SlideShare uma empresa Scribd logo
1 de 60
Phase 1.0 POC Mar 2010 Mohamed Atef MW Administrator
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHY ORACLE IDENTITY MANAGEMENT Oracle Identity Management  allows enterprises to manage end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. Oracle Identity Management  is a member of the Oracle Fusion Middleware family of products, which brings greater agility, better decision-making, and reduced cost and risk to diverse IT environments today.
Oracle Identity Management Solutions Single Sign-On and Web Access Control: Oracle Access Manager  (Protecting resources at a point of access and delegating authentication and authorization decisions to a central authority, help secure web, J2EE  and enterprise applications). Oracle Enterprise Single Sign-On Suite Plus  (Enterprise users can enjoy the benefits of single sign-on to all of their applications, whether they are connected to the corporate network, traveling away from the office, roaming between computers or working at a shared workstation). Directory Services: Oracle Internet Directory  (Is an LDAP v3 compliant directory with meta-directory capabilities. It is built on the industry leading Oracle database and is fully integrated into Oracle Fusion Middleware and Oracle Applications). Oracle Virtual Directory  (Creating a secure application environment requires integration of existing user identity information. For some companies, that information is contained in databases. Others use LDAP directories or Windows Domains. For most, this information is scattered across multiple locations and multiple services, provides Internet and industry-standard LDAP and XML views of existing enterprise identity information, without synchronizing or moving data from its native locations). Oracle Directory Server Enterprise Edition  (Formerly “SUN Directory Server Enterprise Edition” is the best known directory server with proven large deployments in carrier and enterprise environments. It is also the most supported directory by ISVs, so it is ideal for heterogeneous environments. ODSEE provides a core directory service with embedded database, directory proxy, Active Directory (AD) synchronization and a Web administration console). Oracle Authentication Services for Operating Systems  (Oracle Authentication Services for Operating Systems provides centralized authentication and account management for Unix and Linux platforms. This page contains information to get you started with Oracle Authentication Services for Operating Systems.).
Oracle Identity Management Solutions Content Access Control: Oracle Information Rights Management  (Formerly “SealedMedia” is a new form of information security technology that secures and tracks sensitive digital information everywhere it is stored and used, such as encrypting ("sealing") and classifying documents, emails and web pages, and the requirement to install Oracle IRM Desktop agent software on every end user device on which sealed information is created or used). Strong Authentication: Extended Identity Management Ecosystem  (Organizations commonly have multiple security systems in place—one technology to secure physical access, another to secure legacy applications, and yet another to secure network access. To cope with these "silo'd" solutions, Oracle has partnered with best-of-breed ISVs to offer a central and effective means to enforce security policy across all enterprise resources. As part of the Oracle Identity Management Ecosystem, partner solutions seamlessly integrate into Oracle Identity Management solutions extend a common security and identity management framework across all enterprise applications). Oracle Adaptive Access Manager  (Oracle Adaptive Access Manager consists of two primary components that together create one of the most powerful and flexible weapons in the war against fraud. Adaptive Strong Authenticator provides multifactor authentication and protection mechanisms for sensitive information such as passwords, PINs, security questions, account numbers and other credentials). Identity Administration: Oracle Identity Manager  (Formerly known as “Oracle Xellerate Identity Provisioning”, is a powerful and flexible enterprise identity management system that automatically manages users' access privileges within enterprise IT resources). Oracle Role Manager  (Previously known as “Bridgestream SmartRoles”, is an enterprise-class application for managing business and organizational role lifecycle management).
