SlideShare a Scribd company logo
1 of 3
All about Oracle Security Developer Tools

If I talk about, Oracle Security Developer Tools i.e. OSDT the foremost thing which come into my mind is
set of java libraries (JARs) used by developers to secure the enterprise applications. It is one of the SDKs
(Software Development Kits) for building up Oracle Platform Security Services (OPSS) and to manage and
identify the services, etc. It is delivered as a set of Java libraries that ship with Oracle Application Server
and JDeveloper.

Security tools are always treated as critical components for the application development project. The
commercial necessities and government regulations convey that sensitive data that need to be kept
confidential and protected from being altered. It comes with the cryptographic building blocks which are
necessary for basic responsibilitiese.g. secure messaging to more complicated projects such as securely
implementing a service-oriented architecture.

OSDT architecture




Image reference: “http://www.oracle.com/technetwork/testcontent/osdt-133323.pdf”
So what are the business benefits using it?

        Standards-compliant (i.e. Conformance and Validation)–It enables greater control over
        document display. In this, Java, XML are available.
        It is certified with Oracle’s Crypto Engine FIPS 140-2 Level 1 certification.
        It is extensible–i.e. Modular architecture, portable, scalable, easily integrated with enterprise
        applications.
        It is used by several other Oracle products
        It is installed at hundreds of customer sites worldwide since 1996
        Interoperable–Interoperability is the key toward preceding the use of IM in the workplace.
        OASIS / W3C / LAP events are included in it.
        It is readily available i.e. The OSDT JARs are installed with the Oracle Application Server in
        ORACLE_HOME (OC4J and WebLogic Server)

OSDT is part of Oracle Platform Security Services (OPSS), which provides an abstraction layer in the form
of standards-based APIs that separate the developers from security and identity management of
implementation details. OSDT APIs are –

    1. Oracle Crypto – It is a pure Java library that offers fundamental cryptography algorithms,
        including those directed by the National Institute of Standards and Technology (NIST) in their
        FIPS publications.
    2. Oracle Security Engine–It extends Oracle Crypto by offering X.509 based certificate
        management functions. This component is a superset of Oracle Crypto.
    3. Oracle CMS–It implements the IETF Cryptographic Message Syntax (CMS) protocol. CMS defines
        data protection schemes that allow for secure message envelopes.
    4. Oracle XML–In this, security implements the W3C specifications for XML Encryption and XML
        Signature.
    5. Oracle S/MIME – It implements the IETF S/MIME (Secure/Multipurpose Mail Extensions)
        specifications for secure email.
    6. Oracle PKI SDK – It implements the security protocols that are necessary within Public Key
        Infrastructure implementations (LDAP, OCSP, TSP, and CMP).
    7. Oracle Web Services– It provides security to a framework for authentication and authorization
        using existing security technologies as outlined in the OASIS specification for Web Services
        Security.
    8. Oracle Liberty SDK– It implements the Liberty Alliance Project specifications enabling federated
        single sign-on between third-party Liberty-compliant applications.
    9. Oracle SAML– It provides a framework for the exchange of security credentials amongst
        disparate systems and applications in an XML based format as outlined in the OASIS
        specification for the Security Assertions Mark-up Language.
    10. Oracle XKMS – It implements the W3C XKMS 2.0 specification providing PKI integration
        capabilities with Web Services.
You can find more information about this on the oracle websites or refer to the link –
“http://docs.oracle.com/cd/B14099_19/idmanage.1012/b15975/intro.htm” They have their dedicated
documents and articles on specific products and services.

More Related Content

What's hot

Assessing security of your Active Directory
Assessing security of your Active DirectoryAssessing security of your Active Directory
Assessing security of your Active DirectoryAldo Elam Majiah
 
Kubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production EnvironmentKubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production EnvironmentAkeyless
 
The identity of things & the smart cities of tomorrow webinar may 2015
The identity of things & the smart cities of tomorrow webinar may 2015The identity of things & the smart cities of tomorrow webinar may 2015
The identity of things & the smart cities of tomorrow webinar may 2015ForgeRock
 
Active Directory & LDAP | Security for Elasticsearch
Active Directory & LDAP | Security for ElasticsearchActive Directory & LDAP | Security for Elasticsearch
Active Directory & LDAP | Security for ElasticsearchJochen Kressin
 
Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017Maximiliano Accotto
 
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Mike Schwartz
 
IBM Secret Key management protoco
IBM Secret Key management protocoIBM Secret Key management protoco
IBM Secret Key management protocogori4
 
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They KeyOAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They KeyMike Schwartz
 
Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cSecurity Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cTroy Kitch
 
The Key to Strong Cloud Security
The Key to Strong Cloud SecurityThe Key to Strong Cloud Security
The Key to Strong Cloud SecurityAkeyless
 
Kubernetes Secrets - The Good, The Bad, and The Ugly - Akeyless
Kubernetes Secrets -  The Good, The Bad, and The Ugly - AkeylessKubernetes Secrets -  The Good, The Bad, and The Ugly - Akeyless
Kubernetes Secrets - The Good, The Bad, and The Ugly - AkeylessAkeyless
 
Top 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 seriesTop 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 seriesIT Tech
 
Automate threat detections and avoid false positives
  Automate threat detections and avoid false positives  Automate threat detections and avoid false positives
Automate threat detections and avoid false positivesElasticsearch
 
Oracle 11g security - 2014
Oracle 11g security - 2014Oracle 11g security - 2014
Oracle 11g security - 2014Connor McDonald
 
SharePoint and Office 365 Security Tool - SysKit Security Manager
SharePoint and Office 365 Security Tool - SysKit Security ManagerSharePoint and Office 365 Security Tool - SysKit Security Manager
SharePoint and Office 365 Security Tool - SysKit Security ManagerSysKit Ltd
 
Palestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic SecurityPalestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic SecurityElasticsearch
 
Oscar Cabanillas - Elastic - OSL19
Oscar Cabanillas - Elastic - OSL19Oscar Cabanillas - Elastic - OSL19
Oscar Cabanillas - Elastic - OSL19marketingsyone
 

What's hot (19)

Oracle Database Vault
Oracle Database VaultOracle Database Vault
Oracle Database Vault
 
Assessing security of your Active Directory
Assessing security of your Active DirectoryAssessing security of your Active Directory
Assessing security of your Active Directory
 
Kubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production EnvironmentKubernetes Secrets Management - Securing Your Production Environment
Kubernetes Secrets Management - Securing Your Production Environment
 
The identity of things & the smart cities of tomorrow webinar may 2015
The identity of things & the smart cities of tomorrow webinar may 2015The identity of things & the smart cities of tomorrow webinar may 2015
The identity of things & the smart cities of tomorrow webinar may 2015
 
Active Directory & LDAP | Security for Elasticsearch
Active Directory & LDAP | Security for ElasticsearchActive Directory & LDAP | Security for Elasticsearch
Active Directory & LDAP | Security for Elasticsearch
 
Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017Seguridad en sql server 2016 y 2017
Seguridad en sql server 2016 y 2017
 
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
Trust Elevation: Implementing an OAuth2 Infrastructure using OpenID Connect &...
 
Certificates
CertificatesCertificates
Certificates
 
IBM Secret Key management protoco
IBM Secret Key management protocoIBM Secret Key management protoco
IBM Secret Key management protoco
 
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They KeyOAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
OAuth2 for IoT Security: Why OpenID Connect & UMA Are They Key
 
Security Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12cSecurity Inside Out: Latest Innovations in Oracle Database 12c
Security Inside Out: Latest Innovations in Oracle Database 12c
 
The Key to Strong Cloud Security
The Key to Strong Cloud SecurityThe Key to Strong Cloud Security
The Key to Strong Cloud Security
 
Kubernetes Secrets - The Good, The Bad, and The Ugly - Akeyless
Kubernetes Secrets -  The Good, The Bad, and The Ugly - AkeylessKubernetes Secrets -  The Good, The Bad, and The Ugly - Akeyless
Kubernetes Secrets - The Good, The Bad, and The Ugly - Akeyless
 
Top 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 seriesTop 5 reasons to purchase cisco asa 5500 series
Top 5 reasons to purchase cisco asa 5500 series
 
Automate threat detections and avoid false positives
  Automate threat detections and avoid false positives  Automate threat detections and avoid false positives
Automate threat detections and avoid false positives
 
Oracle 11g security - 2014
Oracle 11g security - 2014Oracle 11g security - 2014
Oracle 11g security - 2014
 
SharePoint and Office 365 Security Tool - SysKit Security Manager
SharePoint and Office 365 Security Tool - SysKit Security ManagerSharePoint and Office 365 Security Tool - SysKit Security Manager
SharePoint and Office 365 Security Tool - SysKit Security Manager
 
Palestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic SecurityPalestra de abertura: Evolução e visão do Elastic Security
Palestra de abertura: Evolução e visão do Elastic Security
 
Oscar Cabanillas - Elastic - OSL19
Oscar Cabanillas - Elastic - OSL19Oscar Cabanillas - Elastic - OSL19
Oscar Cabanillas - Elastic - OSL19
 

