System and method for providing an enterprise deployment topology with thick client functionality
First Claim
1. A system comprising:
- a data center having a deployment topology which includes a Demilitarized Zone (DMZ) public zone, a DMZ secure zone, and an Intranet Data Tier;
a plurality of application hosts and applications provided in the DMZ secure zone according to the deployment topology, wherein said application hosts include one or more microprocessor;
a plurality of virtual hosts and external URLs provided in the DMZ public zone for providing access to aspects of functionality of said plurality of application hosts and applications to Intranet-based users and Internet-based users;
wherein said plurality of virtual hosts communicate with the plurality of application hosts and applications, using HTTP without secure socket layer (SSI) via internal URLs which are not exposed external to the data center, whereby the data center can process requests from said Intranet-based users and Internet-based users; and
an administrative subnet in the DMZ public zone;
a plurality of thick client applications hosted within the administrative subnet; and
a VPN socket connection which allows SSL access to the administrative subnet from a workstation external to said data center, said VPN socket connection being independent of said external URLs provided in the DMZ public zone, whereby an administrative user of the workstation can communicate with said plurality of thick client applications such that said thick clients can communicate requests from the thick-client workstation to said plurality of application hosts and applications.
1 Assignment
0 Petitions
Accused Products
Abstract
In accordance with an embodiment, one or more software application products, such as Oracle Fusion Applications, can be installed and/or configured according to an integration and deployment design/blueprint that is built or optimized for use within a multi-tiered deployment topology at an organization'"'"'s (i.e., customer'"'"'s) data center. Based on the customer site topology, provisioning of the software applications can be optimized; and application life cycle operations performed. This enables each product to be aware of the topology, which in turn provides customers with an “out-of-the-box” solution. The topology can also be optimized for security, performance and simplicity. In accordance with an embodiment, the deployment topology can include thick client functionality.
28 Citations
20 Claims
-
1. A system comprising:
-
a data center having a deployment topology which includes a Demilitarized Zone (DMZ) public zone, a DMZ secure zone, and an Intranet Data Tier; a plurality of application hosts and applications provided in the DMZ secure zone according to the deployment topology, wherein said application hosts include one or more microprocessor; a plurality of virtual hosts and external URLs provided in the DMZ public zone for providing access to aspects of functionality of said plurality of application hosts and applications to Intranet-based users and Internet-based users; wherein said plurality of virtual hosts communicate with the plurality of application hosts and applications, using HTTP without secure socket layer (SSI) via internal URLs which are not exposed external to the data center, whereby the data center can process requests from said Intranet-based users and Internet-based users; and an administrative subnet in the DMZ public zone; a plurality of thick client applications hosted within the administrative subnet; and a VPN socket connection which allows SSL access to the administrative subnet from a workstation external to said data center, said VPN socket connection being independent of said external URLs provided in the DMZ public zone, whereby an administrative user of the workstation can communicate with said plurality of thick client applications such that said thick clients can communicate requests from the thick-client workstation to said plurality of application hosts and applications. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 17)
-
-
10. A method, comprising:
-
providing a data center deployment topology including a Demilitarized Zone (DMZ) DMZ public zone, a DMZ secure zone, and an Intranet Data Tier; providing a plurality of application hosts and applications in the DMZ secure zone according to the deployment topology; providing a plurality of virtual hosts and external URLs in the DMZ public zone for providing access to aspects of functionality of said plurality of application hosts and applications to Intranet-based users and Internet-based users; communicating between said plurality of virtual hosts and said plurality of application hosts and applications using HTTP without secure socket layer (SSL) via internal URLs which are not exposed external to the data center, whereby the data center can process requests from said Intranet-based users and Internet-based users; and providing an administrative subnet in the DMZ public zone; providing a plurality of thick client applications hosted within the administrative subnet; and providing a VPN socket connection allows SSL access to the administrative subnet from a workstation external to said data center, said VPN socket connection being independent of said external URLs provided in the DMZ public zone, whereby an administrative user of the workstation can communicate with said plurality of thick client applications such that said thick clients can communicate requests from the thick-client workstation to said plurality of application hosts and applications. - View Dependent Claims (11, 12, 13, 14, 15, 16)
-
-
18. A non-transitory computer readable medium, including instructions stored thereon which when read and executed by one or more computers cause the one or more computers to perform steps comprising:
-
providing a data center deployment topology including a Demilitarized Zone (DMZ) public zone, a DMZ secure zone, and an Intranet Data Tier; providing a plurality of application hosts and applications in the DMZ secure zone according to the deployment topology; providing a plurality of virtual hosts and external URLs in the DMZ public zone for providing access to aspects of functionality of said plurality of application hosts and applications to Intranet-based users and Internet-based users; communicating between said plurality of virtual hosts and said plurality of application hosts and applications using HTTP without secure socket layer (SSL) via internal URLs which are not exposed external to the data center, whereby the data center can process requests from said Intranet-based users and Internet-based users; and providing an administrative subnet in the DMZ public zone; providing a plurality of thick client applications hosted within the administrative subnet; and providing a VPN socket connection which allows SSL access to the administrative subnet from a workstation external to said data center, said VPN socket connection being independent of said external URLs provided in the DMZ public zone, whereby an administrative user of the workstation can communicate with said plurality of thick client applications such that said thick clients can communicate requests from the thick-client workstation to said plurality of application hosts and applications. - View Dependent Claims (19, 20)
-
Specification