SlideShare a Scribd company logo
ESLAM HASSAN HAFEZ
ORACLE IDAM CONSULTANT | 9 JUNE 2014
AGENDA
 Oracle IDM Overview
 Why Business needs IDM?
 OIDM is about governance
 OAM is about identity controlling
 OIDAM suite components
 OIDAM from solution perspective
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 2
The following presentation describes an overview for Oracle Identity
and access management OIDAM from social, enterprise and solution
perspectives.
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 3
ORACLE IDM OVERVIEW
What is identity?
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 4
Name
Mobile
E-Mail
National
ID
Title
Date Of
Birth
Credit
Card No.
ORACLE IDM OVERVIEW
What is your identity on all these applications?
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 5
ORACLE IDM OVERVIEW
What if you register only once?
Middle layer
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 6
ORACLE IDM OVERVIEW
What if you sign in only once?
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 7
Middle layer
ORACLE IDM OVERVIEW
From Enterprise perspective
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 8
WHY BUSINESS NEEDS IDM?
Thousand
s of
systems
10
thousands
of apps
100
thousands of
users Millions of
Entitlements
• Few Administrators
• Lack of Audit Staff
• Too many privileged accounts
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 9
WHY BUSINESS NEEDS IDM?
4 Questions should be
asked to the Business
Owner?
Q1: Where do employees store their passwords,
identity numbers for all applications?
Q2: What determines your employee’s access?
Q3: Who is the most privileged user in your
enterprise?
Q4: How much are manual compliance controls
costing your organization?
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 10
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 11
Oracle Identity Manager - OIDM
OIDM IS ABOUT GOVERNANCE
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 12
OIDM IS ABOUT GOVERNANCE
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 13
Requesting Access to application or acquiring some entitlements
OIDM IS ABOUT GOVERNANCE
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 14
Risk Assessment
OIDM IS ABOUT GOVERNANCE
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 15
Reports and Auditing user accounts
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 16
Oracle Access Manager - OAM
OAM IS ABOUT IDENTITY CONTROLLING
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 17
Check for Authentication and/or Authorization
OAM IS ABOUT IDENTITY CONTROLLING
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 18
Security layers
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 19
Oracle IDAM Overall Architecture and
Components
OIDAM SUITE COMPONENTS
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 20
OIDAM SUITE COMPONENTS
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 21
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 22
Oracle IDAM Solution Perspective
OIDAM FROM SOLUTION PERSPECTIVE
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 23
OIDAM Must be a part of enterprise solution as for the following constraints:
 Target applications Integrations
 Functionalities
 Features and Benefits
Oracle Identity Governance – URL
http://www.oracle.com/us/products/middleware/identity-
management/governance/features/index.html
Oracle Access Management – URL
http://www.oracle.com/us/products/middleware/identity-
management/access-management/features/index.html
Oracle Directory Service – URL
http://www.oracle.com/us/products/middleware/identity-
management/directory-services/overview/index.html
O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 24

More Related Content

What's hot

Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
Amazon Web Services
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
Aujas
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
Kal BO
 
Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019
Ivanti
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
MohanPandey31
 
Oracle Security Presentation
Oracle Security PresentationOracle Security Presentation
Oracle Security Presentation
Francisco Alvarez
 
Continuous monitoring with OSSIM
Continuous monitoring with OSSIMContinuous monitoring with OSSIM
Continuous monitoring with OSSIM
Eguardian Global Services
 
Cissp Study notes.pdf
Cissp Study notes.pdfCissp Study notes.pdf
Cissp Study notes.pdf
MAHESHUMANATHGOPALAK
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
Michael Torres
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
Jerod Brennen
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
Aidy Tificate
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
IBM Security
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
danb02
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
Denise Bailey
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
Identacor
 
The presentation on my "Shadow Admins" research
The presentation on my "Shadow Admins" researchThe presentation on my "Shadow Admins" research
The presentation on my "Shadow Admins" research
Asaf Hecht
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
Ben Rothke
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
Directorate of Information Security | Ditjen Aptika
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
bilcorry
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and Compliance
TLI GrowthSession
 

What's hot (20)

Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 
Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...Best Practices for implementing Database Security Comprehensive Database Secu...
Best Practices for implementing Database Security Comprehensive Database Secu...
 
