SlideShare uma empresa Scribd logo
1 de 24
Demystifying External
                                        Authorization:
                                     Oracle Entitlements
                                    Server Product Review



Tanya Baccam, Senior Instructor and Courseware Author, SANS
Roger Wigenstam, Sr. Director of Product Management, Oracle



            © 2012 The SANS™ Institute - www.sans.org
Speakers




   Tanya Baccam          Roger Wigenstam




   Senior Instructor       Sr. Director
        SANS           Product Management
Agenda




         • External Authorization
           Overview

         • Oracle Entitlements Server

         • Product Review

         • Q&A
Defining External Authorization


“Managing granular access permissions for applications, middleware and databases by
  externalizing and centralizing standards-based authorization policies.”




  Data                 Applications               Web Services               Portals


Data redaction        Fine-grained access to     Data filtering for      Access control for
and filtering for     applications based on      standards-based web     sensitive documents
data at rest and                                 services                stored in portals and
                      roles, entitlements,                               content management
data in motion.
                      attributes, runtime                                systems based on roles
                      context                                            and identity attributes



                          Context-Aware Access Control
Why Is It Important?




 Regulatory            Role Explosion
Considerations                                  Fragmented Security

Regulations are       Role explosion makes it
getting complex and   difficult to secure          Authorization policies
often demand          transactions and data        are often hardwired into
enforcement of        based on roles               application business
Granular Access                                    logic
Privileges
Applying External Authorization




   Content       Collaboration




   Privacy        Confidentiality




   Regulation     Audit
Common Use Cases




      • Web Services (SOA) Security
      • Web Access Control
      • Application Transactions
      • Relational Database Information
      • Portals (SharePoint, etc)
Entitlements Server
                               Product Overview

                           Roger Wigenstam
                           Sr. Director of Product Management,
                           Oracle




©2012 Oracle Corporation
Oracle Entitlements Server (OES)

• Unified External Authorization
  for Applications, Web Services,
  Portals and Databases
• Standards-based Policy
  Enforcement at Run-time
• Declarative Security Model
  Simplifies Application Lifecycle
Real-Time Authorization
                 Sub-millisecond Authorization Response Time



                                        • Massively scalable External
                                         Authorization Management
                                        • Scales easily to large number of
                                         protected resources
                                          • Hundreds of millions of users
                                          • Thousands of roles
                                          • From small workgroups to mission-
                                           critical deployments
                                        • Authorization checks enforced with
                                         real-time latency




©2012 Oracle Corporation
Comprehensive Standards Support

•     Attribute Based Access Control
•     XACML
•     OpenAZ
•     NIST Role Based Access
      Control
•     Enterprise RBAC
•     Java2 / JAAS
•     Code Based Access Control
•     JSR 115 / JACC*
•     Data Security




    Oracle Confidential
Native & Custom Integrations


      Identity Management        Application Servers   Portals & Content Mgmt




                                 Development FWK’s             SOA




          Policy Store            Data Sources             XML Gateways




                       < XML >




 Oracle Confidential
Oracle Entitlements
                                    Server
                               Product Review
                           Tanya Baccam, SANS




©2012 Oracle Corporation
Use Cases




  Application
  Access Control   Data Security




   SharePoint       Web Services
   Security           Security
Architecture


                                                            PEP
                                              Id Store

                                                            PDP
                                                     PIPs




PEP




                                                                  OES Admin Server
                                                                                     Identity Store



                                                                                           Policy Store


          Id Store                    PDP

                 PIPs




                                            PEP
                        Id Store



                               PIPs
                                            PDP
Application Access Control

Web Access Control (URL-based and
Fine-grained)
                                     * Oracle Entitlements
Attribute based Access Control         Server can be used to
                                        enforce multiple
(ABAC/XACML)                            compliance
                                        requirements.
Static and Dynamic Role Mapping
Role Inheritance
Separation of Duties Checks
Runtime Constraint and Context-
aware Policy Enforcement

Integration with LDAP-based
directories
Data Security




Selective Data Redaction/Filtering   * OES enables
     - Row-level security                management of
      -Columnar security                 access policies based
                                         on business need.
Centralized Authorization Policy
Administration for Databases

Integration with major databases
(Oracle, DB2, Sybase, MySQL)
SharePoint Security



