Rediger

Del via


Secure your Oracle Database applications

Data protection and security overview

A database often contains sensitive business information such as customer account details. Applications that use the Microsoft BizTalk Adapter for Oracle Database to access and modify this information either locally or across a distributed network might inadvertently expose it to access by unauthorized actors, unless efforts are made to protect and secure the data during transmission. Data protection and security are usually thought of in the following terms:

  • Authorization controls access to a resource based on the identity of the requester.

  • Authentication provides mechanisms for verifying the identity of a requester.

  • Data confidentiality provides mechanisms for protecting the privacy of data through encryption.

  • Data integrity provides mechanisms to digitally sign data, so that the receiver can ensure that the data has not been altered in-transit.

    Another important area of concern is the user-name password credentials that you supply to the Oracle Database adapter. The adapter uses these credentials to open connections to the Oracle database. These credentials can be supplied in the connection URI; however, because the user name and password are clear text, the Oracle Database adapter provides alternative methods that you can use to supply these credentials in a more secure manner.

    The topics in this section provide guidelines to help you better secure the solutions that you develop with the Oracle Database adapter.

In this section