SlideShare uma empresa Scribd logo
1 de 25
By
Venkateshwar Rao Chekka
What is OIM?
 Oracle Identity Manager is an identity management product that automates
user provisioning, identity administration, and password management,
integrated in a comprehensive workflow engine
Why OIM ?
 Oracle Identity Manager is a powerful and flexible enterprise identity
management system that automatically manages users' access privileges
within enterprise IT resources
 Oracle Identity Management enables organizations to effectively manage the
end-to-end lifecycle of user identities across all enterprise resources, both
within and beyond the firewall and into the cloud
Features of OIM
 Identity life-cycle management for the heterogeneous enterprise
 Approval and provisioning workflows
 Role based access control
 Complete integration solutions: OOTB connectors & Adapter
Factory
 Deep integration to ERP and HRMS
 Audit and compliance reporting and process automation
Architecture of Oracle identity Manager
The Oracle Identity Manager architecture consists of three tiers
Tier 1: Presentation Tier:
The Oracle Identity Manager application GUI component reside in this tier.
Users log in by using the Oracle Identity Manager client. The Oracle Identity
Manager client interacts with the Oracle Identity Manager .
Tier 2: Middleware Tier:
The second tier implements the business logic, which resides in the Java Data
Objects that are managed by the supported J2EE application server The Java
Data Objects implement the business logic of the Oracle Identity Manager
application, however, they are not exposed to any methods from the outside
world. Therefore, to access the business functionality of Oracle Identity
Manager, you can use the API layer within the J2EE infrastructure, which
provides the lookup and communication mechanism
Tier 3: Data Tier:
The third tier consists of the database. This is the layer that is responsible
for managing the storage of data within Oracle Identity Manager.
Installation Steps in OIM
 Database Installation & Configuration
 Installing JRE(JDK)
 RCU ( Repository Creation Utility)
 Web logic installation
 SOA installation
 OIM Installation
 Web logic Configuration
 OIM Configuration
 Design Console & Configuration
Default User Id’s in OIM : Xelsysadm
Default User Id’s in Weblogic : Weblogic
Default Port no’s in OIM : 14000/sysadmin/identity
Default Port no’s in Weblogic : 7001/console/em
Default Port no’s in SOA : 8001/soa-infra
Basic url is http://hostname:portnumber/----
Identity
An identity is the virtual representation of an enterprise resource user
including employees, customers, partners and vendors. Identity
Management shows the rights and relationships the user has when
interacting with a company’s network.
Account:
OIM Account is an abstraction representing a means to be authenticated
to access Oracle Identity Manager.
Provisioning:
Provisioning is a process by which an action to create, modify, or delete
user information in an external resource is initiated from Oracle Identity
Manager and passed into the resource. In terms of data flow,
provisioning provides an outward flow of user information from Oracle
Identity Manager. The provisioning system communicates with the
external resource and specifies changes to make to the user record
residing in it.
Reconciliation :
Reconciliation is a process by which an action to create, modify, or
delete user information for a designated resource is initiated from another
external resource. Oracle Identity Manager communicates with this
external resource to receive user information. In terms of data flow,
reconciliation provides an inward flow of user information into Oracle
Identity Manager, through which it learns about any activity on the
external resource
The following figure shows that provisioning or reconciliation involves
synchronization from OIM to the target system, or from the target system
to OIM:
Type of Provisioning in OIM
Direct Based Provisioning:
Authorized Administrator can create a user account on the target System Without any
approval polices
Request based Provisioning :
Request can be manually created by the administrator or by the users themselves to
provision the account in the target system. Approval Workflows are started after the
provisioning request is submitted and after the approval , the account provisioned to the
target system
policy based Provisioning:
In policy based provisioning the user is provisioned in the target resource automatically
based on defined polices. Polices are used to define associations between the role and
the target system. By default each member of these roles sets a predefined account in
the target system.
Type of OIM reconciliation – Two Type
a) Trusted Source Reconciliation – External Source is authoritative source (eg.
HR), External Source drives creation, modification and deletion of user in Oracle
Identity Manager.
b) Target resource reconciliation – external Source is non-authoritative source with
which user is already provisioned.
Events in Reconciliation – Three type of events
a) Reconciliation Insert – OIM detects a user which does not exists in OIM
b) Reconciliation Update – OIM detects a modification to user which already exists
in OIM
a) Reconciliation Delete – OIM decides that user present in OIM should be removed
What is Connector ?
An Oracle Identity Manager connector is used to integrate Oracle Identity Manager
