Last updated on JUNE 20, 2017
Applies to:Hyperion Foundation Services (including Smartview for Office Toolkit) - Version 10.1.3.4.1  and later
Hyperion Essbase Administration Services - Version 126.96.36.199.000 and later
Hyperion Financial Reporting - Version 188.8.131.52.509 and later
Hyperion BI+ - Version 184.108.40.206.000 and later
Hyperion Planning - Version 220.127.116.11.000 and later
Information in this document applies to any platform.
A common Web security problem is session stealing. This happens when an attacker manages to get a copy of your session cookie, generally while the cookie is being transmitted over the network. This can only happen when the data is being sent in clear-text; that is, the cookie is not encrypted.
EPM System web application sets a cookie to track the session. While setting a cookie, especially a session cookie, the server can set the secure flag, which forces the browser to send the cookie over a secure channel. This behavior reduces the risk of session hijacking.
Secure cookies are available only if EPM System products are deployed in an SSL-enabled environment.
Sign In with your My Oracle Support account
Don't have a My Oracle Support account? Click to get started
My Oracle Support provides customers with access to over a
Million Knowledge Articles and hundreds of Community platforms