Viewers also liked

aPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaperaPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaperChris Reese
 
Journey to a Model-based Approach
Journey to a Model-based ApproachJourney to a Model-based Approach
Journey to a Model-based ApproachMatthew Loew
 
Meadow Valley Wash Drop Structure
Meadow Valley Wash Drop StructureMeadow Valley Wash Drop Structure
Meadow Valley Wash Drop Structureslides4luke
 
aPersona-aMFA-wPatternsOfBehaviorTech-v8_5
aPersona-aMFA-wPatternsOfBehaviorTech-v8_5aPersona-aMFA-wPatternsOfBehaviorTech-v8_5
aPersona-aMFA-wPatternsOfBehaviorTech-v8_5Chris Reese
 
MEDICOS RESIDENTES DE ORTOPEDIA Y TRAMAUTOLOGÍA.
MEDICOS RESIDENTES DE ORTOPEDIA Y TRAMAUTOLOGÍA.MEDICOS RESIDENTES DE ORTOPEDIA Y TRAMAUTOLOGÍA.
MEDICOS RESIDENTES DE ORTOPEDIA Y TRAMAUTOLOGÍA.Enseñanza Medica
 
Manual de reanimacion neonatal
Manual de reanimacion neonatalManual de reanimacion neonatal
Manual de reanimacion neonatalEnseñanza Medica
 
GLOBAL POSITIONING SYSTEM(GPS)
GLOBAL POSITIONING SYSTEM(GPS)GLOBAL POSITIONING SYSTEM(GPS)
GLOBAL POSITIONING SYSTEM(GPS)Pratik Patil
 
Finite state machine based vending machine IEEE Paper
Finite state machine based vending machine IEEE PaperFinite state machine based vending machine IEEE Paper
Finite state machine based vending machine IEEE PaperPratik Patil
 
Seminar Presentation on FSM based vending machine
Seminar Presentation on FSM based vending machine Seminar Presentation on FSM based vending machine
Seminar Presentation on FSM based vending machine Pratik Patil
 
HDL Implementation of Vending Machine Report with Verilog Code
HDL Implementation of Vending Machine Report with Verilog CodeHDL Implementation of Vending Machine Report with Verilog Code
HDL Implementation of Vending Machine Report with Verilog CodePratik Patil
 
Nuclear Battery Seminar Report
Nuclear Battery Seminar ReportNuclear Battery Seminar Report
Nuclear Battery Seminar ReportPratik Patil
 
Seminar presentation on nuclear batteries
Seminar presentation on nuclear batteriesSeminar presentation on nuclear batteries
Seminar presentation on nuclear batteriesPratik Patil
 

Viewers also liked (14)

aPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaperaPersona_EHR_Challenge_WhitePaper
aPersona_EHR_Challenge_WhitePaper
 
Fast moving
Fast movingFast moving
Fast moving
 
Journey to a Model-based Approach
Journey to a Model-based ApproachJourney to a Model-based Approach
Journey to a Model-based Approach
 
Social
SocialSocial
Social
 
Meadow Valley Wash Drop Structure
Meadow Valley Wash Drop StructureMeadow Valley Wash Drop Structure
Meadow Valley Wash Drop Structure
 
aPersona-aMFA-wPatternsOfBehaviorTech-v8_5
aPersona-aMFA-wPatternsOfBehaviorTech-v8_5aPersona-aMFA-wPatternsOfBehaviorTech-v8_5
aPersona-aMFA-wPatternsOfBehaviorTech-v8_5
 
MEDICOS RESIDENTES DE ORTOPEDIA Y TRAMAUTOLOGÍA.
MEDICOS RESIDENTES DE ORTOPEDIA Y TRAMAUTOLOGÍA.MEDICOS RESIDENTES DE ORTOPEDIA Y TRAMAUTOLOGÍA.
MEDICOS RESIDENTES DE ORTOPEDIA Y TRAMAUTOLOGÍA.
 
