This document discusses leveraging Oracle's engineered systems for deploying and running Oracle Identity Management. It introduces Oracle's engineered systems, including Oracle Exalogic and Exadata, which are designed to improve performance, scalability, and simplify deployment for mission-critical applications like Oracle Identity Management. The document also summarizes the benefits of using Oracle Exalogic and Exadata, such as reduced costs, risk, and ability to consolidate hundreds of servers into a single system. It provides examples of large customers that have achieved significant performance and scalability running Oracle Identity Management on Oracle's engineered systems.
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...GregOracle
Applications moved into a managed cloud environment need Identity and Access Management services to ensure user accounts, passwords and roles are all managed properly for the purposes of Security and Audit. In this session, we’ll discuss the key considerations for a Hosted Private Cloud deployment of Oracle applications integrated with Oracle Identity Management Suite to provide self-service account provisioning and federated Single Sign-on (SSO) for an organization’s internal and external users. You will also hear from a customer on how their key business requirements were addressed with Managed Identity Services from Oracle running at Oracle.
Oracle Corporation, an American multinational computer technology corporation has come a log way to become the multinational technology company that it is today. Oracle's rich history tracks it's progress through the development and marketing of computer hardware systems, enterprise software and Oracle itself, the world renowned database technology.
These slides will show about Oracle Corporation at a glance. If you want to know more about Oracle Corporation and how Oracle products can help to grow your business, get in touch now.
Percona Live Europe 2018: What's New in MySQL 8.0 SecurityGeorgi Kodinov
In this session get an overview of all the new security features in MySQL 8.0 and how they fit together to answer the modern security challenges. MySQL 8 takes a new step in tightening the security of MySQL installations and provides new and flexible tools including a brand new default authentication method, SQL roles, enhancements in transparent disk encryption, and modern password controls on password reuse, complexity, and brute force password guessing.
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...GregOracle
Applications moved into a managed cloud environment need Identity and Access Management services to ensure user accounts, passwords and roles are all managed properly for the purposes of Security and Audit. In this session, we’ll discuss the key considerations for a Hosted Private Cloud deployment of Oracle applications integrated with Oracle Identity Management Suite to provide self-service account provisioning and federated Single Sign-on (SSO) for an organization’s internal and external users. You will also hear from a customer on how their key business requirements were addressed with Managed Identity Services from Oracle running at Oracle.
Oracle Corporation, an American multinational computer technology corporation has come a log way to become the multinational technology company that it is today. Oracle's rich history tracks it's progress through the development and marketing of computer hardware systems, enterprise software and Oracle itself, the world renowned database technology.
These slides will show about Oracle Corporation at a glance. If you want to know more about Oracle Corporation and how Oracle products can help to grow your business, get in touch now.
Percona Live Europe 2018: What's New in MySQL 8.0 SecurityGeorgi Kodinov
In this session get an overview of all the new security features in MySQL 8.0 and how they fit together to answer the modern security challenges. MySQL 8 takes a new step in tightening the security of MySQL installations and provides new and flexible tools including a brand new default authentication method, SQL roles, enhancements in transparent disk encryption, and modern password controls on password reuse, complexity, and brute force password guessing.
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...Jürgen Ambrosi
Trasformare i desktop statici secondo il paradigma del Digital Workspace: ambienti di lavoro sicuri che possono essere distribuiti on demand. Distribuire applicazioni e i desktop virtuali o remoti attraverso un'unica infrastruttura VDI che include una piattaforma di virtualizzazione delle applicazioni, per ottimizzare la gestione e semplificare il rilascio delle autorizzazioni agli utenti finali.
Consolidare il controllo, la distribuzione e la protezione delle risorse di elaborazione degli utenti con policy che si adattano dinamicamente all'ambiente di elaborazione dell'utente finale. Assicurare un'esperienza d'uso sempre eccellente a qualsiasi tipo di utente, dai lavoratori mobili agli sviluppatori 3D, su dispositivi, postazioni, supporti e connessioni diverse. Sfruttare una moderna architettura di distribuzione di desktop e applicazioni in grado di distribuire desktop in pochi secondi, ridurre i costi operativi e dello storage con desktop realmente stateless e semplificare il packaging e l'installazione delle applicazioni.
