SlideShare a Scribd company logo
CON8902 - Developing
Secure Mobile Applications
Mark Wilcox
Senior Product Manager
September 2013
2Copyright © 2011, Oracle and/or its affiliates. All right
This document is for informational purposes. It is not a commitment to
deliver any material, code, or functionality, and should not be relied
upon in making purchasing decisions. The development, release, and
timing of any features or functionality described in this document
remains at the sole discretion of Oracle. This document in any form,
software or printed matter, contains proprietary information that is the
exclusive property of Oracle. This document and information
contained herein may not be disclosed, copied, reproduced or
distributed to anyone outside Oracle without prior written consent of
Oracle. This document is not part of your license agreement nor can
it be incorporated into any contractual agreement with Oracle or its
subsidiaries or affiliates.
3
Oracle Fusion Middleware
Business Innovation Platform for the Enterprise and Cloud
 Complete and Integrated
 Best-in-class
 Open standards
 On-premise and Cloud
 Foundation for Oracle
Fusion Applications and
Oracle Cloud
User Engagement
Identity Management
Business
Process
Management
Content
Management
Business
Intelligence
Service Integration Data Integration
Development
Tools
Cloud Application
Foundation
Enterprise
Management
Web Social Mobile
4
Program Agenda
 Define the problem and solution
 Partner Demo and Presentation
 Oracle Shows The Developer Demo
5Copyright © 2012, Oracle and/or its affiliates. All right
The Mobile and Social Access Promise
Anytime Anywhere Access
New Tools for Business
Personal and Business Devices
Mobile, Social and Cloud Access
Mobile and Social Access is
changing the landscape
6Copyright © 2012, Oracle and/or its affiliates. All right
The Mobile and Social Access Problems
Security
Proliferation of Devices
Cannot leverage existing security
Limited device control
A compliance challenge
How to centrally manage the security
and be complaint?
7Copyright © 2012, Oracle and/or its affiliates. All right
The Mobile and Social Access Problems
User Experience
Native Applications
No Native Single Sign-on
Password Help Desk Calls
Inconsistent Login Experience
How to improve user experience and
productivity?
8
Cloud AccessMobile Security Social
Sign-On
Standards
Support
Oracle Access Management
Mobile & Social Overview
9
Mobile Security
Native App
Web App Mobile and
Social
REST
Oracle
SDK
Security App
Access Management
Directory User Profile Services
OAAM Service
OAM Service
Device Registration
Lost & Stolen Devices
GPS/WIFI Location Awareness
Device Fingerprinting & Tracking
Risk-based KBA & OTP
Transactional risk analysis
10Copyright © 2012, Oracle and/or its affiliates. All right
Client SDKs
Native Libraries for iOS and JAVA
Store/Access Keys, Tokens, Handles
and other secure data
Access Mobile Device Information
(OS, Carrier, Geolocation, IP/MAC)
Support KBA, OTP via Email and SMS
Manage Single Sign-on
Quickly build security into your
mobile applications
11Copyright © 2011, Oracle and/or its affiliates. All right
11
Mobile & Social Access Management
Deployment Architecture
Corporate DMZ Corporate Network
HTTP/REST/SOAP/OAuth
Clients
Oracle Adaptive Access
Manager
Mobile and Social
OAM Agent
SOAP/REST and
Legacy Web Services
Oracle Access Manager
Directory Services
Oracle Enterprise
Gateway
Web Services Manager Service Bus
Context Aware Authorization
and Data Redaction
OES PDP
OES PDP
12Copyright © 2011, Oracle and/or its affiliates. All right
Partner Presentation
Vivek Lodhi
ERS Specialist Manager , Deloitte &
Touche LLP
13Copyright © 2011, Oracle and/or its affiliates. All right
Oracle Developer Demo
DEMO
14Copyright © 2012, Oracle and/or its affiliates. All right
• Mobile security is more than device management
• Use a Mobile-focused security product to simplify the
development of secure mobile applications
• Oracle provides an end to end mobile security
solution that leverages existing investments in access
management
Summary
15Copyright © 2012, Oracle and/or its affiliates. All right
• Partners
• Contact Partner Training Services to learn how they can help
you learn Oracle Access Management Secure Mobile
Development
• Customers
• Contact your Oracle Account Representative to learn more
Next Steps
16
17

