SlideShare une entreprise Scribd logo
1  sur  60
Phase 1.0 POC Mar 2010 Mohamed Atef MW Administrator
AGENDA ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
WHY ORACLE IDENTITY MANAGEMENT Oracle Identity Management  allows enterprises to manage end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. Oracle Identity Management  is a member of the Oracle Fusion Middleware family of products, which brings greater agility, better decision-making, and reduced cost and risk to diverse IT environments today.
Oracle Identity Management Solutions Single Sign-On and Web Access Control: Oracle Access Manager  (Protecting resources at a point of access and delegating authentication and authorization decisions to a central authority, help secure web, J2EE  and enterprise applications). Oracle Enterprise Single Sign-On Suite Plus  (Enterprise users can enjoy the benefits of single sign-on to all of their applications, whether they are connected to the corporate network, traveling away from the office, roaming between computers or working at a shared workstation). Directory Services: Oracle Internet Directory  (Is an LDAP v3 compliant directory with meta-directory capabilities. It is built on the industry leading Oracle database and is fully integrated into Oracle Fusion Middleware and Oracle Applications). Oracle Virtual Directory  (Creating a secure application environment requires integration of existing user identity information. For some companies, that information is contained in databases. Others use LDAP directories or Windows Domains. For most, this information is scattered across multiple locations and multiple services, provides Internet and industry-standard LDAP and XML views of existing enterprise identity information, without synchronizing or moving data from its native locations). Oracle Directory Server Enterprise Edition  (Formerly “SUN Directory Server Enterprise Edition” is the best known directory server with proven large deployments in carrier and enterprise environments. It is also the most supported directory by ISVs, so it is ideal for heterogeneous environments. ODSEE provides a core directory service with embedded database, directory proxy, Active Directory (AD) synchronization and a Web administration console). Oracle Authentication Services for Operating Systems  (Oracle Authentication Services for Operating Systems provides centralized authentication and account management for Unix and Linux platforms. This page contains information to get you started with Oracle Authentication Services for Operating Systems.).
Oracle Identity Management Solutions Content Access Control: Oracle Information Rights Management  (Formerly “SealedMedia” is a new form of information security technology that secures and tracks sensitive digital information everywhere it is stored and used, such as encrypting ("sealing") and classifying documents, emails and web pages, and the requirement to install Oracle IRM Desktop agent software on every end user device on which sealed information is created or used). Strong Authentication: Extended Identity Management Ecosystem  (Organizations commonly have multiple security systems in place—one technology to secure physical access, another to secure legacy applications, and yet another to secure network access. To cope with these "silo'd" solutions, Oracle has partnered with best-of-breed ISVs to offer a central and effective means to enforce security policy across all enterprise resources. As part of the Oracle Identity Management Ecosystem, partner solutions seamlessly integrate into Oracle Identity Management solutions extend a common security and identity management framework across all enterprise applications). Oracle Adaptive Access Manager  (Oracle Adaptive Access Manager consists of two primary components that together create one of the most powerful and flexible weapons in the war against fraud. Adaptive Strong Authenticator provides multifactor authentication and protection mechanisms for sensitive information such as passwords, PINs, security questions, account numbers and other credentials). Identity Administration: Oracle Identity Manager  (Formerly known as “Oracle Xellerate Identity Provisioning”, is a powerful and flexible enterprise identity management system that automatically manages users' access privileges within enterprise IT resources). Oracle Role Manager  (Previously known as “Bridgestream SmartRoles”, is an enterprise-class application for managing business and organizational role lifecycle management).
