SlideShare a Scribd company logo
Phase 1.0 POC Mar 2010 Mohamed Atef MW Administrator
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHY ORACLE IDENTITY MANAGEMENT Oracle Identity Management  allows enterprises to manage end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. Oracle Identity Management  is a member of the Oracle Fusion Middleware family of products, which brings greater agility, better decision-making, and reduced cost and risk to diverse IT environments today.
Oracle Identity Management Solutions Single Sign-On and Web Access Control: Oracle Access Manager  (Protecting resources at a point of access and delegating authentication and authorization decisions to a central authority, help secure web, J2EE  and enterprise applications). Oracle Enterprise Single Sign-On Suite Plus  (Enterprise users can enjoy the benefits of single sign-on to all of their applications, whether they are connected to the corporate network, traveling away from the office, roaming between computers or working at a shared workstation). Directory Services: Oracle Internet Directory  (Is an LDAP v3 compliant directory with meta-directory capabilities. It is built on the industry leading Oracle database and is fully integrated into Oracle Fusion Middleware and Oracle Applications). Oracle Virtual Directory  (Creating a secure application environment requires integration of existing user identity information. For some companies, that information is contained in databases. Others use LDAP directories or Windows Domains. For most, this information is scattered across multiple locations and multiple services, provides Internet and industry-standard LDAP and XML views of existing enterprise identity information, without synchronizing or moving data from its native locations). Oracle Directory Server Enterprise Edition  (Formerly “SUN Directory Server Enterprise Edition” is the best known directory server with proven large deployments in carrier and enterprise environments. It is also the most supported directory by ISVs, so it is ideal for heterogeneous environments. ODSEE provides a core directory service with embedded database, directory proxy, Active Directory (AD) synchronization and a Web administration console). Oracle Authentication Services for Operating Systems  (Oracle Authentication Services for Operating Systems provides centralized authentication and account management for Unix and Linux platforms. This page contains information to get you started with Oracle Authentication Services for Operating Systems.).
Oracle Identity Management Solutions Content Access Control: Oracle Information Rights Management  (Formerly “SealedMedia” is a new form of information security technology that secures and tracks sensitive digital information everywhere it is stored and used, such as encrypting ("sealing") and classifying documents, emails and web pages, and the requirement to install Oracle IRM Desktop agent software on every end user device on which sealed information is created or used). Strong Authentication: Extended Identity Management Ecosystem  (Organizations commonly have multiple security systems in place—one technology to secure physical access, another to secure legacy applications, and yet another to secure network access. To cope with these "silo'd" solutions, Oracle has partnered with best-of-breed ISVs to offer a central and effective means to enforce security policy across all enterprise resources. As part of the Oracle Identity Management Ecosystem, partner solutions seamlessly integrate into Oracle Identity Management solutions extend a common security and identity management framework across all enterprise applications). Oracle Adaptive Access Manager  (Oracle Adaptive Access Manager consists of two primary components that together create one of the most powerful and flexible weapons in the war against fraud. Adaptive Strong Authenticator provides multifactor authentication and protection mechanisms for sensitive information such as passwords, PINs, security questions, account numbers and other credentials). Identity Administration: Oracle Identity Manager  (Formerly known as “Oracle Xellerate Identity Provisioning”, is a powerful and flexible enterprise identity management system that automatically manages users' access privileges within enterprise IT resources). Oracle Role Manager  (Previously known as “Bridgestream SmartRoles”, is an enterprise-class application for managing business and organizational role lifecycle management).
