Skip to main content

Defending Enterprise Manager 12C

  • Chapter
  • First Online:
Protecting Oracle Database 12c
  • 1166 Accesses

Abstract

EM12c is a great tool for automating general administration to large estates and also for coordinating the different layers within an application architecture. It is also the natural tool to use for deploying secure configurations and reporting on their effectiveness, but centralizing all of this power in one place raises the obvious question of how to secure EM12c itself. That is the subject of this chapter. First we will look at securing availability and then network communications. We’ll also look at how users are affected and, finally, at the repository which represents the potential weak link.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

eBook
USD 16.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Paul Wright

About this chapter

Cite this chapter

Wright, P. (2014). Defending Enterprise Manager 12C. In: Protecting Oracle Database 12c. Apress, Berkeley, CA. https://doi.org/10.1007/978-1-4302-6212-1_18

Download citation

Publish with us

Policies and ethics