Oracle Identity Management Solutions Federated Identity: Oracle Identity Federation  (Significantly reduces the need to create unnecessary identity in an enterprise directory and lowers the ongoing costs of partner integrations through support of industry federation standards, protects existing IT investments by integrating with a wide variety of data stores, user directories, authentication providers and applications) Fine Grained Entitlements: Oracle Entitlements Server  (Secures access to application resources and software components (such as URLs, EJBs, and JSPs) as well as arbitrary business objects (such as customer accounts or patient records). Oracle Entitlements Server policies specify which users, groups, and/or roles can access application resources, allowing those roles to be dynamically resolved at runtime). Oracle – Sun: Oracle Waveset  (Providesoperational and business efficiency by providing complete automation of user accounts and entitlements provisioning into a variety of enterprise business applications. Oracle Waveset integrates automated identity lifecycle management with identity auditing capabilities, and makes it possible to manage these processes at the business role level).  Oracle OpenSSO  (Is a complete solution that provides Web access management, federated single sign-on and Web services security in a single, self-contained application).
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
WHAT IS ORACLE IDENTITY MANAGER ,[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER ARCHITECTURE ,[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER ARCHITECTURE The  Oracle Identity Manager  architecture has three tiers: Presentation tier Server tier Data & Enterprise Integration tier
TIER1: PRESENTATION TIER ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIER2: SERVER TIER ,[object Object],[object Object],[object Object],[object Object]
TIER2: SERVER TIER ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIER3: DATA & ENTERPRISE INTEGRATION TIER ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIER3: DATA & ENTERPRISE INTEGRATION TIER ,[object Object],[object Object],[object Object],[object Object]
RECONCILIATION & PROVISIONING: OVERVIEW ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RECONCILIATION: TYPES ,[object Object],[object Object],[object Object]
RECONCILIATION: EVENTS ,[object Object],[object Object],[object Object],[object Object]
PROVISIONING: TYPES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TRUSTED SOURCE RECONCILIATION: CONCEPTUAL DIAGRAM ,[object Object],1 Reconciliation flow Provisioning flow Target resource (for example, an Oracle HRMS) Administrator End user Trusted source (for example, Active Directory)
TARGET RESOURCE RECONCILIATION: CONCEPTUAL DIAGRAM ,[object Object],Reconciliation flow Provisioning flow 2 End user Administrator Trusted source (for example, a Active Directory)   Target resource (for example, an Oracle HRMS)
ORACLE IDENTITY MANAGER CONNECTOR: OVERVIEW ,[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CONNECTOR: COMPONENTS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP1 ,[object Object],IT resource type 1
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP1 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP2 ,[object Object],IT resource IT resource type 2
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP2 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP3 ,[object Object],IT resource type Custom process form 3 IT resource
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP3 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP4 ,[object Object],IT resource IT resource type Custom process form Process task adapter 4
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP4 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP5 ,[object Object],IT resource IT resource type Resource object Custom process form Process task adapter 5
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP5 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP6 ,[object Object],IT resource IT resource type Resource object Provisioning process Custom process form Process task adapter 6
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP6 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP7 ,[object Object],IT resource IT resource type Resource object Provisioning process Custom process form Process task adapter Process task   7
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP7 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP8 ,[object Object],IT resource IT resource type Resource object Provisioning process Custom process form Process task adapter Process task   8
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP8 ,[object Object]
ORACLE IDENTITY MANAGER CONNECTORS LIST ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CONNECTORS LIST ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CONNECTORS LIST ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CERTIFIED OPERATING SYSTEMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CERTIFIED APPLICATION SERVERS ,[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CERTIFIED DATABASES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
POC: SCOPE ,[object Object],[object Object],[object Object],Reconciliation flow Provisioning flow Active Director   Oracle HRMS
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
 

