ICS to OIC Migration
Introduction Oracle Integration Cloud (OIC) and Integration Cloud Service (ICS) are iPaaS offerings from Oracle. ICS was released back in 2015 has now been superseded by OIC. Customers on ICS can...
View ArticleIntroduction to Secure Java Coding
Secure Java coding is a vast topic; therefore, this article is just an introduction to it. I will discuss the most frequent attacks, mitigations, and some traps that developers usually fall into either...
View ArticleMachine Learning with Oracle Database Advanced Analytics
TL;DR: Oracle DB + Oracle Data Mining + Oracle R Enterprise = Database Advanced Analytics (OAA) The Database Advanced Analytics option allows running Machine Learning algorithms within the database...
View ArticleUsing 3rd-party security virtual appliances in OCI
OCI offers a very robust and high-performance network firewall that’s integrated into the very core of the Virtual Cloud Network (VCN). For some customers, this is sufficient, while other customers...
View ArticleConnecting Oracle Data Integrator Studio to the Exadata Express Cloud
Introduction This post details the steps required to create connections in Oracle Data Integrator (ODI) to the Exadata Express Cloud (referred to as Cloud Service in the remainder of the post). It is a...
View ArticleOracle GoldenGate Microservices Architecture: Using Self-signed Certificates
Introduction Oracle GoldenGate Microservices Architecture (OGG-MA) provides functionality for securing Rest API calls and communications channels between the Distribution and Receiver Servers over...
View ArticleImproving security and availability with Oracle Virtual Cloud Network VCN...
Overview This is the first post of a two part series focusing on how to improve an Oracle Cloud Infrastructure (OCI) Security and Availability using Oracle Virtual Cloud Network (VCN). One of the first...
View ArticleGetting Credentials in Fusion Applications
Introduction Oracle Fusion Applications is configured to save normal user names and credentials in Oracle Internet Directory (OID) and used for authentication purposes. Many of the applications store...
View ArticleEngagement Cloud – an Introduction to calling REST Services
Introduction This article gives a brief introduction to calling REST services from Oracle Engagement Cloud. It assumes a basic understanding of Groovy, Application Composer, and the requirements of the...
View ArticleUsing Eloqua for B2C? and Responsys for B2B?
By Emma Thomas and Michael J. Sullivan Introduction For many situations the choice of marketing platforms is clear. Given that it is well suited to companies that send large amounts of email, push, or...
View ArticleCustom Login Widget for Oracle Identity Cloud Services
Introduction Identity Cloud Services (IDCS) 18.2.4 introduced an all new authentication API that allows customers to build their own login application. Those new APIs allow you to do username and...
View ArticleOnline document signing using Oracle Integration Cloud and Adobe Sign
Introduction Here is a typical process for document signing: The document is downloaded and sent via an email. The recipient then prints, signs, scans and emails the document back. The document is...
View ArticleAPI Gateway SSL configuration in Production
Introduction This blog provides steps to configure SSL certificate in Oracle API Gateway node’s trust store. It becomes necessary when API gateway in installed in “production” mode. Without SSL...
View ArticleOracle Identity Cloud Service: Long Lived OAuth Tokens
One of the responsibilities of Oracle Identity Cloud Service (IDCS) is to serve as an OAuth 2.0 Authorization Server. As an Authorization Server, IDCS issues access and refresh tokens to OAuth Clients....
View ArticleAbout the A-Team Chronicles
About the A-Team Chronicles The A-Team Chronicles website aggregates and organizes content produced by A-Team members. This content captures best practices, tips and tricks and guidance that A-Team...
View ArticleOracle GoldenGate: Passive-Alias Extract
Introduction The Oracle GoldenGate (OGG) Passive-Alias Extract may be used for data replication between source databases located on servers in untrusted security zones and target database servers in...
View ArticleDeploying the Istio Service Mesh on OKE
Introduction Many organizations today are choosing to deploy their applications using a microservice architecture, so what exactly is a microservice architecture? Microservices – also known as the...
View ArticleExtending Oracle Commerce Cloud Functionality – Server-side Extension
Introduction Oracle Commerce Cloud functionality can be extended through widgets, REST APIs, webhooks and Server-side extensions. For user interface customization and/or extensions, widgets and...
View ArticlePart 1: Automate getting an Identity Cloud Service Access Token in Postman
Introduction If you have spent enough time working with web services you have probably heard of Postman. If not, then let me say it is a great tool to test REST APIs against Identity Cloud Service...
View ArticlePart 2: Using Postman Runner with Identity Cloud Service
Introduction In the last article, Part 1: Automate getting an Identity Cloud Service Access Token in Postman, I explained how using a Pre-request Script can automate getting an access token so when a...
View Article