Patch Management Best Practices 2019
Patch Management Best Practices 2019Patch Management Best Practices 2019
Patch Management Best Practices 2019
 
Security of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptxSecurity of IOT,OT And IT.pptx
Security of IOT,OT And IT.pptx
 
Oracle Security Presentation
Oracle Security PresentationOracle Security Presentation
Oracle Security Presentation
 
Continuous monitoring with OSSIM
Continuous monitoring with OSSIMContinuous monitoring with OSSIM
Continuous monitoring with OSSIM
 
Cissp Study notes.pdf
Cissp Study notes.pdfCissp Study notes.pdf
Cissp Study notes.pdf
 
Cloud Security Demystified
Cloud Security DemystifiedCloud Security Demystified
Cloud Security Demystified
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
Identity and Access Management Introduction
Identity and Access Management IntroductionIdentity and Access Management Introduction
Identity and Access Management Introduction
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Privileged Access Management (PAM)
Privileged Access Management (PAM)Privileged Access Management (PAM)
Privileged Access Management (PAM)
 
[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture[Round table] zeroing in on zero trust architecture
[Round table] zeroing in on zero trust architecture
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
The presentation on my "Shadow Admins" research
The presentation on my "Shadow Admins" researchThe presentation on my "Shadow Admins" research
The presentation on my "Shadow Admins" research
 
Rothke secure360 building a security operations center (soc)
Rothke   secure360 building a security operations center (soc)Rothke   secure360 building a security operations center (soc)
Rothke secure360 building a security operations center (soc)
 
Information Security Policies and Standards
Information Security Policies and StandardsInformation Security Policies and Standards
Information Security Policies and Standards
 
OWASP Secure Coding
OWASP Secure CodingOWASP Secure Coding
OWASP Secure Coding
 
SAP Governance,Risk and Compliance
SAP Governance,Risk and ComplianceSAP Governance,Risk and Compliance
SAP Governance,Risk and Compliance
 

Viewers also liked

Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationDelivery Centric
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Oracle
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 Architecture
Atul Goyal
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
DLT Solutions
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
Delivery Centric
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentationstefanjung
 
Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3
Atul Goyal
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
oow123
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
OracleIDM
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIMTamim Khan
 
Deep Dive and Best Practices for Windows Azure Storage Services
Deep Dive and Best Practices for Windows Azure Storage ServicesDeep Dive and Best Practices for Windows Azure Storage Services
Deep Dive and Best Practices for Windows Azure Storage Services
Microsoft Developer Network (MSDN) - Belgium and Luxembourg
 
Joe power - managing risk through compliance - atlseccon2011
Joe power - managing risk through compliance - atlseccon2011Joe power - managing risk through compliance - atlseccon2011
Joe power - managing risk through compliance - atlseccon2011
Atlantic Security Conference
 
Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011
Atlantic Security Conference
 
Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...
Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...
Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...
Acquia
 

Viewers also liked (17)

Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 Architecture
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
Oim Poc1.0
Oim Poc1.0Oim Poc1.0
Oim Poc1.0
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3Oracle Identity Governance Technical Overview - 11gR2PS3
Oracle Identity Governance Technical Overview - 11gR2PS3
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIM
 
Deep Dive and Best Practices for Windows Azure Storage Services
Deep Dive and Best Practices for Windows Azure Storage ServicesDeep Dive and Best Practices for Windows Azure Storage Services
Deep Dive and Best Practices for Windows Azure Storage Services
 
Joe power - managing risk through compliance - atlseccon2011
Joe power - managing risk through compliance - atlseccon2011Joe power - managing risk through compliance - atlseccon2011
Joe power - managing risk through compliance - atlseccon2011
 
Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011Andrew kozma - security 101 - atlseccon2011
Andrew kozma - security 101 - atlseccon2011
 
Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...
Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...
Leverage Drupal, Shibboleth, and OpenSAML to Connect Federated Identity to th...
 

