This is a text description of asoag038.gif, an image which shows the Oracle Security Architecture and where Enterprise User Security fits in. The image depicts three layers as follows:
The Application Security layer is at the top and it includes the following elements:
- Third-Party Applications, which provide Authorization and Auditing
- Oracle E-Business Suite, which provides Responsibilities and Roles
- Oracle Collaboration Suite, which provides S-MIME (secure e-mail), Interpersonal Rights, and File Privileges
- OracleAS Portal and OracleAS Wireless, which provide Roles and Privilege Groups
The Oracle Platform Security layer is in the middle and it includes the following elements:
- Oracle Application Server, which provides JAAS Roles, Web Services Security, and Java 2 Permissions
- Oracle Database, which provides Enterprise User Security, Virtual Private Database, Encryption, and Label Security
The Oracle Identity Management Infrastructure layer is on the bottom and it includes the following elements:
- OracleAS Certificate Authority
- Oracle Delegated Administration Services
- OracleAS Single Sign-On
- Oracle Directory Integration Service
- Oracle Internet Directory (which is at the very bottom, signifying that all the other identity management elements use the directory as their foundation)
The Oracle Identity Management Infrastructure communicates with External Security Services, which are located adjacent to the infrastructure to signify that the external services are at the same layer. External Security Services include the following elements:
- Access Management
- Directory Services
- Provisioning Services