More Related Content

PPTX
Con8902 developing secure mobile applications-final
PDF
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
PPTX
CIS 2013 Ping Identity Chalktalk
PDF
B4 the identity of things-securing the internet of everything
PDF
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
PDF
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
PDF
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
PPTX
Securing the Extended Enterprise with Mobile Security - Customer Presentation
Con8902 developing secure mobile applications-final
Layer 7 Mobile Security Workshop with CA Technologies and Forrester Research ...
CIS 2013 Ping Identity Chalktalk
B4 the identity of things-securing the internet of everything
Hitchhikers Guide to the Identiverse - How Federated Business will Rule the W...
CIS13: Mobile Single Sign-On: Extending SSO Out to the Client
Successful Enterprise Single Sign-on: Addressing Deployment Challenges
Securing the Extended Enterprise with Mobile Security - Customer Presentation

What's hot (20)

PPTX
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
PPTX
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
PDF
Patterns and Practices in Mobile SSO
PDF
Csooow12 amit-jasuja-securing-new-experience6
ODP
Shibboleth Guided Tour Webinar
PPTX
Onboarding in the IoT
PPTX
Connecting The Real World With The Virtual World
PDF
Mobile SSO: Give App Users a Break from Typing Passwords
PDF
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
PPT
You Can't Spell Enterprise Security without MFA
PPTX
Catalyst 2015: Patrick Harding
PDF
Device Management for Connected Devices
PDF
Layer 7: Building Multi Enterprise SOA
PPTX
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
PDF
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
PDF
Argentinian Security Services Company Relies On BES10 For Secure Cross-Platfo...
PDF
Major Spanish Risk-Prevention Consultancy Relies On BlackBerry To Safeguard M...
PDF
Security On The Edge - A New Way To Think About Securing the Internet of Things
PPTX
Identity Live Sydney 2017 - Michael Dowling
PDF
Local Government Balances Security, Flexibility and Productivity with BlackBe...
Mobile Single-Sign On: Extending SSO Out to the Client - Layer 7's CTO Scott ...
Beyond MDM: 5 Things You Must do to Secure Mobile Devices in the Enterprise
Patterns and Practices in Mobile SSO
Csooow12 amit-jasuja-securing-new-experience6
Shibboleth Guided Tour Webinar
Onboarding in the IoT
Connecting The Real World With The Virtual World
Mobile SSO: Give App Users a Break from Typing Passwords
The Business Ecosystem is a Neighborhood - ForgeRock Identity Live Austin 2017
You Can't Spell Enterprise Security without MFA
Catalyst 2015: Patrick Harding
Device Management for Connected Devices
Layer 7: Building Multi Enterprise SOA
Enterprise on the Go - Devon Winkworth, Snr. Principal Consultant, Layer 7 @ ...
Webinar: Deep Diving Into the KuppingerCole IDaaS Leadership Compass
Argentinian Security Services Company Relies On BES10 For Secure Cross-Platfo...
Major Spanish Risk-Prevention Consultancy Relies On BlackBerry To Safeguard M...
Security On The Edge - A New Way To Think About Securing the Internet of Things
Identity Live Sydney 2017 - Michael Dowling
Local Government Balances Security, Flexibility and Productivity with BlackBe...
Ad

Viewers also liked (19)