Oracle Identity Management Solutions Federated Identity: Oracle Identity Federation  (Significantly reduces the need to create unnecessary identity in an enterprise directory and lowers the ongoing costs of partner integrations through support of industry federation standards, protects existing IT investments by integrating with a wide variety of data stores, user directories, authentication providers and applications) Fine Grained Entitlements: Oracle Entitlements Server  (Secures access to application resources and software components (such as URLs, EJBs, and JSPs) as well as arbitrary business objects (such as customer accounts or patient records). Oracle Entitlements Server policies specify which users, groups, and/or roles can access application resources, allowing those roles to be dynamically resolved at runtime). Oracle – Sun: Oracle Waveset  (Providesoperational and business efficiency by providing complete automation of user accounts and entitlements provisioning into a variety of enterprise business applications. Oracle Waveset integrates automated identity lifecycle management with identity auditing capabilities, and makes it possible to manage these processes at the business role level).  Oracle OpenSSO  (Is a complete solution that provides Web access management, federated single sign-on and Web services security in a single, self-contained application).
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
WHAT IS ORACLE IDENTITY MANAGER ,[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER ARCHITECTURE ,[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER ARCHITECTURE The  Oracle Identity Manager  architecture has three tiers: Presentation tier Server tier Data & Enterprise Integration tier
TIER1: PRESENTATION TIER ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIER2: SERVER TIER ,[object Object],[object Object],[object Object],[object Object]
TIER2: SERVER TIER ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIER3: DATA & ENTERPRISE INTEGRATION TIER ,[object Object],[object Object],[object Object],[object Object],[object Object]
TIER3: DATA & ENTERPRISE INTEGRATION TIER ,[object Object],[object Object],[object Object],[object Object]
RECONCILIATION & PROVISIONING: OVERVIEW ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
RECONCILIATION: TYPES ,[object Object],[object Object],[object Object]
RECONCILIATION: EVENTS ,[object Object],[object Object],[object Object],[object Object]
PROVISIONING: TYPES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
TRUSTED SOURCE RECONCILIATION: CONCEPTUAL DIAGRAM ,[object Object],1 Reconciliation flow Provisioning flow Target resource (for example, an Oracle HRMS) Administrator End user Trusted source (for example, Active Directory)
TARGET RESOURCE RECONCILIATION: CONCEPTUAL DIAGRAM ,[object Object],Reconciliation flow Provisioning flow 2 End user Administrator Trusted source (for example, a Active Directory)   Target resource (for example, an Oracle HRMS)
ORACLE IDENTITY MANAGER CONNECTOR: OVERVIEW ,[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CONNECTOR: COMPONENTS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP1 ,[object Object],IT resource type 1
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP1 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP2 ,[object Object],IT resource IT resource type 2
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP2 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP3 ,[object Object],IT resource type Custom process form 3 IT resource
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP3 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP4 ,[object Object],IT resource IT resource type Custom process form Process task adapter 4
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP4 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP5 ,[object Object],IT resource IT resource type Resource object Custom process form Process task adapter 5
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP5 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP6 ,[object Object],IT resource IT resource type Resource object Provisioning process Custom process form Process task adapter 6
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP6 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP7 ,[object Object],IT resource IT resource type Resource object Provisioning process Custom process form Process task adapter Process task   7
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP7 ,[object Object]
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP8 ,[object Object],IT resource IT resource type Resource object Provisioning process Custom process form Process task adapter Process task   8
CONSTRUCTING AN ORACLE IDENTITY MANAGER CONNECTOR: STEP8 ,[object Object]
ORACLE IDENTITY MANAGER CONNECTORS LIST ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CONNECTORS LIST ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CONNECTORS LIST ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CERTIFIED OPERATING SYSTEMS ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CERTIFIED APPLICATION SERVERS ,[object Object],[object Object],[object Object],[object Object],[object Object]
ORACLE IDENTITY MANAGER CERTIFIED DATABASES ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
POC: SCOPE ,[object Object],[object Object],[object Object],Reconciliation flow Provisioning flow Active Director   Oracle HRMS
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
POC: DEMO ,[object Object]
 