Document Access Control (based
                                     * OES provides a variety
on document tags, attributes,           of authorization
location, user, role, etc)              decisions for different
                                        types of applications
Custom Page Content (FGA checks        and users.
for ASP.NET pages)

Integration with Active Directory
and LDAP-based directories
Web Services Security



 Integration with XML Gateways       * Policies can be set up to

Selective Data Redaction/Filtering      secure connectivity to SOA
                                         and cloud environments..
for SOA web services

Support for a variety of message
standards (XML/SOAP/REST/JMS)
Aberdeen Group Event Series
Featuring Derek Brink

    Chicago                         New York
    April 10th                      April 12th

                  San Francisco
                    May 22nd

     Toronto                          Boston
     April 17th                      April 19th

        Register at: www.oracle.com/identity
Platform Webcast Series
Oracle Customers Discussing Results of Platform
Approach

     Platform Best                            Cisco’s Platform
     Practices                                Approach
     Agilent Technologies                     Cisco Systems
     Available On-Demand                      Available On-Demand




    Platform for                              Platform Business
    Compliance                                Enabler
     ING Bank                                 Toyota Motors
     April 11th 2012                           May 30th 2012


             Register at: www.oracle.com/identity
Securing Oracle




https://www.sans.org/security-training/securing-oracle-74-mid
www.oracle.com/identity



                           www.facebook.com/OracleIDM
                           www.twitter.com/OracleIDM



                           blogs.oracle.com/OracleIDM



©2012 Oracle Corporation
Questions

Mais conteúdo relacionado

Mais procurados

Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2OracleIDM
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation Delivery Centric
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...oow123
 
Self Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More ProductivitySelf Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More ProductivityAtul Goyal
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIMTamim Khan
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access ManagementDLT Solutions
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Oracle
 
Con8289 r12 maintenance tips heisler heisler-con8289
Con8289 r12 maintenance tips heisler heisler-con8289Con8289 r12 maintenance tips heisler heisler-con8289
Con8289 r12 maintenance tips heisler heisler-con8289Berry Clemens
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoMarketingArrowECS_CZ
 
Oracle Access Manager Overview
Oracle Access Manager OverviewOracle Access Manager Overview
Oracle Access Manager Overviewguestf6dc99b
 
Ugf9796 weblogic for ebs and obiee
Ugf9796 weblogic for ebs and obieeUgf9796 weblogic for ebs and obiee
Ugf9796 weblogic for ebs and obieeBerry Clemens
 
Oracle Cloud Storage Service & Oracle Database Backup Cloud Service
Oracle Cloud Storage Service & Oracle Database Backup Cloud ServiceOracle Cloud Storage Service & Oracle Database Backup Cloud Service
Oracle Cloud Storage Service & Oracle Database Backup Cloud ServiceJean-Philippe PINTE
 
Con9437 ad ffor_ebs and mobile
Con9437 ad ffor_ebs and mobileCon9437 ad ffor_ebs and mobile
Con9437 ad ffor_ebs and mobileBerry Clemens
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
OIM Connector for Webservices
OIM Connector for WebservicesOIM Connector for Webservices
OIM Connector for WebservicesAtul Goyal
 
Presentation oracle exalogic elastic cloud
Presentation   oracle exalogic elastic cloudPresentation   oracle exalogic elastic cloud
Presentation oracle exalogic elastic cloudsolarisyougood
 
Oracle Middleware and Hardware Complete Solution
Oracle Middleware and Hardware Complete SolutionOracle Middleware and Hardware Complete Solution
Oracle Middleware and Hardware Complete SolutionFumiko Yamashita
 
Con11257 schifano con11257-best practices for deploying highly scalable virtu...
Con11257 schifano con11257-best practices for deploying highly scalable virtu...Con11257 schifano con11257-best practices for deploying highly scalable virtu...
Con11257 schifano con11257-best practices for deploying highly scalable virtu...Berry Clemens
 

Mais procurados (20)

Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
 
Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
Self Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More ProductivitySelf Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More Productivity
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIM
 
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
 
Con8289 r12 maintenance tips heisler heisler-con8289
Con8289 r12 maintenance tips heisler heisler-con8289Con8289 r12 maintenance tips heisler heisler-con8289
Con8289 r12 maintenance tips heisler heisler-con8289
 
Využijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplnoVyužijte svou Oracle databázi naplno
Využijte svou Oracle databázi naplno
 
Oracle Access Manager Overview
Oracle Access Manager OverviewOracle Access Manager Overview
Oracle Access Manager Overview
 
Ugf9796 weblogic for ebs and obiee
Ugf9796 weblogic for ebs and obieeUgf9796 weblogic for ebs and obiee
Ugf9796 weblogic for ebs and obiee
 
Oracle Cloud Storage Service & Oracle Database Backup Cloud Service
Oracle Cloud Storage Service & Oracle Database Backup Cloud ServiceOracle Cloud Storage Service & Oracle Database Backup Cloud Service
Oracle Cloud Storage Service & Oracle Database Backup Cloud Service
 
Con9437 ad ffor_ebs and mobile
Con9437 ad ffor_ebs and mobileCon9437 ad ffor_ebs and mobile
Con9437 ad ffor_ebs and mobile
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
OIM Connector for Webservices
OIM Connector for WebservicesOIM Connector for Webservices
OIM Connector for Webservices
 
Presentation oracle exalogic elastic cloud
Presentation   oracle exalogic elastic cloudPresentation   oracle exalogic elastic cloud
Presentation oracle exalogic elastic cloud
 
Oracle Middleware and Hardware Complete Solution
Oracle Middleware and Hardware Complete SolutionOracle Middleware and Hardware Complete Solution
Oracle Middleware and Hardware Complete Solution
 
Con11257 schifano con11257-best practices for deploying highly scalable virtu...
Con11257 schifano con11257-best practices for deploying highly scalable virtu...Con11257 schifano con11257-best practices for deploying highly scalable virtu...
Con11257 schifano con11257-best practices for deploying highly scalable virtu...
 

Destaque

Authorization - it's not just about who you are
Authorization - it's not just about who you areAuthorization - it's not just about who you are
Authorization - it's not just about who you areDavid Brossard
 
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...David Brossard
 
Atom Movie Notes Day 2
Atom Movie Notes Day 2Atom Movie Notes Day 2
Atom Movie Notes Day 2jmori1
 
Мой город - Кострома, №14
Мой город - Кострома, №14Мой город - Кострома, №14
Мой город - Кострома, №14Мой город
 
Au Psy492 E Portfolio Template For Slide Share[1]
Au Psy492 E Portfolio Template For Slide Share[1]Au Psy492 E Portfolio Template For Slide Share[1]
Au Psy492 E Portfolio Template For Slide Share[1]jaquece21
 
My sister's keeper
My sister's keeperMy sister's keeper
My sister's keeperMagda_Diego
 
Stepping Towards Self Sufficiency: An Indigenous Economic Development Plan fo...
Stepping Towards Self Sufficiency: An Indigenous Economic Development Plan fo...Stepping Towards Self Sufficiency: An Indigenous Economic Development Plan fo...
Stepping Towards Self Sufficiency: An Indigenous Economic Development Plan fo...Wayne Dunn
 
real estate consultant in patna 9304611353
real estate consultant in patna 9304611353real estate consultant in patna 9304611353
real estate consultant in patna 9304611353Adore Global Pvt. Ltd
 
Sample watchdog uploaded
Sample watchdog uploadedSample watchdog uploaded
Sample watchdog uploadedcsully
 
АО "Самрук-Қазына": Проект стратегии развития
АО "Самрук-Қазына": Проект стратегии развитияАО "Самрук-Қазына": Проект стратегии развития
АО "Самрук-Қазына": Проект стратегии развитияАО "Самрук-Казына"
 
Pathways to improved irrigation performance in Africa
Pathways to improved irrigation performance in AfricaPathways to improved irrigation performance in Africa
Pathways to improved irrigation performance in Africafutureagricultures
 
Publications, Book Chapters, And Selected Patents
Publications, Book Chapters, And Selected PatentsPublications, Book Chapters, And Selected Patents
Publications, Book Chapters, And Selected Patentsazilberstein
 
Cosug for jiang su lug dec 2011
Cosug  for jiang su lug dec 2011Cosug  for jiang su lug dec 2011
Cosug for jiang su lug dec 2011OpenCity Community
 
Aef4 week 2
Aef4 week 2Aef4 week 2
Aef4 week 2Les Davy
 

Destaque (20)

Authorization - it's not just about who you are
Authorization - it's not just about who you areAuthorization - it's not just about who you are
Authorization - it's not just about who you are
 
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
XACML for Developers - Updates, New Tools, & Patterns for the Eager #IAM Deve...
 
