Mais conteúdo relacionado Semelhante a Con8811 converged identity governance for speeding up business and reducing cost final (20) Con8811 converged identity governance for speeding up business and reducing cost final2. Safe Harbor Statement
The following is intended to outline our general product direction. It is
intended for information purposes only, and may not be incorporated
into any contract. It is not a commitment to deliver any material, code,
or functionality, and should not be relied upon in making purchasing
decision. The development, release, and timing of any features or
functionality described for Oracle’s products remains at the sole
discretion of Oracle.
2
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
4. Program Agenda
Converged Identity Governance
Panel Discussion
Q&A
4
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
7. The Right Approach is Self-Reinforcing
Access
Request
Reporting &
Certification
SelfReinfor
cing
Remediation
7
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Provisioning
VISIBILITY
ACROSS
COMPLETE
USER ACCESS
IS KEY
8. Identity Governance
A Platform Approach
Provisioning and Reconciliation
Role and Policy Management
Access Request and Certification
Reporting and Analytics
Identity Administration
8
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Simplify
Access
Reduce
Risk
Improve
Compliance
9. Identity Governance
Business-user friendly
Simplify access request using
an Access Catalog
Allow users to request what
others in their workgroup have
Empower approvers by enabling
email-based approvals
Enforce security using digital
signatures and re-authentication
9
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
10. Identity Governance
Simple, yet Scalable architecture
Authoritative
Sources
Business Users
Application On-boarding
Identity Synchronization
Catalog Management
LDAP Servers
Databases
IT Administrators,
Application Owners
Approval and Provisioning
Workflows
10
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
ERP, Mainframe
Cloud Applications
Onboard and manage the
lifecycle of millions of
identities
Onboard 1000s of
applications without
expensive Connectors
Onboard accounts and
entitlements and manage
their complete lifecycle
Shared workflows to
accelerate request, fulfillment
and Certification
11. Identity Governance
Manage Regular and Privileged Access
Manage access to applications
User requests privilege to manage the
using Access Request
server
Use break glass workflows to get
emergency access
User is granted privilege
User checks out the passwords
Return SYSTEM password
User checks in passwords
Oracle Identity
Governance
Leverage common Connectors
to manage privileged accounts
and credentials
Leverage Access Certification
to ensure Compliance
• User logs in as root
• Adds disk space
Unix Server Database Server
11
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
12. Identity Governance
Continuous Compliance
Manage the lifecycle of
Roles and Policies
Role
Lifecycle
Management
Policy
Lifecycle
Management
Closed Loop
Remediation
Carry out Role Mining
to discover roles
Prevent violations using
Segregation of Duties
Reporting
Governance Analytics
Access
Certification
Segregation
of Duties
Role Mining
12
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Implement Access
Certification
Address violations using
Closed-loop Remediation
15. Come See Our Demo Pods
Moscone South
Oracle Identity
Governance Suite:
Managing
Privileged Accounts
from Your Identity
Platform
15
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Moscone South
Oracle Identity
Governance Suite:
Complete Identity
Lifecycle
Management
Moscone South
Identity
Management
Monitoring with
Oracle Enterprise
Manager
16. IDM Sessions Not To Miss
Monday
1.45 pm – 2:45 pm
•
CON8810: Who Should have Access to What: Better Risk Management
Identity Governance
Moscone West, Room 2018
•
CON8811: Converged Identity Governance for Speeding up Business
and Reducing Cost
Moscone West, Room 2018
•
CON8828: Justifying and Planning a successful Identity
Management Upgrade
Moscone West, Room 2018
Tuesday
10:30 am – 11:30am
Wednesday
1.15 pm – 2.15 pm
16
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
17. Join the Oracle Community
Twitter
twitter.com/OracleIDM
Facebook
facebook.com/OracleIDM
Oracle Blogs
Blogs.oracle.com/OracleIDM
Oracle.com/Identity
17
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
18. Oracle Fusion Middleware
Business Innovation Platform for the Enterprise and Cloud
Complete and Integrated
Web
Social
Mobile
Best-in-class
User Engagement
Business
Process
Management
Open standards
Content
Management
Service Integration
Business
Intelligence
Data Integration
Identity Management
Development
Tools
18
Cloud Application
Foundation
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Enterprise
Management
On-premise and Cloud
Foundation for Oracle Fusion
Applications and Oracle Cloud
Notas do Editor This is our Safe Harbor statement…Please take a moment to review it… With Fusion Middleware, you can extend and maximize your existing technology investment with the same technologies used in Fusion Applications, including embedded analytics and social collaboration, and mobile and cloud computing. Oracle’s complete SOA platform lets your IT organization rapidly design, assemble, deploy, and manage adaptable business applications and—with Oracle’s business process management tools—even bring the task of modeling business processes directly to the business analysts. Oracle Business Intelligence foundation brings together all your enterprise data sources in a single, easy-to-use solution, delivering consistent insights whether it’s through ad hoc queries and analysis, interactive dashboards, scorecards, OLAP, or reporting. And, your existing enterprise applications can leverage the rich social networking capabilities and content sharing that users have come to expect in consumer software. Oracle Fusion Middleware is based on 100 percent open standards, so you aren’t locked into one deployment model when your business requirements change.