Contenu connexe

Tendances

IDM Resume _ Kiran
IDM Resume _ KiranIDM Resume _ Kiran
IDM Resume _ Kiran
Kiran Kumar
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
David J Rosenthal
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
David J Rosenthal
 

Tendances (20)

Cloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdfCloud App Security Customer Presentation.pdf
Cloud App Security Customer Presentation.pdf
 
Azure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - AjayAzure AD Presentation - @ BITPro - Ajay
Azure AD Presentation - @ BITPro - Ajay
 
Identity and Access Management 101
Identity and Access Management 101Identity and Access Management 101
Identity and Access Management 101
 
IDM Resume _ Kiran
IDM Resume _ KiranIDM Resume _ Kiran
IDM Resume _ Kiran
 
Microsoft Zero Trust
Microsoft Zero TrustMicrosoft Zero Trust
Microsoft Zero Trust
 
Oracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer PresentationOracle Identity Governance - Customer Presentation
Oracle Identity Governance - Customer Presentation
 
Microsoft 365 Security and Compliance
Microsoft 365 Security and ComplianceMicrosoft 365 Security and Compliance
Microsoft 365 Security and Compliance
 
Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)Overview of Microsoft Enterprise Mobility & Security(EMS)
Overview of Microsoft Enterprise Mobility & Security(EMS)
 
Secure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity GovernanceSecure your M365 resources using Azure AD Identity Governance
Secure your M365 resources using Azure AD Identity Governance
 
Microsoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert HoitinghMicrosoft Information Protection demystified Albert Hoitingh
Microsoft Information Protection demystified Albert Hoitingh
 
Managing iOS with Microsoft Intune
Managing iOS with Microsoft IntuneManaging iOS with Microsoft Intune
Managing iOS with Microsoft Intune
 
Microsoft Ignite 2022 - Scaling, Securing, Managing, and Publishing Power Pla...
Microsoft Ignite 2022 - Scaling, Securing, Managing, and Publishing Power Pla...Microsoft Ignite 2022 - Scaling, Securing, Managing, and Publishing Power Pla...
Microsoft Ignite 2022 - Scaling, Securing, Managing, and Publishing Power Pla...
 
Microsoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 OverviewMicrosoft 365 Enterprise Security with E5 Overview
Microsoft 365 Enterprise Security with E5 Overview
 
48. Azure Active Directory - Part 1
48. Azure Active Directory - Part 148. Azure Active Directory - Part 1
48. Azure Active Directory - Part 1
 
Microsoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by AtidanMicrosoft Enterprise Mobility Suite Presented by Atidan
Microsoft Enterprise Mobility Suite Presented by Atidan
 
Integrating your on-premises Active Directory with Azure and Office 365
Integrating your on-premises Active Directory with Azure and Office 365Integrating your on-premises Active Directory with Azure and Office 365
Integrating your on-premises Active Directory with Azure and Office 365
 
Introducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database FirewallIntroducing Oracle Audit Vault and Database Firewall
Introducing Oracle Audit Vault and Database Firewall
 
Overview of Microsoft Teams and Data Loss Prevention(DLP)
Overview of Microsoft Teams  and Data Loss Prevention(DLP)Overview of Microsoft Teams  and Data Loss Prevention(DLP)
Overview of Microsoft Teams and Data Loss Prevention(DLP)
 
Microsoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance FrameworkMicrosoft Information Protection: Your Security and Compliance Framework
Microsoft Information Protection: Your Security and Compliance Framework
 
Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016Identity and Access Management Playbook CISO Platform 2016
Identity and Access Management Playbook CISO Platform 2016
 

En vedette

Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
stefanjung
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
Delivery Centric
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
OracleIDM
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
OracleIDM
 

En vedette (16)

Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overview
 
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...Integrate Oracle Identity Management and Advanced Controls for maximum effici...
Integrate Oracle Identity Management and Advanced Controls for maximum effici...
 
ABC’s Proposal
ABC’s ProposalABC’s Proposal
ABC’s Proposal
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity Provisioning
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Oracle-Security_Executive-Presentation
Oracle-Security_Executive-PresentationOracle-Security_Executive-Presentation
Oracle-Security_Executive-Presentation
 
Oracle Fusion Applications Security - Designing Roles
Oracle Fusion Applications Security - Designing RolesOracle Fusion Applications Security - Designing Roles
Oracle Fusion Applications Security - Designing Roles
 
Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...Password Policies in Oracle Access Manager. How to improve user authenticatio...
Password Policies in Oracle Access Manager. How to improve user authenticatio...
 