Atom Movie Notes Day 2
Atom Movie Notes Day 2Atom Movie Notes Day 2
Atom Movie Notes Day 2
 
Мой город - Кострома, №14
Мой город - Кострома, №14Мой город - Кострома, №14
Мой город - Кострома, №14
 
Au Psy492 E Portfolio Template For Slide Share[1]
Au Psy492 E Portfolio Template For Slide Share[1]Au Psy492 E Portfolio Template For Slide Share[1]
Au Psy492 E Portfolio Template For Slide Share[1]
 
My sister's keeper
My sister's keeperMy sister's keeper
My sister's keeper
 
Stepping Towards Self Sufficiency: An Indigenous Economic Development Plan fo...
Stepping Towards Self Sufficiency: An Indigenous Economic Development Plan fo...Stepping Towards Self Sufficiency: An Indigenous Economic Development Plan fo...
Stepping Towards Self Sufficiency: An Indigenous Economic Development Plan fo...
 
real estate consultant in patna 9304611353
real estate consultant in patna 9304611353real estate consultant in patna 9304611353
real estate consultant in patna 9304611353
 
Rencana pelaksanaan
Rencana pelaksanaan Rencana pelaksanaan
Rencana pelaksanaan
 
Giathanh.doc
Giathanh.docGiathanh.doc
Giathanh.doc
 
How to Search Twitter
How to Search TwitterHow to Search Twitter
How to Search Twitter
 
New final iogt ppt (1)
New final iogt ppt (1)New final iogt ppt (1)
New final iogt ppt (1)
 
Sample watchdog uploaded
Sample watchdog uploadedSample watchdog uploaded
Sample watchdog uploaded
 
АО "Самрук-Қазына": Проект стратегии развития
АО "Самрук-Қазына": Проект стратегии развитияАО "Самрук-Қазына": Проект стратегии развития
АО "Самрук-Қазына": Проект стратегии развития
 
Pathways to improved irrigation performance in Africa
Pathways to improved irrigation performance in AfricaPathways to improved irrigation performance in Africa
Pathways to improved irrigation performance in Africa
 
Publications, Book Chapters, And Selected Patents
Publications, Book Chapters, And Selected PatentsPublications, Book Chapters, And Selected Patents
Publications, Book Chapters, And Selected Patents
 
Campanita
CampanitaCampanita
Campanita
 
Cosug for jiang su lug dec 2011
Cosug  for jiang su lug dec 2011Cosug  for jiang su lug dec 2011
Cosug for jiang su lug dec 2011
 
Aef4 week 2
Aef4 week 2Aef4 week 2
Aef4 week 2
 
00 ส่วนนำ1
00 ส่วนนำ100 ส่วนนำ1
00 ส่วนนำ1
 

Semelhante a SANS Institute Product Review: Oracle Entitlements Server

Round table guide
Round table guideRound table guide
Round table guideOracleIDM
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraORACLE USER GROUP ESTONIA
 
Oracle web center
Oracle web centerOracle web center
Oracle web centerEast Le
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
Gartner Catalyst Savvis Cloud API Case Study
Gartner Catalyst   Savvis Cloud API Case StudyGartner Catalyst   Savvis Cloud API Case Study
Gartner Catalyst Savvis Cloud API Case StudyCA API Management
 
Alfresco CMS (ECMS) - Businessware Technologies
Alfresco CMS (ECMS) - Businessware TechnologiesAlfresco CMS (ECMS) - Businessware Technologies
Alfresco CMS (ECMS) - Businessware Technologiesasimzaman
 
Oracle - Document Life - 6apr2012
Oracle - Document Life - 6apr2012Oracle - Document Life - 6apr2012
Oracle - Document Life - 6apr2012Agora Group
 
Vincent Desveronnieres, Oracle
Vincent Desveronnieres,  OracleVincent Desveronnieres,  Oracle
Vincent Desveronnieres, OracleEwa Stepien
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementNoam Bunder
 