PPT
Spartak dermendjiev-2014-1
PDF
De como uma cassete com frases comprometedoras de militares portugueses condi...
PPTX
Un día de nuestras vidas
PDF
каталог авторских программ е.виль вильямс и и. чуланова 2014
PPTX
Chapter 16
PDF
Terre vigne et vins
PPT
People who won by allah
PPTX
Slide show 208
PPTX
L'aparell de golgi
PDF
Sequestro chinês
DOCX
ข้อสอบภาษาไทย นักเรียนนายสิบตำรวจ
PPTX
درس تعليمي
PPTX
Dibenhooooooooooooooooooooooooooooooo
PDF
PROJETO DE RESOLUÇÃO Nº 560/XIII/2.ª
PDF
Michael Durante EBITDA Shortcomings
PDF
Presentazione - Camera Italo-Brasiliana di Commercio e Industria RJ
PPTX
Definisi mahasiswa
PPT
Circulatory system
PDF
Dec 1500 2007
Spartak dermendjiev-2014-1
De como uma cassete com frases comprometedoras de militares portugueses condi...
Un día de nuestras vidas
каталог авторских программ е.виль вильямс и и. чуланова 2014
Chapter 16
Terre vigne et vins
People who won by allah
Slide show 208
L'aparell de golgi
Sequestro chinês
ข้อสอบภาษาไทย นักเรียนนายสิบตำรวจ
درس تعليمي
Dibenhooooooooooooooooooooooooooooooo
PROJETO DE RESOLUÇÃO Nº 560/XIII/2.ª
Michael Durante EBITDA Shortcomings
Presentazione - Camera Italo-Brasiliana di Commercio e Industria RJ
Definisi mahasiswa
Circulatory system
Dec 1500 2007
Ad

Similar to OOW13: Developing secure mobile applications (CON8902) (20)

PPTX
Con8817 api management - enable your infrastructure for secure mobile and c...
PPTX
Con8896 securely enabling mobile access for business transformation - final
PPTX
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
PDF
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
PPTX
Con8823 access management for the internet of things-final
PPTX
Overview of Oracle Identity Management - Customer Presentation
PDF
Wise Men Oracle Mobility Webinar- 11-December-2014
PDF
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
PPTX
Oracle Access Management - Customer presentation
PDF
Building Better Mobile Backends with Oracle Mobile Cloud Service
PPTX
Con8819 context and risk aware access control any device any where - final
PDF
MCSDataSheet
PDF
B3 mobile development and deployment platform enabled by oracle fusion midd...
PPTX
Con8836 leveraging the cloud to simplify your identity management implement...
PDF
Oracle mobile cloud service
PDF
Oracle E-Business Suitre mobile apps ADF
PDF
Exploring Oracle Enterprise Mobility using Oracle Mobile Solutions
PPTX
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
PDF
Best Practices in Implementing Oracle Database Security Products
PDF
Oracle Mobile Solution Overview
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8896 securely enabling mobile access for business transformation - final
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Re-­Think Mobile… Beyond Mobile­‐First: Oracle Mobile Strategy and Overview
Con8823 access management for the internet of things-final
Overview of Oracle Identity Management - Customer Presentation
Wise Men Oracle Mobility Webinar- 11-December-2014
The Mobile Enterprise in Action: Managing Business Processes from Your Mobile...
Oracle Access Management - Customer presentation
Building Better Mobile Backends with Oracle Mobile Cloud Service
Con8819 context and risk aware access control any device any where - final
MCSDataSheet
B3 mobile development and deployment platform enabled by oracle fusion midd...
Con8836 leveraging the cloud to simplify your identity management implement...
Oracle mobile cloud service
Oracle E-Business Suitre mobile apps ADF
Exploring Oracle Enterprise Mobility using Oracle Mobile Solutions
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
Best Practices in Implementing Oracle Database Security Products
Oracle Mobile Solution Overview

Recently uploaded (20)

PDF
Empathic Computing: Creating Shared Understanding
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
Spectroscopy.pptx food analysis technology
PDF
Electronic commerce courselecture one. Pdf
PPT
Teaching material agriculture food technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PDF
KodekX | Application Modernization Development
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
DOCX
The AUB Centre for AI in Media Proposal.docx
Empathic Computing: Creating Shared Understanding
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
Advanced methodologies resolving dimensionality complications for autism neur...
MIND Revenue Release Quarter 2 2025 Press Release
Chapter 3 Spatial Domain Image Processing.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
Unlocking AI with Model Context Protocol (MCP)
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
cuic standard and advanced reporting.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Spectroscopy.pptx food analysis technology
Electronic commerce courselecture one. Pdf
Teaching material agriculture food technology
Programs and apps: productivity, graphics, security and other tools
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
KodekX | Application Modernization Development
Reach Out and Touch Someone: Haptics and Empathic Computing
The AUB Centre for AI in Media Proposal.docx

