SlideShare uma empresa Scribd logo
1 de 19
Baixar para ler offline
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle Identity & Access Management
USTRANSCOM
September 28, 2016
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Safe Harbor Statement
The following is intended to outline our general product direction. It is intended for
information purposes only, and may not be incorporated into any contract. It is not a
commitment to deliver any material, code, or functionality, and should not be relied upon
in making purchasing decisions. The development, release, and timing of any features or
functionality described for Oracle’s products remains at the sole discretion of Oracle.
Oracle Confidential – Internal/Restricted/Highly Restricted 2
Copyright © 2016 Oracle and/or its affiliates. All rights reserved. |
GOVERNANCE
MANAGEMENT
SERVICES
USER
AUTHENTICATION
LOCATION
DATA
EXTREME
SCALE
LOW
TCO
INTEGRATED
INTEROPERABLE
DEVICE
AUTHN
NAMING
SERVICES
HOST
ACCESS
CONTROL
AP
P
THOUSANDS MILLIONS BILLIONS 10s of BILLIONS
VIRTUAL
DIRECTORY
META
DIRECTORY
LDAP
DIRECTORY
IDENTITY
FEDERATION
EXTERNAL
AUTHORIZATION
ENTERPRISE&
WEBSINGLE
SIGN-ON
MOBILE &SOCIAL
SIGN-ON
FRAUD
DETECTION
EMPLOYEES
CONTRACTORS
& PARTNERS
CUSTOMERS
& PROSPECTS
OPERATING
SYSTEMS
DIRECTORY
SERVICES
A
P
P
S
APPLICATIONS
COMMON REPOSITORY
DATABASES SINGLE
USER
VIEW
ACCESS
REQUEST
ENTITLEMENT
CATALOG PRIVILEGED
ACCOUNT
MANAGEMENT
ACCESS
CERTIFICATION
PRIVILIGED
ACCOUNTS
USER
PROVISIONING
CERTIFICATION
REVIEW
ACCESS
REQUEST
INTEGRATED
PLATFORM
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle Access Management
Oracle Fusion Middleware’s Security Pillar
CloudOn-Premise
Authentication
Intelligent, Risk-based
Strong Authentication
Common Policy Model – Shared Infrastructure Services
Web Mobile Social Internet of Things
4
Authorization
Real-Time, Context-Aware
Externalized Policies
Federation
Standards-Based
Leverages Social Identities
Mobile and API
RESTful Interfaces
API Security
Managed Cloud
Scalability, High Availability, Disaster Recovery
System Management
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle Access Management
• Complete
• Context-aware and risk-aware
• Scalable, highly available
• Standards-based and modular
5
Services and Capabilities
Authentication, SSO
Adaptive Access and Fraud Prevention
Identity Federation
Secure Token Service
Mobile Security and Social Identity
Access Portal
Enterprise SSO
External, Fine-Grained Authorization
Web Services Security
API Security
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Access Management – Web SSO
• Web authentication
– User name and password
– Windows native authentication (WNA)
– Strong authentication (CAC / PIV)
– Multi-Factor
• Web Single Sign-On (SSO)
• Fine-grained authorization
6Oracle Confidential – Internal
Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |
Integrated Risk, Fraud, and Strong Authentication
• Context-aware, risk-aware and content-
aware
• Leverage real-time context for
authentication and authorization
• Native mobile OTP for step-up
authentication
• Real-time risk analysis and fraud prevention
• Data redaction through dynamic
authorization based on risk
• Cross-platform consistent policies; adaptive
to context, content and risk
7
LOW
HIGH
MED
RESPONSE
ALLOW DENY
RISK
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle Identity Governance
Unified Approach to Complete Identity Governance
Self Service
Access Request, Password
Management
Platform & Integration Layer
8
Compliance
Access Certification, SOD,
Continuous Compliance
Identity Intelligence
Operational Reporting,
Access Dashboards
Privileged Access
Privileged Access, Privileged
Audit, Session Recording
Common Data Model Role & Policy Library
Workflows and Service
Desk Integration
Access Catalog
Identity Connector Framework – Provisioning/De-Provisioning
CloudOn-Premise
Managed Cloud
Cloud MobileEnterprise
Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |
Business-Friendly Request Catalog
• Business-friendly Access Catalog
• Self-Service Application On-boarding
And Administration
• Search, Browse And Contextual
Recommendations
• In-line Policy Checks To Prevent
SOD Violations
• Flexible Forms For Advanced Data Capture
• End-to-end Visibility Into The Approval and
Fulfillment Process
Enabling end-users to get the access they need
Search,
Browse,
Recommend
Policy-compliant
Access Request
Business-Friendly
Access Catalog
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle Identity Governance
• Access Catalog provides ability to browse
and search
• Smart search forms allow users to
navigate the Catalog in a guided manner
• Catalog search results indicate relevance
• Access Catalog can recommend access
based on pre-defined and user-defined
criteria
• Support for Start/End Dates for Access
Grants
• Preventative SoD Analysis
Intelligent Access Catalog
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle Identity Governance
• Business users can request creation of
new roles and changes to existing ones
• Role requests can leverage the same
request and approval framework
available for Access Requests and
Certification
• Role owners can see comprehensive
auditing and prior versions
Comprehensive Role Lifecycle Management
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle Identity Governance
• Comprehensive role analytics allows
business users to see the impact of new
roles and changes to existing ones
• Role owners can reduce role explosion by
review the effectiveness of the roles and
consolidate new roles with existing ones
• Business users can create roles using
“model users”
Comprehensive Role Lifecycle Management
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle Identity Governance
SOD Detection and Closed Loop Remediation
• SOD Rule and Policy Definition
• Define rules across users, applications, roles and
entitlements
• Detective SOD Analysis
• Detective Policy Enforcement – Closed Loop
Remediation
• Access History to audit all violations and decisions
• Review High Risk policy violations in Certifications
• Preventative SOD Analysis
• Enforce SOD policies during access requests
• Review policy violations during approvals and
launch exception workflows
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle Identity Governance
• Administrators can define custom
security roles to control who can do
what at an attribute level
• Users can be assigned security roles
via rules reducing administration
burden
• User actions and the context that they
used to perform the action are
audited
Simplified yet granular security
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
Oracle Privileged Account Manager
• Check-Out / Check-In Self Service Console
• Custom built approvals (e.g. phone)
• Custom built ticketing system integration
• Custom built notifications
• Access Request Interface – Privilege Accounts added to OIG resource
catalog
• Keystroke logging
• Session recording
15
Accountability
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |
• Extended managed targets
• UNIX SSH Targets
• LDAP
• Database
• Windows
• SSH based targets
• SAP
• UNIX / Linux server
• Oracle Database
• Microsoft SQL Server
• Sybase
• IBM DB2
• Microsoft Active DirectorySession
Management control policies
• Session Recording
OPAM
16
More managed targets, greater control and more visibility
Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |
OUD
VirtualizationStorage Synchronization
Cloud Apps
Databases
Enterprise Apps Servers
Mobile Apps
HR DBDSEE
Active
Directory
OUD – The All in One Directory
17
• Storage,
virtualization and
Sync
• High performance
• Extreme scalability
• REST support
3 - 18Copyright © 2015, Oracle and/or its affiliates. All rights reserved.
Oracle Enterprise Manager Fusion Middleware Control
Oracle Identity & Access Management