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middlewareinvestorrelation
 
Oracle Application Management Suite
Oracle Application Management SuiteOracle Application Management Suite
Oracle Application Management SuiteOracleVolutionSeries
 
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...Subbu Devulapalli
 
Oracle 4월 20일
Oracle 4월 20일Oracle 4월 20일
Oracle 4월 20일Cana Ko
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsKannan Subbiah
 
Summer training oracle
Summer training   oracle Summer training   oracle
Summer training oracle Arshit Rai
 
Summer training oracle
Summer training   oracle Summer training   oracle
Summer training oracle Arshit Rai
 
Oracle Identity and access management overview
Oracle Identity and access management overviewOracle Identity and access management overview
Oracle Identity and access management overviewkalikishoregomattam1
 
P hallam baker_keynote
P hallam baker_keynoteP hallam baker_keynote
P hallam baker_keynoteshindeshekhar
 

Semelhante a SANS Institute Product Review: Oracle Entitlements Server (20)

Round table guide
Round table guideRound table guide
Round table guide
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Oracle web center
Oracle web centerOracle web center
Oracle web center
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
Gartner Catalyst Savvis Cloud API Case Study
Gartner Catalyst   Savvis Cloud API Case StudyGartner Catalyst   Savvis Cloud API Case Study
Gartner Catalyst Savvis Cloud API Case Study
 
Alfresco CMS (ECMS) - Businessware Technologies
Alfresco CMS (ECMS) - Businessware TechnologiesAlfresco CMS (ECMS) - Businessware Technologies
Alfresco CMS (ECMS) - Businessware Technologies
 
Oracle - Document Life - 6apr2012
Oracle - Document Life - 6apr2012Oracle - Document Life - 6apr2012
Oracle - Document Life - 6apr2012
 
Vincent Desveronnieres, Oracle
Vincent Desveronnieres,  OracleVincent Desveronnieres,  Oracle
Vincent Desveronnieres, Oracle
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
 
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
"Oracle Insight for Investors" Educational Webcast - Oracle Fusion Middleware
 
Oracle Application Management Suite
Oracle Application Management SuiteOracle Application Management Suite
Oracle Application Management Suite
 
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
 
Oracle 4월 20일
Oracle 4월 20일Oracle 4월 20일
Oracle 4월 20일
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
Oracle a TBIZ2011
Oracle a TBIZ2011Oracle a TBIZ2011
Oracle a TBIZ2011
 
Securityinsideout
SecurityinsideoutSecurityinsideout
Securityinsideout
 
Summer training oracle
Summer training   oracle Summer training   oracle
Summer training oracle
 
Summer training oracle
Summer training   oracle Summer training   oracle
Summer training oracle
 
Oracle Identity and access management overview
Oracle Identity and access management overviewOracle Identity and access management overview
Oracle Identity and access management overview
 
P hallam baker_keynote
P hallam baker_keynoteP hallam baker_keynote
P hallam baker_keynote
 

Mais de OracleIDM

Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1OracleIDM
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12OracleIDM
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…OracleIDM
 

Mais de OracleIDM (20)

Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
 

Último

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 

Último (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 

SANS Institute Product Review: Oracle Entitlements Server

  • 1. Demystifying External Authorization: Oracle Entitlements Server Product Review Tanya Baccam, Senior Instructor and Courseware Author, SANS Roger Wigenstam, Sr. Director of Product Management, Oracle © 2012 The SANS™ Institute - www.sans.org
  • 2. Speakers Tanya Baccam Roger Wigenstam Senior Instructor Sr. Director SANS Product Management
  • 3. Agenda • External Authorization Overview • Oracle Entitlements Server • Product Review • Q&A
  • 4. Defining External Authorization “Managing granular access permissions for applications, middleware and databases by externalizing and centralizing standards-based authorization policies.” Data Applications Web Services Portals Data redaction Fine-grained access to Data filtering for Access control for and filtering for applications based on standards-based web sensitive documents data at rest and services stored in portals and roles, entitlements, content management data in motion. attributes, runtime systems based on roles context and identity attributes Context-Aware Access Control
  • 5. Why Is It Important? Regulatory Role Explosion Considerations Fragmented Security Regulations are Role explosion makes it getting complex and difficult to secure Authorization policies often demand transactions and data are often hardwired into enforcement of based on roles application business Granular Access logic Privileges
  • 6. Applying External Authorization Content Collaboration Privacy Confidentiality Regulation Audit
  • 7. Common Use Cases • Web Services (SOA) Security • Web Access Control • Application Transactions • Relational Database Information • Portals (SharePoint, etc)
  • 8. Entitlements Server Product Overview Roger Wigenstam Sr. Director of Product Management, Oracle ©2012 Oracle Corporation
  • 9. Oracle Entitlements Server (OES) • Unified External Authorization for Applications, Web Services, Portals and Databases • Standards-based Policy Enforcement at Run-time • Declarative Security Model Simplifies Application Lifecycle
  • 10. Real-Time Authorization Sub-millisecond Authorization Response Time • Massively scalable External Authorization Management • Scales easily to large number of protected resources • Hundreds of millions of users • Thousands of roles • From small workgroups to mission- critical deployments • Authorization checks enforced with real-time latency ©2012 Oracle Corporation
  • 11. Comprehensive Standards Support • Attribute Based Access Control • XACML • OpenAZ • NIST Role Based Access Control • Enterprise RBAC • Java2 / JAAS • Code Based Access Control • JSR 115 / JACC* • Data Security Oracle Confidential
  • 12. Native & Custom Integrations Identity Management Application Servers Portals & Content Mgmt Development FWK’s SOA Policy Store Data Sources XML Gateways < XML > Oracle Confidential
  • 13. Oracle Entitlements Server Product Review Tanya Baccam, SANS ©2012 Oracle Corporation
  • 14. Use Cases Application Access Control Data Security SharePoint Web Services Security Security
  • 15. Architecture PEP Id Store PDP PIPs PEP OES Admin Server Identity Store Policy Store Id Store PDP PIPs PEP Id Store PIPs PDP
  • 16. Application Access Control Web Access Control (URL-based and Fine-grained) * Oracle Entitlements Attribute based Access Control Server can be used to enforce multiple (ABAC/XACML) compliance requirements. Static and Dynamic Role Mapping Role Inheritance Separation of Duties Checks Runtime Constraint and Context- aware Policy Enforcement Integration with LDAP-based directories
  • 17. Data Security Selective Data Redaction/Filtering * OES enables - Row-level security management of -Columnar security access policies based on business need. Centralized Authorization Policy Administration for Databases Integration with major databases (Oracle, DB2, Sybase, MySQL)
  • 18. SharePoint Security Document Access Control (based * OES provides a variety on document tags, attributes, of authorization location, user, role, etc) decisions for different types of applications Custom Page Content (FGA checks and users. for ASP.NET pages) Integration with Active Directory and LDAP-based directories
  • 19. Web Services Security  Integration with XML Gateways * Policies can be set up to Selective Data Redaction/Filtering secure connectivity to SOA and cloud environments.. for SOA web services Support for a variety of message standards (XML/SOAP/REST/JMS)
  • 20. Aberdeen Group Event Series Featuring Derek Brink Chicago New York April 10th April 12th San Francisco May 22nd Toronto Boston April 17th April 19th Register at: www.oracle.com/identity
  • 21. Platform Webcast Series Oracle Customers Discussing Results of Platform Approach Platform Best Cisco’s Platform Practices Approach Agilent Technologies Cisco Systems Available On-Demand Available On-Demand Platform for Platform Business Compliance Enabler ING Bank Toyota Motors April 11th 2012 May 30th 2012 Register at: www.oracle.com/identity
  • 23. www.oracle.com/identity www.facebook.com/OracleIDM www.twitter.com/OracleIDM blogs.oracle.com/OracleIDM ©2012 Oracle Corporation

