PIX and Oracle TNS

I have a PIX firewall between a client and an oracle server.

The customer is always start a connection on port 1521 on the server.

The server always sends a port forwarding to inform him that he

Start a new connection to a second port.

This second port is always random, which makes me create a rule that allows

the client to connect to any port on the server. This situation completely open my server.

Is it possible to create a rule that restrict customer access to the

Server and the oracle connection happen?

Paulo Roque

Have you tried "fixup protocol sqlnet 1521"? BTW, it should be on by default.

Oleg Tipisov,

REDCENTER,

Moscow

Tags: Cisco Security

Similar Questions

  • Oracle's 10 g and Oracle 10 g DB connection problem

    Toady, I installed oracle forms 10g and oracle 10g db when I run my form it gives me this error how can I solve it

    "ora-12154 tns could not resolve the connect identifier specified.


    Here are the values in forms 10g AMT

    tnsnames.ora # Network Configuration file: C:\DevSuiteHome_1\network\admin\tnsnames.ora
    # Generated by Oracle configuration tools.

    EXTPROC_CONNECTION_DATA =
    (DESCRIPTION =
    (ADDRESS_LIST =
    (ADDRESS = (PROTOCOL = TCP)(HOST = localhost) (PORT = 1521))
    )
    (CONNECT_DATA =
    (SERVICE_NAME = PLSExtProc)
    )
    )
    IMS =
    (DESCRIPTION =
    (ADDRESS = (PROTOCOL = TCP)(HOST = localhost) (PORT = 1521))
    (CONNECT_DATA =
    (SERVER = DEDICATED)
    (SERVICE_NAME = IMS)
    )
    )


    and here the values of forms 10g SQLnet

    sqlnet.ora # Network Configuration file: C:\DevSuiteHome_1\network\admin\sqlnet.ora
    # Generated by Oracle configuration tools.

    SQLNET. AUTHENTICATION_SERVICES = (NTS)

    NAMES. DIRECTORY_PATH = (LDAP, TNSNAMES, EZCONNECT, ONAMES, HOSTNAME)

    (description =
    # (address = (protocol = tcp (port = 1383))(host=localhost))
    (ADDRESS = (PROTOCOL = TCP)(HOST = localhost) (PORT = 1521))
    (connect_data =(rpc=on))
    )

    Should what changes I make to overcome this problem.

    On a stand-alone computer (not connected to the network), you need a network emulation. If you use Windows, you can install Microsoft Loopback card (as indicated in the preinstallation of Oracle database requirements , see section * 2.4.4 installation Oracle database on Non-Networked computers *). If you do not use Windows - you will then need to find the equivalent for your operating system.

    In addition, as Paul M indicated, each product Oracle is installed in a House of Oracle. If you have configured the TNSNAMES on the RDBMS, but is not configured for the Suite of developer (Forms 10g), then you will need to perform this configuration. To do this, the easiest method is to set an Environment Variable (TNS_ADMIN) that points to the TNSNAMES file. ORA, you have already set up with your RDBMS. If you don't know how to create an environment variable, see: How to create environment variables.

    Hope this helps,
    Craig B-)

    If someone useful or appropriate, please mark accordingly.

  • How to reconnect the new database with oracle and oracle mid infrastructure

    course oracle environment;
    Database; 10gr 2 (10.2.0.1) old-SID: gtxprod host: 10.30.100.199
    new database; 10gr 2 (10.2.0.1) - SID: gtxprod2 host: 10.40.110.199
    application sever. 10.2.0.1 (oracle mid level.) and oracle infra SSO, forms, reports, portal.

    problem;
    I try to reconnect from the application to the new database server. I do not know how?

    I went to /opt/oracle/10ggtxinf/network/admin/tnsnames.ora
    # tnsnames.ora Network Configuration File: /opt/oracle/10gasr2inf/network/admin/tnsnames.ora
    # Generated by Oracle configuration tools.
    
    asdb.gtx.com =
      (DESCRIPTION =
        (ADDRESS = (PROTOCOL = TCP)(HOST = isdev.gtx.com)(PORT = 1521))
        (CONNECT_DATA =
          (SERVER = DEDICATED)
          (SERVICE_NAME =asdb.gtx.com)
        )
      )
    
    
    gtxprod.gtx.com =
      (DESCRIPTION =
        (ADDRESS_LIST =
          (ADDRESS = (PROTOCOL = TCP)(HOST = gtxprod.gtx.com)(PORT = 1521))
        )
        (CONNECT_DATA =
          (SID = gtxprod)
        )
      )
    
    gtxprod2.gtx.com =
      (DESCRIPTION =
        (ADDRESS_LIST =
          (ADDRESS = (PROTOCOL = TCP)(HOST = gtxprod2.gtx.com)(PORT = 1521))
        )
        (CONNECT_DATA =
          (SID = gtxprod2)
        )
      )
    In application of the oracle infra. How Asian Bank of development of database instance can connected with the new data base gtxprod2?

