What is a firewall? What is a demilitarized zone DMZ?
13.10 Frequently asked questions about security
This section contains common security questions and answers. 13.10.1 What is a firewall? A firewall is one system or a group of several systems put in place to enforce a security policy between the Internet and an organizations network. In other words, a firewall is an electronic ‘fence’ around a network to protect it from unauthorized access. 13-26 Oracle Fusion Middleware Configuration Guide for Oracle Business Intelligence Discoverer Figure 13–3 A typical Internet connection with a Client-side and Server-side firewall Typically, an organization using a Web Server machine that communicates across the Internet has a firewall between its Oracle HTTP Server machine and the Internet. This is known as a Server-side firewall. Other organizations or remote parts of the same organization connecting to this Web Server machine typically have their own firewall, known as a Client-side firewall. Information that conforms to the organizations firewall policy is allowed to pass through the firewalls enabling server machines and client machines to communicate. 13.10.2 What is a demilitarized zone DMZ? A demilitarized zone DMZ is a firewall configuration that provides an additional level of security. In this configuration, the DMZ is an extra network placed between a protected network and the Internet. Resources residing within the DMZ are visible on the public Internet, but are secure. DMZs typically hold servers that host a companys public Web site, File Transfer Protocol FTP site, and Simple Mail Transfer Protocol SMTP server. Figure 13–4 A Demilitarized Zone DMZ Firewall policies vary across organization and there are a wide variety of bespoke and off-the-shelf firewall packages in use. A good firewall configuration assumes that resources in the DMZ will be breached, and if this happens, the firewall should minimize damage to the internal network and any sensitive data residing on the network. This involves two steps: ■ Move sensitive private resources at a minimum, databases and application logic from the DMZ to the internal network behind the internal firewall ■ Restrict access to sensitive private resources from the DMZ itself, and from internal networks Maintaining Security with Oracle BI Discoverer 13-27 13.10.3 What is HTTPS and why should I use it?Parts
» Oracle Fusion Middleware Online Documentation Library
» What is Oracle BI Discoverer?
» About Discoverer installations that are associated with Oracle Internet Directory and schemas
» How to confirm an Oracle BI Discoverer installation
» About connecting to Discoverer What is the Oracle BI Discoverer architecture?
» About the Discoverer Java EE applications
» About the Discoverer CORBA components
» About the Discoverer database tier Oracle BI Discoverer Navigation
» Display Trusted Certificates from the Certificate type drop down list if it is not Click Apply.
» About running Discoverer Plus over HTTP for the first time on a client machine
» How to start Discoverer Plus
» How to modify the URL that starts Discoverer
» What are the types of Discoverer connections?
» How to create public connections
» What happens when you start Discoverer servlets? What happens when you stop Discoverer servlets?
» What happens when you enable and disable Discoverer client-tier components
» What is the Discoverer Catalog? What is the OLAP Catalog?
» Characteristics of the folder structure of the Discoverer Catalog? Folders in the structure
» Types of privileges for objects and folders Managing privileges as the D4OSYS user
» Go to the Fusion Middleware Control Discoverer Home page.
» Customizing the look and feel of Discoverer Plus OLAP Information to be provided to end users
» Forms of output from the utility Description of output from the utility
» URL parameters for the Discoverer Plus OLAP
» Discoverer topology with a single instance Discoverer topology with multiple instances
» About providing load balancing
» About using Fusion Middleware Control to manage multiple machines
» What are the benefits of Oracle Web Cache? How does Oracle Web Cache work?
» In the Components area, click Discoverer Viewer in the Name column. Click Customize.
» How to improve Discoverer performance by using worksheets and page items appropriately
» How to set the log level for Discoverer component loggers How to copy Discoverer log files
» List of URL parameters specific to Discoverer Plus
» List of URL parameters specific to Discoverer Viewer
» About Discoverer and security
» About Discoverer and the Oracle Applications security model
» Configuring End-to-End Secure Sockets Layer for Discoverer
» Using Discoverer with Oracle Single Sign-On
» Using Discoverer with Oracle Access Manager
» Introducing Virtual Private Databases, Single Sign-On, and Discoverer
» Example for using GUID or SSO user name to limit Discoverer data
» How to use the eul_triggerpost_login trigger
» What is a firewall? What is a demilitarized zone DMZ?
» What is HTTPS and why should I use it? How do I configure Discoverer to work in an intranet
» About Discoverer connections and Oracle e-Business Suite
Show more