Академический Документы
Профессиональный Документы
Культура Документы
Problem Statements
More regulations than ever…
?
Report and audit
a – Security administrator
b – CFO
c – The 3-peat summer intern who is now
working for your competitor
Q: How secure is your
identity data?
ce
na n t i on
r en
ove re v
ty G P
nti r aud
I d e F
Auditors & Regulators Identity Thieves
ent i ty
em cur
na g Se
M a t er
e nt - Ce n
l e m t a
En
ti t Da
Rogue Employees Privileged Users
Identity Governance
Value Propositions
Business Requirements for IT Security
20
Oracle Identity Management
Four C’s of Success
Procure-To-Pay Process
• Automate user management, manage
Financials
entitlements, enforce segregation of duties
Issue
Payment • Link HR employee data to user accounts
DBA
• Automate security management of shared
accounts
How Can Identity Management Help?
Compliance & Fraud Mgmt. For Financial Services
Identity Management
• User Provisioning
• Role Management
Information
• Entitlements Management
• Risk-Based Access Control
Infrastructure • Virtual Directories
Databases
Information Rights Management
Applications
• Document-level access control
Content
• All copies, regardless of location
(even beyond the firewall)
• Auditing and revocation
34
Oracle Confidential
34
Information Centric Security Solutions
Content
INFORMATION
RIGHTS Centralized Document Revocation (Digital Document Activity
Access Control Shredding) Monitoring and Audit
MANAGEMENT
Applications
IDENTITY
AND ACCESS Identity Access
Administration Directory Services Management
MANAGEMENT
Databases
<Insert Picture Here>
Access Manager
Adaptive Access Manager Directory Server EE
Identity Manager
Enterprise Single Sign-On Internet Directory
Identity Federation Virtual Directory
Entitlements Server
Identity & Access Governance
Identity Analytics
Operational Manageability
*Access Management includes Oracle OpenSSO STS and Oracle OpenSSO Fedlet
5 variations of the suite solution and product slides
Oracle’s Identity Management Portfolio
Operational Manageability
*Access Management includes Oracle OpenSSO STS and Oracle OpenSSO Fedlet
5 variations of the suite solution and product slides
Oracle’s Identity Management Suite
• End-to-end authentication,
single sign-on, and fine
grained application protection
• Enhanced Manageability
• Centralized Server and Agent Administration
• Inline Diagnostics and Troubleshooting
• Pluggable authentication,
flexible identity assertion
• Compliance auditing
Oracle Access Manager
Oracle HTTP Server Deployed
Application
Authentication
Portals
Fedlet for
Affiliates
Fraud Prevention
• Centralized policy
administration, dashboards,
investigation/forensics tools
Authentication & Fraud Prevention
Oracle Adaptive Access Manager
Secure
Login Model Analysis and Detect
Risk Forensics Anomalies
Evaluate
transactions
Challenge
or Block
• Authentication Security
• Real-time Anomaly Detection
• Proactive Fraud Prevention
• Reporting and forensics
Security for Applications
• Consolidated application
security policy
• Enforcement across
application and data tiers
App
App
Application
Oracle Access
App
App
Management Suite
App
• Hard-coded security policies • Externalized entitlements
• Brittle policy management • Agile business policies
• Application policy silos • Centralized policy management
Entitlements Management
Entitlements Administration Authorization Enforcement
Application
App
policy
Client-Side Server-Side
Agents Option Agents Option
Gateway Option (Last-Mile Security)
User
Self registration Social Networking
Single
View
LDAP
Centralized Management of DBAs
Integration with Active Directory
LDAP SoD for Privileged DBA Access
Oracle
Virtual
Directory DB Vault
Finance DBA
HR
App A Finance
CRM
App B
CRM DBA
Identity as a Service
Web Services
search.oracle.com
Identity management
or
oracle.com