Best way to secure RIDC connection?

Hi All,
I need you inputs on the best way to secure RIDC connection. RIDC supports the following:
1. Intradoc - Use Socket SSL.
2. JAX- WS. -
3. HTTP - Using Apache HttpClient package. This is not preferred as we don't have an environment that will support WNA.
I am more interested in knowing the which of the options is better (1 or 2) and reasons for it.
Thanks,
SP

Thanks Yannick for your reply. For the same reason we have choose to use RIDC over SSL.
I got the configuration working programatically (following the developers guide) but if I try to create a connection of type 'socketssl' i get the following error which i posted in another thread.
Unable to Create a Content Repository Connection using 'socketssl'
It would be very helpful if you could let me know if I'm doing something wrong here. I'm using Jdeveloper 11.1.1.5.0.
Thanks,
Manjunath
Edited by: 890922 on 31/10/2011 19:43

Similar Messages

  • What is the best way to secure and harden a Macbook Pro against unwanted surveillance?

    What is the best way to secure and harden a Macbook Pro against unwanted surveillance? Tor, VPN, Little Snitch, etc. This would be for that latest version of Mavericks.

    djbabybokchoy wrote:
    Nothing specific, just speaking in general. Ex-wives, governments, bad guys...anyone really. I'm just looking to make my Mac a bit more private and secure, especially when on public networks.
    Governments and ex's will/may have recourse to the legal process (or in the case of the Gov they can choose to ignore the legal system if they feel like it) when they want to see something of yours, good luck hardening your Mac against that. The best way to avoid the possibility of snooping over public networks is to avoid them but if you can't then Kappy's suggestion will help.
    Strong passwords (everywhere) and don't use the same password in multiple locations.
    If you really want to secure your home wireless use Mac address connection authentication, do not allow unknown Mac addresses to connect. It's much stronger than a WPA password alone.

  • Best way to secure Aironet 1200 for small office

    We are getting ready to install 4 aironet 1200 AP's into an office that will only be used by 5 people with T43 Thinkpads (Intel 2200 built-in card).
    What is the best method to secure the connection and prevent the outside world from accessing our internal network?
    I don't feel WEP/WPA encryption is enough -- Would be interested in using the built in security that comes with the Aironet and not an external security server, yet.
    Any info or push in the right direction is greatly appreciated.
    Thanks

    You could pretty easily use the "local" RADIUS built-in to the AP firmware and implement LEAP or EAP-FAST.
    Both are pretty easy to set up, the AP can handle that small load without any real performance issues, and the Intel client software supports it (you'll want to make sure all the client software and drivers are the most recent, there were some issues in the past).
    Both LEAP and EAP-FASt will support seamless roaming, You'd set one of the APs up for WDS and the others to point to it.
    Admin (add/change/delete users) via the Web GUI is also pretty straight forward.
    Good Luck
    Scott

  • Best way to secure wireless?

    I'll be getting a MacBook Pro and wireless broadband from Sky very soon and I was wondering what the best ways of securing your wireless are.I only want the people in my home to use it, not the neighbours.
    Thanks

    In your router be sure to turn on security using WPA2. You can add an additional level of security if the router supports it by creating a private or closed network in which only devices whose MAC addresses are included can join the network. If the router has its own built-in firewall turn it on as well if it isn't on by default. Consult the user manual for your router on how to configure these.

  • Which is the best way to create a connection object

    hi,
    Eventhough i am not new to java I just wanted to know that which is the best way for creating sql connection object.
    Is it using the DriverManager.getConnection(..,..,..) or using a datasource and getting the connection.
    Which is more efficient or Is there any other way to create sql connection which is even more better.
    thanks in advance.
    pradeepbhargav

    AFAIK all connections, DataSource ones included are created by calling the DriverManager. A DataSource is a factory for Connection objects (from JavaDocs)
    If you're talking about managing connections then it depends on the application. A DataSource is great for apps that can support many clients or are multi-threaded, but may require a JNDI implementation to get to it.
    If however you have an single threaded app that hits the database in a serial fashion, then DataSource is probably an overkill.
    Dave

  • What is the best way to secure my iPad from ID theft

    What is the best way to secure iPad purchases from the app store?