Con VMware Horizon è possibile realizzare tutto ciò, trasformando il Digital Workspace degli utenti in modo moderno, flessibile e sicuro.
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...Shaunak Gujjewar
The above PPT was created as a part of college presentation on the topic of Enterprise Application Integration & Flexibility with Service-oriented Architecture.
References :-
https://en.wikipedia.org/wiki/Enterprise_application_integration
https://en.wikipedia.org/wiki/Service-oriented_architecture
https://www.sciencedirect.com/science/article/pii/S1877050921000375
Bhadale group of companies on-premise services catalogueVijayananda Mohire
This is our offering for the On-premise cloud services. We have a wide range of services that assist clients in adopting cloud technologies right at their premise.
From Disaster to Recovery: Preparing Your IT for the UnexpectedDataCore Software
Did you know that 22% of data center outages are caused by human error? Or that 10% are caused by weather incidents?
The impact of an unexpected outage for just a few hours or even days could be catastrophic to your business.
How would you like to minimize or even eliminate these business interruptions, and more?
Join us to discover:
• Useful and simple measures to use that can help you keep the lights on
• How to quickly recover when the worst-case scenario occurs
• How to achieve zero downtime and high availability
Customer-Centric Data Management for Better Customer ExperiencesInformatica
With consumer and business buyer expectations growing exponentially, more businesses are competing on the basis of customer experience. But executing preferred customer experiences requires data about who your customers are today and what will they likely need in the future. Every business can benefit from an AI-powered master data management platform to supply this information to line-of-business owners so they can execute great experiences at scale. This same need is true from an internal business process perspective as well. For example, many businesses require better data management practices to deliver preferred employee experiences. Informatica provides an MDM platform to solve for these examples and more.
Oracle Cloud Infrastructure offers tools and architecture that help enterprises seamlessly move from on premise to the cloud, leveraging improved automation and built-in security to mitigate threats, ultimately supporting superior migration and economics.
4° Sessione VMware Horizon: la piattaforma per l’erogazione e la gestione di ...Jürgen Ambrosi
Trasformare i desktop statici secondo il paradigma del Digital Workspace: ambienti di lavoro sicuri che possono essere distribuiti on demand. Distribuire applicazioni e i desktop virtuali o remoti attraverso un'unica infrastruttura VDI che include una piattaforma di virtualizzazione delle applicazioni, per ottimizzare la gestione e semplificare il rilascio delle autorizzazioni agli utenti finali.
Consolidare il controllo, la distribuzione e la protezione delle risorse di elaborazione degli utenti con policy che si adattano dinamicamente all'ambiente di elaborazione dell'utente finale. Assicurare un'esperienza d'uso sempre eccellente a qualsiasi tipo di utente, dai lavoratori mobili agli sviluppatori 3D, su dispositivi, postazioni, supporti e connessioni diverse. Sfruttare una moderna architettura di distribuzione di desktop e applicazioni in grado di distribuire desktop in pochi secondi, ridurre i costi operativi e dello storage con desktop realmente stateless e semplificare il packaging e l'installazione delle applicazioni.
Con VMware Horizon è possibile realizzare tutto ciò, trasformando il Digital Workspace degli utenti in modo moderno, flessibile e sicuro.
Mis 20021241104 20021241103_20021241148_20021241155_20021241149_eai and flexi...Shaunak Gujjewar
The above PPT was created as a part of college presentation on the topic of Enterprise Application Integration & Flexibility with Service-oriented Architecture.
References :-
https://en.wikipedia.org/wiki/Enterprise_application_integration
https://en.wikipedia.org/wiki/Service-oriented_architecture
https://www.sciencedirect.com/science/article/pii/S1877050921000375
Bhadale group of companies on-premise services catalogueVijayananda Mohire
This is our offering for the On-premise cloud services. We have a wide range of services that assist clients in adopting cloud technologies right at their premise.
From Disaster to Recovery: Preparing Your IT for the UnexpectedDataCore Software
Did you know that 22% of data center outages are caused by human error? Or that 10% are caused by weather incidents?
The impact of an unexpected outage for just a few hours or even days could be catastrophic to your business.
How would you like to minimize or even eliminate these business interruptions, and more?