OOW13: Developing secure mobile applications (CON8902)

  • 1. CON8902 - Developing Secure Mobile Applications Mark Wilcox Senior Product Manager September 2013
  • 2. 2Copyright © 2011, Oracle and/or its affiliates. All right This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates.
  • 3. 3 Oracle Fusion Middleware Business Innovation Platform for the Enterprise and Cloud  Complete and Integrated  Best-in-class  Open standards  On-premise and Cloud  Foundation for Oracle Fusion Applications and Oracle Cloud User Engagement Identity Management Business Process Management Content Management Business Intelligence Service Integration Data Integration Development Tools Cloud Application Foundation Enterprise Management Web Social Mobile
  • 4. 4 Program Agenda  Define the problem and solution  Partner Demo and Presentation  Oracle Shows The Developer Demo
  • 5. 5Copyright © 2012, Oracle and/or its affiliates. All right The Mobile and Social Access Promise Anytime Anywhere Access New Tools for Business Personal and Business Devices Mobile, Social and Cloud Access Mobile and Social Access is changing the landscape
  • 6. 6Copyright © 2012, Oracle and/or its affiliates. All right The Mobile and Social Access Problems Security Proliferation of Devices Cannot leverage existing security Limited device control A compliance challenge How to centrally manage the security and be complaint?
  • 7. 7Copyright © 2012, Oracle and/or its affiliates. All right The Mobile and Social Access Problems User Experience Native Applications No Native Single Sign-on Password Help Desk Calls Inconsistent Login Experience How to improve user experience and productivity?
  • 8. 8 Cloud AccessMobile Security Social Sign-On Standards Support Oracle Access Management Mobile & Social Overview
  • 9. 9 Mobile Security Native App Web App Mobile and Social REST Oracle SDK Security App Access Management Directory User Profile Services OAAM Service OAM Service Device Registration Lost & Stolen Devices GPS/WIFI Location Awareness Device Fingerprinting & Tracking Risk-based KBA & OTP Transactional risk analysis
  • 10. 10Copyright © 2012, Oracle and/or its affiliates. All right Client SDKs Native Libraries for iOS and JAVA Store/Access Keys, Tokens, Handles and other secure data Access Mobile Device Information (OS, Carrier, Geolocation, IP/MAC) Support KBA, OTP via Email and SMS Manage Single Sign-on Quickly build security into your mobile applications
  • 11. 11Copyright © 2011, Oracle and/or its affiliates. All right 11 Mobile & Social Access Management Deployment Architecture Corporate DMZ Corporate Network HTTP/REST/SOAP/OAuth Clients Oracle Adaptive Access Manager Mobile and Social OAM Agent SOAP/REST and Legacy Web Services Oracle Access Manager Directory Services Oracle Enterprise Gateway Web Services Manager Service Bus Context Aware Authorization and Data Redaction OES PDP OES PDP
  • 12. 12Copyright © 2011, Oracle and/or its affiliates. All right Partner Presentation Vivek Lodhi ERS Specialist Manager , Deloitte & Touche LLP
  • 13. 13Copyright © 2011, Oracle and/or its affiliates. All right Oracle Developer Demo DEMO
  • 14. 14Copyright © 2012, Oracle and/or its affiliates. All right • Mobile security is more than device management • Use a Mobile-focused security product to simplify the development of secure mobile applications • Oracle provides an end to end mobile security solution that leverages existing investments in access management Summary
  • 15. 15Copyright © 2012, Oracle and/or its affiliates. All right • Partners • Contact Partner Training Services to learn how they can help you learn Oracle Access Management Secure Mobile Development • Customers • Contact your Oracle Account Representative to learn more Next Steps
  • 16. 16
  • 17. 17