Notas do Editor

  1. There has been a dramatic shift in the requirements for providing secure access to applications, web services and databases.Even though many organizations have centralized their web access management infrastructure, many authorization decisions are hard-wired into the application business logic itself. The business logic that makes authorization decisions is not centrally managed, governed or controlled by a security team. To make matters worse, runtime access control decisions are rarely audited. The result is a fragmented policy framework that is difficult to control and manage. External Authorization solutions overcome this problem by externalizing granular access privileges from applications and then centralizing administration. External Authorization solutions can enforce policies based on a combination of roles, attributes, context, or runtime conditions.External Authzdoes for authorization what Single Sign-On did for authentication. With SSO, we achieved the first step of externalizing user names, passwords, and logins to a centralized enterprise-wide system. With ExternalAuthz, we can now abstract policies that were previously hard-coded into applications. The benefits include– enabling your business to adapt and change on a dime as market conditions and compliance mandates require enforcement of newer and more complex policies. Centralizing policy management allows for consistent enforcement, improving security and achieving good governance across the enterprise.
  2. There are three primary business drivers fueling the need to externalize authorization from applications. Regulatory considerations are getting more stringent and complex. Meeting modern regulatory demands often requires enforcement of granular access privileges at application runtime. With role based access becoming predominant, many organizations are now dealing with the challenge of role explosion wherein redundant role definitions can often make it difficult to secure transactions and data on the basis of roles. Finally, a lot of homegrown applications have authorization policies built into the business logic which makes it hard to change policies in response to evolving security and regulatory mandates. This has led to the growth of External Authorization solutions which make it easy to externalize and centralize authorization policy definitions. Solutions like Oracle Entitlement Server allow extremely rich policy definitions to be set up on the basis of context, attributes, roles or runtime conditions.
  3. External Authorization solutions can be applied to solve multiple kinds of real world problems.From securing content to securing collaboration. And For securing privacy and confidentiality of data. Recent regulations such as Healthcare regulations and privacy laws have placed stricter requirements on access to applications and auditing of that access. Often meeting these compliance mandates require fine grained access control policies. In the absence of a central infrastructure to manage and enforce granular security policies, organizations find themselves constantly retooling applications to keep pace with changing regulatory demands. Regulatory demands like enforcement of segregation of duties and Chinese walls can be easily enforced by externalizing authorization. External authz solutions can keep track of entitlement activity in your enterprise. Every time an authz policy decision is made, an audit record can be created that can be later analyzed or reported on.
  4. With External Authorization, organizations can enforce granular security throughout the stack - apps, web services, portals or databasescan be secured by externalizing authorization policies.SOA – ExternalAuthz can simplify and secure connectivity to SOA environments.Data - Existing security tools do not address the fundamental need of protecting the data itself based on the context of the access. Either they provide an excessively coarse-grained control over the data source – an all or nothing proposition that does not work in most cases – or they require changes in all the applications that can access the data. Every application touching the data source requires developers to write custom code to filter database tables and present only the subset of the data that is appropriate to the context of the application, process, and user making the request. External authz can provide only the necessary subset of data pertinent to the context of the access request. Applications- Applications of many flavors – including homegrown, packaged and cloud applications can be secured.Organizations can decouple the evolution of authzpolicies from business logic by externalizing access privileges from applications.
  5. The architecture for the use case review consisted of the following OES components:Administration Console: The Administration Console provides a rich Web based UI for policy authoring and management. It can also distribute policy updates to applications. Policy Store: The Policy Store serves as a central persistent store for authorization policies. This helpsin centralized management of security. Applications can get policies directly from the central policy store. Policy Decision Point (PDP): This is the runtime component which includes the core authorization engine (also known as Security Module or SM). When the SM gets an authorization request from a user or application, it evaluates this request against all relevant policies and gives a final authorization result. As part of policy evaluation, the SM can look up information from external data sources such as LDAP systems, databases, Web Services and other data sources. An SM also includes PEPs (Policy Enforcement Points), which can be used to automatically enforce OES authorization decisions in environments such as WebLogic and SharePoint among others.