with a specific third-party application, such as Microsoft Exchange or Novell directory.
Oracle Identity Manager is packaged with a number of predefined connectors.
Types Of Connectors:
1.OOTB (Out of The Box)
2. GTC (Generic Technology Connector)
3. Custom Connectors
Connector Deployment
 Copy the Connector software and paste into the given path
C:OracleMiddlwareOracle_IDM1serverConnectorDefaultD
irectory
 Go to SYS Admin console and Click on Manage Connector
Connector components
Resource Object This is a virtual representation of the target
application on which you want to provision
accounts. It is the parent record with which
the provisioning process and process form
are associated
Provisioning Process This process definition is used to create,
maintain, and delete accounts on the target
system. It consists of definitions of the
individual tasks that are used to perform
automated functions on the target system.
Each connector is packaged with a single
provisioning process. You can manually create
additional provisioning processes.
Process Form This form is used to provide information
about user accounts to be created, updated, or
deleted on the target system. This form is also
used to capture data that can be used by
provisioning process tasks or to provide a
mechanism for users to provide real-time
data.
IT Resource Type This component is a template for all IT
resource definitions associated with the
connector. An IT resource type specifies the
parameters that are common to all IT
resource instances, such as host servers and
computers, of that particular IT resource
type.
Adapters This includes all adapters that are required to
perform common functions on the target
application. Each adapter is predefined with
certain mappings and functionality. These
adapters are capable of interacting with the
tasks in the provisioning process and the
fields of the process form.
Scheduled Task (where applicable) If the connector that you want to use is
shipped with a predefined reconciliation
module, then you are provided with a
scheduled task definition. You use this
component to control the frequency at which
the target system is polled for changes to
tracked data.
Provisioning Work Flow
Target System
Process Form
Process Task
Adapters(Process
Definition)
Lookups(Configuration Lookup for
provisioning)
OIM
Pre populate Adapters
OIM creates User
Process Definition
Resource Object
Trusted /Target Configuration Look up For Reconciliation)
Reconciliation Rules & Action rules
Trusted /Target Source
Trusted / Target Source Reconciliation Work Flow
Custom Attributes Creation
Entity attributes are properties of the entity. The information about the user entity is
stored in the form of attributes, such as first name, last name, user login, and password.
There are default user attributes in Oracle Identity Manager. However, you can create
custom user attributes by using the User form under System Entities in the Oracle
Identity System Administration. The custom attributes are referred to as user defined
fields (UDFs). Oracle Identity Manager lets you create UDFs for the user, role,
resource, organization, and catalog entities.
 Create a user:
Add content– Data component -- Catalog– User Vo– Select
attribute– ADF input w/label
 View a user:
Add content– Data component– Manager users– user vo1—ADF
Output w/label
 Modify a User:
Add content– Data component—catalog—user Vo—ADF Input
text w/label
Generic Technology Connectors
A generic technology connector is a collection of components.
A component provides a service that is used by another
component, the target system, or Oracle Identity Manager.
Together, these components can be linked to support a wide
variety of data formats and data transport mechanisms.
Flat file Reconciliation
 The Flat File connector is a generic solution to retrieve records
from flat files that are exported from various enterprise target
systems. These flat files can be of various formats such as CSV,
LDIF, XML, and so on. The connector focuses only on the
reconciliation of records from a flat file. The installation media
contains scheduled jobs that can be used to load users, accounts,
and entitlements from a flat file into an existing resource in Oracle
Identity Manager.
Orchestration
The process of any Oracle Identity Manager operation that goes through a
predefined set of stages and executes some business logic in each stage is
called an orchestration.
The type of object that is changed by the orchestration is called an
orchestration target.
Orchestration is divided into predefined steps called stages. Every operation
moves through these stages until it reaches finalization. Orchestration has the
following stages:
Validation: Stage to perform validation on the orchestration, such as
validity of orchestration parameters. Orchestration parameter is the data
that is required to carry out the orchestration operation.
Preprocess: Stage to perform orchestration parameter manipulations or
get approvals or perform Segregation of Duties (Sod) checks.
Action: Stage in which the action takes place.
Audit: Stage in which the auditing of operation is performed.
Post process: Stage in which consequent operations related to the
current operation takes place. Examples of consequent operations are
auto role membership and policy evaluation on a user creation.
Finalization: Last stage in the process to perform any clean up
Oracle Identity Manager Basics