Mais conteúdo relacionado

Mais procurados

https://www.slideshare.net/neo4j/a-fusion-of-machine-learning-and-graph-analy...
https://www.slideshare.net/neo4j/a-fusion-of-machine-learning-and-graph-analy...https://www.slideshare.net/neo4j/a-fusion-of-machine-learning-and-graph-analy...
https://www.slideshare.net/neo4j/a-fusion-of-machine-learning-and-graph-analy...Neo4j
 
Scaling paypal workloads with oracle rac ss
Scaling paypal workloads with oracle rac ssScaling paypal workloads with oracle rac ss
Scaling paypal workloads with oracle rac ssAnil Nair
 
Introducing the Oracle Cloud Infrastructure (OCI) Best Practices Framework
Introducing the Oracle Cloud Infrastructure (OCI) Best Practices FrameworkIntroducing the Oracle Cloud Infrastructure (OCI) Best Practices Framework
Introducing the Oracle Cloud Infrastructure (OCI) Best Practices FrameworkRevelation Technologies
 
Working with Relational Databases in AWS Glue ETL (ANT342) - AWS re:Invent 2018
Working with Relational Databases in AWS Glue ETL (ANT342) - AWS re:Invent 2018Working with Relational Databases in AWS Glue ETL (ANT342) - AWS re:Invent 2018
Working with Relational Databases in AWS Glue ETL (ANT342) - AWS re:Invent 2018Amazon Web Services
 
The art of the possible with graph technology_Neo4j GraphSummit Dublin 2023.pptx
The art of the possible with graph technology_Neo4j GraphSummit Dublin 2023.pptxThe art of the possible with graph technology_Neo4j GraphSummit Dublin 2023.pptx
The art of the possible with graph technology_Neo4j GraphSummit Dublin 2023.pptxNeo4j
 
Oracle Management Cloud
Oracle Management CloudOracle Management Cloud
Oracle Management CloudFabio Batista
 
Oracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best Practices
Oracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best PracticesOracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best Practices
Oracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best PracticesMarkus Michalewicz
 
Oracle GoldenGate Architecture Performance
Oracle GoldenGate Architecture PerformanceOracle GoldenGate Architecture Performance
Oracle GoldenGate Architecture PerformanceEnkitec
 
Introduction to snowflake
Introduction to snowflakeIntroduction to snowflake
Introduction to snowflakeSunil Gurav
 
Microsoft SQL Server Query Tuning
Microsoft SQL Server Query TuningMicrosoft SQL Server Query Tuning
Microsoft SQL Server Query TuningMark Ginnebaugh
 
What to Expect From Oracle database 19c
What to Expect From Oracle database 19cWhat to Expect From Oracle database 19c
What to Expect From Oracle database 19cMaria Colgan
 
New Generation Oracle RAC Performance
New Generation Oracle RAC PerformanceNew Generation Oracle RAC Performance
New Generation Oracle RAC PerformanceAnil Nair
 
Dimensional modeling in oracle sql developer
Dimensional modeling in oracle sql developerDimensional modeling in oracle sql developer
Dimensional modeling in oracle sql developerJeff Smith
 
Oracle sharding : Installation & Configuration
Oracle sharding : Installation & ConfigurationOracle sharding : Installation & Configuration
Oracle sharding : Installation & Configurationsuresh gandhi
 
Oracle Management Cloud, OMC architecture
Oracle Management Cloud, OMC architecture Oracle Management Cloud, OMC architecture
Oracle Management Cloud, OMC architecture Samir El-Nabawy
 
The Road to Modernization: From EBS to Oracle ERP Cloud
The Road to Modernization: From EBS to Oracle ERP CloudThe Road to Modernization: From EBS to Oracle ERP Cloud
The Road to Modernization: From EBS to Oracle ERP CloudPerficient, Inc.
 
