Search Results

Search found 13599 results on 544 pages for 'patch management'.

Page 288/544 | < Previous Page | 284 285 286 287 288 289 290 291 292 293 294 295  | Next Page >

  • Data Source Security Part 2

    - by Steve Felts
    In Part 1, I introduced the default security behavior and listed the various options available to change that behavior.  One of the key topics to understand is the difference between directly using database user and password values versus mapping from WLS user and password to the associated database values.   The direct use of database credentials is relatively new to WLS, based on customer feedback.  Some of the trade-offs are covered in this article. Credential Mapping vs. Database Credentials Each WLS data source has a credential map that is a mechanism used to map a key, in this case a WLS user, to security credentials (user and password).  By default, when a user and password are specified when getting a connection, they are treated as credentials for a WLS user, validated, and are converted to a database user and password using a credential map associated with the data source.  If a matching entry is not found in the credential map for the data source, then the user and password associated with the data source definition are used.  Because of this defaulting mechanism, you should be careful what permissions are granted to the default user.  Alternatively, you can define an invalid default user to ensure that no one can accidentally get through (in this case, you would need to set the initial capacity for the pool to zero so that the pool is populated only by valid users). To create an entry in the credential map: 1) First create a WLS user.  In the administration console, go to Security realms, select your realm (e.g., myrealm), select Users, and select New.  2) Second, create the mapping.  In the administration console, go to Services, select Data sources, select your data source name, select Security, select Credentials, and select New.  See http://docs.oracle.com/cd/E24329_01/apirefs.1211/e24401/taskhelp/jdbc/jdbc_datasources/ConfigureCredentialMappingForADataSource.html for more information. The advantages of using the credential mapping are that: 1) You don’t hard-code the database user/password into a program or need to prompt for it in addition to the WLS user/password and 2) It provides a layer of abstraction between WLS security and database settings such that many WLS identities can be mapped to a smaller set of DB identities, thereby only requiring middle-tier configuration updates when WLS users are added/removed. You can cut down the number of users that have access to a data source to reduce the user maintenance overhead.  For example, suppose that a servlet has the one pre-defined, special WLS user/password for data source access, hard-wired in its code in a getConnection(user, password) call.  Every WebLogic user can reap the specific DBMS access coded into the servlet, but none has to have general access to the data source.  For instance, there may be a ‘Sales’ DBMS which needs to be protected from unauthorized eyes, but it contains some day-to-day data that everyone needs. The Sales data source is configured with restricted access and a servlet is built that hard-wires the specific data source access credentials in its connection request.  It uses that connection to deliver only the generally needed day-to-day information to any caller. The servlet cannot reveal any other data, and no WebLogic user can get any other access to the data source.  This is the approach that many large applications take and is the reasoning behind the default mapping behavior in WLS. The disadvantages of using the credential map are that: 1) It is difficult to manage (create, update, delete) with a large number of users; it is possible to use WLST scripts or a custom JMX client utility to manage credential map entries. 2) You can’t share a credential map between data sources so they must be duplicated. Some applications prefer not to use the credential map.  Instead, the credentials passed to getConnection(user, password) should be treated as database credentials and used to authenticate with the database for the connection, avoiding going through the credential map.  This is enabled by setting the “use-database-credentials” to true.  See http://docs.oracle.com/cd/E24329_01/apirefs.1211/e24401/taskhelp/jdbc/jdbc_datasources/ConfigureOracleParameters.html "Configure Oracle parameters" in Oracle WebLogic Server Administration Console Help. Use Database Credentials is not currently supported for Multi Data Source configurations.  When enabled, it turns off credential mapping on Generic and Active GridLink data sources for the following attributes: 1. identity-based-connection-pooling-enabled (this interaction is available by patch in 10.3.6.0). 2. oracle-proxy-session (this interaction is first available in 10.3.6.0). 3. set client identifier (this interaction is available by patch in 10.3.6.0).  Note that in the data source schema, the set client identifier feature is poorly named “credential-mapping-enabled”.  The documentation and the console refer to it as Set Client Identifier. To review the behavior of credential mapping and using database credentials: - If using the credential map, there needs to be a mapping for each WLS user to database user for those users that will have access to the database; otherwise the default user for the data source will be used.  If you always specify a user/password when getting a connection, you only need credential map entries for those specific users. - If using database credentials without specifying a user/password, the default user and password in the data source descriptor are always used.  If you specify a user/password when getting a connection, that user will be used for the credentials.  WLS users are not involved at all in the data source connection process.