Mais conteúdo relacionado

Mais procurados

Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationDelivery Centric
 
Power BI Governance and Development Best Practices - Presentation at #MSBIFI ...
Power BI Governance and Development Best Practices - Presentation at #MSBIFI ...Power BI Governance and Development Best Practices - Presentation at #MSBIFI ...
Power BI Governance and Development Best Practices - Presentation at #MSBIFI ...Jouko Nyholm
 
Oracle Configurator Developer
Oracle Configurator DeveloperOracle Configurator Developer
Oracle Configurator DeveloperPritesh Mogane
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management ProjectsHitachi ID Systems, Inc.
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceArijan Horvat
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101OneLogin
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
OpenAM - An Introduction
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An IntroductionForgeRock
 
Oracle eBS Overview.pptx
Oracle eBS Overview.pptxOracle eBS Overview.pptx
Oracle eBS Overview.pptxssuser9dce1e1
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access managementVandana Verma
 
Oracle RDBMS architecture
Oracle RDBMS architectureOracle RDBMS architecture
Oracle RDBMS architectureMartin Berger
 
What’s New in Oracle E-Business Suite R12.2 for Database Administrators?
What’s New in Oracle E-Business Suite R12.2 for Database Administrators?What’s New in Oracle E-Business Suite R12.2 for Database Administrators?
What’s New in Oracle E-Business Suite R12.2 for Database Administrators?vasuballa
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementNeo4j
 
Access Security - Privileged Identity Management
Access Security - Privileged Identity ManagementAccess Security - Privileged Identity Management
Access Security - Privileged Identity ManagementEng Teong Cheah
 
Oracle backup and recovery
Oracle backup and recoveryOracle backup and recovery
Oracle backup and recoveryYogiji Creations
 
Power bi overview of static row level security
Power bi overview of static row level securityPower bi overview of static row level security
Power bi overview of static row level securityManishK55
 

Mais procurados (20)

Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
Power BI Governance and Development Best Practices - Presentation at #MSBIFI ...
Power BI Governance and Development Best Practices - Presentation at #MSBIFI ...Power BI Governance and Development Best Practices - Presentation at #MSBIFI ...
Power BI Governance and Development Best Practices - Presentation at #MSBIFI ...
 
Oracle Configurator Developer
Oracle Configurator DeveloperOracle Configurator Developer
Oracle Configurator Developer
 
Oracle DBA
Oracle DBAOracle DBA
Oracle DBA
 
Best Practices for Identity Management Projects
Best Practices for Identity Management ProjectsBest Practices for Identity Management Projects
Best Practices for Identity Management Projects
 
Customizing Oracle EBS OA Framework
Customizing Oracle EBS OA FrameworkCustomizing Oracle EBS OA Framework
Customizing Oracle EBS OA Framework
 
SailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity GovernanceSailPoint - IdentityNow Identity Governance
SailPoint - IdentityNow Identity Governance
 
Identity Access Management 101
Identity Access Management 101Identity Access Management 101
Identity Access Management 101
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
OpenAM - An Introduction
OpenAM - An IntroductionOpenAM - An Introduction
OpenAM - An Introduction
 
Oracle eBS Overview.pptx
Oracle eBS Overview.pptxOracle eBS Overview.pptx
Oracle eBS Overview.pptx
 
Identity & access management
Identity & access managementIdentity & access management
Identity & access management
 
Row level security
Row level securityRow level security
Row level security
 
Oracle RDBMS architecture
Oracle RDBMS architectureOracle RDBMS architecture
Oracle RDBMS architecture
 
What’s New in Oracle E-Business Suite R12.2 for Database Administrators?
What’s New in Oracle E-Business Suite R12.2 for Database Administrators?What’s New in Oracle E-Business Suite R12.2 for Database Administrators?
What’s New in Oracle E-Business Suite R12.2 for Database Administrators?
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
Oracle Data Integrator
Oracle Data Integrator Oracle Data Integrator
Oracle Data Integrator
 
Access Security - Privileged Identity Management
Access Security - Privileged Identity ManagementAccess Security - Privileged Identity Management
Access Security - Privileged Identity Management
 
Oracle backup and recovery
Oracle backup and recoveryOracle backup and recovery
Oracle backup and recovery
 