Join us to discover:
• Useful and simple measures to use that can help you keep the lights on
• How to quickly recover when the worst-case scenario occurs
• How to achieve zero downtime and high availability
Customer-Centric Data Management for Better Customer ExperiencesInformatica
With consumer and business buyer expectations growing exponentially, more businesses are competing on the basis of customer experience. But executing preferred customer experiences requires data about who your customers are today and what will they likely need in the future. Every business can benefit from an AI-powered master data management platform to supply this information to line-of-business owners so they can execute great experiences at scale. This same need is true from an internal business process perspective as well. For example, many businesses require better data management practices to deliver preferred employee experiences. Informatica provides an MDM platform to solve for these examples and more.
Oracle Cloud Infrastructure offers tools and architecture that help enterprises seamlessly move from on premise to the cloud, leveraging improved automation and built-in security to mitigate threats, ultimately supporting superior migration and economics.
Oracle Cloud Infrastructure (OCI) is a comprehensive IaaS delivering on-premises, high-performance computing power to run cloud native and enterprise companyu2019s IT workloads. It is a cloud computing platform created by Oracle Corporation. OCI provides real-time elasticity for enterprise applications by combining Oracle's autonomous services, and integrated security with seamless performance. It delivers compact & powerful computing solutions for infrastructure and platform cloud services.
An important part of OCI, Business Analytics enables your association to develop through knowledge, superior insights, and special experiences. Oracle Analytics utilizes inserted AI and machine learning consciousness to break down information so you can settle on more intelligent expectations and better choices.
Business Analytics using Oracle infinityIs'hak Gambo
This slide is a group assignment presented to faculty of computer science, BUK as requirement of Introduction to Cloud Computing course.
It includes introduction, problem statement, objectives, overview, methodology and conclusion regarding Oracle Cloud services.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Essentials of Automations: Optimizing FME Workflows with ParametersSafe Software
Are you looking to streamline your workflows and boost your projects’ efficiency? Do you find yourself searching for ways to add flexibility and control over your FME workflows? If so, you’re in the right place.
Join us for an insightful dive into the world of FME parameters, a critical element in optimizing workflow efficiency. This webinar marks the beginning of our three-part “Essentials of Automation” series. This first webinar is designed to equip you with the knowledge and skills to utilize parameters effectively: enhancing the flexibility, maintainability, and user control of your FME projects.
Here’s what you’ll gain:
- Essentials of FME Parameters: Understand the pivotal role of parameters, including Reader/Writer, Transformer, User, and FME Flow categories. Discover how they are the key to unlocking automation and optimization within your workflows.
- Practical Applications in FME Form: Delve into key user parameter types including choice, connections, and file URLs. Allow users to control how a workflow runs, making your workflows more reusable. Learn to import values and deliver the best user experience for your workflows while enhancing accuracy.
- Optimization Strategies in FME Flow: Explore the creation and strategic deployment of parameters in FME Flow, including the use of deployment and geometry parameters, to maximize workflow efficiency.
- Pro Tips for Success: Gain insights on parameterizing connections and leveraging new features like Conditional Visibility for clarity and simplicity.
We’ll wrap up with a glimpse into future webinars, followed by a Q&A session to address your specific questions surrounding this topic.
Don’t miss this opportunity to elevate your FME expertise and drive your projects to new heights of efficiency.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Welocme to ViralQR, your best QR code generator.ViralQR
Welcome to ViralQR, your best QR code generator available on the market!
At ViralQR, we design static and dynamic QR codes. Our mission is to make business operations easier and customer engagement more powerful through the use of QR technology. Be it a small-scale business or a huge enterprise, our easy-to-use platform provides multiple choices that can be tailored according to your company's branding and marketing strategies.
Our Vision
We are here to make the process of creating QR codes easy and smooth, thus enhancing customer interaction and making business more fluid. We very strongly believe in the ability of QR codes to change the world for businesses in their interaction with customers and are set on making that technology accessible and usable far and wide.
Our Achievements
Ever since its inception, we have successfully served many clients by offering QR codes in their marketing, service delivery, and collection of feedback across various industries. Our platform has been recognized for its ease of use and amazing features, which helped a business to make QR codes.
Our Services
At ViralQR, here is a comprehensive suite of services that caters to your very needs:
Static QR Codes: Create free static QR codes. These QR codes are able to store significant information such as URLs, vCards, plain text, emails and SMS, Wi-Fi credentials, and Bitcoin addresses.