    In Forms Server, based on a Web site, if go to Forms Server, I can see tns.ora but I can't see anything to update to the new database.

    you could give me information how understand this problem?

    Thank you very much in advance

    Hi Wen,

    As you have created a new database 'gtxprod2' so the Stanley database should be in place
    cmd--> lsnrctl status
    That you have even made changes to 10ggtxinf/network/admin/tnsnames.ora
    do the same entry in the oraclebi/network/admin/tnsname.ora file

    You can check if your new entry is rite of
    tnsping gtxprod2 (>)
    Now you ask how the application will come to know what database to point to
    Go to oracle AS
    As using your forms and reports go to oraclebi/forms/server/formsweb.cfg

    At the end of the file, there might be a few entries
    for example
    [test]
    envFile = test.env
    Form = LOGIN_ENT.fmx
    LookAndFeel = oracle
    separateFrame = true
    UserID=nrs_fd/nrs_fd@fixdep
    SplashScreen = NO
    logo = NO
    Background = No.
    color = auto
    make = yes
    Archive = frmall.jar
    archive_jini = frmall_jinit.jar, frmwebutil.jar, Jacob.jar, icons.jar
    ImageBase codebase =
    term = frmpcweb.res
    baseHTML = webutilbase.htm
    baseHTMLjinitiator = webutiljini.htm
    baseHTMLjpi = webutiljpi.htm
    WebUtilArchive = frmwebutil.jar, jacob.jar

    "userid=nrs_fd/nrs_fd@fixdep" IE (username) / (password) @tnsname
    the following entry specifies what database, the application must point to

    If your using a war file, you must create a data source and as datasource, you must specify the tnsname input

    Concerning
    Fabian

  • PIX and ASA static, dynamic and RA VPN does not

    Hello

    I am facing a very interesting problem between a PIX 515 and an ASA 5510.

    The PIX is in HQ and has several dynamic VPN connections (around 130) and IPsec vpn remote works very well. I had to add a PIX to ASA L2L VPN static and it does not work as it is supposed to be. The ASA 5510, at the remote end, connects and rest for a small period of time, however, all other VPN connections stop working.

    The most interesting thing is that ASA is associated with the dynamic map and not the static map that I created (check by sh crypto ipsec his counterpart x.x.x.x). However, if I make any changes in the ACL 'ACL-Remote' it affects the tunnel between the PIX and ASA.

    Someone saw something like that?

    Here is more detailed information:

    HQ - IOS 8.0 (3) - PIX 515

    ASA 5510 - IOS 7.2 (3) - remote provider

    Several Huawei and Cisco routers dynamically connected via ADSL

    Several users remote access IPsec

    A VPN site-to site static between PIX and ASA - does not.

    Here is the config on the PIX:

    Crypto ipsec transform-set ESP-3DES-ESP-SHA-HMAC-IPSec esp-3des esp-sha-hmac

    Dyn - VPN game 100 Dynamics-card crypto transform-set ESP-3DES-ESP-SHA-HMAC-IPSec

    Crypto dynamic-map Dyn - VPN 100 the value reverse-road

    VPN - card 30 crypto card matches the ACL address / remote

    card crypto VPN-card 30 peers set 20 x. XX. XX. XX

    card crypto VPN-card 30 the transform-set ESP-3DES-ESP-SHA-HMAC-IPSec value

    VPN crypto card - 100 - isakmp dynamic Dyn - VPN ipsec

    interface card crypto VPN-card outside

    crypto ISAKMP allow outside

    crypto ISAKMP policy 10

    preshared authentication

    3des encryption

    md5 hash

    Group 2

    life 86400

    crypto ISAKMP policy 65535

    preshared authentication

    3des encryption

    sha hash

    Group 2

    life 86400

    access list ACL-remote ext ip 10.0.0.0 allow 255.255.255.0 192.168.1.0 255.255.255.0

    Thank you.