Enabling a Data Mesh Architecture and Data Sharing Culture with Denodo
Enabling a Data Mesh Architecture and Data Sharing Culture with DenodoEnabling a Data Mesh Architecture and Data Sharing Culture with Denodo
Enabling a Data Mesh Architecture and Data Sharing Culture with DenodoDenodo
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIMTamim Khan
 

Mais procurados (20)

https://www.slideshare.net/neo4j/a-fusion-of-machine-learning-and-graph-analy...
https://www.slideshare.net/neo4j/a-fusion-of-machine-learning-and-graph-analy...https://www.slideshare.net/neo4j/a-fusion-of-machine-learning-and-graph-analy...
https://www.slideshare.net/neo4j/a-fusion-of-machine-learning-and-graph-analy...
 
Scaling paypal workloads with oracle rac ss
Scaling paypal workloads with oracle rac ssScaling paypal workloads with oracle rac ss
Scaling paypal workloads with oracle rac ss
 
Introducing the Oracle Cloud Infrastructure (OCI) Best Practices Framework
Introducing the Oracle Cloud Infrastructure (OCI) Best Practices FrameworkIntroducing the Oracle Cloud Infrastructure (OCI) Best Practices Framework
Introducing the Oracle Cloud Infrastructure (OCI) Best Practices Framework
 
Working with Relational Databases in AWS Glue ETL (ANT342) - AWS re:Invent 2018
Working with Relational Databases in AWS Glue ETL (ANT342) - AWS re:Invent 2018Working with Relational Databases in AWS Glue ETL (ANT342) - AWS re:Invent 2018
Working with Relational Databases in AWS Glue ETL (ANT342) - AWS re:Invent 2018
 
Oracle Database Vault
Oracle Database VaultOracle Database Vault
Oracle Database Vault
 
The art of the possible with graph technology_Neo4j GraphSummit Dublin 2023.pptx
The art of the possible with graph technology_Neo4j GraphSummit Dublin 2023.pptxThe art of the possible with graph technology_Neo4j GraphSummit Dublin 2023.pptx
The art of the possible with graph technology_Neo4j GraphSummit Dublin 2023.pptx
 
Cloud Oracle
Cloud Oracle Cloud Oracle
Cloud Oracle
 
Oracle Management Cloud
Oracle Management CloudOracle Management Cloud
Oracle Management Cloud
 
Oracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best Practices
Oracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best PracticesOracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best Practices
Oracle Real Application Clusters (RAC) 12c Rel. 2 - Operational Best Practices
 
Oracle GoldenGate Architecture Performance
Oracle GoldenGate Architecture PerformanceOracle GoldenGate Architecture Performance
Oracle GoldenGate Architecture Performance
 
Introduction to snowflake
Introduction to snowflakeIntroduction to snowflake
Introduction to snowflake
 
Microsoft SQL Server Query Tuning
Microsoft SQL Server Query TuningMicrosoft SQL Server Query Tuning
Microsoft SQL Server Query Tuning
 
What to Expect From Oracle database 19c
What to Expect From Oracle database 19cWhat to Expect From Oracle database 19c
What to Expect From Oracle database 19c
 
New Generation Oracle RAC Performance
New Generation Oracle RAC PerformanceNew Generation Oracle RAC Performance
New Generation Oracle RAC Performance
 
Dimensional modeling in oracle sql developer
Dimensional modeling in oracle sql developerDimensional modeling in oracle sql developer
Dimensional modeling in oracle sql developer
 
Oracle sharding : Installation & Configuration
Oracle sharding : Installation & ConfigurationOracle sharding : Installation & Configuration
Oracle sharding : Installation & Configuration
 
Oracle Management Cloud, OMC architecture
Oracle Management Cloud, OMC architecture Oracle Management Cloud, OMC architecture
Oracle Management Cloud, OMC architecture
 
The Road to Modernization: From EBS to Oracle ERP Cloud
The Road to Modernization: From EBS to Oracle ERP CloudThe Road to Modernization: From EBS to Oracle ERP Cloud
The Road to Modernization: From EBS to Oracle ERP Cloud
 
Enabling a Data Mesh Architecture and Data Sharing Culture with Denodo
Enabling a Data Mesh Architecture and Data Sharing Culture with DenodoEnabling a Data Mesh Architecture and Data Sharing Culture with Denodo
Enabling a Data Mesh Architecture and Data Sharing Culture with Denodo
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIM
 

