Via Puneet Rajkumar.Comments Off | Filed in Oracle | Tags: EBS
You can use the Oracle Data Masking Pack with Oracle Enterprise Manager today to scramble sensitive data in cloned environments. Due to data dependencies, scrambling E-Business Suite data is not a trivial task. The data needs to be scrubbed in such a way that allows the application to continue to function.
Using the Data Masking Pack in E-Business Suite environments is now easier with the release of new set of templates for E-Business Suite databases:
Oracle E-Business Suite Release 12.1.3 Template for Data Masking Pack (Patch13898999)
This template works with the Oracle Data Masking Pack and Oracle Enterprise Manager to obscure sensitive E-Business Suite information that is copied from production to non-production environments.
Note that this not a free feature. You must purchase licenses for Oracle Enterprise Manager and the Oracle Data Masking Pack plug-in. The EBS template is included in the pack’s license.Comments Off | Filed in Oracle | Tags: EBS, Security
For all of you EBS gurus out there, take comfort in knowing that there are similarities between Fusion and EBS. Not everything is similar though, and in some cases, it may be easier to forget your knowledge of “how EBS does it” and learn “how Fusion does it” without trying to translate.Comments Off | Filed in Oracle | Tags: EBS
There is a third issue, after support cost, and availability, there is the big issue around the upgrade path. Oracle have always said that there would be an upgrade path from the latest two releases which at the time was 11.5.10 and 12.0, but now we also have 12.1 so there is only a path from 12.0 onwards. Is this fair, well I am not sure, in most cases I see the move to Fusion Apps as a replacement is not the best thing for an organisation, especially one who has not already moved to R12, so not having the option is not a problem.Comments Off | Filed in Oracle | Tags: EBS, fusion
I think a lot of people will take Fusion but in small steps, taking the co-existence route, after perhaps adopting some technology first, over time.
Oracle Workflow, a component of Oracle E-Business Suite, lets you set up subscriptions to business events which can launch workflows or enable messages to be propagated from one system to another when business events occur.
The Oracle Workflow Business Event System is an application service that leverages the Oracle Advanced Queuing (AQ) infrastructure to communicate business events between systems.
Predefined events are provided with some Oracle E-Business Suite products. For example, the “Create Person Event” (oracle.apps.ar.hz.Person.create) is the name of a seeded business event in the Receivables application. The event is triggered when a person party record is created within the Trading Community Architecture (TCA).
Not all events are seeded. However, Oracle gives you the option to create a custom event. An example would be an event that is triggered when an invoice is matched to a purchase order.
In this article, I will show you how to create and use a custom business event. I will go through the following steps:
Consume the event in PL/SQL
Floyd Teter on Oracle E-Business Suite:
Here’s the upshot for those of you “keeping the faith” with 11i. The iceberg is melting, the curtain is coming down, the lights are dimming, the fat lady is singing. The later versions of 11i were good things…we got bundles of value out of 11i…but, like it or not, it’s winding down in favor of a better product in R12.1.3. It’s time to upgrade. Frankly, the longer you keep the faith with 11i, the more you’ll miss out on the value of the new products…and the more it will cost when you do make the move.Comments Off | Filed in Oracle | Tags: EBS
Isam Alyousfi and Lester Gutierrez are key members of our Applications Performance Group. They recently presented their popular session covering performance tuning tips for all layers of the E-Business Suite at OAUG/Collaborate earlier this year. […] This presentation is chock full of tips, pointers, and hard-won knowledge. It represents the distillation of countless performance-related Service Requests and customer escalations. If you’re grappling with performance issues in your environment, or simply trying to squeeze more performance out of existing hardware, I’d strongly recommend downloading this presentation.Comments Off | Filed in Oracle | Tags: EBS, performance, presentation
Oracle Applications 11i Encrypted Password String Disclosure (PDF): An undisclosed security vulnerability exists in Oracle Applications 11i that may allow an unauthenticated, internal attacker to obtain Oracle Applications’ user account encrypted password strings, which in turn can be decrypted using previously published information. An attacker can potentially obtain either any user’s password or the Oracle Applications’ main database account password (APPS).
Building an Audit Trail in an Oracle Applications Environment (PDF): Sarbanes-Oxleyâ€™s section 404 requires a companyâ€™s key systems be audited. However, many companies have “unauditable” systems and donâ€™t even know it. This paper explores methods by which companies can create an auditable system by implementing various levels of audit trails in Oracle Applications.
Dissecting the Redo Logs (PDF): This paper delves into the guts of the undocumented binary format of the redo logs and shows the forensics examiner, if there is evidence to be found, how to find it and how it can be integrated into a time line of events. It also explores how an attacker can attempt to cover their tracks and how to spot this.
Locating dropped objects (PDF): This paper shows, even when an object has been dropped and purged from the system there will be, in the vast majority of cases, fragments left â€œlying aroundâ€ which can be sewn together to build an accurate picture of what the actions the attacker took. Perhaps, depending upon how quickly an investigation takes place from the incident in question, even all data pertaining to the dropped object or objects may still be found.
Isolating Evidence of Attacks Against the Authentication Mechanism (PDF): This paper looks at attacks against the authentication mechanism and evidence to check whether a logon attempt was successful or not. It also looks at other attacks leveled at the authentication process including SID guessing, user enumeration and brute forcing of passwords over the network. Moreover, the paper looks at the differences between a logon attempt via the FTP and Web services provided with the XML Database and directly with the RDBMS itself.
We are in the process of upgrading our Oracle E-Business Suite (EBS) from 11.0.3 to 11.5.10 (more on that later). So, I frequently visit the EBS Electronic Technical Reference Manual (eTRM) to browse and try to understand the data models, database design and APIs of some EBS modules. When I logged in this morning I noticed that the eTRM for EBS release 12 had been posted. I thought of sharing this news with you.
Note: you need a Metalink account in order to be able to browse the eTRM.Comments Off | Filed in Oracle | Tags: EBS