Mais conteúdo relacionado

Mais procurados

Oracle data guard for beginners
Oracle data guard for beginnersOracle data guard for beginners
Oracle data guard for beginnersPini Dibask
 
Oracle Weblogic for EBS and obiee (R12.2)
Oracle Weblogic for EBS and obiee (R12.2)Oracle Weblogic for EBS and obiee (R12.2)
Oracle Weblogic for EBS and obiee (R12.2)Berry Clemens
 
OpenIDM - An Introduction
OpenIDM - An IntroductionOpenIDM - An Introduction
OpenIDM - An IntroductionForgeRock
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
Oracle architecture ppt
Oracle architecture pptOracle architecture ppt
Oracle architecture pptDeepak Shetty
 
Intro to OAuth2 and OpenID Connect
Intro to OAuth2 and OpenID ConnectIntro to OAuth2 and OpenID Connect
Intro to OAuth2 and OpenID ConnectLiamWadman
 
OpenAM - An Introduction
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An IntroductionForgeRock
 
Oracle Cloud Infrastructure (OCI)
Oracle Cloud Infrastructure (OCI)Oracle Cloud Infrastructure (OCI)
Oracle Cloud Infrastructure (OCI)emmajones88
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?ForgeRock
 
WIN403_AWS Directory Service for Microsoft Active Directory Deep Dive
WIN403_AWS Directory Service for Microsoft Active Directory Deep DiveWIN403_AWS Directory Service for Microsoft Active Directory Deep Dive
WIN403_AWS Directory Service for Microsoft Active Directory Deep DiveAmazon Web Services
 
vRO Training Document
vRO Training DocumentvRO Training Document
vRO Training DocumentMayank Goyal
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management StrategyNetIQ
 
What to Expect From Oracle database 19c
What to Expect From Oracle database 19cWhat to Expect From Oracle database 19c
What to Expect From Oracle database 19cMaria Colgan
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise ManagerBob Rhubart
 
Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_02Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_02gameaxt
 
Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015Alvaro Sanchez-Mariscal
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
Oracle Cloud Storage Service & Oracle Database Backup Cloud Service
Oracle Cloud Storage Service & Oracle Database Backup Cloud ServiceOracle Cloud Storage Service & Oracle Database Backup Cloud Service
Oracle Cloud Storage Service & Oracle Database Backup Cloud ServiceJean-Philippe PINTE
 
Introduction to Oracle Cloud Infrastructure Services
Introduction to Oracle Cloud Infrastructure ServicesIntroduction to Oracle Cloud Infrastructure Services
Introduction to Oracle Cloud Infrastructure ServicesKnoldus Inc.
 

Mais procurados (20)

Oracle data guard for beginners
Oracle data guard for beginnersOracle data guard for beginners
Oracle data guard for beginners
 
Oracle Weblogic for EBS and obiee (R12.2)
Oracle Weblogic for EBS and obiee (R12.2)Oracle Weblogic for EBS and obiee (R12.2)
Oracle Weblogic for EBS and obiee (R12.2)
 
OpenIDM - An Introduction
OpenIDM - An IntroductionOpenIDM - An Introduction
OpenIDM - An Introduction
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Oracle architecture ppt
Oracle architecture pptOracle architecture ppt
Oracle architecture ppt
 
Intro to OAuth2 and OpenID Connect
Intro to OAuth2 and OpenID ConnectIntro to OAuth2 and OpenID Connect
Intro to OAuth2 and OpenID Connect
 
CyberArk
CyberArkCyberArk
CyberArk
 
OpenAM - An Introduction
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An Introduction
 
Oracle Cloud Infrastructure (OCI)
Oracle Cloud Infrastructure (OCI)Oracle Cloud Infrastructure (OCI)
Oracle Cloud Infrastructure (OCI)
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
 
WIN403_AWS Directory Service for Microsoft Active Directory Deep Dive
WIN403_AWS Directory Service for Microsoft Active Directory Deep DiveWIN403_AWS Directory Service for Microsoft Active Directory Deep Dive
WIN403_AWS Directory Service for Microsoft Active Directory Deep Dive
 
vRO Training Document
vRO Training DocumentvRO Training Document
vRO Training Document
 
Building an Effective Identity Management Strategy
Building an Effective Identity Management StrategyBuilding an Effective Identity Management Strategy
Building an Effective Identity Management Strategy
 
What to Expect From Oracle database 19c
What to Expect From Oracle database 19cWhat to Expect From Oracle database 19c
What to Expect From Oracle database 19c
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise Manager
 
Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_02Microsoft Offical Course 20410C_02
Microsoft Offical Course 20410C_02
 
Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015Stateless authentication with OAuth 2 and JWT - JavaZone 2015
Stateless authentication with OAuth 2 and JWT - JavaZone 2015
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
Oracle Cloud Storage Service & Oracle Database Backup Cloud Service
Oracle Cloud Storage Service & Oracle Database Backup Cloud ServiceOracle Cloud Storage Service & Oracle Database Backup Cloud Service
Oracle Cloud Storage Service & Oracle Database Backup Cloud Service
 
Introduction to Oracle Cloud Infrastructure Services
Introduction to Oracle Cloud Infrastructure ServicesIntroduction to Oracle Cloud Infrastructure Services
Introduction to Oracle Cloud Infrastructure Services
 

Destaque

Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overviewEslam Hafez
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Oracle
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningMike Reams
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentationstefanjung
 
Oracle Fusion Applications Security - Designing Roles
Oracle Fusion Applications Security - Designing RolesOracle Fusion Applications Security - Designing Roles
Oracle Fusion Applications Security - Designing Roleskmundy
 
Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Andrejs Prokopjevs
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationDelivery Centric
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access ManagementDLT Solutions
 
What is tackled in the Java EE Security API (Java EE 8)
What is tackled in the Java EE Security API (Java EE 8)What is tackled in the Java EE Security API (Java EE 8)
What is tackled in the Java EE Security API (Java EE 8)Rudy De Busscher
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingJohn Bauer
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2OracleIDM
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 

Destaque (18)

Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overview
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
 
ABC’s Proposal
ABC’s ProposalABC’s Proposal
ABC’s Proposal
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity Provisioning
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
Oracle Fusion Applications Security - Designing Roles
Oracle Fusion Applications Security - Designing RolesOracle Fusion Applications Security - Designing Roles
Oracle Fusion Applications Security - Designing Roles
 
Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...
 