Destaque

Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationDelivery Centric
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureAtul Goyal
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overviewEslam Hafez
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Oracle
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation Delivery Centric
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationDelivery Centric
 
OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1Atul Goyal
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentationstefanjung
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2OracleIDM
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Oracle Access Management Suite Plus 11g PreSales Specialist
Oracle Access Management Suite Plus 11g PreSales SpecialistOracle Access Management Suite Plus 11g PreSales Specialist
Oracle Access Management Suite Plus 11g PreSales SpecialistHany Widodo
 
Talk IT_ Oracle_임기성_110907
Talk IT_ Oracle_임기성_110907Talk IT_ Oracle_임기성_110907
Talk IT_ Oracle_임기성_110907Cana Ko
 
Self Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More ProductivitySelf Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More ProductivityAtul Goyal
 
Integrating Enterprise Controls with the Cloud
Integrating Enterprise Controls with the CloudIntegrating Enterprise Controls with the Cloud
Integrating Enterprise Controls with the CloudAtul Goyal
 
Federal Architecture in the 1950s, 1960s, and 1970s
Federal Architecture in the 1950s, 1960s, and 1970sFederal Architecture in the 1950s, 1960s, and 1970s
Federal Architecture in the 1950s, 1960s, and 1970spreservationcombination
 
P6 analytics producing meaningful results in P6 analytics - Oracle Primavera...
P6 analytics producing meaningful results in P6 analytics  - Oracle Primavera...P6 analytics producing meaningful results in P6 analytics  - Oracle Primavera...
P6 analytics producing meaningful results in P6 analytics - Oracle Primavera...p6academy
 

Destaque (20)

Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 Architecture
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overview
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Oracle identity & access management online training
Oracle identity & access management online trainingOracle identity & access management online training
Oracle identity & access management online training
 
Oracle Access Management Suite Plus 11g PreSales Specialist
Oracle Access Management Suite Plus 11g PreSales SpecialistOracle Access Management Suite Plus 11g PreSales Specialist
Oracle Access Management Suite Plus 11g PreSales Specialist
 
Talk IT_ Oracle_임기성_110907
Talk IT_ Oracle_임기성_110907Talk IT_ Oracle_임기성_110907
Talk IT_ Oracle_임기성_110907
 
Self Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More ProductivitySelf Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More Productivity
 
Integrating Enterprise Controls with the Cloud
Integrating Enterprise Controls with the CloudIntegrating Enterprise Controls with the Cloud
Integrating Enterprise Controls with the Cloud
 
Federal Architecture in the 1950s, 1960s, and 1970s
Federal Architecture in the 1950s, 1960s, and 1970sFederal Architecture in the 1950s, 1960s, and 1970s
Federal Architecture in the 1950s, 1960s, and 1970s
 
P6 analytics producing meaningful results in P6 analytics - Oracle Primavera...
P6 analytics producing meaningful results in P6 analytics  - Oracle Primavera...P6 analytics producing meaningful results in P6 analytics  - Oracle Primavera...
P6 analytics producing meaningful results in P6 analytics - Oracle Primavera...
 

Semelhante a Oracle Identity & Access Management

Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Atul Goyal
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...oow123
 
API Gateway - OFM Canberra October 2014
API Gateway - OFM Canberra October 2014API Gateway - OFM Canberra October 2014
API Gateway - OFM Canberra October 2014Joelith
 
MySQL Security
MySQL SecurityMySQL Security
MySQL SecurityMario Beck
 
PeopleSoft Keynote: PeopleSoft Investment Strategy and Roadmap
PeopleSoft Keynote:  PeopleSoft Investment Strategy and RoadmapPeopleSoft Keynote:  PeopleSoft Investment Strategy and Roadmap
PeopleSoft Keynote: PeopleSoft Investment Strategy and RoadmapCedar Consulting
 
Hyperledger Austin meetup July 10, 2018
Hyperledger Austin meetup July 10, 2018Hyperledger Austin meetup July 10, 2018
Hyperledger Austin meetup July 10, 2018Oracle Developers
 
Oracle - Hyperledger Silicon Valley meetup, June 20, 2018
Oracle - Hyperledger Silicon Valley meetup, June 20, 2018Oracle - Hyperledger Silicon Valley meetup, June 20, 2018
Oracle - Hyperledger Silicon Valley meetup, June 20, 2018Oracle Developers
 
Oracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners GuideOracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners GuideCourtney Llamas
 
Using MySQL Enterprise Monitor for Continuous Performance Improvement
Using MySQL Enterprise Monitor for Continuous Performance ImprovementUsing MySQL Enterprise Monitor for Continuous Performance Improvement
Using MySQL Enterprise Monitor for Continuous Performance ImprovementMark Matthews
 
Multiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oidMultiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oidpasalapudi
 
B6 improve operational_efficiency_through_process_and_document_collaboration
B6 improve operational_efficiency_through_process_and_document_collaborationB6 improve operational_efficiency_through_process_and_document_collaboration
B6 improve operational_efficiency_through_process_and_document_collaborationDr. Wilfred Lin (Ph.D.)
 
Oracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationOracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationDelivery Centric
 
Addvantum Oracle Profile OFMW
Addvantum  Oracle Profile OFMW Addvantum  Oracle Profile OFMW
Addvantum Oracle Profile OFMW Addvantum
 
Real-World RESTful Service Development Problems and Solutions
Real-World RESTful Service Development Problems and SolutionsReal-World RESTful Service Development Problems and Solutions
Real-World RESTful Service Development Problems and SolutionsMasoud Kalali
 
Securing your Applications for the Cloud Age
Securing your Applications for the Cloud AgeSecuring your Applications for the Cloud Age
Securing your Applications for the Cloud AgeArtur Alves
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Oracle Enterprise Manager Security: A Practitioners Guide
Oracle Enterprise Manager Security: A Practitioners GuideOracle Enterprise Manager Security: A Practitioners Guide
Oracle Enterprise Manager Security: A Practitioners GuideCourtney Llamas
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?ForgeRock
 
Oracle Eloqua Roadmap SoCal Marketing Cloud User Group February 2016
Oracle Eloqua Roadmap SoCal Marketing Cloud User Group February 2016Oracle Eloqua Roadmap SoCal Marketing Cloud User Group February 2016
Oracle Eloqua Roadmap SoCal Marketing Cloud User Group February 2016Ron Corbisier
 

Semelhante a Oracle Identity & Access Management (20)

Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
 
API Gateway - OFM Canberra October 2014
API Gateway - OFM Canberra October 2014API Gateway - OFM Canberra October 2014
API Gateway - OFM Canberra October 2014
 
MySQL Security
MySQL SecurityMySQL Security
MySQL Security
 
PeopleSoft Keynote: PeopleSoft Investment Strategy and Roadmap
PeopleSoft Keynote:  PeopleSoft Investment Strategy and RoadmapPeopleSoft Keynote:  PeopleSoft Investment Strategy and Roadmap
PeopleSoft Keynote: PeopleSoft Investment Strategy and Roadmap
 
Hyperledger Austin meetup July 10, 2018
Hyperledger Austin meetup July 10, 2018Hyperledger Austin meetup July 10, 2018
Hyperledger Austin meetup July 10, 2018
 
Oracle - Hyperledger Silicon Valley meetup, June 20, 2018
Oracle - Hyperledger Silicon Valley meetup, June 20, 2018Oracle - Hyperledger Silicon Valley meetup, June 20, 2018
Oracle - Hyperledger Silicon Valley meetup, June 20, 2018
 
Oracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners GuideOracle Enterprise Manager Security A Practitioners Guide
Oracle Enterprise Manager Security A Practitioners Guide
 
Using MySQL Enterprise Monitor for Continuous Performance Improvement
Using MySQL Enterprise Monitor for Continuous Performance ImprovementUsing MySQL Enterprise Monitor for Continuous Performance Improvement
Using MySQL Enterprise Monitor for Continuous Performance Improvement
 
Multiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oidMultiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oid
 
B6 improve operational_efficiency_through_process_and_document_collaboration
B6 improve operational_efficiency_through_process_and_document_collaborationB6 improve operational_efficiency_through_process_and_document_collaboration
B6 improve operational_efficiency_through_process_and_document_collaboration
 
Soa suite12c presentation @AMIS by Simone Geib
Soa suite12c presentation @AMIS by Simone GeibSoa suite12c presentation @AMIS by Simone Geib
Soa suite12c presentation @AMIS by Simone Geib
 
Oracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationOracle Directory Services - Customer Presentation
Oracle Directory Services - Customer Presentation
 
Addvantum Oracle Profile OFMW
Addvantum  Oracle Profile OFMW Addvantum  Oracle Profile OFMW
Addvantum Oracle Profile OFMW
 
Real-World RESTful Service Development Problems and Solutions
Real-World RESTful Service Development Problems and SolutionsReal-World RESTful Service Development Problems and Solutions
Real-World RESTful Service Development Problems and Solutions
 
Securing your Applications for the Cloud Age
Securing your Applications for the Cloud AgeSecuring your Applications for the Cloud Age
Securing your Applications for the Cloud Age
 
Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Oracle Enterprise Manager Security: A Practitioners Guide
Oracle Enterprise Manager Security: A Practitioners GuideOracle Enterprise Manager Security: A Practitioners Guide
Oracle Enterprise Manager Security: A Practitioners Guide
 
Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?Identity Management with the ForgeRock Identity Platform - So What’s New?
Identity Management with the ForgeRock Identity Platform - So What’s New?
 
Oracle Eloqua Roadmap SoCal Marketing Cloud User Group February 2016
Oracle Eloqua Roadmap SoCal Marketing Cloud User Group February 2016Oracle Eloqua Roadmap SoCal Marketing Cloud User Group February 2016
Oracle Eloqua Roadmap SoCal Marketing Cloud User Group February 2016
 

Mais de DLT Solutions

WebLogic 12c & WebLogic Mgmt Pack
WebLogic 12c & WebLogic Mgmt PackWebLogic 12c & WebLogic Mgmt Pack
WebLogic 12c & WebLogic Mgmt PackDLT Solutions
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingDLT Solutions
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security OptionDLT Solutions
 
Replicate data between environments
Replicate data between environmentsReplicate data between environments
Replicate data between environmentsDLT Solutions
 