Similar to Oracle IDAM overview

Alliance 2017 - New to NAV? Top 10 Things You Need to Know
Alliance 2017 - New to NAV? Top 10 Things You Need to KnowAlliance 2017 - New to NAV? Top 10 Things You Need to Know
Alliance 2017 - New to NAV? Top 10 Things You Need to Know
Sparkrock
 
How to Get Buy-in For Your Personalisation and Experimentation Platform | Opt...
How to Get Buy-in For Your Personalisation and Experimentation Platform | Opt...How to Get Buy-in For Your Personalisation and Experimentation Platform | Opt...
How to Get Buy-in For Your Personalisation and Experimentation Platform | Opt...
Optimizely
 
[Webinar] Getting Buy-in for Your Experimentation and Personalisation Program
[Webinar] Getting Buy-in for Your Experimentation and Personalisation Program[Webinar] Getting Buy-in for Your Experimentation and Personalisation Program
[Webinar] Getting Buy-in for Your Experimentation and Personalisation Program
Dan Ross
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
OneLogin
 
Hidden Costs of Inventory Spreadsheets
Hidden Costs of Inventory SpreadsheetsHidden Costs of Inventory Spreadsheets
Hidden Costs of Inventory Spreadsheets
Jeff Carr
 
Inception Phases - Handling Complexity
Inception Phases - Handling ComplexityInception Phases - Handling Complexity
Inception Phases - Handling Complexity
Equal Experts
 
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Sparkrock
 
Unify Corporate Profile
Unify Corporate ProfileUnify Corporate Profile
Unify Corporate Profile
AnuragBhimrajka1
 
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
RootedCON
 
Kodak Strategy analysis and recommendation
Kodak Strategy analysis and recommendation Kodak Strategy analysis and recommendation
Kodak Strategy analysis and recommendation
Trương Lan Hương
 
How to turn your tablet into a customer facing device moki slideshare
How to turn your tablet into a customer facing device   moki slideshareHow to turn your tablet into a customer facing device   moki slideshare
How to turn your tablet into a customer facing device moki slideshare
Moki
 
Delivia delivery management system eng
Delivia delivery management system engDelivia delivery management system eng
Delivia delivery management system eng
Gleb Nikulin
 
Managing Technical Debt - WordCamp Orlando 2017
Managing Technical Debt - WordCamp Orlando 2017Managing Technical Debt - WordCamp Orlando 2017
Managing Technical Debt - WordCamp Orlando 2017
Chad Windnagle
 
Esteban Pérez-Hemminger: Designing for compliance: why you should care
Esteban Pérez-Hemminger: Designing for compliance: why you should careEsteban Pérez-Hemminger: Designing for compliance: why you should care
Esteban Pérez-Hemminger: Designing for compliance: why you should care
UXPALA
 
Introducing the Unified Cloud - Sean Bruton
Introducing the Unified Cloud - Sean Bruton Introducing the Unified Cloud - Sean Bruton
Introducing the Unified Cloud - Sean Bruton
Hostway|HOSTING
 
2015 Quality Management System Vendor Benchmark
2015 Quality Management System Vendor Benchmark2015 Quality Management System Vendor Benchmark
2015 Quality Management System Vendor Benchmark
Quality & Regulatory Network LLC
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
OracleIDM
 
Compliance in the Era of Cloud
Compliance in the Era of CloudCompliance in the Era of Cloud
Compliance in the Era of Cloud
OneLogin
 