Oracle Identity Management Solutions Federated Identity: Oracle Identity Federation  (Significantly reduces the need to create unnecessary identity in an enterprise directory and lowers the ongoing costs of partner integrations through support of industry federation standards, protects existing IT investments by integrating with a wide variety of data stores, user directories, authentication providers and applications) Fine Grained Entitlements: Oracle Entitlements Server  (Secures access to application resources and software components (such as URLs, EJBs, and JSPs) as well as arbitrary business objects (such as customer accounts or patient records). Oracle Entitlements Server policies specify which users, groups, and/or roles can access application resources, allowing those roles to be dynamically resolved at runtime). Oracle – Sun: Oracle Waveset  (Providesoperational and business efficiency by providing complete automation of user accounts and entitlements provisioning into a variety of enterprise business applications. Oracle Waveset integrates automated identity lifecycle management with identity auditing capabilities, and makes it possible to manage these processes at the business role level).  Oracle OpenSSO  (Is a complete solution that provides Web access management, federated single sign-on and Web services security in a single, self-contained application).
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
WHAT IS ORACLE IDENTITY MANAGER ,[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER ARCHITECTURE ,[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER ARCHITECTURE The  Oracle Identity Manager  architecture has three tiers: Presentation tier Server tier Data & Enterprise Integration tier
TIER1: PRESENTATION TIER ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIER2: SERVER TIER ,[object Object],[object Object],[object Object],[object Object]
TIER2: SERVER TIER ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIER3: DATA & ENTERPRISE INTEGRATION TIER ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIER3: DATA & ENTERPRISE INTEGRATION TIER ,[object Object],[object Object],[object Object],[object Object]
RECONCILIATION & PROVISIONING: OVERVIEW ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RECONCILIATION: TYPES ,[object Object],[object Object],[object Object]
RECONCILIATION: EVENTS ,[object Object],[object Object],[object Object],[object Object]
PROVISIONING: TYPES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TRUSTED SOURCE RECONCILIATION: CONCEPTUAL DIAGRAM ,[object Object],1 Reconciliation flow Provisioning flow Target resource (for example, an Oracle HRMS) Administrator End user Trusted source (for example, Active Directory)
TARGET RESOURCE RECONCILIATION: CONCEPTUAL DIAGRAM ,[object Object],Reconciliation flow Provisioning flow 2 End user Administrator Trusted source (for example, a Active Directory)   Target resource (for example, an Oracle HRMS)
ORACLE IDENTITY MANAGER CONNECTOR: OVERVIEW ,[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CONNECTOR: COMPONENTS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP1 ,[object Object],IT resource type 1
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP1 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP2 ,[object Object],IT resource IT resource type 2
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP2 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP3 ,[object Object],IT resource type Custom process form 3 IT resource
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP3 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP4 ,[object Object],IT resource IT resource type Custom process form Process task adapter 4
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP4 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP5 ,[object Object],IT resource IT resource type Resource object Custom process form Process task adapter 5
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP5 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP6 ,[object Object],IT resource IT resource type Resource object Provisioning process Custom process form Process task adapter 6
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP6 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP7 ,[object Object],IT resource IT resource type Resource object Provisioning process Custom process form Process task adapter Process task   7
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP7 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP8 ,[object Object],IT resource IT resource type Resource object Provisioning process Custom process form Process task adapter Process task   8
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP8 ,[object Object]
ORACLE IDENTITY MANAGER CONNECTORS LIST ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CONNECTORS LIST ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CONNECTORS LIST ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CERTIFIED OPERATING SYSTEMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CERTIFIED APPLICATION SERVERS ,[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CERTIFIED DATABASES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
POC: SCOPE ,[object Object],[object Object],[object Object],Reconciliation flow Provisioning flow Active Director   Oracle HRMS
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
 