Streamline it management
Streamline it managementStreamline it management
Streamline it managementDLT Solutions
 
Consolidate and prepare for cloud efficiencies
Consolidate and prepare for cloud efficienciesConsolidate and prepare for cloud efficiencies
Consolidate and prepare for cloud efficienciesDLT Solutions
 
Red Hat Software Defined Storage
Red Hat Software Defined StorageRed Hat Software Defined Storage
Red Hat Software Defined StorageDLT Solutions
 
Openshift Container Platform
Openshift Container PlatformOpenshift Container Platform
Openshift Container PlatformDLT Solutions
 
Red Hat JBOSS Data Virtualization
Red Hat JBOSS Data VirtualizationRed Hat JBOSS Data Virtualization
Red Hat JBOSS Data VirtualizationDLT Solutions
 
Red Hat JBoss Data Virtualization
Red Hat JBoss Data VirtualizationRed Hat JBoss Data Virtualization
Red Hat JBoss Data VirtualizationDLT Solutions
 
How to Upgrade Hundreds or Thousands of Databases
How to Upgrade Hundreds or Thousands of DatabasesHow to Upgrade Hundreds or Thousands of Databases
How to Upgrade Hundreds or Thousands of DatabasesDLT Solutions
 
Why Upgrade to Oracle Database 12c?
Why Upgrade to Oracle Database 12c?Why Upgrade to Oracle Database 12c?
Why Upgrade to Oracle Database 12c?DLT Solutions
 
Cross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersCross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersDLT Solutions
 
Making Sense of Threat Reports
Making Sense of Threat ReportsMaking Sense of Threat Reports
Making Sense of Threat ReportsDLT Solutions
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionDLT Solutions
 
Deploying and Managing Red Hat Enterprise Linux in Amazon Web Services
Deploying and Managing Red Hat Enterprise Linux in Amazon Web ServicesDeploying and Managing Red Hat Enterprise Linux in Amazon Web Services
Deploying and Managing Red Hat Enterprise Linux in Amazon Web ServicesDLT Solutions
 
Implementing BIM for Owners
Implementing BIM for OwnersImplementing BIM for Owners
Implementing BIM for OwnersDLT Solutions
 
Autodesk Infrastructure Solutions for Government Agencies
Autodesk Infrastructure Solutions for Government AgenciesAutodesk Infrastructure Solutions for Government Agencies
Autodesk Infrastructure Solutions for Government AgenciesDLT Solutions
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?DLT Solutions
 

Mais de DLT Solutions (20)

WebLogic 12c & WebLogic Mgmt Pack
WebLogic 12c & WebLogic Mgmt PackWebLogic 12c & WebLogic Mgmt Pack
WebLogic 12c & WebLogic Mgmt Pack
 
Oracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and MaskingOracle Key Vault Data Subsetting and Masking
Oracle Key Vault Data Subsetting and Masking
 
AV/DF Advanced Security Option
AV/DF Advanced Security OptionAV/DF Advanced Security Option
AV/DF Advanced Security Option
 
Replicate data between environments
Replicate data between environmentsReplicate data between environments
Replicate data between environments
 
Streamline it management
Streamline it managementStreamline it management
Streamline it management
 
Consolidate and prepare for cloud efficiencies
Consolidate and prepare for cloud efficienciesConsolidate and prepare for cloud efficiencies
Consolidate and prepare for cloud efficiencies
 
Red Hat Software Defined Storage
Red Hat Software Defined StorageRed Hat Software Defined Storage
Red Hat Software Defined Storage
 
Openshift Container Platform
Openshift Container PlatformOpenshift Container Platform
Openshift Container Platform
 
Red Hat JBOSS Data Virtualization
Red Hat JBOSS Data VirtualizationRed Hat JBOSS Data Virtualization
Red Hat JBOSS Data Virtualization
 
Red Hat JBoss Data Virtualization
Red Hat JBoss Data VirtualizationRed Hat JBoss Data Virtualization
Red Hat JBoss Data Virtualization
 
How to Upgrade Hundreds or Thousands of Databases
How to Upgrade Hundreds or Thousands of DatabasesHow to Upgrade Hundreds or Thousands of Databases
How to Upgrade Hundreds or Thousands of Databases
 
Why Upgrade to Oracle Database 12c?
Why Upgrade to Oracle Database 12c?Why Upgrade to Oracle Database 12c?
Why Upgrade to Oracle Database 12c?
 
Cross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling ComputersCross Domain Solutions for SolarWinds from Sterling Computers
Cross Domain Solutions for SolarWinds from Sterling Computers
 
Making Sense of Threat Reports
Making Sense of Threat ReportsMaking Sense of Threat Reports
Making Sense of Threat Reports
 
DLT Portal
DLT PortalDLT Portal
DLT Portal
 
Symantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security SolutionSymantec and ForeScout Delivering a Unified Cyber Security Solution
Symantec and ForeScout Delivering a Unified Cyber Security Solution
 
Deploying and Managing Red Hat Enterprise Linux in Amazon Web Services
Deploying and Managing Red Hat Enterprise Linux in Amazon Web ServicesDeploying and Managing Red Hat Enterprise Linux in Amazon Web Services
Deploying and Managing Red Hat Enterprise Linux in Amazon Web Services
 
Implementing BIM for Owners
Implementing BIM for OwnersImplementing BIM for Owners
Implementing BIM for Owners
 
Autodesk Infrastructure Solutions for Government Agencies
Autodesk Infrastructure Solutions for Government AgenciesAutodesk Infrastructure Solutions for Government Agencies
Autodesk Infrastructure Solutions for Government Agencies
 
Is Your Agency Data Challenged?
Is Your Agency Data Challenged?Is Your Agency Data Challenged?
Is Your Agency Data Challenged?
 