    Marcelo Pinheiro

    The problem is that the ASA has a crypto acl defined between host and network, while the remote end has to the network.

    Make sure that the acl is reversed.

  • PIX and NAT - T

    Hi all

    I have a small question. I have a couple of users who use routers to connect by VPN to our pix that authenticates by a RAY for L2TP connections. I enabled the NAT - T on our PIX and they may not always connect. Is there anything I might have missed. I checked most of the posts in this forum do not see anything else, I should have activated.

    Can anyone help?

    Thanks in advance.

    Michael

    A tunnel of Lan-to-Lan of a router in a PIX does not NAT - T, unless there is NAT devices between two end points. If this is the case, you must ensure that both the software both from the end of rehbeh points devices support this capability. An example of a router to tunnel PIX IPSec configuration is available at http://www.cisco.com/en/US/products/hw/vpndevc/ps2030/products_configuration_example09186a0080094498.shtml

    Another example that deals with the same configuration with NAT is available at

    http://www.Cisco.com/en/us/Tech/tk583/TK372/technologies_configuration_example09186a0080094a87.shtml

  • 5.1 ACS is not supported ODBC and Oracle

    Hi Netpro

    Train my familiar and careless with the old version of the ACS, ACS unit I bought two 5.1 device to work in the HA function. After installation and did ' t tried configured for use with the external database with ORACLE, I see nothing. I tried to read the paper and I saw no keyword that said this support the ODBC or Oracle version. If anyone can help me what is the workaround for ACS work with ODBC and Oracle.

    Thank you

    Pitcher

    This pitcher,

    4.2 the CSA can be installed on the CSACS-1120-K9 unit simply re-Imaging it (so not really a downgrade) with a dedicated DVD.

    You can get such a DVD through an official TAC case:

    http://Tools.Cisco.com/ServiceRequestTool/create/launch.do

    Kind regards

    Fede

    --

    If this helps you or answers to your question if it you please mark it as 'responded' or write it down, if other users can easily find it.

  • VPN between a PIX and a VPN 3000

    I'm trying to set up a VPN between PIX and a VPN 3000. All configurations are complete, but the tunnel has not been established. On the PIX, to 'see the crypto engine' and ' show isakmp his ' orders, I do not see the tunnel. Of "show ipsec his ' command, I can see the mistakes"#send"continues to increase when I try to connect to the remote network. Here is the copy - paste command:

    Tag crypto map: myvpnmap, local addr. 10.70.24.2

    local ident (addr, mask, prot, port): (10.70.24.128/255.255.255.128/0/0)

    Remote ident (addr, mask, prot, port): (10.96.0.0/255.224.0.0/0/0)

    current_peer: 10.70.16.5:0

    LICENCE, flags is {origin_is_acl},

    #pkts program: encrypt 0, #pkts: 0, #pkts 0 digest

    #pkts decaps: 0, #pkts decrypt: 0, #pkts check 0

    compressed #pkts: 0, unzipped #pkts: 0

    #pkts uncompressed: 0, #pkts compr. has failed: 0, #pkts decompress failed:

    #send 12, #recv errors 0

    local crypto endpt. : 10.70.24.2, remote Start crypto. : 10.70.16.5

    Path mtu 1500, fresh ipsec generals 0, media, mtu 1500

    current outbound SPI: 0

    SAS of the esp on arrival:

    the arrival ah sas:

    SAS of the CFP on arrival:

    outgoing esp sas:

    outgoing ah sas:

    outgoing CFP sas:

    Obviously, the PIX identifies protected traffic but failed to establish the tunnel. I was wondering what could be the reason for these kind of mistakes? That means them growing '#send errors?

    Thank you very much!

    Sending error mean simply the PIX is grateful to encrypt this traffic, but there is no built tunnel and so it must drop the package.

    you will need to look at why the tunnel is not under construction however, "sending error" are just a byproduct of some other configuration issue. On the PIX, it looks like you would have something like:

    Crypto ip 10.70.24.128 access list allow 255.255.255.128 10.96.0.0 255.224.0.0

    On the 3000 under the L2L section and the Local and remote network, you need the exact opposite of the latter, then it would be:

    / Local network mask = 10.96.0.0/0.31.255.255

    / Remote network mask = 10.70.24.128/0.0.0.127

    If you have something else the tunnel will fail to come. Otherwise, we see that the Cryptography debugs the PIX and the trunk of the 3000 when the tunnel is built.