Power bi overview of static row level security
Power bi overview of static row level securityPower bi overview of static row level security
Power bi overview of static row level security
 

Semelhante a Oracle Identity Manager Basics

Oracle Open World S308250  Securing Your People Soft Application Via Idm
Oracle Open World S308250  Securing Your People Soft Application Via IdmOracle Open World S308250  Securing Your People Soft Application Via Idm
Oracle Open World S308250  Securing Your People Soft Application Via Idmedwinlorenzana
 
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365Scott Hoag
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET Journal
 
Scalable web-based workflow platform
Scalable web-based workflow platformScalable web-based workflow platform
Scalable web-based workflow platformAshutosh Bijoor
 
Chapter 2 - Enterprise Application Integration.pdf
Chapter 2 - Enterprise Application Integration.pdfChapter 2 - Enterprise Application Integration.pdf
Chapter 2 - Enterprise Application Integration.pdfKhairul Anwar Sedek
 
Identity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureIdentity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureAidy Tificate
 
SYDSP - Office 365 and Cloud Identity - What does it mean for me?
SYDSP  - Office 365 and Cloud Identity - What does it mean for me?SYDSP  - Office 365 and Cloud Identity - What does it mean for me?
SYDSP - Office 365 and Cloud Identity - What does it mean for me?Scott Hoag
 
Net framework session03
Net framework session03Net framework session03
Net framework session03Vivek chan
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfMansiMehta96928
 
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?Scott Hoag
 
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerKnowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerMike Reams
 
Software Engineering for Web Applications
Software Engineering for Web ApplicationsSoftware Engineering for Web Applications
Software Engineering for Web ApplicationsMoh'd Shakeb Baig
 
Business Record Management System and Financial Reporting
Business Record Management System and Financial ReportingBusiness Record Management System and Financial Reporting
Business Record Management System and Financial ReportingMike Taylor
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and designRobinsonObura
 

Semelhante a Oracle Identity Manager Basics (20)

Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
Oracle Open World S308250  Securing Your People Soft Application Via Idm
Oracle Open World S308250  Securing Your People Soft Application Via IdmOracle Open World S308250  Securing Your People Soft Application Via Idm
Oracle Open World S308250  Securing Your People Soft Application Via Idm
 
Business Analytics System
Business Analytics SystemBusiness Analytics System
Business Analytics System
 
Oim Poc1.0
Oim Poc1.0Oim Poc1.0
Oim Poc1.0
 
IDM Introduction
IDM IntroductionIDM Introduction
IDM Introduction
 
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
 
Oracle ADF Case Study
Oracle ADF Case StudyOracle ADF Case Study
Oracle ADF Case Study
 
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
IRJET- Enabling Identity-Based Integrity Auditing and Data Sharing with Sensi...
 
Scalable web-based workflow platform
Scalable web-based workflow platformScalable web-based workflow platform
Scalable web-based workflow platform
 
Chapter 2 - Enterprise Application Integration.pdf
Chapter 2 - Enterprise Application Integration.pdfChapter 2 - Enterprise Application Integration.pdf
Chapter 2 - Enterprise Application Integration.pdf
 
Identity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM ArchitectureIdentity Manager Opensource OpenIDM Architecture
Identity Manager Opensource OpenIDM Architecture
 
SYDSP - Office 365 and Cloud Identity - What does it mean for me?
SYDSP  - Office 365 and Cloud Identity - What does it mean for me?SYDSP  - Office 365 and Cloud Identity - What does it mean for me?
SYDSP - Office 365 and Cloud Identity - What does it mean for me?
 
Net framework session03
Net framework session03Net framework session03
Net framework session03
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
UNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdfUNIT-5 IoT Reference Architecture.pdf
UNIT-5 IoT Reference Architecture.pdf
 
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
SPSVB - Office 365 and Cloud Identity - What Does It Mean for Me?
 
