{"id":450,"date":"2003-10-16T00:00:00","date_gmt":"2003-10-16T00:00:00","guid":{"rendered":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/10\/16\/oracle-ships-security-software\/"},"modified":"2021-12-30T11:37:21","modified_gmt":"2021-12-30T11:37:21","slug":"oracle-ships-security-software","status":"publish","type":"post","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/2003\/10\/16\/oracle-ships-security-software\/","title":{"rendered":"Oracle Ships Security Software"},"content":{"rendered":"<p>Oracle unveiled Thursday security software that streamlines the process of controlling access to corporate applications and information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Oracle Identity Management enables system administrators to establish single sign-on for employees, partners or customers who need access to multiple business applications.<\/p>\n<p>The software includes LDAP directory services to store and manage user identities and access control privileges, and integration services for connecting to an existing security and directory infrastructure, officials with the Redwood City, Calif., company said.<\/p>\n<p>The software also has user provisioning services for Oracle and non-Oracle applications, and public key infrastructure services, including a certificate authority to issue digital certificates for users.<\/p>\n<p>More info: [url=http:\/\/www.techweb.com\/wire\/story\/TWB20031016S0011]http:\/\/www.techweb.com\/wire\/story\/TWB20031016S0011[\/url]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[29],"tags":[],"class_list":["post-450","post","type-post","status-publish","format-standard","hentry","category-news"],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=450"}],"version-history":[{"count":1,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/450\/revisions"}],"predecessor-version":[{"id":2937,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/posts\/450\/revisions\/2937"}],"wp:attachment":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/media?parent=450"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/categories?post=450"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/tags?post=450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}