  • Installation of site to site VPN IPSec using PIX and ASA

    / * Style definitions * / table. MsoNormalTable {mso-style-name : « Table Normal » ; mso-tstyle-rowband-taille : 0 ; mso-tstyle-colband-taille : 0 ; mso-style-noshow:yes ; mso-style-priorité : 99 ; mso-style-qformat:yes ; mso-style-parent : » « ;" mso-rembourrage-alt : 0 à 5.4pt 0 à 5.4pt ; mso-para-margin : 0 ; mso-para-marge-bottom : .0001pt ; mso-pagination : widow-orphelin ; police-taille : 11.0pt ; famille de police : « Calibri », « sans-serif » ; mso-ascii-font-family : Calibri ; mso-ascii-theme-font : minor-latin ; mso-fareast-font-family : « Times New Roman » ; mso-fareast-theme-font : minor-fareast ; mso-hansi-font-family : Calibri ; mso-hansi-theme-font : minor-latin ; mso-bidi-font-family : « Times New Roman » ; mso-bidi-theme-font : minor-bidi ;}

    I am a site configuration to site IPSec VPN using a PIX515E to site A and ASA5520 to Site B.

    I have attached the lab diagram. Consider PIX and ASA are in default configuration, which means that nothing is configured on both devices.

    According to the scheme

    ASA5520

    External interface is the level of security 11.11.10.1/248 0

    The inside interface is 172.16.9.2/24 security level 100

    Default route is 0.0.0.0 0.0.0.0 11.11.10.2 1

    PIX515E

    External interface is the level of security 123.123.10.2/248 0

    The inside interface is 172.16.10.1/24 security level 100

    Default route is 0.0.0.0 0.0.0.0 123.123.10.1 1

    / * Style definitions * / table. MsoNormalTable {mso-style-name : « Table Normal » ; mso-tstyle-rowband-taille : 0 ; mso-tstyle-colband-taille : 0 ; mso-style-noshow:yes ; mso-style-priorité : 99 ; mso-style-qformat:yes ; mso-style-parent : » « ;" mso-rembourrage-alt : 0 à 5.4pt 0 à 5.4pt ; mso-para-margin : 0 ; mso-para-marge-bottom : .0001pt ; mso-pagination : widow-orphelin ; police-taille : 11.0pt ; famille de police : « Calibri », « sans-serif » ; mso-ascii-font-family : Calibri ; mso-ascii-theme-font : minor-latin ; mso-fareast-font-family : « Times New Roman » ; mso-fareast-theme-font : minor-fareast ; mso-hansi-font-family : Calibri ; mso-hansi-theme-font : minor-latin ; mso-bidi-font-family : « Times New Roman » ; mso-bidi-theme-font : minor-bidi ;}

    Could someone tell me how to set up this configuration? I tried but didn't workout. Here is the IKE protocol I have used.

    IKE information:

    IKE Encrytion OF

    MD5 authentication method

    Diffie Helman Group 2

    Failure to life

    IPSEC information:

    IPsec encryption OF

    MD5 authentication method

    Failure to life

    Please enter the following command

    on asa

    Sysopt connection permit VPN

    on pix not sure of the syntax, I think it is

    Permitted connection ipsec sysopt

    What we are trying to do here is basically allowing vpn opening ports

    Alternatively you can open udp 500 and esp (or port ip 50) out to in on the two firewalls

  • PIX and non - IP traffic

    I need to install a PIX 501 in a network. The internal interface is connected to my local network and that the external interface is connected to e0 interface of the router.

    The LAN have LLC,(2) and IP traffic. Is possible to LLC,(2) traffic through the firewall without tunnel? Can I connected another interface on the router in the local network only to traffic ll2?

    Thank you

    The PIX only manages the IP traffic, so unless tyou can encapsulate your traffic IP LLC, the PIX won't touch it. I guess you can bypass the PIX and connect a LLC,(2) interface that is only on the router in your home network, depends on how secure you want to be. Make sure that you do not configure an IP address on the router interface, otherwise you will run the risk of someone circumvent security of PIX.