Editor's Notes

  • #3: Voice over … none of this constitutes a commitment to deliver futures
  • #4: With Fusion Middleware, you can extend and maximize your existing technology investment with the same technologies used in Fusion Applications, including embedded analytics and social collaboration, and mobile and cloud computing. Oracle’s complete SOA platform lets your IT organization rapidly design, assemble, deploy, and manage adaptable business applications and—with Oracle’s business process management tools—even bring the task of modeling business processes directly to the business analysts. Oracle Business Intelligence foundation brings together all your enterprise data sources in a single, easy-to-use solution, delivering consistent insights whether it’s through ad hoc queries and analysis, interactive dashboards, scorecards, OLAP, or reporting. And, your existing enterprise applications can leverage the rich social networking capabilities and content sharing that users have come to expect in consumer software. Oracle Fusion Middleware is based on 100 percent open standards, so you aren’t locked into one deployment model when your business requirements change.
  • #9: Oracle Access Manager for Mobile and Social OverviewConnects mobile users to identity services using REST interfacesOrganizations can bridge the security gap between the enterprise and mobile devices. With RESTful identity services, rich mobile applications can access stateless identity functions from mobile devices which are limited by processing capacity and battery power. Organizations can maketheir backend services and data available in a secure manner by simply exposing these through virtual REST API’s in the DMZ. Messages, security tokens, and protocols are automatically translated between formats appropriate for mobile devices and the source system. REST API’s can mash up information from multiple sources and be protected from a wide variety of attacks (denial of service, sql injection, content retrieval attacks, etcetc), usage can be monitored, and all your Oracle Access Management technologies can be leveraged for further protection. Delivers SSO and Authorization for native mobile applications Traditional mobile security solutions like VPN tunnels are limited in that they cannot overcome the problem of SSO for native mobile apps. OAM-M&S simplifies SSO across rich mobile apps and browser applications. This reduces the number of logins required for enterprise applications from the native mobile screen. Authorization can control what transactions end users are able to perform from a device and under what conditions. Perhaps only transactions below a given amount are allowed from a mobile device. An organizations REST API’s require authorization, what data is accessible to a given user must be controlled and monitored. A users location and device state may need to be taken into account. Enables sign on from 3rd party and Social identities to Enterprise resourcesWith the proliferation of social networking sites, there is a need for relying parties to consume identities from internet identity providers like Facebook, Twitter, LinkedIn, Google and Yahoo. Many of these providers support user centric federation standards like OpenID and Oauth. OAM-M&S enables organizations to accept internet identities for signing on users to low value applications like blogs, communities, etc. This in turn can provide a seamless user experience for users without the burden of additional logins.Single Sign-On covers web applications, native mobile applications, and also the RESTful API’s and web services accessed from the device.Supports industry standards (OpenID, OAuth)Oracle IDM supports OpenID and Oauth. So with Oracle Identity Management we are making it easier for relying parties to accept identities from internet identity providers like Facebook, Twitter, LinkedIn, Google and Yahoo.  
  • #10: Mobile Security – web and mobile appDevice registration and fingerprintLost & stolen device securityGPS/WIFI based location awareness
  • #12: Oracle Adaptive Access ManagerDevice Fingerprinting and Registration DatabaseRisk-Based Authentication that Factors Mobile ContextOracle Enterprise GatewayEnables Mobile Application REST API’s and protects API’s, webservices, and SOA infrastructure from external threats and invalid / suspicious requestsExtends Access Management with authentication, authorization, audit to REST API’s, web servicesOracle Entitlement ServerMake AuthorizationDecisions and Redact Data based on User,Mobile, or any other ContextExternalize AuthorizationPolicies from Application CodeOracle Access Management : Mobile & SocialMobile Identity and Access GatewayAuthentication, Registration, and User Profile Services for MobileOracle Web Services ManagerLast mile security for an organizations backend web services and SOA infrastructure Embedded agentsNative Mobile Security SDKNative Login Screens / Secure Credential StorageEasy Integration w/ SSO and Web Services SecurityNative Mobile Security AppsLogin App for Native and Web Apps Providing Device ContextNative White Pages App Integrated w/ User Profile Services