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
What is tackled in the Java EE Security API (Java EE 8)
What is tackled in the Java EE Security API (Java EE 8)What is tackled in the Java EE Security API (Java EE 8)
What is tackled in the Java EE Security API (Java EE 8)
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 

Semelhante a Oim Poc1.0

Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsGregOracle
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity featuresAnil Pandey
 
IDM Resume _ Kiran
IDM Resume _ KiranIDM Resume _ Kiran
IDM Resume _ KiranKiran Kumar
 
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...Subbu Devulapalli
 
7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodromDoina Draganescu
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1AgileIT
 
Products
ProductsProducts
Productsnafia
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
What Is Oracle Fusion Middleware .pdf
What Is Oracle Fusion Middleware .pdfWhat Is Oracle Fusion Middleware .pdf
What Is Oracle Fusion Middleware .pdfPridesys IT Ltd.
 
Presentation on Oracle Application Server
Presentation on  Oracle Application Server Presentation on  Oracle Application Server
Presentation on Oracle Application Server Muthoot finance Ltd
 
Oracle and its related technologies
Oracle and its related technologiesOracle and its related technologies
Oracle and its related technologiesanup4704
 
Oracle and its related technologies
Oracle and its related technologiesOracle and its related technologies
Oracle and its related technologiesanup4704
 
Multiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oidMultiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oidpasalapudi
 
OMC_LogAnalytics_DataSheet
OMC_LogAnalytics_DataSheetOMC_LogAnalytics_DataSheet
OMC_LogAnalytics_DataSheetHarish Akali
 

Semelhante a Oim Poc1.0 (20)

Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered Systems
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity features
 
Oracle Cloud Essentials
Oracle Cloud EssentialsOracle Cloud Essentials
Oracle Cloud Essentials
 
As onew816a
As onew816aAs onew816a
As onew816a
 
IDM Resume _ Kiran
IDM Resume _ KiranIDM Resume _ Kiran
IDM Resume _ Kiran
 
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise Manager
 
816isdfo
816isdfo816isdfo
816isdfo
 
7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
Products
ProductsProducts
Products
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
kowsalyamanickam_resume_OIM
kowsalyamanickam_resume_OIMkowsalyamanickam_resume_OIM
kowsalyamanickam_resume_OIM
 
What Is Oracle Fusion Middleware .pdf
What Is Oracle Fusion Middleware .pdfWhat Is Oracle Fusion Middleware .pdf
What Is Oracle Fusion Middleware .pdf
 
Presentation on Oracle Application Server
Presentation on  Oracle Application Server Presentation on  Oracle Application Server
Presentation on Oracle Application Server
 
Oracle and its related technologies
Oracle and its related technologiesOracle and its related technologies
Oracle and its related technologies
 
Oracle and its related technologies
Oracle and its related technologiesOracle and its related technologies
Oracle and its related technologies
 
Multiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oidMultiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oid
 
Top 10 reasons to adopt cloud
Top 10 reasons to adopt cloudTop 10 reasons to adopt cloud
Top 10 reasons to adopt cloud
 
OMC_LogAnalytics_DataSheet
OMC_LogAnalytics_DataSheetOMC_LogAnalytics_DataSheet
OMC_LogAnalytics_DataSheet
 

