Elements of SSOARS


For the Social Security Online Accounting and
Reporting System (SSOARS), the Social
Security Administration uses Oracle
Financials and the Oracle database
management system with the General Ledger,
Accounts Payable, Accounts Receivable and
Purchasing modules.

Servers and storage

Software resides on clustered servers from
Sun Microsystems running Solaris. The system
uses Sun Cluster software for high availability
and database failover, Oracle Real
Application Clusters for sharing resources
between nodes, and load-balancing software
from Alteon Networks. EMC direct-access
storage devices supply about 500G of production
storage. Veritas Volume Manager from
Symantec manages the disk drives, and
Veritas File System is used to speed access
and recovery times. Control-M software from
BMC Software handles scheduling.

Disaster recovery

SSA uses a disk-to-disk-to-tape backup system
to ensure that no more than one day's
data is ever lost in a disaster. It uses EMC
TimeFinder software to create Business
Contingency Volume backups twice daily '
before and after batch processing. After the
primary and secondary volumes are synchronized,
split and mounted onto a backup server,
the secondary volume is copied to tape using
Veritas Net Backup and Media Server. Daily
and monthly backups are stored off-site.


Business Objects' Crystal Reports software is
used to create a graphical user interface for
reports on the SSA Web portal.


SSOARS links with the agency's purchasing
system, Compusearch Software Systems'
Prism-Procurement. It also links to the government's
Travel Manager system and the Central
Contractor Registration database.


  • Records management: Look beyond the NARA mandates

    Records management is about to get harder

    New collaboration technologies ramped up in the wake of the pandemic have introduced some new challenges.

  • puzzled employee (fizkes/Shutterstock.com)

    Phish Scale: Weighing the threat from email scammers

    The National Institute of Standards and Technology’s Phish Scale quantifies characteristics of phishing emails that are likely to trick users.

Stay Connected

Sign up for our newsletter.

I agree to this site's Privacy Policy.