Manual de reanimacion neonatal
Manual de reanimacion neonatalManual de reanimacion neonatal
Manual de reanimacion neonatal
 
GLOBAL POSITIONING SYSTEM(GPS)
GLOBAL POSITIONING SYSTEM(GPS)GLOBAL POSITIONING SYSTEM(GPS)
GLOBAL POSITIONING SYSTEM(GPS)
 
Finite state machine based vending machine IEEE Paper
Finite state machine based vending machine IEEE PaperFinite state machine based vending machine IEEE Paper
Finite state machine based vending machine IEEE Paper
 
Seminar Presentation on FSM based vending machine
Seminar Presentation on FSM based vending machine Seminar Presentation on FSM based vending machine
Seminar Presentation on FSM based vending machine
 
HDL Implementation of Vending Machine Report with Verilog Code
HDL Implementation of Vending Machine Report with Verilog CodeHDL Implementation of Vending Machine Report with Verilog Code
HDL Implementation of Vending Machine Report with Verilog Code
 
Nuclear Battery Seminar Report
Nuclear Battery Seminar ReportNuclear Battery Seminar Report
Nuclear Battery Seminar Report
 
Seminar presentation on nuclear batteries
Seminar presentation on nuclear batteriesSeminar presentation on nuclear batteries
Seminar presentation on nuclear batteries
 

Similar to All about Oracle Security Developer Tools

Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
Presentation on Oracle Application Server
Presentation on  Oracle Application Server Presentation on  Oracle Application Server
Presentation on Oracle Application Server Muthoot finance Ltd
 
Embedding Oracle Weblogic Server 1871199
Embedding Oracle Weblogic Server 1871199Embedding Oracle Weblogic Server 1871199
Embedding Oracle Weblogic Server 1871199cwspeaks
 
Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsGregOracle
 
CamelOne 2013 Karaf A-MQ Camel CXF Security
CamelOne 2013 Karaf A-MQ Camel CXF SecurityCamelOne 2013 Karaf A-MQ Camel CXF Security
CamelOne 2013 Karaf A-MQ Camel CXF SecurityKenneth Peeples
 
Lucw lsec-securit-20110907-4-final-5
Lucw lsec-securit-20110907-4-final-5Lucw lsec-securit-20110907-4-final-5
Lucw lsec-securit-20110907-4-final-5Luc Wijns
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity featuresAnil Pandey
 
Oracle9i application server release 2
Oracle9i application server release 2 Oracle9i application server release 2
Oracle9i application server release 2 FITSFSd
 
Procurement Exchange - Our underlying technology
Procurement Exchange - Our underlying technologyProcurement Exchange - Our underlying technology
Procurement Exchange - Our underlying technologyGlenn Turley
 
How Oracle Mobile Cloud and Oracle MAF can Acccelerate Mobile Application Dev...
How Oracle Mobile Cloud and Oracle MAF can Acccelerate Mobile Application Dev...How Oracle Mobile Cloud and Oracle MAF can Acccelerate Mobile Application Dev...
How Oracle Mobile Cloud and Oracle MAF can Acccelerate Mobile Application Dev...RapidValue
 
High Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyHigh Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyRamesh Nagappan
 
Weblogic Cluster Security
Weblogic Cluster SecurityWeblogic Cluster Security
Weblogic Cluster SecurityAditya Bhuyan
 
Introduction Java Web Framework and Web Server.
Introduction Java Web Framework and Web Server.Introduction Java Web Framework and Web Server.
Introduction Java Web Framework and Web Server.suranisaunak
 
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...RapidValue
 

Similar to All about Oracle Security Developer Tools (20)

Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Presentation on Oracle Application Server
Presentation on  Oracle Application Server Presentation on  Oracle Application Server
Presentation on Oracle Application Server
 
Sql intro
Sql introSql intro
Sql intro
 
Embedding Oracle Weblogic Server 1871199
Embedding Oracle Weblogic Server 1871199Embedding Oracle Weblogic Server 1871199
Embedding Oracle Weblogic Server 1871199
 
Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered Systems
 
Oim Poc1.0
Oim Poc1.0Oim Poc1.0
Oim Poc1.0
 
CamelOne 2013 Karaf A-MQ Camel CXF Security
CamelOne 2013 Karaf A-MQ Camel CXF SecurityCamelOne 2013 Karaf A-MQ Camel CXF Security
CamelOne 2013 Karaf A-MQ Camel CXF Security
 
Lucw lsec-securit-20110907-4-final-5
Lucw lsec-securit-20110907-4-final-5Lucw lsec-securit-20110907-4-final-5
Lucw lsec-securit-20110907-4-final-5
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity features
 
Sso & rman
Sso & rmanSso & rman
Sso & rman
 
Oracle9i application server release 2
Oracle9i application server release 2 Oracle9i application server release 2
Oracle9i application server release 2
 
Procurement Exchange - Our underlying technology
Procurement Exchange - Our underlying technologyProcurement Exchange - Our underlying technology
Procurement Exchange - Our underlying technology
 
How Oracle Mobile Cloud and Oracle MAF can Acccelerate Mobile Application Dev...
How Oracle Mobile Cloud and Oracle MAF can Acccelerate Mobile Application Dev...How Oracle Mobile Cloud and Oracle MAF can Acccelerate Mobile Application Dev...
How Oracle Mobile Cloud and Oracle MAF can Acccelerate Mobile Application Dev...
 