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminarOverview Oracle Identity Management tijdens AMIS Simplified Security seminar
Overview Oracle Identity Management tijdens AMIS Simplified Security seminar
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
What is tackled in the Java EE Security API (Java EE 8)
What is tackled in the Java EE Security API (Java EE 8)What is tackled in the Java EE Security API (Java EE 8)
What is tackled in the Java EE Security API (Java EE 8)
 
Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 

Similaire à Oim Poc1.0

Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered Systems
GregOracle
 
Products
ProductsProducts
Products
nafia
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
guest536dd0e
 
Oracle and its related technologies
Oracle and its related technologiesOracle and its related technologies
Oracle and its related technologies
anup4704
 
OMC_LogAnalytics_DataSheet
OMC_LogAnalytics_DataSheetOMC_LogAnalytics_DataSheet
OMC_LogAnalytics_DataSheet
Harish Akali
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
MJ Ferdous
 

Similaire à Oim Poc1.0 (20)

Oracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered SystemsOracle Identity Management Leveraging Oracle’s Engineered Systems
Oracle Identity Management Leveraging Oracle’s Engineered Systems
 
8.1.6 newsecurity features
8.1.6 newsecurity features8.1.6 newsecurity features
8.1.6 newsecurity features
 
Oracle Cloud Essentials
Oracle Cloud EssentialsOracle Cloud Essentials
Oracle Cloud Essentials
 
As onew816a
As onew816aAs onew816a
As onew816a
 
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise Manager
 
816isdfo
816isdfo816isdfo
816isdfo
 
7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom7. oracle iam11g+strategyodrom
7. oracle iam11g+strategyodrom
 
Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1Agile IT EMS webinar series, session 1
Agile IT EMS webinar series, session 1
 
Products
ProductsProducts
Products
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
kowsalyamanickam_resume_OIM
kowsalyamanickam_resume_OIMkowsalyamanickam_resume_OIM
kowsalyamanickam_resume_OIM
 
What Is Oracle Fusion Middleware .pdf
What Is Oracle Fusion Middleware .pdfWhat Is Oracle Fusion Middleware .pdf
What Is Oracle Fusion Middleware .pdf
 
Presentation on Oracle Application Server
Presentation on  Oracle Application Server Presentation on  Oracle Application Server
Presentation on Oracle Application Server
 
Oracle and its related technologies
Oracle and its related technologiesOracle and its related technologies
Oracle and its related technologies
 
Oracle and its related technologies
Oracle and its related technologiesOracle and its related technologies
Oracle and its related technologies
 
Multiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oidMultiple ldap implementation with ebs using oid
Multiple ldap implementation with ebs using oid
 
Top 10 reasons to adopt cloud
Top 10 reasons to adopt cloudTop 10 reasons to adopt cloud
Top 10 reasons to adopt cloud
 
OMC_LogAnalytics_DataSheet
OMC_LogAnalytics_DataSheetOMC_LogAnalytics_DataSheet
OMC_LogAnalytics_DataSheet
 
Active Directory Proposal
Active Directory ProposalActive Directory Proposal
Active Directory Proposal
 

