus </li></ul><ul><li>Background tasks to remove orphan files on the web server/app, server mitigating data leakage </li></ul><ul><li>Mitigation of abusive access attempts (bot based) </li></ul><ul><ul><li>Configurable error messages for incorrect login, reduces data leakage (some hackers use the error messages to modify their attempts) </li></ul></ul><ul><ul><li>Throttling invalid access attempts </li></ul></ul><ul><li>Reducing false positives from threat analysis (customers are using more of these threat analysis tools) </li></ul>
    35. 36. User-Level SAML Security For Web Services
    36. 37. SAML Security Support <ul><li>Description </li></ul><ul><li>Business Need and Benefits </li></ul><ul><li>Setup and Process </li></ul>
    37. 38. SAML Support Description <ul><li>With PeopleTools 8.50, you can now secure web services using SAML, providing greater flexibility and granularity. This is based on node to node certificate trust . </li></ul><ul><ul><li>Note: This is NOT SAML support for user authentication or an integration with identity federation. SAML is a token based on standards, NOT a standard token. SAML is not synonymous with Identity Federation </li></ul></ul>
    38. 39. SAML Support Business Need and Benefits <ul><li>PeopleSoft can now verify user IDs included in the SOAP header or associated with a node definition before invoking a web service request. The user ID must be defined in the system as a valid PeopleSoft ID, and, as with any other user ID in the PeopleSoft system, the user ID gains access to system resources through permission lists. </li></ul><ul><li>The Web Services page in the permission lists component enables you to assign web service permissions to user IDs. </li></ul>
    39. 40. SAML Support Setup and Process Go to SAML Inbound Setup: PeopleTools > Security>SAML Administration Setup > SAML Inbound Setup
    40. 41. <Insert Picture Here> Support For Secured FTP (FTPS)
    41. 42. FTPS Support <ul><li>Description </li></ul><ul><li>Business Need and Benefits </li></ul><ul><li>Setup and Process </li></ul>
    42. 43. FTPS Support Description <ul><li>In PeopleTools 8.50 we will be introducing support for FTPS using file transfer libraries. </li></ul><ul><li>SFTP is still facilitated using the ftpunx script customization </li></ul><ul><ul><li>So when will SFTP be supported … ? </li></ul></ul>
    43. 44. FTPS Support Business Need and Benefits <ul><li>This will provide secured file transfer capability on all platforms </li></ul><ul><li>Although PeopleSoft always considered that FTP servers would be protected behind corporate firewalls customers and their auditors have raised concerns </li></ul><ul><li>Corporations are insisting on building security into their infrastructures </li></ul>
    44. 45. FTPS Support Setup and Process <ul><li>Certificate Alias </li></ul><ul><ul><li>The Certificate Alias must be an alias name of a certificate stored in thedatabase (using the PeopleTools Digital Certificates page). </li></ul></ul><ul><li>Verify Host </li></ul><ul><ul><li>0: Do not verify the server for host name. </li></ul></ul><ul><ul><li>1: Checks if there exists any value in the common name field in the server certificate. Does not verify if it matches with what the client specifies. </li></ul></ul><ul><ul><li>2: (Default) Checks for a match with the hostname in the URL with thecommon name or Subject Alternate field in the server certificate. </li></ul></ul><ul><li>Verify Peer </li></ul><ul><ul><li>False: Do not verify the Peer. </li></ul></ul><ul><ul><li>True: (Default) Verify Peer. This will authenticate the certificate sent by the server. </li></ul></ul><ul><li>SSL Usage Level </li></ul><ul><ul><li>0 - No SSL: No SSL will be used. </li></ul></ul><ul><ul><li>1 - Try SSL: Try using SSL, proceed as normal otherwise. </li></ul></ul><ul><ul><li>2 - SSL for Control: Require SSL for the control connection. </li></ul></ul>
    45. 46. <Insert Picture Here> Native Integration Oracle Access Manager
    46. 47. Oracle Access Manager PeopleSoft Native Support <ul><li>Business Benefits </li></ul><ul><ul><li>This feature provides check box configuration for OAM with PeopleSoft </li></ul></ul><ul><li>Business Need/Business Benefits </li></ul><ul><ul><li>This feature will simplify adoption by PeopleSoft customers of OAM </li></ul></ul>Note: With the release of PeopleTools 8.50, PeopleSoft will be dropping native support for OSSO