    Technically, they will import off your flash drive....if it's one of the models that work (maybe 50% do) and if they meet the very rigid naming convention that the iPad insists on.
    It's far easier to use a computer then either sync them on via iTunes, e-mail them to yourself or upload them to something like dropox, then download them onto your device.

  • Which is Best way to pool DB connections on Server no-J2EE???

    I have a applicatio, which run on very different app servers (WebSpere, JRun and i-Planet)... the db conncetion problems existe whit server no-J2EE compliant, like as i-Planet.
    On J2EE servers I cant use Server DataSource to pooled connection, and server make this work transparently and good.
    But, if have to manually manage to pool connection, which is the best way?
    Befor use Poolman package... by CodeStudio, but is not effective for me...
    Now, are studying the Jackarta-Commons DBCP...
    Which is the best ?... there is other solution for this problem ?.
    thx !

    App in I'm work, make exhaustive use of db connection,
    only on startup, use a average of 130 connection
    request on less 10 secconds.
    All connection requested, when finish to use, there
    are closed, supposeddly, the closed connction are
    returned to pool, but this no happend it quickl, How do you know it doesn't happen quickly?
    Normally a returned connection would just be inserted into a list with a possible state change. That would be very quick in java. It might check the state of the connection and that is going to take longer Another pool manager might do the same though.
    then,
    if pool is able to create emmergency connections (up
    num max) always returned new connection, any one
    else, if pool can't create emmergency connection
    objects, app wait for free connection of pool... long
    delay !Of course, but any pool is going to do that.

  • Best way to secure server

    hi ! well my servlet app in done, but Im worried about security and how sensible data can be reached by people who shouldnt be accessing it.
    So my question is, wich is the best way to ensure that the data will not be readed by someone else? I have crypted things like database fields, but Im interested in the data that is being handled by the server and the client and possible attacks.
    All recomendations are welcome.
    Thanks!

    dunno if u did it but first thing to do is prevent sql injection ie forbiding usernames password and all other form feild or in fact any stringish data u accept form clients to start with unwanted chars like (' or " or ;) and end with things like sql comment mark (i think its --).
    next thing that can come in handy is forbiding HttpSession to be created in all servlets exept in login servlet. this is done by:
    HtttpSession session=request.getSession(false);
    this disables HttpSession to be created but still making if avaliable if it is created some time earlier (depeniding on session-timout tag in web.xml, default is 10 or 30 minutes).
    hope i helped

  • What's the best way to secure an Apple TV unit?

    I'm looking to secure an Apple TV in my office. What's the best way to lock it down to, say, a table or a wall?

    Some type of locking cabinet or drawer to put the unit in that leaves sufficient room for the cables to come out the back.
    Then use the Remote app on an iOS device to control the unit.

  • Best way to configure and connect two 4500 switches

    I have a  core 4507r+e in our production environment. We just acquired a 4500r and I would like to use it a distribution switch. What’s the best way to configure the new 4500r switch to connect to the core 4500 switch?

    Disclaimer
    The Author of this posting offers the information contained within this posting without consideration and with the reader's understanding that there's no implied or expressed suitability or fitness for any purpose. Information provided is for informational purposes only and should not be construed as rendering professional advice of any kind. Usage of this posting's information is solely at reader's own risk.
    Liability Disclaimer
    In no event shall Author be liable for any damages whatsoever (including, without limitation, damages for loss of use, data or profit) arising out of the use or inability to use the posting's information even if Author has been advised of the possibility of such damage.
    Posting
    BTW, when you link your core to your distribution, the connecting link can be L2, L3 or both.
    What I wanted to bring to your attention, 4500s can often easily oversubscribe some of their ports.  Much depends on the sup and line cards being used.  When you want to interconnect a core and distribution, you don't want to use a port that's something like 8:1 oversubscribed.  (Further, if you're doing mostly L2, and all traffic L3 has to go to the core, depending on you traffic flows, a single link might have insufficient bandwidth.)
    Also from core to distribution, if possible, it's good to avoid single points of failure.  So if you only have one link between them, that link's transceivers (if used), the ports connected to, the line card connected to, are all single points of failure.  (Of course, with only single sups in each chassis, that too is a single point of failure.  From what you've described, from a performance and redundancy standpoint, you might actually be better off using a 4510R, with your two sups [if same model] and line cards - creating a collapsed core/distribution.)