    Read the article

  • Create a Monitoring Server for SQL Server with PowerShell

    At some point you are going to need a notification system for a range of events that occur in your servers. Laerte Junior shows how you can even set up temporary or permanent alerts for any WMI events to give you a system that fits your server environment perfectly. Get Smart with SQL Backup Pro Powerful centralised management, encryption and more.SQL Backup Pro was the smartest kid at school Discover why.

    Read the article

  • Windows 8 : réduction des redémarrages automatiques pour le service Windows Update

    Windows 8 : réduction des redémarrages automatiques après les mises à jour Mise à jour du 15/11/11 Windows 8 apportera une révision majeure du service Windows Update qui sera désormais moins intrusif, avec des redémarrages centralisés. Microsoft, sur le blog consacré à l'OS, présente les améliorations apportées au service Windows Update utilisé pour mettre à jour plus de 350 millions de PC sous Windows 7 et plus de 800 millions de dispositifs Windows en général, selon la firme. Avec Windows 8, les redémarrages pour les mises à jour seront effectués une seule fois au début de chaque mois, après la publication du Patch Tuesday qui survient le...

    Read the article

  • Multiple vulnerabilities in libexif

    - by Umang_D
    CVE DescriptionCVSSv2 Base ScoreComponentProduct and Resolution CVE-2012-2812 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 6.4 libexif Solaris 11 11/11 SRU 12.4 CVE-2012-2813 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 6.4 CVE-2012-2814 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 7.5 CVE-2012-2836 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability 6.4 CVE-2012-2837 Numeric Errors vulnerability 5.0 CVE-2012-2840 Numeric Errors vulnerability 7.5 CVE-2012-2841 Numeric Errors vulnerability 7.5 CVE-2012-2845 Numeric Errors vulnerability 6.4 This notification describes vulnerabilities fixed in third-party components that are included in Oracle's product distributions.Information about vulnerabilities affecting Oracle products can be found on Oracle Critical Patch Updates and Security Alerts page.

    Read the article

  • The Minimalist Approach to Content Governance - Manage Phase

    - by Kellsey Ruppel
    Originally posted by John Brunswick. Most people would probably agree that creating content is the enjoyable part of the content life cycle. Management, on the other hand, is generally not. This is why we thankfully have an opportunity to leverage meta data, security and other settings that have been applied or inherited in the prior parts of our governance process. In the interests of keeping this process pragmatic, there is little day to day activity that needs to happen here. Most of the activity that happens post creation will occur in the final "Retire" phase in which content may be archived or removed. The Manage Phase will focus on updating content and the meta data associated with it - specifically around ownership. Often times the largest issues with content ownership occur when a content creator leaves and organization or changes roles within an organization.   1. Update Content Ownership (as needed and on a quarterly basis) Why - Without updating content to reflect ownership changes it will be impossible to continue to meaningfully govern the content. How - Run reports against the meta data (creator and department to which the creator belongs) on content items for a particular user that may have left the organization or changed job roles. If the content is without and owner connect with the department marked as responsible. The content's ownership should be reassigned or if the content is no longer needed by that department for some reason it can be archived and or deleted. With a minimal investment it is possible to create reports that use an LDAP or Active Directory system to contrast all noted content owners versus the users that exist in the directory. The delta will indicate which content will need new ownership assigned. Impact - This implicitly keeps your repository and search collection clean. A very large percent of content that ends up no longer being useful to an organization falls into this category. This management phase (automated if possible) should be completed every quarter or as needed. The impact of actually following through with this phase is substantial and will provide end users with a better experience when browsing and searching for content.

    Read the article

  • Renaming a Published SQL Server Database

    I have transactional replication configured in production. I am wondering if we could rename the publication database in transactional replication without having to drop and recreate the replication set up. Also, is it possible to rename the database files of the publication database without affecting the replication configuration. Get Smart with SQL Backup Pro Powerful centralised management, encryption and more.SQL Backup Pro was the smartest kid at school Discover why.