How Sapient Razorfish Cuts Its Campaign Deployment Times from Days to Minutes...
How Sapient Razorfish Cuts Its Campaign Deployment Times from Days to Minutes...How Sapient Razorfish Cuts Its Campaign Deployment Times from Days to Minutes...
How Sapient Razorfish Cuts Its Campaign Deployment Times from Days to Minutes...
Amazon Web Services
 
Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!
Oracle
 

Similar to Oracle IDAM overview (20)

Alliance 2017 - New to NAV? Top 10 Things You Need to Know
Alliance 2017 - New to NAV? Top 10 Things You Need to KnowAlliance 2017 - New to NAV? Top 10 Things You Need to Know
Alliance 2017 - New to NAV? Top 10 Things You Need to Know
 
How to Get Buy-in For Your Personalisation and Experimentation Platform | Opt...
How to Get Buy-in For Your Personalisation and Experimentation Platform | Opt...How to Get Buy-in For Your Personalisation and Experimentation Platform | Opt...
How to Get Buy-in For Your Personalisation and Experimentation Platform | Opt...
 
[Webinar] Getting Buy-in for Your Experimentation and Personalisation Program
[Webinar] Getting Buy-in for Your Experimentation and Personalisation Program[Webinar] Getting Buy-in for Your Experimentation and Personalisation Program
[Webinar] Getting Buy-in for Your Experimentation and Personalisation Program
 
The Future of Enterprise Identity Management
The Future of Enterprise Identity ManagementThe Future of Enterprise Identity Management
The Future of Enterprise Identity Management
 
Hidden Costs of Inventory Spreadsheets
Hidden Costs of Inventory SpreadsheetsHidden Costs of Inventory Spreadsheets
Hidden Costs of Inventory Spreadsheets
 
Inception Phases - Handling Complexity
Inception Phases - Handling ComplexityInception Phases - Handling Complexity
Inception Phases - Handling Complexity
 
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
Alliance 2017 - CRM Deep Dive: Workflows, Business Rules, Security, and Troub...
 
Unify Corporate Profile
Unify Corporate ProfileUnify Corporate Profile
Unify Corporate Profile
 
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
Gianluca D'Antonio - Working in Cybersecurity: thrut & lies behind the trince...
 
Kodak Strategy analysis and recommendation
Kodak Strategy analysis and recommendation Kodak Strategy analysis and recommendation
Kodak Strategy analysis and recommendation
 
How to turn your tablet into a customer facing device moki slideshare
How to turn your tablet into a customer facing device   moki slideshareHow to turn your tablet into a customer facing device   moki slideshare
How to turn your tablet into a customer facing device moki slideshare
 
Delivia delivery management system eng
Delivia delivery management system engDelivia delivery management system eng
Delivia delivery management system eng
 
Managing Technical Debt - WordCamp Orlando 2017
Managing Technical Debt - WordCamp Orlando 2017Managing Technical Debt - WordCamp Orlando 2017
Managing Technical Debt - WordCamp Orlando 2017
 
Esteban Pérez-Hemminger: Designing for compliance: why you should care
Esteban Pérez-Hemminger: Designing for compliance: why you should careEsteban Pérez-Hemminger: Designing for compliance: why you should care
Esteban Pérez-Hemminger: Designing for compliance: why you should care
 
Introducing the Unified Cloud - Sean Bruton
Introducing the Unified Cloud - Sean Bruton Introducing the Unified Cloud - Sean Bruton
Introducing the Unified Cloud - Sean Bruton
 
2015 Quality Management System Vendor Benchmark
2015 Quality Management System Vendor Benchmark2015 Quality Management System Vendor Benchmark
2015 Quality Management System Vendor Benchmark
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Compliance in the Era of Cloud
Compliance in the Era of CloudCompliance in the Era of Cloud
Compliance in the Era of Cloud
 
How Sapient Razorfish Cuts Its Campaign Deployment Times from Days to Minutes...
How Sapient Razorfish Cuts Its Campaign Deployment Times from Days to Minutes...How Sapient Razorfish Cuts Its Campaign Deployment Times from Days to Minutes...
How Sapient Razorfish Cuts Its Campaign Deployment Times from Days to Minutes...
 
Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!Top 10 P2P Advanced Controls to improve your bottom line!
Top 10 P2P Advanced Controls to improve your bottom line!
 

Recently uploaded

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
Laura Byrne
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Jeffrey Haguewood
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Product School
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
Product School
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 

Recently uploaded (20)

To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
Unsubscribed: Combat Subscription Fatigue With a Membership Mentality by Head...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
From Daily Decisions to Bottom Line: Connecting Product Work to Revenue by VP...
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 

Oracle IDAM overview

  • 1. ESLAM HASSAN HAFEZ ORACLE IDAM CONSULTANT | 9 JUNE 2014
  • 2. AGENDA  Oracle IDM Overview  Why Business needs IDM?  OIDM is about governance  OAM is about identity controlling  OIDAM suite components  OIDAM from solution perspective O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 2
  • 3. The following presentation describes an overview for Oracle Identity and access management OIDAM from social, enterprise and solution perspectives. O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 3
  • 4. ORACLE IDM OVERVIEW What is identity? O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 4 Name Mobile E-Mail National ID Title Date Of Birth Credit Card No.
  • 5. ORACLE IDM OVERVIEW What is your identity on all these applications? O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 5
  • 6. ORACLE IDM OVERVIEW What if you register only once? Middle layer O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 6
  • 7. ORACLE IDM OVERVIEW What if you sign in only once? O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 7 Middle layer
  • 8. ORACLE IDM OVERVIEW From Enterprise perspective O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 8
  • 9. WHY BUSINESS NEEDS IDM? Thousand s of systems 10 thousands of apps 100 thousands of users Millions of Entitlements • Few Administrators • Lack of Audit Staff • Too many privileged accounts O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 9
  • 10. WHY BUSINESS NEEDS IDM? 4 Questions should be asked to the Business Owner? Q1: Where do employees store their passwords, identity numbers for all applications? Q2: What determines your employee’s access? Q3: Who is the most privileged user in your enterprise? Q4: How much are manual compliance controls costing your organization? O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 10
  • 11. O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 11 Oracle Identity Manager - OIDM
  • 12. OIDM IS ABOUT GOVERNANCE O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 12
  • 13. OIDM IS ABOUT GOVERNANCE O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 13 Requesting Access to application or acquiring some entitlements
  • 14. OIDM IS ABOUT GOVERNANCE O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 14 Risk Assessment
  • 15. OIDM IS ABOUT GOVERNANCE O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 15 Reports and Auditing user accounts
  • 16. O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 16 Oracle Access Manager - OAM
  • 17. OAM IS ABOUT IDENTITY CONTROLLING O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 17 Check for Authentication and/or Authorization
  • 18. OAM IS ABOUT IDENTITY CONTROLLING O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 18 Security layers
  • 19. O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 19 Oracle IDAM Overall Architecture and Components
  • 20. OIDAM SUITE COMPONENTS O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 20
  • 21. OIDAM SUITE COMPONENTS O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 21
  • 22. O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 22 Oracle IDAM Solution Perspective
  • 23. OIDAM FROM SOLUTION PERSPECTIVE O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 23 OIDAM Must be a part of enterprise solution as for the following constraints:  Target applications Integrations  Functionalities  Features and Benefits Oracle Identity Governance – URL http://www.oracle.com/us/products/middleware/identity- management/governance/features/index.html Oracle Access Management – URL http://www.oracle.com/us/products/middleware/identity- management/access-management/features/index.html Oracle Directory Service – URL http://www.oracle.com/us/products/middleware/identity- management/directory-services/overview/index.html
  • 24. O R A C L E I D E N T I T Y & A C C E S S M A N A G E R O V E R V I E W 24