  • Is KeyChain the best way to secure all passwords?

    I have a list of passwords and logins for various websites.  Is KeyChain the best way to track them and to login to the sites securely?

    Yes, it remembers passwords in probably 95% of cases (there are some problem sites that can "trick" it). It does also work with iOS devices as well. Note it only works in Safari on OS X and iOS. You can't use it in other browsers, or in other applications on iOS.
    I've been using it for years (before it was iCloud keychain, there was MobileMe keychain sync in Snow Leopard) and it has worked well for me.
    There are paid alternatives, like 1Password, which are also very good but if you use Safari I don't think there's a need to spend money.

  • Best way to Securely publish OWA and Active Sync

    Hi Guys
    Just a quick question what is the best way for me to securely publish OWA and Active Sync in Exchange 2013, I have 1 CAS server and one MB server both on my lan but i have 443 open to internet and would like to make it more secure by putting maybe a reverse
    proxy or OWA device in my DMA, my setup is small sub 200 users so cost is a factor, what is the most economically way for me to do this with the least amount of work and complication
    I know ISA/TMG is now extinct and i dont want to use any linux reverse proxies etc.. just a simple solution that will publish these services securely that is easy to support going forward and inexpensive.
    Thanks in advance
    Spudney

    What exactly are you looking to secure?  If all that you have open is TCP 443 that is a tight setup already.
    You'll  have to state the business requirements you are looking to address - and for a 200 user org I suspect that they will be very different from a large enterprise.
    Take a look at this pls:
    http://blogs.technet.com/b/exchange/archive/2013/07/17/life-in-a-post-tmg-world-is-it-as-scary-as-you-think.aspx
    And say hello to Renton as well please!
    Cheers,
    Rhoderick
    Microsoft Senior Exchange PFE
    Blog:
    http://blogs.technet.com/rmilne 
    Twitter:   LinkedIn:
      Facebook:
      XING:
    Note: Posts are provided “AS IS” without warranty of any kind, either expressed or implied, including but not limited to the implied warranties of merchantability and/or fitness for a particular purpose.

  • Best way to securely share file/send link to external client

    I'm looking for the best method of securely sharing and/or sending large files (big Keynote documents and videos) to external clients. Basically a YouSendIt-type solution, but hosted and running off of my OS X Server.
    What I'd like to be able to do is generate a secure URL for an individual file that can be emailed to a client. I would prefer not to have them need a username/password, but just be able to click and download from the link. I'd also like that link to expire after a certain amount of time. I'm not positive if this is the best method, and am open to other options suggestions.
    Would love some advice as I've been Googling for quite a while without any solid suggestions or solutions. Thanks!

    Off the top, and I don't know how familiar you are with bash shell or other scripting languages here...
    Cleanup is one or two lines of bash in a +periodic daily+ script. Delete stuff older than a week or such via a bash shell find command and an rm, mayhap. That stuff is easy, if it's just a "blindly nuke stuff older than a week" or similar logic required. (Test that rm logic carefully as it really stinks to accidentally rm too much.)
    Upload is slightly more involved. Probably a droplet or such, invoking Applescript or a bash shell script to generate a GUID (or a random string) and copy the file into the web files directory. [Here's a start|http://putnamhill.net/codeshop/applescript/applescript_bash.html] toward this; that looks like it'll get you to bash, and you can do what you need from there. Drop a file on the droplet, and you get a GUID-based name generated and an sftp certificate-based transfer up to the server, and a dialog box showing you the filename.
    Or you do an upload via a web form that pulls up the file and manipulates it and tosses up a page with the URL for you. That can easily be a cgi page, since this isn't high-volume stuff.
    If this stuff doesn't exist, it's a day or two to code it in bash. And perl or php or python or ruby or such could likely be used here, too.
    In general: be careful with who and what can be uploaded to your server, too. Allowing a random file upload into the server environment is very close to allowing a server breach. Some of the attacks here are clever, too. (qv: "gifar" files).