    Read the article

  • Corticon provides Business Rules Engines for Silverlight, WCF and .NET developers

    Now Corticon Business Rules Engines and Business Rules Management Systems users can enjoy support for the Windows 7 operating system, and for Silverlight and Windows Communication Foundation developers. The new Corticon 4.3 provides numerous performance, usability, and integration enhancements and provides the industry-first cloud deployment option for a business rules engine. span.fullpost {display:none;}

    Read the article

  • Which VCS is efficient for storing small changes to big text files?

    - by MiguelM
    A government agency publishes a text file with thousands of records. The entire file is about 60MB. Every day the file has about 60 new or changed records. We need to validate some info against that file, and for auditing purposes, we may need to recover the file as it was in certain date. I thought I could use a VCS to store the file using git, but I understand git stores the entire text file gzipped, so the 60BM file will still need about 30MB to store everyday version. I wonder if one of the free VCS stores only diff/patch files.

    Read the article

  • Testez Bonita Open Solution 5.7, la solution française open-source de gestion des processus métier compte 1.5 millions de téléchargements

    Testez Bonita Open Solution 5.7, la nouvelle offre open-source de gestion des processus métier De la société française, qui fête son troisième anniversaire A l'occasion de son troisième anniversaire,BonitaSoft, l'éditeur informatique leader dans la gestion des processus métier (business process management ou BPM), a sorti Bonita Open Solution 5.7. Cette nouvelle version propose l'accès à un service de support qui revendique une qualité professionnelle avec une couverture mondiale qui « garantit de recevoir une réponse à un problème dans un délai allant jusqu'à deux heures en fonction du niveau de support choisi ».

    Read the article

  • Google I/O Sandbox Case Study: Assistly

    Google I/O Sandbox Case Study: Assistly We interviewed Assistly at the Google I/O Sandbox on May 11, 2011. They explained to us the benefits of building on Google Apps. Assistly is a customer management system that helps companies deliver top-quality customer service. For more information about developing with Google Apps, visit: code.google.com For more information on Assistly, visit: www.assistly.com From: GoogleDevelopers Views: 21 0 ratings Time: 01:29 More in Science & Technology

    Read the article

  • Technical webcast next week

    - by Javier Puerta
    Three technical webcast will be delivered next week: Oracle Enterprise Manager 12c Automated Agent Deployment -  November 29, 17:00 CET Perform a Zero Downtime Upgrade to Oracle Enterprise Manager 12c - November 30 17 CET Oracle Enterprise Manager Ops Center: Global Systems Management Made Easy (Replay) - December 1, 19:00 CET  Go here to register and check the full list of live and on-demand sessions.

    Read the article

  • Mac theme for Firefox

    - by Anirudha
    Originally posted on: http://geekswithblogs.net/anirugu/archive/2013/10/19/mac-theme-for-firefox.aspxFrom a long time There is a theme for Firefox that is called MacOSX Theme This is used for make Firefox appearance like Mac. The bad news about this add-ons is that this plugin doesn’t maintain as good as it should be. Now this add-ons theme doesn’t work current Firefox. Don’t worry. You can got it f1beta.com/macosx_theme_firefox_4-1.8.1-fx.xpi  Note:-  This plugin is work of https://addons.mozilla.org/en-US/firefox/user/golf-at/ and found online https://addons.mozilla.org/en-US/firefox/addon/macosx-theme-firefox-4/?src=api I just patch it for people who have problem with installing it on latest Firefox. You can still use This theme from original site with this hack https://addons.mozilla.org/en-US/firefox/addon/checkcompatibility/ this plugin make the unsupported plugin worked.

    Read the article

  • Applications Unlimited and Siebel 8.0

    Scott Nash,Vice President, Product management updates listeners on the success of the Siebel 8.0 release, the customer momentum, how Oracle continues to invest in the Siebel product line and what's new for Siebel and CRM.

    Read the article

  • Oracle Magazine, September/October 2009

    Oracle Magazine September/October features articles on benefits of Oracle Fusion Middleware 11g, Oracle's database security and identity management solutions, Oracle OpenWorld preview, easily move application data with Oracle Data Integrator, scripting Oracle RMAN commands, Tom Kyte answers your questions, debugging with Oracle Application Development Framework, array binding, best PL/SQL practices, Oracle Application Express and Amazon EC2, Oracle WebCenter for integrating applications and much more.