More Related Content

What's hot

Overview of Oracle Product Portfolio (focus on Platform) - April, 2017
Overview of Oracle Product Portfolio (focus on Platform) - April, 2017Overview of Oracle Product Portfolio (focus on Platform) - April, 2017
Overview of Oracle Product Portfolio (focus on Platform) - April, 2017
Lucas Jellema
 
Cloud Oracle
Cloud Oracle Cloud Oracle
Cloud Oracle
Fran Navarro
 
Oracle Fusion & Cloud Applications Overview
Oracle Fusion & Cloud Applications OverviewOracle Fusion & Cloud Applications Overview
Oracle Fusion & Cloud Applications Overview
Ahmed El-Demasy
 
Data-Ed Slides: Best Practices in Data Stewardship (Technical)
Data-Ed Slides: Best Practices in Data Stewardship (Technical)Data-Ed Slides: Best Practices in Data Stewardship (Technical)
Data-Ed Slides: Best Practices in Data Stewardship (Technical)
DATAVERSITY
 
OCI Overview
OCI OverviewOCI Overview
OCI Overview
Kamil Wieczorek
 
Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...
Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...
Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...
IDERA Software
 
Designing An Enterprise Data Fabric
Designing An Enterprise Data FabricDesigning An Enterprise Data Fabric
Designing An Enterprise Data Fabric
Alan McSweeney
 
Active dataguard
Active dataguardActive dataguard
Active dataguardManoj Kumar
 
Oracle financials functional training on ap, ar & gl
Oracle financials functional training on ap, ar & glOracle financials functional training on ap, ar & gl
Oracle financials functional training on ap, ar & gl
magnifics
 
Apache Atlas: Governance for your Data
Apache Atlas: Governance for your DataApache Atlas: Governance for your Data
Apache Atlas: Governance for your Data
DataWorks Summit/Hadoop Summit
 
Agiliza tus procesos de negocio con Microsoft Power Platform
Agiliza tus procesos de negocio con Microsoft Power PlatformAgiliza tus procesos de negocio con Microsoft Power Platform
Agiliza tus procesos de negocio con Microsoft Power Platform
DQSconsulting
 
OOW15 - Oracle E-Business Suite Technology: Latest Features and Roadmap
OOW15 - Oracle E-Business Suite Technology: Latest Features and RoadmapOOW15 - Oracle E-Business Suite Technology: Latest Features and Roadmap
OOW15 - Oracle E-Business Suite Technology: Latest Features and Roadmap
vasuballa
 
Azure - Identity as a service
Azure - Identity as a serviceAzure - Identity as a service
Azure - Identity as a service
BizTalk360
 
Cloudciti Disaster Recovery as a Service
Cloudciti Disaster Recovery as a Service   Cloudciti Disaster Recovery as a Service
Cloudciti Disaster Recovery as a Service
PT Datacomm Diangraha
 
Building the Data Lake with Azure Data Factory and Data Lake Analytics
Building the Data Lake with Azure Data Factory and Data Lake AnalyticsBuilding the Data Lake with Azure Data Factory and Data Lake Analytics
Building the Data Lake with Azure Data Factory and Data Lake Analytics
Khalid Salama
 
Oracle Access Manager Overview
Oracle Access Manager OverviewOracle Access Manager Overview
Oracle Access Manager Overview
guestf6dc99b
 
Power BI Overview, Deployment and Governance
Power BI Overview, Deployment and GovernancePower BI Overview, Deployment and Governance
Power BI Overview, Deployment and Governance
James Serra
 
OIM Connector for Webservices
OIM Connector for WebservicesOIM Connector for Webservices
OIM Connector for Webservices
Atul Goyal
 
Azure data factory
Azure data factoryAzure data factory
Azure data factory
BizTalk360
 
Data Architecture - The Foundation for Enterprise Architecture and Governance
Data Architecture - The Foundation for Enterprise Architecture and GovernanceData Architecture - The Foundation for Enterprise Architecture and Governance
Data Architecture - The Foundation for Enterprise Architecture and Governance
DATAVERSITY
 

What's hot (20)

Overview of Oracle Product Portfolio (focus on Platform) - April, 2017
Overview of Oracle Product Portfolio (focus on Platform) - April, 2017Overview of Oracle Product Portfolio (focus on Platform) - April, 2017
Overview of Oracle Product Portfolio (focus on Platform) - April, 2017
 
Cloud Oracle
Cloud Oracle Cloud Oracle
Cloud Oracle
 
Oracle Fusion & Cloud Applications Overview
Oracle Fusion & Cloud Applications OverviewOracle Fusion & Cloud Applications Overview
Oracle Fusion & Cloud Applications Overview
 
Data-Ed Slides: Best Practices in Data Stewardship (Technical)
Data-Ed Slides: Best Practices in Data Stewardship (Technical)Data-Ed Slides: Best Practices in Data Stewardship (Technical)
Data-Ed Slides: Best Practices in Data Stewardship (Technical)
 
OCI Overview
OCI OverviewOCI Overview
OCI Overview
 
Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...
Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...
Geek Sync | Data Architecture and Data Governance: A Powerful Data Management...
 
