Preface

This topic contains following sub-topics:

Purpose

This guide provides security-related usage and configuration recommendations for Oracle Banking Corporate Lending Process Management. It also describes the procedures required to implement or secure certain features, but it is not a general-purpose configuration manual.

Audience

This guide is primarily intended for Developers for Oracle Banking Corporate Lending Process Management and third party or vendor software’s. Some information may be relevant to IT decision makers and users of the application are also included.

Note:

Readers are assumed to possess basic operating system, network, and system administration skills with awareness of vendor/third-party software’s and knowledge of Oracle Banking Corporate Lending Process Management application.

Related Resources

For more information on any related features, refer to the following documents:
  • Oracle Banking Microservices Platform Foundation Installation Guide
  • OBCLPM Installation Guide
  • OBCLPM API Security Guide
  • SSL Configuration Setup Guide

Conventions

The following text conventions are used in this document:

Convention Meaning

boldface

Boldface type indicates graphical user interface elements associated with an action, or terms defined in text or the glossary.

italic

Italic type indicates book titles, emphasis, or placeholder variables for which you supply particular values.

monospace

Monospace type indicates commands within a paragraph, URLs, code in examples, text that appears on the screen, or text that you enter.

Screenshot Disclaimer

Personal information used in the interface or documents is dummy and does not exist in the real world. It is only for reference purposes.

Acronyms and Abbreviations

The list of the acronyms and abbreviations that are used in this guide are as follows:

Table -1 Acronyms and Abbreviations

Acronyms Abbreviations
AES Advanced Encryption Standard
API Application Programming Interface
AV Audit Vault
DV Database Vault
JSON JavaScript Object Notation
JWT JSON Web Tokens
LDAP Lightweight Directory Access Protocol
M&A Mergers and Acquisitions
OAM Oracle Access Manager
OIM Oracle Identity Management
SAML Security Assertion Markup Language
SQL Structured Query Language
SSL Secure Sockets Layer
SSO Single Sign-On
SVS Security Vulnerability Scanning
TDE Transparent Data Encryption
TLS Transport Layer Security

Basic Actions

Table -2 List of Basic Actions

Action Description
Approve Click Approve to approve the initiated report.

This button is displayed, once the user click Authorize.

Audit Click Audit to view the maker details, checker details of the particular record, and record status.

This button is displayed only for the records that are already created.

Authorize Click Authorize to authorize the record created. A maker of the screen is not allowed to authorize the report. Only a checker can authorize a record.

This button is displayed only for the already created records.

Close Click Close to close a record.

This action is available only when a record is created.

Confirm Click Confirm to confirm the performed action.
Cancel Click Cancel to cancel the performed action.
Compare Click Compare to view the comparison through the field values of old record and the current record.

This button is displayed in the widget, once the user click Authorize.

Collapse All Click Collapse All to hide the details in the sections.

This button is displayed, once the user click Compare.

Expand All Click Expand All to expand and view all the details in the sections.

This button is displayed, once the user click Compare.

New Click New to add a new record. The system displays a new record to specify the required data.

Note:

The fields which are marked with Required are mandatory.
OK Click OK to confirm the details in the screen.
Save Click Save to save the details entered or selected in the screen.
View Click View to view the report details in a particular modification stage.

This button is displayed in the widget, once the user click Authorize.

View Difference only Click View Difference only to view a comparison through the field element values of old record and the current record, which has undergone changes.

This button is displayed, once the user click Compare.

Symbols and Icons

The following symbols and icons are used in the screens.

Table -3 Symbols and Icons - Common

Symbol/Icon Function

Minimize

Minimize

Maximize

Maximize

Close

Close

Perform Search

Perform Search

Open a list

Open a list

Add a new record

Add a new record

Navigate to the first record

Navigate to the first record

Navigate to the last record

Navigate to the last record

Navigate to the previous record

Navigate to the previous record

Navigate to the next record

Navigate to the next record

Grid view

Grid view

List view

List view

Refresh

Refresh

Calender

Calender

Filter

Filter

Copy

Copy a record

Add

Click this icon to add a new row.

Remove

Click this icon to delete an existing row.

View

Click to view the created record.

Action

Click to unlock, delete, authorize or view the created record.

Table -4 Symbols and Icons - Audit Details

Symbol/Icon Function

A user

A user

Date and time

Date and time

Unauthorized or Closed status

Unauthorized or Closed status

Authorized or Open status

Authorized or Open status

Table -5 Symbols and Icons - Widget

Symbol/Icon Function

Open status

Open status

Unauthorized status

Unauthorized status

Closed status

Closed status

Authorized status

Authorized status

Scope

Scope

Read Sections Completely

Each section should be read and understood completely. Instructions should never be blindly applied. Relevant discussion may occur immediately after instructions for an action, so be sure to read whole sections before beginning implementation.

Understand the Purpose of this Guidance

The purpose of the guidance is to provide security-relevant configuration recommendations. It does not imply the suitability or unsuitability of any product for any particular situation, which entails a risk decision.

Limitations

This guide is limited in its scope to the security-related guidelines. This guide does not claim to offer comprehensive configuration guidance. For general configuration and implementation guidance, refer to other sources such as Vendor specific sites.

Test in Non-Production Environment

To the extent possible, guidance should be tested in a non-production environment before deployment.

Ensure that any test environment simulates the configuration in which the application will be deployed as closely as possible.