    Read the article

  • Qualcomm Receives Value from Fusion Technologies

    Qualcomm's CIO, Norm Fjeldheim, tells listeners how his company is preparing for IT growth, how using Fusion technologies like SOA is cutting development costs, and how Oracle's Identity Management solution is improving security. Fjeldheim also discusses his thoughts around Fusion applications.

    Read the article

  • Achieve Spatial Data Support in SSIS

    Overview SQL Server 2008 introduced a new category of datatypes known as spatial datatypes which stores spatial information. The new spatial datatypes are geography and geometry. SQL Server Management Studio comes with good good support for these spatial data ... [Read Full Article]

    Read the article

  • Architecture Guide: ASP.NET MVC + N-tier + Entity Framework and Many More

    If you want to use ASP.NET MVC but is strugling to get things arrange to confidently use for your next business project. This Article is just for you. The article guide you to use ASP.NET MVC to architect a small Document Management System....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Bin Packing Problems: The SQL

    The 'bin packing' problem isn't just a fascination for computer scientists, but comes up in a whole range of real-world applications. It isn't that easy to come up with a practical, set oriented solution in SQL that gives a near-optimal result. Get smart with SQL Backup ProPowerful centralised management, encryption and more.SQL Backup Pro was the smartest kid at school. Discover why.

    Read the article

  • Magic Quadrant for x86 Server Virtualization Infrastructure

    - by Cinzia Mascanzoni
    The 2012 Gartner MQ for x86 Server Virtualization has just published.  KEY TAKEAWAYS - Oracle is in the “Challengers” quadrant. - This is a significant “jump” above the x-axis (from the “Niche” quadrant) during previous years - The move into the “Challengers” quadrant was possible for 3 primary reasons - 1) strength of the Oracle VM 3.0 release - 2) integrated management capabilities - 3) solid customer momentum during past year - Gartner even specifically states that Oracle VM use is growing amongst VMware customers Read the full report here.

    Read the article

  • Microsoft Visual Studio 2010: Turn Ideas into Solutions

    Explore upcoming webcasts on Microsoft Visual Studio 2010 as we explain how the development system can help you simplify the entire development process and deliver better applications. Learn about Visual Studio Team Foundation Server code management tasks, creating rich user experiences with Microsoft Silverlight, debugging features and capabilities, and working with Microsoft SharePoint Server 2010....Did you know that DotNetSlackers also publishes .net articles written by top known .net Authors? We already have over 80 articles in several categories including Silverlight. Take a look: here.

    Read the article

  • Best Free and Open Source CRM Software

    <b>Tech Source: </b>"If you happen to own a business and are looking for CRM applications, I have here a list of some of the most well-known free and open-source customer relationship management (CRM) software available today."

    Read the article

  • Unable to install applications (Oneiric)

    - by yayu
    When I use the software center to install something, I get the error: An unhandlable error occured There seems to be a programming error in aptdaemon, the software that allows you to install/remove software and to perform other package management related tasks on using the command line: $sudo apt-get install <something> E: dpkg was interrupted, you must manually run 'sudo dpkg --configure -a' to correct the problem. I am unable to install anything. How do we fix this?

    Read the article

  • Installing VMware Worstation/Player 8.0.4 on Ubuntu 12.10 fails to load with Unable to start services

    - by user106986
    I have been attempting to install this application for a few weeks without any success. I have installed and uninstalled the application and pathes with no change. I have even tried to load a VM in Virtualbox and install the application there to a base install of Ubuntu 12.10 and it still did not install. I have downloaded the patch and modified it to reflect the version of VMware Worstation and Player I am installing. I still receive the same error I saw in the first attempt to install the software. Which leads me to think that I am missing something. The error is: Unable to start services. See log file /tmp/vmware-root/modconfig-7674.log for details. I have the output of the log file if that will help. According to the dialogue box Virtual Network Device and VMware Blocking Filesystem fail to either load or execute. Any help would be greatly appreciated.

    Read the article

< Previous Page | 284 285 286 287 288 289 290 291 292 293 294 295  | Next Page >