Designing An Enterprise Data Fabric
Designing An Enterprise Data FabricDesigning An Enterprise Data Fabric
Designing An Enterprise Data Fabric
 
Active dataguard
Active dataguardActive dataguard
Active dataguard
 
Oracle financials functional training on ap, ar & gl
Oracle financials functional training on ap, ar & glOracle financials functional training on ap, ar & gl
Oracle financials functional training on ap, ar & gl
 
Apache Atlas: Governance for your Data
Apache Atlas: Governance for your DataApache Atlas: Governance for your Data
Apache Atlas: Governance for your Data
 
Agiliza tus procesos de negocio con Microsoft Power Platform
Agiliza tus procesos de negocio con Microsoft Power PlatformAgiliza tus procesos de negocio con Microsoft Power Platform
Agiliza tus procesos de negocio con Microsoft Power Platform
 
OOW15 - Oracle E-Business Suite Technology: Latest Features and Roadmap
OOW15 - Oracle E-Business Suite Technology: Latest Features and RoadmapOOW15 - Oracle E-Business Suite Technology: Latest Features and Roadmap
OOW15 - Oracle E-Business Suite Technology: Latest Features and Roadmap
 
Azure - Identity as a service
Azure - Identity as a serviceAzure - Identity as a service
Azure - Identity as a service
 
Cloudciti Disaster Recovery as a Service
Cloudciti Disaster Recovery as a Service   Cloudciti Disaster Recovery as a Service
Cloudciti Disaster Recovery as a Service
 
Building the Data Lake with Azure Data Factory and Data Lake Analytics
Building the Data Lake with Azure Data Factory and Data Lake AnalyticsBuilding the Data Lake with Azure Data Factory and Data Lake Analytics
Building the Data Lake with Azure Data Factory and Data Lake Analytics
 
Oracle Access Manager Overview
Oracle Access Manager OverviewOracle Access Manager Overview
Oracle Access Manager Overview
 
Power BI Overview, Deployment and Governance
Power BI Overview, Deployment and GovernancePower BI Overview, Deployment and Governance
Power BI Overview, Deployment and Governance
 
OIM Connector for Webservices
OIM Connector for WebservicesOIM Connector for Webservices
OIM Connector for Webservices
 
Azure data factory
Azure data factoryAzure data factory
Azure data factory
 
Data Architecture - The Foundation for Enterprise Architecture and Governance
Data Architecture - The Foundation for Enterprise Architecture and GovernanceData Architecture - The Foundation for Enterprise Architecture and Governance
Data Architecture - The Foundation for Enterprise Architecture and Governance
 

Viewers also liked

OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 Architecture
Atul Goyal
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overview
Eslam Hafez
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Oracle
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity Provisioning
Mike Reams
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
Intel IT Center
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentationstefanjung
 
Oracle Fusion Applications Security - Designing Roles
Oracle Fusion Applications Security - Designing RolesOracle Fusion Applications Security - Designing Roles
Oracle Fusion Applications Security - Designing Roles
kmundy
 
Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...
Andrejs Prokopjevs
 
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Getting value from IoT, Integration and Data Analytics
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationDelivery Centric
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
DLT Solutions
 
What is tackled in the Java EE Security API (Java EE 8)
What is tackled in the Java EE Security API (Java EE 8)What is tackled in the Java EE Security API (Java EE 8)
What is tackled in the Java EE Security API (Java EE 8)
Rudy De Busscher
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
John Bauer
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2OracleIDM
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
OracleIDM
 

Viewers also liked (19)

OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 Architecture
 
Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overview
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
 
ABC’s Proposal
ABC’s ProposalABC’s Proposal
ABC’s Proposal
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity Provisioning
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
Oracle Fusion Applications Security - Designing Roles
Oracle Fusion Applications Security - Designing RolesOracle Fusion Applications Security - Designing Roles
Oracle Fusion Applications Security - Designing Roles
 
Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...
 
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
What is tackled in the Java EE Security API (Java EE 8)
What is tackled in the Java EE Security API (Java EE 8)What is tackled in the Java EE Security API (Java EE 8)
What is tackled in the Java EE Security API (Java EE 8)
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 

Similar to Oim Poc1.0

Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsGregOracle
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity features
Anil Pandey
 
Oracle Cloud Essentials
Oracle Cloud EssentialsOracle Cloud Essentials
Oracle Cloud Essentials
Smart ERP Solutions, Inc.
 