Dynamic QR codes: These also have all the advanced features but are subscription-based. They can directly link to PDF files, images, micro-landing pages, social accounts, review forms, business pages, and applications. In addition, they can be branded with CTAs, frames, patterns, colors, and logos to enhance your branding.
Pricing and Packages
Additionally, there is a 14-day free offer to ViralQR, which is an exceptional opportunity for new users to take a feel of this platform. One can easily subscribe from there and experience the full dynamic of using QR codes. The subscription plans are not only meant for business; they are priced very flexibly so that literally every business could afford to benefit from our service.
Why choose us?
ViralQR will provide services for marketing, advertising, catering, retail, and the like. The QR codes can be posted on fliers, packaging, merchandise, and banners, as well as to substitute for cash and cards in a restaurant or coffee shop. With QR codes integrated into your business, improve customer engagement and streamline operations.
Comprehensive Analytics
Subscribers of ViralQR receive detailed analytics and tracking tools in light of having a view of the core values of QR code performance. Our analytics dashboard shows aggregate views and unique views, as well as detailed information about each impression, including time, device, browser, and estimated location by city and country.
So, thank you for choosing ViralQR; we have an offer of nothing but the best in terms of QR code services to meet business diversity!
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
Oracle Identity Management Leveraging Oracle’s Engineered Systems
1. An Oracle White Paper
August 2013
Oracle Identity Management Leveraging
Oracle’s Engineered Systems
High Performance, Scalability, Simplified Deployment
2. Oracle Identity Management Leveraging Oracle Engineered Systems
Disclaimer
The following is intended to outline our general product direction. It is intended for information purposes
only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or
functionality, and should not be relied upon in making purchasing decisions. The development, release, and
timing of any features or functionality described for Oracle’s products, remains at the sole discretion of
Oracle.
3. Oracle Identity Management Leveraging Oracle Engineered Systems
Executive Overview ............................................................................ 2
Introduction ......................................................................................... 3
Oracle’s Engineered Systems......................................................... 3
Oracle Identity Management........................................................... 4
Oracle Exalogic / Oracle Exadata Benefits ......................................... 5
Installing Oracle Identity Management on Oracle Exalogic ................ 5
250 Million User Benchmark ............................................................... 6
Customer Case Studies ...................................................................... 7
Turkey’s Ministry of Education ........................................................ 7
Western US State ........................................................................... 8
Conclusion .......................................................................................... 9
4. Oracle Identity Management Leveraging Oracle Engineered Systems
2
Executive Overview
Enterprises deploy Information Technology (IT) applications in various ways today. They may
use on-premise physical servers, virtualization, private clouds, public clouds, or a combination
thereof. In all cases, the main goals include improving the ease of application deployment,
increasing system performance, providing security across the enterprise, and ensuring
contained costs.
With an inclusive “in-a-box” strategy, Oracle’s engineered systems combine best-of-breed
hardware and software components with game-changing technical innovations. Designed,
engineered, and tested to work best together, Oracle’s engineered systems power the cloud or
streamline data center operations to make IT deployments more efficient. The components of
Oracle’s engineered systems are preassembled for targeted functionality and then, as a
complete system, optimized for extreme performance, translating into less risk and cost for
your organization. Oracle’s engineered systems integrate seamlessly with existing IT
environments, and provide the kind of customer experience that helps your users do what they
need to do faster, better, and more efficiently.
With Oracle’s engineered systems as the foundation for running your mission-critical
applications, you get fully integrated servers, storage and networking that will save you months
of integrating, testing, and benchmarking time. Oracle’s engineered systems deployment also
gives you the ability to manage the entire system—from applications to servers to storage—
from a single console.
Oracle Identity Management enables organizations to effectively manage the end-to-end
lifecycle of user identities across all enterprise resources, both within and beyond the firewall
and into the cloud. The Oracle Identity Management platform delivers highly scalable solutions
for identity governance, access management, and directory services, helping organizations
strengthen security and capture business opportunities around mobile and social access.
This document presents the business benefits of leveraging Oracle’s engineered systems for
deploying and running Oracle Identity Management.
5. Oracle Identity Management Leveraging Oracle Engineered Systems
3
Introduction
This section introduces Oracle’s engineered systems and Oracle Identity Management.