    47. 48. <Insert Picture Here> Support for Transparent Data Encryption (TDE) and Data Vault
    48. 49. TDE and Data Vault Support <ul><li>While customers have implemented TDE and Data Vault with PeopleSoft, this feature provides support for install and Upgrade </li></ul><ul><li>Transparent Data Encryption </li></ul><ul><li>Oracle Data Vault </li></ul>
    49. 50. Data Encryption Challenges <ul><li>Meeting Regulatory Requirements surrounding Data protection of PII data. </li></ul><ul><ul><li>In recent years there have been numerous incidents of identity theft and credit card fraud resulting in damages reaching into the tens of millions of dollars. </li></ul></ul><ul><ul><li>Protecting against these types of threats requires security solutions that are transparent by design. </li></ul></ul><ul><ul><li>Universities and health care organizations are tightening security around personally identifiable information (PII) such as social security numbers while retailers are working to comply with PCI-DSS requirements. </li></ul></ul>
    50. 51. Transparent Data Encryption -TDE Benefits <ul><li>What are the benefits of using the Transparent Data Encryption (TDE)? </li></ul><ul><ul><li>TDE Is Application Transparent: </li></ul></ul><ul><ul><ul><li>No Views Required </li></ul></ul></ul><ul><ul><ul><li>Application logic performed thru SQL will continue to work </li></ul></ul></ul><ul><ul><ul><li>Transparent Key Management and Separation of Duty </li></ul></ul></ul><ul><ul><ul><li>Manages the encryption keys transparently </li></ul></ul></ul><ul><ul><ul><li>Encrypts the index value associated with a given application table </li></ul></ul></ul><ul><ul><li>Regulatory compliance </li></ul></ul><ul><ul><ul><li>Media protection: (For data at rest ) </li></ul></ul></ul><ul><ul><ul><ul><li>Disk drive replacement or backup tapes </li></ul></ul></ul></ul><ul><ul><ul><li>Low implementation costs: </li></ul></ul></ul><ul><ul><ul><ul><li>No database triggers or views required </li></ul></ul></ul></ul><ul><ul><ul><ul><li>Index support for equality searches </li></ul></ul></ul></ul>
    51. 52. Database Vault Support <ul><li>There is no explicit integration between PeopleSoft and the Oracle DB Vault feature. </li></ul><ul><li>Templates for DB Vault Rule-sets which can be used with a PeopleSoft installation have been developed and posted on the Oracle technology network (OTN). </li></ul><ul><li> </li></ul><ul><ul><li>Database Vault security policies for PeopleSoft </li></ul></ul><ul><ul><li>Database Vault security policies for PeopleSoft </li></ul></ul><ul><ul><ul><li>Database Vault security policies for PeopleSoft can also be used for 11g </li></ul></ul></ul><ul><li>Separate templates exist for each version of Oracle where DB Vault is supported. These templates are applicable to the following PeopleSoft releases: PT8.2x, PT8.4x and beyond </li></ul>
    52. 53. Data Vault Support PeopleSoft Realm <ul><li>This realm protects against unauthorized access by privileged users to business data. It protects all objects owned the PeopleSoft Access Id in addition to some PeopleSoft database roles. Access to this Realm is granted to PeopleSoft Access Id as well as the user PSFTDBA. </li></ul><ul><li>The user PSFTDBA is a new user designed to do administration activities on the PeopleSoft applications (such as patching) but it is not allowed to access business data inside the PeopleSoft applications. </li></ul><ul><li>The PeopleSoft Access Id authorization is restricted to specific processes. This is enforced through the PeopleSoft Access Rule Set. </li></ul><ul><li> </li></ul><ul><li>(see link for “ Database Vault and security policies for PeopleSoft” ) </li></ul>
    53. 54. Data Vault Support PeopleSoft Realm Oracle Database Vault can be used to help fulfill various compliance related requirements, such as the following:
    54. 55. <Insert Picture Here> Decouple and Secure PS_HOME
    55. 56. Feature Overview <ul><li>AppServer and PRCS domain configuration outside PS_HOME </li></ul><ul><li>Support existing behavior but not as default </li></ul><ul><li>Allows customer to: </li></ul><ul><ul><li>Deploy secure-by-default environment </li></ul></ul><ul><ul><li>Minimize disk-space by PS_HOME sharing </li></ul></ul><ul><ul><li>Apply patches easier </li></ul></ul><ul><ul><li>Reduce administration overhead </li></ul></ul><ul><li>No impact to Web Server – PIA deployment </li></ul>