  • PIX and SSH - access to PIX via SSH

    Need help with PIX and SSH

    Objective: Connect to PIX via SSH from the 10.1.1.50 IP address behind inside the interface on the PIX using local aaa on PIX.

    Current settings:

    hostname pix1

    example.com domain name

    CA generates the key rsa 1024

    example username password abc123 privileges 15

    include authentication AAA ssh inside 10.1.1.50 255.255.255.255 local

    SSH 10.1.1.50 255.255.255.255 inside

    Thanks for any help!

    Try this:

    AAA-server local LOCAL Protocol

    the ssh LOCAL console AAA authentication

  • Site to Site VPN between PIX and Linksys RV042

    I am trying to create a tunnel between a 506th PIX and a Linksys RV042 vpn .  I configured the Phase 1 and Phase 2 as well as the transformation defined and interested traffic and connected to the external interface, but it will not create the tunnel.  Configurations are as follows:

    506th PIX running IOS 6.3

    part of pre authentication ISAKMP policy 40
    ISAKMP policy 40 cryptographic 3des
    ISAKMP policy 40 sha hash
    40 2 ISAKMP policy group
    ISAKMP duration strategy of life 40 86400
    ISAKMP key * address 96.10.xxx.xxx netmask 255.255.255.255
    access-list 101 permit ip 192.168.21.0 255.255.255.0 192.168.1.0 255.255.255.0crypto map Columbia_to_Office 10 ipsec-isakmp
    crypto Columbia_to_Office 10 card matches the address 101
    card crypto Columbia_to_Office 10 set peer 96.10.xxx.xxx
    10 Columbia_to_Office transform-set ESP-3DES-SHA crypto card game
    Columbia_to_Office interface card crypto outside

    Linksys RV042

    Configuration of local groups
    IP only
         IP address: 96.10.xxx.xxx
    Type of local Security group: subnet
    IP address: 192.168.1.0
    Subnet mask: 255.255.255.0

    Configuration of the remote control groups
    IP only
    IP address: 66.192.xxx.xxx
    Security remote control unit Type: subnet
    IP address: 192.168.21.0
    Subnet mask: 255.255.255.0

    IPSec configuration
    Input mode: IKE with preshared key
    Group Diffie-Hellman phase 1: group2
    Phase 1 encryption: 3DES
    Authentication of the phase 1: SHA1
    Life of ITS phase 1: 86400
       
    Phase2 encryption: 3DES
    Phase2 authentication: SHA1
    Phase2 life expectancy: 3600 seconds
    Pre-shared key *.

    I'm a novice on the VPN. Thanks in advance for your expertise.

    Yes, version PIX 6.3 does not support HS running nat or sh run crypto.

    Please please post the complete config if you don't mind.

    Please also try to send traffic between subnets 2 and get the output of:

    See the isa scream his

    See the ipsec scream his

  • Version 7.0 of the PIX and ASA 5500

    Hi all

    Is ASA 5500 series identical a PIX 515 or 525 or 535 with version 7.0... I still see some areas where it confused between version 7.0 of the PIX and ASA 5500 series... If not, what are the benefits of ASA 5500 on the PIX 7.0?

    ASA is not the same as PIX, ASA is different hardware architecture. Although both can run the same code. One of the benefits of the SAA is that you can have an IPS module in it to make the prevention of intrusions.

    Search for comprarison on CCO.

  • Router vpn site to site PIX and vpn client

    I have two on one interface on the pix vpn connections that terminate VPN. client vpn and VPN site-to-site have passed phase one and two and decrypt and encrypt the packets. However as in another post I can not ping through the l2l vpn. I checked this isn't a nat problem a nd two NAT 0 on the pix and the NAT on the router access lists work correctly.

    ISAKMP crypto RTR #show its
    IPv4 Crypto ISAKMP Security Association
    status of DST CBC State conn-id slot
    66.x.x.x 89.x.x.x QM_IDLE 2001 0 ACTIVE

    IPv6 Crypto ISAKMP Security Association

    local ident (addr, mask, prot, port): (192.168.2.0/255.255.255.0/0/0)
    Remote ident (addr, mask, prot, port): (192.168.10.0/255.255.255.0/0/0)
    current_peer 66.x.x.x port 500
    LICENCE, flags is {origin_is_acl},
    #pkts program: 23583, #pkts encrypt: 23583 #pkts digest: 23583
    #pkts decaps: 18236, #pkts decrypt: 18236, #pkts check: 18236
    compressed #pkts: 0, unzipped #pkts: 0
    #pkts uncompressed: 0, #pkts compr. has failed: 0
    #pkts not unpacked: 0, #pkts decompress failed: 0
    #send 40, #recv errors 0

    local crypto endpt. : 89.x.x.x, remote Start crypto. : 66.x.x.x
    Path mtu 1380, ip mtu 1380, ip mtu BID Dialer0
    current outbound SPI: 0xC4BAC5E (206285918)