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerKnowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
 
Software Engineering for Web Applications
Software Engineering for Web ApplicationsSoftware Engineering for Web Applications
Software Engineering for Web Applications
 
Business Record Management System and Financial Reporting
Business Record Management System and Financial ReportingBusiness Record Management System and Financial Reporting
Business Record Management System and Financial Reporting
 
System analysis and design
System analysis and designSystem analysis and design
System analysis and design
 

Último

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfciinovamais
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docxPoojaSen20
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docxPoojaSen20
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxDenish Jangid
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 

Último (20)

microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Activity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdfActivity 01 - Artificial Culture (1).pdf
Activity 01 - Artificial Culture (1).pdf
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
psychiatric nursing HISTORY COLLECTION .docx
psychiatric  nursing HISTORY  COLLECTION  .docxpsychiatric  nursing HISTORY  COLLECTION  .docx
psychiatric nursing HISTORY COLLECTION .docx
 
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 

Oracle Identity Manager Basics

  • 2. What is OIM?  Oracle Identity Manager is an identity management product that automates user provisioning, identity administration, and password management, integrated in a comprehensive workflow engine Why OIM ?  Oracle Identity Manager is a powerful and flexible enterprise identity management system that automatically manages users' access privileges within enterprise IT resources  Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud
  • 3. Features of OIM  Identity life-cycle management for the heterogeneous enterprise  Approval and provisioning workflows  Role based access control  Complete integration solutions: OOTB connectors & Adapter Factory  Deep integration to ERP and HRMS  Audit and compliance reporting and process automation
  • 4. Architecture of Oracle identity Manager
  • 5. The Oracle Identity Manager architecture consists of three tiers Tier 1: Presentation Tier: The Oracle Identity Manager application GUI component reside in this tier. Users log in by using the Oracle Identity Manager client. The Oracle Identity Manager client interacts with the Oracle Identity Manager . Tier 2: Middleware Tier: The second tier implements the business logic, which resides in the Java Data Objects that are managed by the supported J2EE application server The Java Data Objects implement the business logic of the Oracle Identity Manager application, however, they are not exposed to any methods from the outside world. Therefore, to access the business functionality of Oracle Identity Manager, you can use the API layer within the J2EE infrastructure, which provides the lookup and communication mechanism Tier 3: Data Tier: The third tier consists of the database. This is the layer that is responsible for managing the storage of data within Oracle Identity Manager.
  • 6. Installation Steps in OIM  Database Installation & Configuration  Installing JRE(JDK)  RCU ( Repository Creation Utility)  Web logic installation  SOA installation  OIM Installation  Web logic Configuration  OIM Configuration  Design Console & Configuration
  • 7. Default User Id’s in OIM : Xelsysadm Default User Id’s in Weblogic : Weblogic Default Port no’s in OIM : 14000/sysadmin/identity Default Port no’s in Weblogic : 7001/console/em Default Port no’s in SOA : 8001/soa-infra Basic url is http://hostname:portnumber/----
  • 8. Identity An identity is the virtual representation of an enterprise resource user including employees, customers, partners and vendors. Identity Management shows the rights and relationships the user has when interacting with a company’s network. Account: OIM Account is an abstraction representing a means to be authenticated to access Oracle Identity Manager.
  • 9. Provisioning: Provisioning is a process by which an action to create, modify, or delete user information in an external resource is initiated from Oracle Identity Manager and passed into the resource. In terms of data flow, provisioning provides an outward flow of user information from Oracle Identity Manager. The provisioning system communicates with the external resource and specifies changes to make to the user record residing in it. Reconciliation : Reconciliation is a process by which an action to create, modify, or delete user information for a designated resource is initiated from another external resource. Oracle Identity Manager communicates with this external resource to receive user information. In terms of data flow, reconciliation provides an inward flow of user information into Oracle Identity Manager, through which it learns about any activity on the external resource
  • 10. The following figure shows that provisioning or reconciliation involves synchronization from OIM to the target system, or from the target system to OIM:
  • 11. Type of Provisioning in OIM Direct Based Provisioning: Authorized Administrator can create a user account on the target System Without any approval polices Request based Provisioning : Request can be manually created by the administrator or by the users themselves to provision the account in the target system. Approval Workflows are started after the provisioning request is submitted and after the approval , the account provisioned to the target system policy based Provisioning: In policy based provisioning the user is provisioned in the target resource automatically based on defined polices. Polices are used to define associations between the role and the target system. By default each member of these roles sets a predefined account in the target system.