    56. 57. Secure PS_HOME Overview <ul><li>Install PeopleTools using admin account making directory tree read-execute only </li></ul><ul><li>Create and start domains using a restricted account which cannot write to PS_HOME </li></ul><ul><li>Achieved using: </li></ul><ul><ul><li>Management of users and groups </li></ul></ul><ul><ul><li>Root / sudo access </li></ul></ul><ul><ul><li>Network drives on Windows </li></ul></ul><ul><li>Technique used should be suited to the security processes for the organization in question </li></ul>
    57. 58. Secure PS_HOME <ul><li>PeopleSoft Applications no longer write to PS_HOME at runtime - all writes now outside PS_HOME </li></ul><ul><li>Installation should be performed by an admin user who can restrict write-access access to the PS_HOME directory tree </li></ul><ul><ul><li>On UNIX this may be achieved using umask settings </li></ul></ul><ul><ul><li>On Windows this is achieved by installing with an admin account </li></ul></ul><ul><li>Due to differences between user and security models on UNIX and Windows steps taken are quite different </li></ul>
    58. 59. So it can be Secured …
    59. 60. And also Shared …
    60. 61. Sys Admins – Action Items <ul><li>Review System and Server Administration PeopleBooks </li></ul><ul><li>Identify post-installation customizations required => ensure these are done using the installer admin account </li></ul><ul><li>Decide on whether to deviate from the default PS_CFG_HOME </li></ul><ul><li>Test the environment to verify security </li></ul><ul><li>Identify and resolve any problems </li></ul>
    61. 62. <Insert Picture Here> Security Other Features
    62. 63. Other Features <ul><li>ADAM (AD LDS) Support </li></ul><ul><li>JNDI Replacing LDAP libraries </li></ul><ul><li>Securing Server Based File Directories </li></ul><ul><li>PIA Hardening </li></ul><ul><li>MCF/CTI </li></ul><ul><ul><li>Presence </li></ul></ul><ul><ul><li>UAD </li></ul></ul><ul><ul><li>CTI Applet </li></ul></ul><ul><ul><li>Genesys </li></ul></ul>
    63. 64. <Insert Picture Here> More Information
    64. 65. More Information <ul><li>PeopleTools Strategy eMail </li></ul><ul><ul><li>[email_address] </li></ul></ul><ul><li>PeopleTools on Oracle Wiki </li></ul><ul><ul><li>http:// /page/PeopleSoft </li></ul></ul><ul><li>PeopleSoft discussion forums </li></ul><ul><ul><li>http:// =152 </li></ul></ul><ul><li>PeopleTools Blog landing page </li></ul><ul><ul><li>http:// </li></ul></ul><ul><li>Open Group Jericho Forum &quot;de-perimeterization&quot;: </li></ul><ul><ul><li>http://   </li></ul></ul><ul><li>Oracle's Critical patch Update </li></ul><ul><ul><li> </li></ul></ul>
    65. 66. Not getting Security and other Alerts? Go to OTN - Oracle Technology Network http:// Look at the upper right hand corner ( Account | Manage Subscriptions | Sign Out ) Make sure you're logged in, then Click on “ Manage Subscriptions ” Scroll down to “ Opt-in to Oracle Communications ” Check box for “ Oracle Security Alerts - Get the latest Security Alerts issued by Oracle as they become available ” ... and any other alert or newsletter you want to receive Scroll down to the end of the page and &quot; Confirm &quot;
    66. 67. More Information <ul><li>FMW Best Practice Center for Peoplesoft </li></ul><ul><ul><li> </li></ul></ul><ul><li>PeopleSoft Tools and technology </li></ul><ul><ul><li> </li></ul></ul><ul><li>PeopleSoft Technology Blog </li></ul><ul><ul><li> </li></ul></ul><ul><li>Fusion Middleware @ </li></ul><ul><ul><li>http:// /fusion </li></ul></ul><ul><li>Fusion Middleware @ OTN </li></ul><ul><ul><li>http:// /technology/products/middleware </li></ul></ul><ul><li>FAQ: Using PeopleSoft Enterprise with Oracle Technology Components </li></ul><ul><ul><li>http:// </li></ul></ul>
    67. 68. Additional Resources <ul><li>For more information about Oracle Applications </li></ul><ul><ul><ul><li> </li></ul></ul></ul><ul><li>For more information about Education </li></ul><ul><ul><ul><li>http:// </li></ul></ul></ul><ul><li>For more information about Support </li></ul><ul><ul><ul><li>http:// /support/ </li></ul></ul></ul><ul><li>For MetaLink information </li></ul><ul><ul><ul><li>https:// </li></ul></ul></ul><ul><li>For Oracle Product documentation : </li></ul><ul><ul><ul><li> </li></ul></ul></ul><ul><li>Certification Information </li></ul><ul><ul><li>Https:// </li></ul></ul><ul><li>Technical Updates </li></ul><ul><ul><li> </li></ul></ul>