As onew816a
As onew816aAs onew816a
As onew816a
Anil Pandey
 
IDM Resume _ Kiran
IDM Resume _ KiranIDM Resume _ Kiran
IDM Resume _ KiranKiran Kumar
 
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Subbu Devulapalli
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise Manager
PebbleIT Solutions
 
816isdfo
816isdfo816isdfo
816isdfo
Anil Pandey
 
7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom
Doina Draganescu
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
AgileIT
 
Products
ProductsProducts
Productsnafia
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Serviceguest536dd0e
 
What Is Oracle Fusion Middleware .pdf
What Is Oracle Fusion Middleware .pdfWhat Is Oracle Fusion Middleware .pdf
What Is Oracle Fusion Middleware .pdf
Pridesys IT Ltd.
 
Presentation on Oracle Application Server
Presentation on  Oracle Application Server Presentation on  Oracle Application Server
Presentation on Oracle Application Server
Muthoot finance Ltd
 
Oracle and its related technologies
Oracle and its related technologiesOracle and its related technologies
Oracle and its related technologiesanup4704
 
Oracle and its related technologies
Oracle and its related technologiesOracle and its related technologies
Oracle and its related technologies
anup4704
 
Multiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oidMultiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oid
pasalapudi
 
Top 10 reasons to adopt cloud
Top 10 reasons to adopt cloudTop 10 reasons to adopt cloud
Top 10 reasons to adopt cloud
Smart ERP Solutions, Inc.
 
OMC_LogAnalytics_DataSheet
OMC_LogAnalytics_DataSheetOMC_LogAnalytics_DataSheet
OMC_LogAnalytics_DataSheetHarish Akali
 

Similar to Oim Poc1.0 (20)

Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered Systems
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity features
 
Oracle Cloud Essentials
Oracle Cloud EssentialsOracle Cloud Essentials
Oracle Cloud Essentials
 
As onew816a
As onew816aAs onew816a
As onew816a
 
IDM Resume _ Kiran
IDM Resume _ KiranIDM Resume _ Kiran
IDM Resume _ Kiran
 
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise Manager
 
816isdfo
816isdfo816isdfo
816isdfo
 
7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
Products
ProductsProducts
Products
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
kowsalyamanickam_resume_OIM
kowsalyamanickam_resume_OIMkowsalyamanickam_resume_OIM
kowsalyamanickam_resume_OIM
 
What Is Oracle Fusion Middleware .pdf
What Is Oracle Fusion Middleware .pdfWhat Is Oracle Fusion Middleware .pdf
What Is Oracle Fusion Middleware .pdf
 
Presentation on Oracle Application Server
Presentation on  Oracle Application Server Presentation on  Oracle Application Server
Presentation on Oracle Application Server
 
Oracle and its related technologies
Oracle and its related technologiesOracle and its related technologies
Oracle and its related technologies
 
Oracle and its related technologies
Oracle and its related technologiesOracle and its related technologies
Oracle and its related technologies
 
Multiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oidMultiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oid
 
Top 10 reasons to adopt cloud
Top 10 reasons to adopt cloudTop 10 reasons to adopt cloud
Top 10 reasons to adopt cloud
 
OMC_LogAnalytics_DataSheet
OMC_LogAnalytics_DataSheetOMC_LogAnalytics_DataSheet
OMC_LogAnalytics_DataSheet
 

