How ERPUX keeps your Oracle data secure. Designed for a 10-minute CISO review.
ERPUX is a UI-only layer. It renders data but never stores it. All queries flow directly to your Oracle ERP Cloud instance via Oracle REST APIs.
No data is stored at the ERPUX layer. All responses are streamed directly from Oracle to the browser.
ERPUX never stores your ERP data. Every query is executed in real-time against your Oracle instance. Results are rendered in the browser and discarded when the session ends.
ERPUX uses bidirectional JWT authentication with RS256 signing. No passwords are stored or transmitted.
Oracle sends a signed JWT via Page Integration (Secure Destination). ERPUX verifies the token using Oracle's public certificate. Token contains user identity, roles, and data security context.
ERPUX creates a JWT signed with the customer-specific private key, asserting the authenticated user. Oracle validates this token and executes API calls as that user, enforcing all security policies.
ERPUX does not implement its own authorization layer. All data access is controlled by Oracle.
Customer JWT private keys and service credentials are stored in a cloud-managed, HSM-backed secret vault — never in application databases or source code.
When a customer connects their Oracle instance, the JWT private key is encrypted and stored in a dedicated cloud vault backed by hardware security modules (HSMs). ERPUX retrieves the key at runtime to sign outbound JWT tokens, and discards it from memory after use. The application database only stores a vault reference — never the key itself.
All data is encrypted in transit and at rest across every layer of the platform.
ERPUX runs on a serverless, globally distributed edge network. There are no servers to manage, patch, or secure — reducing attack surface to near zero.
Because ERPUX stores no customer ERP data, your existing Oracle compliance certifications cover your data at rest and in transit. Our infrastructure providers maintain independent SOC 2 and ISO 27001 certifications.
Have security questions? We're happy to walk your security team through the architecture.
Contact Us