Oracle’s Engineered Systems
Oracle’s engineered systems include the following products, designed for specific purposes:
• Oracle Exadata Database Machine: The only database machine that provides extreme performance
for both data warehousing and online transaction processing (OLTP) applications.
• Oracle Exalogic Elastic Cloud: Designed, optimized, and certified for running Oracle applications
(such as Oracle Identity Management). Exalogic is ideal for mission-critical middleware and
applications from Oracle and third-party vendors. It delivers lower total cost of ownership (TCO),
reduces risk, and offers unprecedented levels of performance, reliability, and scalability.
• Oracle SuperCluster T5-8: A complete engineered system that delivers extreme performance and the
highest availability and efficiency for databases and applications. Oracle SuperCluster T5-8 is ideal
for consolidation and private clouds.
• Oracle Database Appliance: An engineered system of software, servers, storage and networking that
offers a simple, reliable, low-cost package for mid-range database workloads.
• Oracle Exalytics: The first engineered system featuring in-memory software and hardware and an
optimized business intelligence platform with advanced visualization.
• Oracle Big Data Appliance: An engineered system optimized for acquiring, organizing and loading
unstructured data into Oracle Database.
• Oracle’s Sun ZFS Storage Appliances: Provide robust application and data storage for Oracle’s SPARC
SuperCluster and Exalogic Elastic Cloud, and offer immediate benefits for customers using
network-attached storage (NAS) for enterprise applications, virtualization, cloud, storage
consolidation, and data protection.
• Oracle Network Application Platform: An engineered system for carrier-grade application development
that enables network equipment providers and communications service providers to dramatically
improve cost, time to market, and capacity to innovate.
6. Oracle Identity Management Leveraging Oracle Engineered Systems
4
Oracle Identity Management
Over the last decade, the mission of identity and access management (IAM) has expanded to include a
wide range of business objectives. Whereas early identity systems essentially served to simplify user
account management, organizations are now building IAM functionality into their controls
infrastructure (according to IT market intelligence firm IDC, the IAM market size for 2014 is
estimated at around US$4billion). As applications outgrow traditional network boundaries through
cloud and mobile channels, organizations are using IAM to create a secure, integrated user experience.
The constant specter of insider threats and consumer fraud also necessitates identification-based access
controls throughout the enterprise. IAM systems are now at the backbone of e-government services,
commercial websites, telecommunications networks, social networking, and healthcare information
exchanges.
Figure 1: Oracle Identity and Access Management Logical View
Oracle Identity Management is a fully integrated suite of IAM functionality. Oracle Identity
Management protects enterprise resources and manages the processes acting on those resources.
Oracle Identity Management functionality is delivered as a unified, integrated security services platform
designed to administer user identities, provision resources to users, protect access to corporate
resources, enable trusted online business partnerships, and support governance and compliance across
the enterprise.
7. Oracle Identity Management Leveraging Oracle Engineered Systems
5
This document covers Oracle Identity Management running on Oracle Exalogic and Oracle Exadata.
Please refer to the 250 Million-User Benchmark technical white paper for more technical information
regarding the benchmarking of Oracle Identity Management on Oracle Exalogic and Oracle Exadata.
Oracle Exalogic / Oracle Exadata Benefits
The integrated systems trend is on the rise. According to Gartner, “by 2015, 35 percent of total server
shipped value will be as integrated systems.” (Gartner Data Center Conference presentation, “Will
Fabric Computing Change the Concept of the Traditional Server?” December 2011.)
The extreme performance designed into every Oracle engineered system helps reduce risk and lower
costs in your business. Oracle standardizes components in its engineered systems to reduce your risk
and make tasks—such as software and hardware upgrades—automatic and predictable. Consolidating
resources, whether in the data center or in the cloud, is a way to simplify your IT environment.
One of the key business benefits of Oracle’s engineered systems is the savings you make in operations.
According to Gartner and Crédit Suisse, the enterprise IT budget is typically broken down into
facilities (7%), hardware (10%), software (12%), implementation (31%) and staffing (40%). Oracle’s
engineered systems allow you to cut down on IT costs by 70% in implementation and staffing,
including sizing and deployment planning, installation and configuration, deployment and scaling,
patching and maintenance, and platform administration.