Oim Poc1.0

  • 1. Phase 1.0 POC Mar 2010 Mohamed Atef MW Administrator
  • 2.
  • 3. WHY ORACLE IDENTITY MANAGEMENT Oracle Identity Management allows enterprises to manage end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. Oracle Identity Management is a member of the Oracle Fusion Middleware family of products, which brings greater agility, better decision-making, and reduced cost and risk to diverse IT environments today.
  • 4. Oracle Identity Management Solutions Single Sign-On and Web Access Control: Oracle Access Manager (Protecting resources at a point of access and delegating authentication and authorization decisions to a central authority, help secure web, J2EE and enterprise applications). Oracle Enterprise Single Sign-On Suite Plus (Enterprise users can enjoy the benefits of single sign-on to all of their applications, whether they are connected to the corporate network, traveling away from the office, roaming between computers or working at a shared workstation). Directory Services: Oracle Internet Directory (Is an LDAP v3 compliant directory with meta-directory capabilities. It is built on the industry leading Oracle database and is fully integrated into Oracle Fusion Middleware and Oracle Applications). Oracle Virtual Directory (Creating a secure application environment requires integration of existing user identity information. For some companies, that information is contained in databases. Others use LDAP directories or Windows Domains. For most, this information is scattered across multiple locations and multiple services, provides Internet and industry-standard LDAP and XML views of existing enterprise identity information, without synchronizing or moving data from its native locations). Oracle Directory Server Enterprise Edition (Formerly “SUN Directory Server Enterprise Edition” is the best known directory server with proven large deployments in carrier and enterprise environments. It is also the most supported directory by ISVs, so it is ideal for heterogeneous environments. ODSEE provides a core directory service with embedded database, directory proxy, Active Directory (AD) synchronization and a Web administration console). Oracle Authentication Services for Operating Systems (Oracle Authentication Services for Operating Systems provides centralized authentication and account management for Unix and Linux platforms. This page contains information to get you started with Oracle Authentication Services for Operating Systems.).
  • 5. Oracle Identity Management Solutions Content Access Control: Oracle Information Rights Management (Formerly “SealedMedia” is a new form of information security technology that secures and tracks sensitive digital information everywhere it is stored and used, such as encrypting ("sealing") and classifying documents, emails and web pages, and the requirement to install Oracle IRM Desktop agent software on every end user device on which sealed information is created or used). Strong Authentication: Extended Identity Management Ecosystem (Organizations commonly have multiple security systems in place—one technology to secure physical access, another to secure legacy applications, and yet another to secure network access. To cope with these "silo'd" solutions, Oracle has partnered with best-of-breed ISVs to offer a central and effective means to enforce security policy across all enterprise resources. As part of the Oracle Identity Management Ecosystem, partner solutions seamlessly integrate into Oracle Identity Management solutions extend a common security and identity management framework across all enterprise applications). Oracle Adaptive Access Manager (Oracle Adaptive Access Manager consists of two primary components that together create one of the most powerful and flexible weapons in the war against fraud. Adaptive Strong Authenticator provides multifactor authentication and protection mechanisms for sensitive information such as passwords, PINs, security questions, account numbers and other credentials). Identity Administration: Oracle Identity Manager (Formerly known as “Oracle Xellerate Identity Provisioning”, is a powerful and flexible enterprise identity management system that automatically manages users' access privileges within enterprise IT resources). Oracle Role Manager (Previously known as “Bridgestream SmartRoles”, is an enterprise-class application for managing business and organizational role lifecycle management).
  • 6. Oracle Identity Management Solutions Federated Identity: Oracle Identity Federation (Significantly reduces the need to create unnecessary identity in an enterprise directory and lowers the ongoing costs of partner integrations through support of industry federation standards, protects existing IT investments by integrating with a wide variety of data stores, user directories, authentication providers and applications) Fine Grained Entitlements: Oracle Entitlements Server (Secures access to application resources and software components (such as URLs, EJBs, and JSPs) as well as arbitrary business objects (such as customer accounts or patient records). Oracle Entitlements Server policies specify which users, groups, and/or roles can access application resources, allowing those roles to be dynamically resolved at runtime). Oracle – Sun: Oracle Waveset (Providesoperational and business efficiency by providing complete automation of user accounts and entitlements provisioning into a variety of enterprise business applications. Oracle Waveset integrates automated identity lifecycle management with identity auditing capabilities, and makes it possible to manage these processes at the business role level). Oracle OpenSSO (Is a complete solution that provides Web access management, federated single sign-on and Web services security in a single, self-contained application).
  • 7. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 8. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 9. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 10. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 11. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 12. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 13. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 14.
  • 15.
  • 16. ORACLE IDENTITY MANAGER ARCHITECTURE The Oracle Identity Manager architecture has three tiers: Presentation tier Server tier Data & Enterprise Integration tier
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.  
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.