  • What is best way to secure client/server communication?

    Hi all, I have a question for you. What is the best method for ensuring a secure communication through a client/server stream socket implementation?
    I currently have a server that talks to several clients for various tasks. I would like to make all communication between the server and clients secure. In other words when one of my clients accepts an incoming connection I would like to verify that the server is really who they are talking with, and also that the data that is being received is indeed not tampered with.
    Is SSL the correct technology to use with this? And if so, what is the general outline of steps I need to follow to get an SSL connection? I mean do I need certificates and all that stuff?
    Thanks in advance for any help you may be able to provide.

    The more I look into SSL the more it appears it is only for web servers. My app is not web server based. Is SSL not the correct way to go on this then?

  • What is the best way to secure documents by division?

    I'm sure this type of question has been asked and my needs aren't unique, but I didn't see exactly what I need.  I'm fairly new to Sharepoint and could use some help, please.
    I have a document library and one of the metadata fields is Division.  We set up a Coordinator group for each division and would like the users in the group to only be able to view and manage their division's documents.  I set up a view for each
    division, and we are setting up a web part for each view, and using the Target Audience to control which view people see.  I think this is clumsy and there are better ways to do this (probably).  Contributors are all in one common group, and I think
    we're OK with that because each conributor can only view and manage his own documents.  It's the coordinators who currently have access to ALL of the documents in the library that I want to change so they can only access their own division's documents.
    I am considering setting up a folder for each division, and when someone deposits a document in the library, I would use an SP Designer workflow to move the document to the approriate folder based on the division.  I think I can then secure each folder
    to a particular coordinator group.  That sounds easy enough and may be the best approach.
    I think, but am not sure, if I can assign security directly based on the Division column and not have to use the folders.  I'm not sure if I can do this, and, if I can, I'm not sure it is the best approach.  I'm worried I might get too many security
    scopes if it looks at each item separately.  Or can I set up  differnet content type for each division and control access based on content type?
    Anyway, I'm looking for the best approach and I'm not knowledgeable enough about SharePoint to know this on my own.  Obviously I want something that's easy to set up and manage, doesn't create too many scopes, etc.  Any help would be appreciated.

    Hi Tom,
    Out of the box you can assign permission to an item based on thier cloumn value.You can write an event receiver for that.
    I would suggst you to create a content type and use different document library for different divison.Use this common content type with all the document libraries.Permission  segregation based on different doc library would be much easier to maintain and
    performance would increase.Using a single document library with lots of stop ineherit item level permission degarde the performance.
    Thanks

Maybe you are looking for

  • Permission denied: fopen('/usr/local/ssl/openssl.cnf'

    When installing phone software (CounterPath-Bria3) i get an error message in the system: Permission denied: fopen('/usr/local/ssl/openssl.cnf'..) CounterPath is arguing, they use their own SSL library. Does anybody have an idea, how to fix this?

  • Where can i get a new polycarbonate unibody for my macbook?

    My  Macbook's Polycarbonate Unibody has cracks in it and doesnt look to great. Where can I find a brand new one?

  • 27" iMac was stolen, now returned but has been locked what do I do?

    My 27' iMac was stolen, now returned but has been locked what do I do? It was purchased in December of 2011, they nust have set up icloud account to lock it. How do I get around this? Apple should have my serial number of this computer matching my ac

  • How to upgrade Exchange Server 2013 CU5 on my site?

    My site have four Exchange servers . The four Exchange Servers are installed mailbox and cas roles. The Dag achieved by the four servers. Please help me to upgrade exchange server 2013 cu5 on the four servers. how to do? Thanks. 北京老马

  • BAPI_GET_PAYSLIP_HTML

    I have to make a application in webdynpro with Sap Netweaver developer studio to post PAYSLIP on portal.I am trying to  use the bapi "BAPI_GET_PAYSLIP_HTML", but WebDynpor is not responding properly, Can I use this BAPI and can we modify HTML code in