Converged Oracle Identity Management platforms running on Oracle’s engineered systems can
consolidate hundreds of servers into a single “box.” For example, a very large US broadband and
telecommunications company runs 200 Oracle Identity Management servers on Oracle Exalogic.
Installing Oracle Identity Management on Oracle Exalogic
Customers install Oracle Identity Management on Oracle Exalogic in the same way they install other
Oracle applications or middleware components.
Typically, after preparing your data center site, commissioning the Oracle Exalogic machine, providing
initial network configuration (e.g., IP address assignments), and setting up the Sun ZFS Storage 7320
(the initial configuration of the storage appliance in your Oracle Exalogic machine is completed at the
time of manufacturing), you’re ready to install Oracle Identity Management on the Oracle middleware
stack (Oracle Linux 5.5 is preinstalled on each of the compute nodes in your Oracle Exalogic machine).
8. Oracle Identity Management Leveraging Oracle Engineered Systems
6
Figure 2: Oracle Identity Management on Oracle Exalogic
250 Million User Benchmark
The goal of the 250 million-user benchmark is to demonstrate the ability of a selection of Oracle
Identity Management components to support extreme loads when deployed on Oracle Exalogic and
Oracle Exadata. The Oracle Identity Management components involved in this benchmark are Oracle
Access Manager (OAM), a web single sign-on (SSO) solution, and Oracle Adaptive Access Manager
(OAAM), a strong, multifactor authentication and fraud detection platform, together with Oracle
Internet Directory (OID), one of the LDAP directory servers offered by Oracle with the Oracle
Directory Services platform, used in this case to seed test user data.
The 250 million-user benchmark (1) shows the ability of the environment to support up to 250 million
users (based on specific use cases described in the 250 Million-User Benchmark technical white paper), (2)
demonstrates the scalability of OAM and OAAM on Oracle Exalogic and Oracle Exadata, and (3)
identifies optimal settings for each tier (operating system, middleware, and database) as well as optimal
settings for each Cloud Application Foundation component (Java Virtual Machine, web tier, Oracle
Traffic Director (OTD), OAM, OAAM, OID, and the Oracle Database).
Figure 3: 250M User Benchmark Configuration
The Oracle Exalogic / Oracle Exadata platforms used for this benchmark include an Oracle Exalogic
machine (X3-2 Quarter Rack) and an Oracle Exadata machine (X3-2 Quarter Rack). The Oracle
Exalogic machine comes with 8 compute nodes (Intel Xeon CPU E5-2690; 2x8 cores at 2.90 GHz (or
9. Oracle Identity Management Leveraging Oracle Engineered Systems
7
a total of 128 compute cores), 256GB of RAM, one ZFS Storage 7320 clustered configuration, and the
high-speed InfiniBand internal network. The Oracle Exadata machine comes with 2 compute nodes
(Intel Xeon CPU E5-2690; 2x8 cores at 2.90 GHz), and three Oracle Exadata storage servers X3-2
with 36 CPU cores for SQL processing.
The benchmark topology is as follows: The OAM and OAAM servers are installed on Oracle Exalogic
nodes. The OAM and OAAM database servers are installed on Oracle Exadata. OID is installed on
Oracle Exalogic nodes, and OID’s database is installed on Oracle Exadata. The web tier including
Oracle HTTP Server (OHS) with OAM’s WebGates (web filters communicating with the OAM server
in the application tier, as shown in Figure 1), and Oracle Traffic Director are on Oracle Exalogic
nodes. The Load Runner Controller used for the benchmark is installed on an external Microsoft
Windows machine, and load generators are installed on miscellaneous external machines.
The benchmark results are indicative of how much performance is gained by running Oracle Identity
Management on Oracle Exalogic / Oracle Exadata. OAM shows extreme performance, linear scale up
and scale out. OAM can support 7.7 million, 12.5 million, and 16.4 million logins per hour with one,
two, and three Oracle Exalogic nodes respectively. OAAM can support up to 12 million transactions
per hour with one Oracle Exalogic node, and 2 Oracle Exalogic nodes can support up to 20 million
transactions per hour.
Customer Case Studies
Following are two examples of customers that have deployed (or are in the process of deploying)
Oracle Identity Management on Oracle Exalogic / Oracle Exadata machines.
