Professional Documents
Culture Documents
Überblick
Klaus Scherbach
Principal Sales Consultant
BU Identity Management
This document is for informational purposes. It is not a commitment to
deliver any material, code, or functionality, and should not be relied
upon in making purchasing decisions. The development, release, and
timing of any features or functionality described in this document
remains at the sole discretion of Oracle. This document in any form,
software or printed matter, contains proprietary information that is the
exclusive property of Oracle. This document and information
contained herein may not be disclosed, copied, reproduced or
distributed to anyone outside Oracle without prior written consent of
Oracle. This document is not part of your license agreement nor can
it be incorporated into any contractual agreement with Oracle or its
subsidiaries or affiliates.
Functional Overview
• Complete
• Innovative
• Simplified
• Scalable
• Open
Registration Attestation
Self Service Lifecycles
OAM WebGates
Identity Context
Events
Directory Services
Authentication
Authorization Oracle Access Management
Single Sign-On
Container
Context
2. Publish, Propagate & Evaluate attributes across Oracle’s Fusion Middleware stack
PEP PEP
PDP PDP
PEP
PIPs
OES Admin Server
PDP Iden(ty Store
Policy Store
PEP
PEP
PDP
LDAP
OAM Agent Directory Services
Second
ary Auth
OES PDP enticati
on
Mobile and Social
Oracle Adaptive Access
Manager
OES PDP
Oracle Enterprise
Gateway
OWSM JMS
HTTP,
SOAP,
Agent REST,
XML,
JMS
OWSM
OWSM OWSM Agent
Agent* Agent Service Bus
WS-Security,
Basic Auth, WS-Security,
Digest,
Basic Auth, OWSM
X509, UNT,
SAML, Kerberos Digest, Agent*
Sign & Encrypt X509, UNT,
OWSM SAML, Kerberos
Agent* Sign & Encrypt
Trust
Connectors
Provision De-Provision
Grant User Access Monitor User Access
Applications
Identity Warehouse
Risk Factors
Identity Data
Sources
DB
Roles Certification Entitlements Provisioning Resources Policy
History Events Violations
Mainframe
Risk Aggregation
Reject
Focused
Sign-off
Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Oracle Confidential
22
Oracle Identity Governance 11gR2
Connectors
Governance needs
• Supports multiple target versions Access
and multiple instances of a target Request
Identity
Enterprise Applications
simultaneously Access
Certification
Connector
Framework
Identity
Privileged Connectors
• Flexible deployment options – Access Directories
Threats
Increased Online Threat
Costly Insider Fraud
76% Data Stolen From
Servers
Compliance 86% Hacking Involve
Tougher Regulations
Stolen Credentials
Greater Focus on Risk
Stronger Governance 48% Caused by Insiders
17% Involved Privilege
Motivation Misuse
Social Media
Cloud Computing
Mobile Access
2011 Data Breach Investigations Report
Single Node
OID Cluster
+ RAC
+ Replication