Último

Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Angel Borroy López
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identityteam-WIBU
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...confluent
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...Akihiro Suda
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf31events.com
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Mater
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Developmentvyaparkranti
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfYashikaSharma391629
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringHironori Washizaki
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Velvetech LLC
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)jennyeacort
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEEVICTOR MAESTRE RAMIREZ
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfMarharyta Nedzelska
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfStefano Stabellini
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceBrainSell Technologies
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesPhilip Schwarz
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsSafe Software
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...Technogeeks
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsAhmed Mohamed
 

Último (20)

Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
Alfresco TTL#157 - Troubleshooting Made Easy: Deciphering Alfresco mTLS Confi...
 
Post Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on IdentityPost Quantum Cryptography – The Impact on Identity
Post Quantum Cryptography – The Impact on Identity
 
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
Catch the Wave: SAP Event-Driven and Data Streaming for the Intelligence Ente...
 
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
20240415 [Container Plumbing Days] Usernetes Gen2 - Kubernetes in Rootless Do...
 
Sending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdfSending Calendar Invites on SES and Calendarsnack.pdf
Sending Calendar Invites on SES and Calendarsnack.pdf
 
Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)Ahmed Motair CV April 2024 (Senior SW Developer)
Ahmed Motair CV April 2024 (Senior SW Developer)
 
VK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web DevelopmentVK Business Profile - provides IT solutions and Web Development
VK Business Profile - provides IT solutions and Web Development
 
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdfInnovate and Collaborate- Harnessing the Power of Open Source Software.pdf
Innovate and Collaborate- Harnessing the Power of Open Source Software.pdf
 
Machine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their EngineeringMachine Learning Software Engineering Patterns and Their Engineering
Machine Learning Software Engineering Patterns and Their Engineering
 
Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...Software Project Health Check: Best Practices and Techniques for Your Product...
Software Project Health Check: Best Practices and Techniques for Your Product...
 
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
Call Us🔝>༒+91-9711147426⇛Call In girls karol bagh (Delhi)
 
Cloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEECloud Data Center Network Construction - IEEE
Cloud Data Center Network Construction - IEEE
 
A healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdfA healthy diet for your Java application Devoxx France.pdf
A healthy diet for your Java application Devoxx France.pdf
 
Xen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdfXen Safety Embedded OSS Summit April 2024 v4.pdf
Xen Safety Embedded OSS Summit April 2024 v4.pdf
 
CRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. SalesforceCRM Contender Series: HubSpot vs. Salesforce
CRM Contender Series: HubSpot vs. Salesforce
 
Folding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a seriesFolding Cheat Sheet #4 - fourth in a series
Folding Cheat Sheet #4 - fourth in a series
 
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort ServiceHot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
Hot Sexy call girls in Patel Nagar🔝 9953056974 🔝 escort Service
 
Powering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data StreamsPowering Real-Time Decisions with Continuous Data Streams
Powering Real-Time Decisions with Continuous Data Streams
 
What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...What is Advanced Excel and what are some best practices for designing and cre...
What is Advanced Excel and what are some best practices for designing and cre...
 
Unveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML DiagramsUnveiling Design Patterns: A Visual Guide with UML Diagrams
Unveiling Design Patterns: A Visual Guide with UML Diagrams
 