  • 12. Type of OIM reconciliation – Two Type a) Trusted Source Reconciliation – External Source is authoritative source (eg. HR), External Source drives creation, modification and deletion of user in Oracle Identity Manager. b) Target resource reconciliation – external Source is non-authoritative source with which user is already provisioned. Events in Reconciliation – Three type of events a) Reconciliation Insert – OIM detects a user which does not exists in OIM b) Reconciliation Update – OIM detects a modification to user which already exists in OIM a) Reconciliation Delete – OIM decides that user present in OIM should be removed
  • 13. What is Connector ? An Oracle Identity Manager connector is used to integrate Oracle Identity Manager with a specific third-party application, such as Microsoft Exchange or Novell directory. Oracle Identity Manager is packaged with a number of predefined connectors. Types Of Connectors: 1.OOTB (Out of The Box) 2. GTC (Generic Technology Connector) 3. Custom Connectors
  • 14. Connector Deployment  Copy the Connector software and paste into the given path C:OracleMiddlwareOracle_IDM1serverConnectorDefaultD irectory  Go to SYS Admin console and Click on Manage Connector
  • 15. Connector components Resource Object This is a virtual representation of the target application on which you want to provision accounts. It is the parent record with which the provisioning process and process form are associated Provisioning Process This process definition is used to create, maintain, and delete accounts on the target system. It consists of definitions of the individual tasks that are used to perform automated functions on the target system. Each connector is packaged with a single provisioning process. You can manually create additional provisioning processes. Process Form This form is used to provide information about user accounts to be created, updated, or deleted on the target system. This form is also used to capture data that can be used by provisioning process tasks or to provide a mechanism for users to provide real-time data.
  • 16. IT Resource Type This component is a template for all IT resource definitions associated with the connector. An IT resource type specifies the parameters that are common to all IT resource instances, such as host servers and computers, of that particular IT resource type. Adapters This includes all adapters that are required to perform common functions on the target application. Each adapter is predefined with certain mappings and functionality. These adapters are capable of interacting with the tasks in the provisioning process and the fields of the process form. Scheduled Task (where applicable) If the connector that you want to use is shipped with a predefined reconciliation module, then you are provided with a scheduled task definition. You use this component to control the frequency at which the target system is polled for changes to tracked data.
  • 17. Provisioning Work Flow Target System Process Form Process Task Adapters(Process Definition) Lookups(Configuration Lookup for provisioning) OIM Pre populate Adapters
  • 18. OIM creates User Process Definition Resource Object Trusted /Target Configuration Look up For Reconciliation) Reconciliation Rules & Action rules Trusted /Target Source Trusted / Target Source Reconciliation Work Flow
  • 19. Custom Attributes Creation Entity attributes are properties of the entity. The information about the user entity is stored in the form of attributes, such as first name, last name, user login, and password. There are default user attributes in Oracle Identity Manager. However, you can create custom user attributes by using the User form under System Entities in the Oracle Identity System Administration. The custom attributes are referred to as user defined fields (UDFs). Oracle Identity Manager lets you create UDFs for the user, role, resource, organization, and catalog entities.
  • 20.  Create a user: Add content– Data component -- Catalog– User Vo– Select attribute– ADF input w/label  View a user: Add content– Data component– Manager users– user vo1—ADF Output w/label  Modify a User: Add content– Data component—catalog—user Vo—ADF Input text w/label
  • 21. Generic Technology Connectors A generic technology connector is a collection of components. A component provides a service that is used by another component, the target system, or Oracle Identity Manager. Together, these components can be linked to support a wide variety of data formats and data transport mechanisms.
  • 22. Flat file Reconciliation  The Flat File connector is a generic solution to retrieve records from flat files that are exported from various enterprise target systems. These flat files can be of various formats such as CSV, LDIF, XML, and so on. The connector focuses only on the reconciliation of records from a flat file. The installation media contains scheduled jobs that can be used to load users, accounts, and entitlements from a flat file into an existing resource in Oracle Identity Manager.
  • 23. Orchestration The process of any Oracle Identity Manager operation that goes through a predefined set of stages and executes some business logic in each stage is called an orchestration. The type of object that is changed by the orchestration is called an orchestration target. Orchestration is divided into predefined steps called stages. Every operation moves through these stages until it reaches finalization. Orchestration has the following stages:
  • 24. Validation: Stage to perform validation on the orchestration, such as validity of orchestration parameters. Orchestration parameter is the data that is required to carry out the orchestration operation. Preprocess: Stage to perform orchestration parameter manipulations or get approvals or perform Segregation of Duties (Sod) checks. Action: Stage in which the action takes place. Audit: Stage in which the auditing of operation is performed. Post process: Stage in which consequent operations related to the current operation takes place. Examples of consequent operations are auto role membership and policy evaluation on a user creation. Finalization: Last stage in the process to perform any clean up