Last updated on APRIL 24, 2016
Applies to:Oracle Adaptive Access Manager - Version 184.108.40.206.0 and later
Information in this document applies to any platform.
When we log into OAAM console and use an intercepting proxy like Burp, we can see that the browser includes jsessionid in the GET requests to OAAM admin console. Passing jsessionid in the URL is a security concern and we would like to know if there is a way to disable this?
Sign In with your My Oracle Support account
Don't have a My Oracle Support account? Click to get started
Million Knowledge Articles and hundreds of Community platforms