Oracle Identity & Access Management

  • 1. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Identity & Access Management USTRANSCOM September 28, 2016
  • 2. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. Oracle Confidential – Internal/Restricted/Highly Restricted 2
  • 3. Copyright © 2016 Oracle and/or its affiliates. All rights reserved. | GOVERNANCE MANAGEMENT SERVICES USER AUTHENTICATION LOCATION DATA EXTREME SCALE LOW TCO INTEGRATED INTEROPERABLE DEVICE AUTHN NAMING SERVICES HOST ACCESS CONTROL AP P THOUSANDS MILLIONS BILLIONS 10s of BILLIONS VIRTUAL DIRECTORY META DIRECTORY LDAP DIRECTORY IDENTITY FEDERATION EXTERNAL AUTHORIZATION ENTERPRISE& WEBSINGLE SIGN-ON MOBILE &SOCIAL SIGN-ON FRAUD DETECTION EMPLOYEES CONTRACTORS & PARTNERS CUSTOMERS & PROSPECTS OPERATING SYSTEMS DIRECTORY SERVICES A P P S APPLICATIONS COMMON REPOSITORY DATABASES SINGLE USER VIEW ACCESS REQUEST ENTITLEMENT CATALOG PRIVILEGED ACCOUNT MANAGEMENT ACCESS CERTIFICATION PRIVILIGED ACCOUNTS USER PROVISIONING CERTIFICATION REVIEW ACCESS REQUEST INTEGRATED PLATFORM
  • 4. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Access Management Oracle Fusion Middleware’s Security Pillar CloudOn-Premise Authentication Intelligent, Risk-based Strong Authentication Common Policy Model – Shared Infrastructure Services Web Mobile Social Internet of Things 4 Authorization Real-Time, Context-Aware Externalized Policies Federation Standards-Based Leverages Social Identities Mobile and API RESTful Interfaces API Security Managed Cloud Scalability, High Availability, Disaster Recovery System Management
  • 5. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Access Management • Complete • Context-aware and risk-aware • Scalable, highly available • Standards-based and modular 5 Services and Capabilities Authentication, SSO Adaptive Access and Fraud Prevention Identity Federation Secure Token Service Mobile Security and Social Identity Access Portal Enterprise SSO External, Fine-Grained Authorization Web Services Security API Security
  • 6. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Access Management – Web SSO • Web authentication – User name and password – Windows native authentication (WNA) – Strong authentication (CAC / PIV) – Multi-Factor • Web Single Sign-On (SSO) • Fine-grained authorization 6Oracle Confidential – Internal
  • 7. Copyright © 2014, Oracle and/or its affiliates. All rights reserved. | Integrated Risk, Fraud, and Strong Authentication • Context-aware, risk-aware and content- aware • Leverage real-time context for authentication and authorization • Native mobile OTP for step-up authentication • Real-time risk analysis and fraud prevention • Data redaction through dynamic authorization based on risk • Cross-platform consistent policies; adaptive to context, content and risk 7 LOW HIGH MED RESPONSE ALLOW DENY RISK
  • 8. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration Layer 8 Compliance Access Certification, SOD, Continuous Compliance Identity Intelligence Operational Reporting, Access Dashboards Privileged Access Privileged Access, Privileged Audit, Session Recording Common Data Model Role & Policy Library Workflows and Service Desk Integration Access Catalog Identity Connector Framework – Provisioning/De-Provisioning CloudOn-Premise Managed Cloud Cloud MobileEnterprise
  • 9. Copyright © 2015, Oracle and/or its affiliates. All rights reserved. | Business-Friendly Request Catalog • Business-friendly Access Catalog • Self-Service Application On-boarding And Administration • Search, Browse And Contextual Recommendations • In-line Policy Checks To Prevent SOD Violations • Flexible Forms For Advanced Data Capture • End-to-end Visibility Into The Approval and Fulfillment Process Enabling end-users to get the access they need Search, Browse, Recommend Policy-compliant Access Request Business-Friendly Access Catalog
  • 10. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Identity Governance • Access Catalog provides ability to browse and search • Smart search forms allow users to navigate the Catalog in a guided manner • Catalog search results indicate relevance • Access Catalog can recommend access based on pre-defined and user-defined criteria • Support for Start/End Dates for Access Grants • Preventative SoD Analysis Intelligent Access Catalog
  • 11. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Identity Governance • Business users can request creation of new roles and changes to existing ones • Role requests can leverage the same request and approval framework available for Access Requests and Certification • Role owners can see comprehensive auditing and prior versions Comprehensive Role Lifecycle Management
  • 12. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Identity Governance • Comprehensive role analytics allows business users to see the impact of new roles and changes to existing ones • Role owners can reduce role explosion by review the effectiveness of the roles and consolidate new roles with existing ones • Business users can create roles using “model users” Comprehensive Role Lifecycle Management
  • 13. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Identity Governance SOD Detection and Closed Loop Remediation • SOD Rule and Policy Definition • Define rules across users, applications, roles and entitlements • Detective SOD Analysis • Detective Policy Enforcement – Closed Loop Remediation • Access History to audit all violations and decisions • Review High Risk policy violations in Certifications • Preventative SOD Analysis • Enforce SOD policies during access requests • Review policy violations during approvals and launch exception workflows
  • 14. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Identity Governance • Administrators can define custom security roles to control who can do what at an attribute level • Users can be assigned security roles via rules reducing administration burden • User actions and the context that they used to perform the action are audited Simplified yet granular security
  • 15. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Privileged Account Manager • Check-Out / Check-In Self Service Console • Custom built approvals (e.g. phone) • Custom built ticketing system integration • Custom built notifications • Access Request Interface – Privilege Accounts added to OIG resource catalog • Keystroke logging • Session recording 15 Accountability
  • 16. Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | • Extended managed targets • UNIX SSH Targets • LDAP • Database • Windows • SSH based targets • SAP • UNIX / Linux server • Oracle Database • Microsoft SQL Server • Sybase • IBM DB2 • Microsoft Active DirectorySession Management control policies • Session Recording OPAM 16 More managed targets, greater control and more visibility
  • 17. Copyright © 2015 Oracle and/or its affiliates. All rights reserved. | OUD VirtualizationStorage Synchronization Cloud Apps Databases Enterprise Apps Servers Mobile Apps HR DBDSEE Active Directory OUD – The All in One Directory 17 • Storage, virtualization and Sync • High performance • Extreme scalability • REST support
  • 18. 3 - 18Copyright © 2015, Oracle and/or its affiliates. All rights reserved. Oracle Enterprise Manager Fusion Middleware Control