Oim Poc1.0

  • 1. Phase 1.0 POC Mar 2010 Mohamed Atef MW Administrator
  • 2.
  • 3. WHY ORACLE IDENTITY MANAGEMENT Oracle Identity Management allows enterprises to manage end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. Oracle Identity Management is a member of the Oracle Fusion Middleware family of products, which brings greater agility, better decision-making, and reduced cost and risk to diverse IT environments today.
  • 4. Oracle Identity Management Solutions Single Sign-On and Web Access Control: Oracle Access Manager (Protecting resources at a point of access and delegating authentication and authorization decisions to a central authority, help secure web, J2EE and enterprise applications). Oracle Enterprise Single Sign-On Suite Plus (Enterprise users can enjoy the benefits of single sign-on to all of their applications, whether they are connected to the corporate network, traveling away from the office, roaming between computers or working at a shared workstation). Directory Services: Oracle Internet Directory (Is an LDAP v3 compliant directory with meta-directory capabilities. It is built on the industry leading Oracle database and is fully integrated into Oracle Fusion Middleware and Oracle Applications). Oracle Virtual Directory (Creating a secure application environment requires integration of existing user identity information. For some companies, that information is contained in databases. Others use LDAP directories or Windows Domains. For most, this information is scattered across multiple locations and multiple services, provides Internet and industry-standard LDAP and XML views of existing enterprise identity information, without synchronizing or moving data from its native locations). Oracle Directory Server Enterprise Edition (Formerly “SUN Directory Server Enterprise Edition” is the best known directory server with proven large deployments in carrier and enterprise environments. It is also the most supported directory by ISVs, so it is ideal for heterogeneous environments. ODSEE provides a core directory service with embedded database, directory proxy, Active Directory (AD) synchronization and a Web administration console). Oracle Authentication Services for Operating Systems (Oracle Authentication Services for Operating Systems provides centralized authentication and account management for Unix and Linux platforms. This page contains information to get you started with Oracle Authentication Services for Operating Systems.).
  • 5. Oracle Identity Management Solutions Content Access Control: Oracle Information Rights Management (Formerly “SealedMedia” is a new form of information security technology that secures and tracks sensitive digital information everywhere it is stored and used, such as encrypting ("sealing") and classifying documents, emails and web pages, and the requirement to install Oracle IRM Desktop agent software on every end user device on which sealed information is created or used). Strong Authentication: Extended Identity Management Ecosystem (Organizations commonly have multiple security systems in place—one technology to secure physical access, another to secure legacy applications, and yet another to secure network access. To cope with these "silo'd" solutions, Oracle has partnered with best-of-breed ISVs to offer a central and effective means to enforce security policy across all enterprise resources. As part of the Oracle Identity Management Ecosystem, partner solutions seamlessly integrate into Oracle Identity Management solutions extend a common security and identity management framework across all enterprise applications). Oracle Adaptive Access Manager (Oracle Adaptive Access Manager consists of two primary components that together create one of the most powerful and flexible weapons in the war against fraud. Adaptive Strong Authenticator provides multifactor authentication and protection mechanisms for sensitive information such as passwords, PINs, security questions, account numbers and other credentials). Identity Administration: Oracle Identity Manager (Formerly known as “Oracle Xellerate Identity Provisioning”, is a powerful and flexible enterprise identity management system that automatically manages users' access privileges within enterprise IT resources). Oracle Role Manager (Previously known as “Bridgestream SmartRoles”, is an enterprise-class application for managing business and organizational role lifecycle management).
  • 6. Oracle Identity Management Solutions Federated Identity: Oracle Identity Federation (Significantly reduces the need to create unnecessary identity in an enterprise directory and lowers the ongoing costs of partner integrations through support of industry federation standards, protects existing IT investments by integrating with a wide variety of data stores, user directories, authentication providers and applications) Fine Grained Entitlements: Oracle Entitlements Server (Secures access to application resources and software components (such as URLs, EJBs, and JSPs) as well as arbitrary business objects (such as customer accounts or patient records). Oracle Entitlements Server policies specify which users, groups, and/or roles can access application resources, allowing those roles to be dynamically resolved at runtime). Oracle – Sun: Oracle Waveset (Providesoperational and business efficiency by providing complete automation of user accounts and entitlements provisioning into a variety of enterprise business applications. Oracle Waveset integrates automated identity lifecycle management with identity auditing capabilities, and makes it possible to manage these processes at the business role level). Oracle OpenSSO (Is a complete solution that provides Web access management, federated single sign-on and Web services security in a single, self-contained application).
  • 7. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 8. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 9. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 10. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 11. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 12. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 13. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 14.
  • 15.
  • 16. ORACLE IDENTITY MANAGER ARCHITECTURE The Oracle Identity Manager architecture has three tiers: Presentation tier Server tier Data & Enterprise Integration tier
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.  
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.