Abstract
EM12c is a great tool for automating general administration to large estates and also for coordinating the different layers within an application architecture. It is also the natural tool to use for deploying secure configurations and reporting on their effectiveness, but centralizing all of this power in one place raises the obvious question of how to secure EM12c itself. That is the subject of this chapter. First we will look at securing availability and then network communications. We’ll also look at how users are affected and, finally, at the repository which represents the potential weak link.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2014 Paul Wright
About this chapter
Cite this chapter
Wright, P. (2014). Defending Enterprise Manager 12C. In: Protecting Oracle Database 12c. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6212-1_18
Download citation
DOI: https://doi.org/10.1007/978-1-4302-6212-1_18
Published:
Publisher Name: Apress, Berkeley, CA
Print ISBN: 978-1-4302-6211-4
Online ISBN: 978-1-4302-6212-1
eBook Packages: Professional and Applied ComputingApress Access BooksProfessional and Applied Computing (R0)