    SAS of the esp on arrival:
    SPI: 0xD7848FB (225986811)
    transform: aes - esp esp-sha-hmac.
    running parameters = {Tunnel}
    Conn ID: 3, flow_id: Motorola SEC 1.0:3, card crypto: PIX_MAP
    calendar of his: service life remaining (k/s) key: (4573083/78319)
    Size IV: 16 bytes
    support for replay detection: Y
    Status: ACTIVE

    the arrival ah sas:

    SAS of the CFP on arrival:

    outgoing esp sas:
    SPI: 0xC4BAC5E (206285918)
    transform: aes - esp esp-sha-hmac.
    running parameters = {Tunnel}
    Conn ID: 4, flow_id: Motorola SEC 1.0:4, card crypto: PIX_MAP
    calendar of his: service life remaining (k/s) key: (4572001/78319)
    Size IV: 16 bytes
    support for replay detection: Y
    Status: ACTIVE

    outgoing ah sas:

    outgoing CFP sas:

    Expand the IP NAT access list
    10 deny ip 192.168.2.0 0.0.0.255 192.168.10.0 0.0.0.255 (21396 matches)
    20 permit ip 192.168.2.0 0.0.0.255 everything (362 matches)
    Expand the IP VPN_ACCESS access list
    10 permit ip 192.168.20.0 0.0.0.255 192.168.10.0 0.0.0.255 (39724 matches)

    I looked on the internet and that it points to a routing error when packets are being encrypted and decrypted, but you can't do a ping on the binding. However when I test the connection I did not enter any of the static routes that networks are connected directly on each side of the pix and the router. any help would be a preciated as I think there's maybe something is blocking the ping to reach the internal network at the end of pix with a configured access list.

    is ping failure of the only thing between the site to site VPN? and assuming that all other traffic works fine since it decrypts and encrypts the packets.

    If it's just ping, then activate pls what follows on the PIX:

    If it is version 6.3 and below: fixup protocol icmp

    If it is version 7.0 and higher: select "inspect icmp" under your political map of the world.

    Config complete hand and on the other could help determine if it's a configuration problem or another problem.

  • silent uninstall ODAC 12 c module 4 and Oracle development tools

    Hi all

    I need to uninstall a previously installed ODAC 12 c module 4 and Oracle Developer Tools silently. Oui\bin\setup.exe will be fine uninstall, but I want to uninstall it from script.

    There is no button to save a responsefile at the end of the dialog box.

    oui\bin\setup.exe-Enregistrer FichierDestination - odacr4 - deinst.rsp

    Does not complain, but does not record a response file.

    Installation notes describe uninstall them, but not without supervision/silencer.

    Any advice?

    Best regards

    Niels Jespersen

    Here's what I used to silently uninstall ODT with ODAC. It does not require a response file, but requires that you specify the Oracle home

    "{' C:\oracle\product\12.1.0\client_1\oui\bin\setup.exe-silent - waitforcompletion - nowait - uninstall" DEINSTALL_LIST = {"oracle.odac.client","12.1.0.2.0"} "' REMOVE_HOMES={"C:\oracle\product\12.1.0\client_1 "}"

    A log file is generated in C:\Program Files (x 86) \Oracle\Inventory\logs

  • SSO ADF and Oracle Forms?

    Hello

    Is there a recommended way to share authentication between ADF and Oracle forms?

    We currently use Oracle 11 g 2 forms and we have our forms developed in-house running on this.  I would like to start working on some applications of the ADF, but I do not know how to ensure that the username and passwords are the same for our existing forms applications and any new request to ADF we add.

    I would use JDeveloper 12 c.

    We have < 100 users, so this isn't a large installation, and most users are (same office).

    Thanks for ideas or advice.

    Check out this blog https://blogs.oracle.com/olaf/entry/ofm_11g_oam_sso_for_forms_and because it describes how using OAM.

    Timo

Maybe you are looking for