Oim Poc1.0

  • 1. Phase 1.0 POC Mar 2010 Mohamed Atef MW Administrator
  • 2.
  • 3. WHY ORACLE IDENTITY MANAGEMENT Oracle Identity Management allows enterprises to manage end-to-end lifecycle of user identities across all enterprise resources both within and beyond the firewall. You can now deploy applications faster, apply the most granular protection to enterprise resources, automatically eliminate latent access privileges, and much more. Oracle Identity Management is a member of the Oracle Fusion Middleware family of products, which brings greater agility, better decision-making, and reduced cost and risk to diverse IT environments today.
  • 4. Oracle Identity Management Solutions Single Sign-On and Web Access Control: Oracle Access Manager (Protecting resources at a point of access and delegating authentication and authorization decisions to a central authority, help secure web, J2EE and enterprise applications). Oracle Enterprise Single Sign-On Suite Plus (Enterprise users can enjoy the benefits of single sign-on to all of their applications, whether they are connected to the corporate network, traveling away from the office, roaming between computers or working at a shared workstation). Directory Services: Oracle Internet Directory (Is an LDAP v3 compliant directory with meta-directory capabilities. It is built on the industry leading Oracle database and is fully integrated into Oracle Fusion Middleware and Oracle Applications). Oracle Virtual Directory (Creating a secure application environment requires integration of existing user identity information. For some companies, that information is contained in databases. Others use LDAP directories or Windows Domains. For most, this information is scattered across multiple locations and multiple services, provides Internet and industry-standard LDAP and XML views of existing enterprise identity information, without synchronizing or moving data from its native locations). Oracle Directory Server Enterprise Edition (Formerly “SUN Directory Server Enterprise Edition” is the best known directory server with proven large deployments in carrier and enterprise environments. It is also the most supported directory by ISVs, so it is ideal for heterogeneous environments. ODSEE provides a core directory service with embedded database, directory proxy, Active Directory (AD) synchronization and a Web administration console). Oracle Authentication Services for Operating Systems (Oracle Authentication Services for Operating Systems provides centralized authentication and account management for Unix and Linux platforms. This page contains information to get you started with Oracle Authentication Services for Operating Systems.).
  • 5. Oracle Identity Management Solutions Content Access Control: Oracle Information Rights Management (Formerly “SealedMedia” is a new form of information security technology that secures and tracks sensitive digital information everywhere it is stored and used, such as encrypting ("sealing") and classifying documents, emails and web pages, and the requirement to install Oracle IRM Desktop agent software on every end user device on which sealed information is created or used). Strong Authentication: Extended Identity Management Ecosystem (Organizations commonly have multiple security systems in place—one technology to secure physical access, another to secure legacy applications, and yet another to secure network access. To cope with these "silo'd" solutions, Oracle has partnered with best-of-breed ISVs to offer a central and effective means to enforce security policy across all enterprise resources. As part of the Oracle Identity Management Ecosystem, partner solutions seamlessly integrate into Oracle Identity Management solutions extend a common security and identity management framework across all enterprise applications). Oracle Adaptive Access Manager (Oracle Adaptive Access Manager consists of two primary components that together create one of the most powerful and flexible weapons in the war against fraud. Adaptive Strong Authenticator provides multifactor authentication and protection mechanisms for sensitive information such as passwords, PINs, security questions, account numbers and other credentials). Identity Administration: Oracle Identity Manager (Formerly known as “Oracle Xellerate Identity Provisioning”, is a powerful and flexible enterprise identity management system that automatically manages users' access privileges within enterprise IT resources). Oracle Role Manager (Previously known as “Bridgestream SmartRoles”, is an enterprise-class application for managing business and organizational role lifecycle management).
  • 6. Oracle Identity Management Solutions Federated Identity: Oracle Identity Federation (Significantly reduces the need to create unnecessary identity in an enterprise directory and lowers the ongoing costs of partner integrations through support of industry federation standards, protects existing IT investments by integrating with a wide variety of data stores, user directories, authentication providers and applications) Fine Grained Entitlements: Oracle Entitlements Server (Secures access to application resources and software components (such as URLs, EJBs, and JSPs) as well as arbitrary business objects (such as customer accounts or patient records). Oracle Entitlements Server policies specify which users, groups, and/or roles can access application resources, allowing those roles to be dynamically resolved at runtime). Oracle – Sun: Oracle Waveset (Providesoperational and business efficiency by providing complete automation of user accounts and entitlements provisioning into a variety of enterprise business applications. Oracle Waveset integrates automated identity lifecycle management with identity auditing capabilities, and makes it possible to manage these processes at the business role level). Oracle OpenSSO (Is a complete solution that provides Web access management, federated single sign-on and Web services security in a single, self-contained application).
  • 7. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 8. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 9. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 10. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 11. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 12. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 13. ETISALAT IDENTITY MANAGEMENT ARCHITECTURE PHASE 1 Oracle HRMS Administrator Oracle Identity Manager Oracle HRMS Active Directory Users Temp & Vendors Accounts Self Registration
  • 14.
  • 15.
  • 16. ORACLE IDENTITY MANAGER ARCHITECTURE The Oracle Identity Manager architecture has three tiers: Presentation tier Server tier Data & Enterprise Integration tier
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33.
  • 34.
  • 35.
  • 36.
  • 37.
  • 38.
  • 39.
  • 40.
  • 41.
  • 42.
  • 43.
  • 44.
  • 45.
  • 46.
  • 47.
  • 48.
  • 49.
  • 50.
  • 51.
  • 52.  
  • 53.
  • 54.
  • 55.
  • 56.
  • 57.
  • 58.
  • 59.
  • 60.