Java Security Framework's
Java Security Framework'sJava Security Framework's
Java Security Framework's
 
High Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted CryptographyHigh Performance Security With SPARC T4 Hardware Assisted Cryptography
High Performance Security With SPARC T4 Hardware Assisted Cryptography
 
Top 10 reasons to adopt cloud
Top 10 reasons to adopt cloudTop 10 reasons to adopt cloud
Top 10 reasons to adopt cloud
 
Weblogic security
Weblogic securityWeblogic security
Weblogic security
 
Weblogic Cluster Security
Weblogic Cluster SecurityWeblogic Cluster Security
Weblogic Cluster Security
 
Introduction Java Web Framework and Web Server.
Introduction Java Web Framework and Web Server.Introduction Java Web Framework and Web Server.
Introduction Java Web Framework and Web Server.
 
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development - ...
 

Recently uploaded

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 

Recently uploaded (20)

Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 

All about Oracle Security Developer Tools

  • 1. All about Oracle Security Developer Tools If I talk about, Oracle Security Developer Tools i.e. OSDT the foremost thing which come into my mind is set of java libraries (JARs) used by developers to secure the enterprise applications. It is one of the SDKs (Software Development Kits) for building up Oracle Platform Security Services (OPSS) and to manage and identify the services, etc. It is delivered as a set of Java libraries that ship with Oracle Application Server and JDeveloper. Security tools are always treated as critical components for the application development project. The commercial necessities and government regulations convey that sensitive data that need to be kept confidential and protected from being altered. It comes with the cryptographic building blocks which are necessary for basic responsibilitiese.g. secure messaging to more complicated projects such as securely implementing a service-oriented architecture. OSDT architecture Image reference: “http://www.oracle.com/technetwork/testcontent/osdt-133323.pdf”
  • 2. So what are the business benefits using it? Standards-compliant (i.e. Conformance and Validation)–It enables greater control over document display. In this, Java, XML are available. It is certified with Oracle’s Crypto Engine FIPS 140-2 Level 1 certification. It is extensible–i.e. Modular architecture, portable, scalable, easily integrated with enterprise applications. It is used by several other Oracle products It is installed at hundreds of customer sites worldwide since 1996 Interoperable–Interoperability is the key toward preceding the use of IM in the workplace. OASIS / W3C / LAP events are included in it. It is readily available i.e. The OSDT JARs are installed with the Oracle Application Server in ORACLE_HOME (OC4J and WebLogic Server) OSDT is part of Oracle Platform Security Services (OPSS), which provides an abstraction layer in the form of standards-based APIs that separate the developers from security and identity management of implementation details. OSDT APIs are – 1. Oracle Crypto – It is a pure Java library that offers fundamental cryptography algorithms, including those directed by the National Institute of Standards and Technology (NIST) in their FIPS publications. 2. Oracle Security Engine–It extends Oracle Crypto by offering X.509 based certificate management functions. This component is a superset of Oracle Crypto. 3. Oracle CMS–It implements the IETF Cryptographic Message Syntax (CMS) protocol. CMS defines data protection schemes that allow for secure message envelopes. 4. Oracle XML–In this, security implements the W3C specifications for XML Encryption and XML Signature. 5. Oracle S/MIME – It implements the IETF S/MIME (Secure/Multipurpose Mail Extensions) specifications for secure email. 6. Oracle PKI SDK – It implements the security protocols that are necessary within Public Key Infrastructure implementations (LDAP, OCSP, TSP, and CMP). 7. Oracle Web Services– It provides security to a framework for authentication and authorization using existing security technologies as outlined in the OASIS specification for Web Services Security. 8. Oracle Liberty SDK– It implements the Liberty Alliance Project specifications enabling federated single sign-on between third-party Liberty-compliant applications. 9. Oracle SAML– It provides a framework for the exchange of security credentials amongst disparate systems and applications in an XML based format as outlined in the OASIS specification for the Security Assertions Mark-up Language. 10. Oracle XKMS – It implements the W3C XKMS 2.0 specification providing PKI integration capabilities with Web Services.
  • 3. You can find more information about this on the oracle websites or refer to the link – “http://docs.oracle.com/cd/B14099_19/idmanage.1012/b15975/intro.htm” They have their dedicated documents and articles on specific products and services.