  6. Oracle Entitlements Server (OES) can be used to secure applications of all flavors – homegrown, mainframe, packaged, cloud. It provides authorization for a broad set of ecosystems including Java EE, Java SE, .NET, content management systems and databases. OES provides a rich hierarchical policy model based on the Role Based Access Control (RBAC) and Attribute Based Access Control (ABAC) standards.OES allows both static and dynamic assignment of Applications Roles based on policy. In dynamic role mapping, roles are assigned on an as needed basis depending on the action initiated by the user. For example, the role of Fund Manager should be granted to a person only on certain funds. They come into existence when an authorization request is made and they are destroyed once a decision is computed. OES provides sophisticated facilities to accurately control role assignments based on the contextBusiness roles are often structured hierarchically. Employees in higher positions are automatically granted privileges of people in their reporting hierarchy. To model these real world relationships OES supports role inheritance.OES can also be used to enforce SoD checks. There may be a need to ensure that certain users cannot perform tasks that might establish a conflict of interest (e.g. Financial Analyst making trades on the company they are covering). It also help establish how certain tasks should be given to certain users only (e.g. delegated administration). These policies are intended to make sure that only the correct user is doing the correct thing.OES can also enforce policies based on context or runtime conditions. For example, you may to change what an application allows a user to do based upon time of day or business conditions. Also there may be policies that dictate how an application carries out an activity (e.g. more than just a grant/deny decision for a piece of functionality).And OES integrates easily with LDAP based directories for sourcing identity attributes.
  7. In enterprises, most data originates from a database, flows through various service tiers and is finally rendered by the UI. Securing data at the source ensures that information does not leak. OES supports data redaction filters in the data tier as well as in the business tier.Sometimes information stored in a database is extremely sensitive and extensive checks need to be done irrespective of the application. For example, credit card numbers and passwords should only be shared on a need to know basis. In these situations it may be desirable to enforce restrictions from within the Database itself. OES can be used to do Row and Column level filtering based on standards based authorization policies. Because this filtering is done within the database, security policies will be enforced irrespective of the application. This solution is also useful with legacy applications which cannot externalize authorization. And OES integrates easily with most major databases.
  8. Content Management Servers such as SharePoint provide excellent facilities for storing, retrieving and sharing documents. They often come with standard facilities to secure documents. OES can extend these simple security models with sophisticated RBAC and ABAC based models. For example, a policy such as “Only employees with clearance level 4 can view confidential documents” can be easily implemented using OES policy constraints. SharePoint serves as both a portal and document repository. OES provides OOTB policy enforcementPoints (PEPs) for securing SharePoint Sites, URLs, Pages, Portlets, Web Parts, page contents and documents. An OES HTTP module secures Web pages and the OES Web Control secures Web Parts. In addition OES provides an authorization tag library which allows conditional execution of code and custom UI rendering.This allows you to gain control of prolific use of SharePoint in your organization. It also allows you to lock down information hosted in SharePoint to a very granular level. It allows you to protect web parts, pages, list items – any user information that can be rendered can protected with OES. It is wellintegrated with Active Directory and can naturally reuse the information stored in AD.
  9. OES integrates easily with XML gateways to help simplify and secure connectivity to SOA environments. OES is natively integrated with Oracle Enterprise Gateway, the recently launched Oracle XML Gateway Product. OES Security Modules are embedded within OEG. This can help enforce granular security for SOA environments. For instance, you can now enforce security policies for web services based on the content of SOAP headers and attribute information. This makes it easier to enforce policies based on time of day, client IP etc. Policies can be setup to redact confidential information from web service responses.OES supports most web services message standards including SOAP, REST, and JMS.
  10. Oracle is proud to sponsor the Platform Approach seminar series. In this multi-city event series, Derek Brink (research analyst from Aberdeen Group) will discuss how organizations can build a business case for a comprehensive identity and access program. In addition, attendees will learn how to build a roadmap that optimizes the results of large scale Identity Management. Oracle experts and architects will also provide information on how to unlock the potential of the Oracle Identity Platform. Register today at oracle.com/identity
  11. You also have a unique online opportunity to learn from and get questions answered by Oracle customers. These are webcasts but they will also be available on demand as well.Agilent Technologies discusses how they moved from multiple point solutions to consolidate their deployment on OracleCisco discusses their unique approach to consolidate their identity program into a platform On April 11th – ING Bank - will discusshow a platform with integrated administration and governance reduced cost and improved complianceOn May 30th – Toyota Motors – will discuss they leveraged a platform to build a social network for cars.
  12. OES integrates easily with XML gateways to help simplify and secure connectivity to SOA environments. OES is natively integrated with Oracle Enterprise Gateway, the recently launched Oracle XML Gateway Product. OES Security Modules are embedded within OEG. This can help enforce granular security for SOA environments. For instance, you can now enforce security policies for web services based on the content of SOAP headers and attribute information. This makes it easier to enforce policies based on time of day, client IP etc. Policies can be setup to redact confidential information from web service responses.OES supports most web services message standards including SOAP, REST, and JMS.
  13. Join the Oracle community for regular updates on content and hear about upcoming events and news.