Turkey’s Ministry of Education
Turkey has over 25 million children in K-12 public schools. FATIH, a project commissioned by the
Turkish Ministry of Education, is designed to advance the use of modern technology to support
teaching in over 42,000 schools (570,000 classes) throughout Turkey. Technology includes smart
boards, tablets for teachers, rich content, and a central governance structure. Oracle has been chosen
by the Turkish Ministry of Education to provide a solution to identity-related challenges.
Every year more than 2 million students enter the K-12 population, and 2 million students graduate
from the system annually. More than 20 million students go on to the next grade, 2 million of them
move from primary to secondary, and 2 million from secondary to high school thus creating substantial
provisioning challenges. Since most end-users are children, the user experience must be very simple
10. Oracle Identity Management Leveraging Oracle Engineered Systems
8
(authentication, single sign-on, and credentials management). For a project of this scale (25 million
students), performance and scalability are key factors. Performance requirements are based on specific
use cases. Peaks are expected to happen with a high ratio of the total user population authenticating
and starting single sign-on sessions in very short-time periods.
Similarly, provisioning happens in bulk with almost all the user population seeing annual
“organizational changes” over a few weeks. This includes 10% of the total user population off-
boarding and new users on-boarding within the same time frame. Scalability is important because there
are many potential usage scenarios that will follow, such as parents accessing the resources after school
hours.
The FATIH project uses Oracle Access Manager (OAM) for web applications authentication and
single sign-on, and Oracle Identity Manager (OIM) for provisioning and user life cycle management.
User identities are persisted in Oracle Unified Directory (OUD). Performance and scalability
challenges are addressed by running the identity management components on Oracle Exalogic (Oracle
performed a preliminary proof of concept on an Oracle Exalogic system which earned the customer’s
unequivocal endorsement).
Oracle’s engineered systems are hosted at the Turkish Telekom Datacenter in Ankara. This includes
Oracle Exalogic and Oracle Exadata, in addition to Oracle Exalytics and Oracle Big Data Appliance,
together with a set of machines dedicated to disaster recovery. Running all of the identity management
components on Oracle’s engineered systems has made it possible to have natural load switching: OAM
and OUD are loaded mainly during school time, whereas OIM is loaded during the summer when
OAM/OUD loads are minimal. So, even if all components run on all nodes, the load is naturally
balanced since the OAM-OUD and OIM peak times are different. The most important performance
impact can be observed on connections, for example directory replication sees zero network friction.
The time required to upload directory data from scratch (25 million records in 50 minutes) is almost
the same as the time it takes to replicate the whole directory over to a new directory replica.
Western US State
This western United States state with a potential number of 3M+ users runs its business on Oracle’s
engineered systems. Adding Oracle Identity Management components to the existing stack was a
natural thing to do. Oracle’s engineered systems are hosted on Oracle On Demand (Oracle On
Demand recommends the use of Oracle’s engineered systems). As a result, no customer maintenance
staff is necessary, all Oracle’s engineered systems’ maintenance is provided by Oracle itself.
11. Oracle Identity Management Leveraging Oracle Engineered Systems
9
The customer uses Oracle Access Manager and Oracle Adaptive Access Manager for access control,
web single sign-on, strong authentication, and fraud detection, and Oracle Identity Manager for user
life cycle management. In addition to Oracle Identity Management components, the customer also uses
Oracle PeopleSoft, Enterprise Resource Planning (ERP) applications, and custom applications, all
running on Oracle’s engineered systems.
In this case, the customer uses Oracle Identity Management to support its Health Information
Exchange (HIE). Oracle Consulting Services (OCS) supported the implementation of the identity
management components. Oracle Identity Management is a solution well suited to support the
customer’s requirements in terms of a very large number of roles and integrated eligibility (e.g., the
legal ability to review others’ medical information).
Conclusion
Oracle engineered systems are optimized to achieve enterprise performance levels that are unmatched
in the industry. Whether it’s consolidating business applications on Oracle Exalogic Elastic Cloud and
database workloads on Oracle Exadata Database Machine, or consolidating workloads from several
machines onto a single system, engineered systems that work faster and that are less expensive just
make good sense. Oracle Identity Management is one example of how Oracle Exalogic and Oracle
Exadata can help support up to 250 million users and show tremendous improvement over traditional
deployments.