2 Securing Oracle Banking Branch
You can use various programs available within Oracle Banking Branch to help in the maintenance of security and secure the desktop operating system.
Desktop Security
Refer to the vendor-specific relevant sections for securing the desktop operating system. In addition, refer to the browser-specific security settings mentioned in the vendor-specific docs.
Refer to the client browser setting required for Oracle Banking Branch.
Oracle Banking Branch Controls
Table 2-1 Oracle Banking Branch Products Controls
Control | Description |
---|---|
Disable Logging |
It is recommended that the debug logging facility of the application be turned off, once the system is in production. This is achieved by updating the The above-described practice does not disable logging performed by the application in the database tier. This can be disabled by running the lockdown scripts provided. The lockdown scripts will disable logging across all modules and all users in the system. |
Sign-on Messages |
|
Authentication and Authorization |
Only authenticated users can access the system. Secondly, a user should have access rights to execute a function. The user profile of a user contains the User ID and the functions to which the user has access. Oracle Banking Branch operations such as new, copy, query, unlock, and so on will be enabled based on function rights available for the user. The function rights will be checked for each operation performed by the user, in the Security Management Service module of the Oracle Banking Branch. |
Role-Based Access Controls |
The role-based access controls are:
|
Access Controls - Branch Level |
SMS provides branch-level access through the roles provided for the user at a particular branch. |
Maker – Checker |
The application supports dual control methodology, wherein every operation performed has to be authorized by another user with the requisite rights. |
Access Enforcement |
Access management in Oracle Banking Branch can be done in two steps:
|
Password Management |
The Oracle Banking Branch application relies on external password management and does not store any credentials. If an external LDAP is used, password management and policy rules can be set on that (For example, in WebLogic Embedded-LDAP, the user and password rules can be configured via the admin console of the WebLogic). If OIM/OAM is configured, password management and policy rules can be set on OIM. The Identity Provider (IdP) in case of SAML takes care of the password policies. Certain user password related parameters should be defined at the system level. These parameters will apply to all the users of the system. Examples of such parameters are the number of invalid login attempts after which a user-id should be disabled, the maximum and minimum length for a password. Note: For more information on Password Management, refer to Password Policies in this guide. |
Password Policies
To enable password validation criteria, there is a flag given in the SECURITY_CONFIG table is PASSWORD_VALIDATION_FLAG which has to be set as Y.
Table 2-2 SECURITY_PASSWORD_VAL_CONFIG
Property | Value | Description |
---|---|---|
MIN_PSWD_LEN | Any integer | Minimum password length required |
MAX_PSWD_LEN | Any integer | Maximum password length allowed |
MIN_PSWD_AGE | Any integer | Not used currently |
MAX_PSWD_AGE | Any integer | Not used currently |
FLAG_UPPER_CHAR | Y/N | Y- Uppercase characters required |
NUM_MAND_UPPER | Integer |
Minimum uppercase characters required. Checked only if FLAG_UPPER_CHAR is set to Y |
FLAG_LOWER_CHAR | Y/N | Y- Lowercase characters required |
NUM_MAND_LOWER | Integer |
Minimum lowercase characters required. Checked only if FLAG_LOWER_CHAR is set to Y |
FLAG_SPECIAL_CHAR | Y/N | Y- Special characters required |
NUM_MAND_SPECIAL | Integer |
Minimum special characters required. Checked only if FLAG_SPECIAL_CHAR is set to Y |
FLAG_NUMERIC_CHAR | Y/N | Y- Numeric characters required |
NUM_MAND_NUMERIC | Integer |
Minimum numeric characters required. Checked only if FLAG_ NUMERIC_CHAR is set to Y |