<p><b>Develop and Implement an End-to-End IAM Solution</b> Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. <i>Designing an IAM Framework with Oracle Identity and Access Management Suite</i> explains h
Designing an IAM Framework with Oracle Identity and Access Management Suite
β Scribed by Jeff Scheidel
- Publisher
- McGraw-Hill Osborne Media
- Year
- 2010
- Tongue
- English
- Leaves
- 369
- Series
- Osborne ORACLE Press Series
- Edition
- 1
- Category
- Library
No coin nor oath required. For personal study only.
β¦ Synopsis
Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management Suite explains how to reduce risk exposure by effectively managing your full spectrum of users. Learn how to create and provision accounts, employ strong authentication and authorization, integrate legacy applications, and handle regulatory compliance. The latest performance-testing, self-auditing, and business intelligence reporting techniques are also covered in this comprehensive resource. - Establish company requirements and develop implementation plans - Build and execute your identity business case - Set up accounts, roles, and provisioning workflows using Oracle Identity Manager and Analysis - Authenticate and authorize users with Oracle Access Manager - Enact strong authorization policies using Oracle Entitlements Server - Identify anomalous behavior and create proactive fraud prevention rules with Oracle Adaptive Access Manager - Enforce regulatory compliance and generate audit-ready reports - Learn about latest additions from the acquired Sun stack
β¦ Table of Contents
Contents......Page 12
Acknowledgments......Page 20
Introduction......Page 22
Part I: Defining the Value of and the Need for IAM......Page 30
1 Whoβs Where, and Why Do You Care?......Page 32
The Value of Identity to User and Enterprise......Page 33
The Value of Identity to the Enterprise......Page 35
The Value of Identity to the End User......Page 38
Getting What You Need from IAM......Page 40
2 Determining Your Need for an IAM Framework......Page 42
Starting from Scratch......Page 43
Replacing or Augmenting IAM......Page 46
Making the Business Case, Round One......Page 51
Part II: Preparing the Enterprise for IAM......Page 56
3 Planning an IAM Project......Page 58
Resources, Both Digital and Human......Page 59
Remembering the Goal......Page 63
Getting Ready to Break Things......Page 64
Determining Specific Requirements......Page 65
Governance by Committee......Page 67
4 Compliance Considerations......Page 74
What Compliance Typically Includes......Page 75
What Compliance Should Include......Page 76
Regulatory Compliance Laws......Page 83
The Takeaways......Page 94
5 Making the Business Case......Page 96
Round Two in Front of Management......Page 97
Return on Investment (ROI)......Page 100
Asking for Help, One More Time......Page 103
Finalizing the Request......Page 104
6 Achieving Pitfalls: Common Mistakes in IAM......Page 106
Mistakes Both Large and Small......Page 107
Part III: The Oracle Identity and Access Solution......Page 114
7 Designing an Oracle IAM Framework......Page 116
The Latest and Greatest......Page 117
The Purpose of the Framework......Page 119
The Oracle Identity Suite......Page 120
Defining Your Organization, Top to Bottom......Page 121
Defining Your Resources......Page 122
Source(s) of Truth and Authority......Page 124
Populate Your Authoritative Source(s)......Page 131
Enabling Your Population: Roles, Privileges, and Access......Page 132
Authenticating and Authorizing Your Population......Page 138
Governance, Compliance, and Reporting in the Design......Page 142
Centralized and Delegated Administration......Page 145
Security in the Development Process......Page 146
The End Process: Termination......Page 147
Deciding When Design Is Completed......Page 150
8 User Account Creation......Page 152
Bulk Loading......Page 153
HR Event......Page 155
Self-Registration......Page 156
Universal Requirements......Page 157
9 Provisioning: Now That Iβm In, What Can I Have?......Page 160
Oracle Provisioning......Page 162
Organizations and Groups......Page 165
Defined Resources and Connectors......Page 166
User Profiles......Page 168
Workflow Definitions......Page 171
Manual Provisioning......Page 177
Automated Provisioning......Page 178
Role-Based Provisioning......Page 181
Database Security and Provisioning......Page 186
Reporting and Compliance......Page 187
10 Authentication and SSO: Accessing What Iβve Been Granted......Page 190
Authentication Architecture......Page 191
Simple Authentication......Page 194
Strong Authentication, Historically......Page 199
11 Authorization: Now That Iβve Got It, How Do I Get to It?......Page 210
Layers of Authorization......Page 211
Coarse-Grained Authorization......Page 213
Fine-Grained Entitlements......Page 217
Federation......Page 223
Database Security......Page 227
12 Compliance Support......Page 230
Common Elements of Regulatory Compliance......Page 231
Certification: The Ugliest Compliance Process?......Page 240
Reconciliation of User Accounts......Page 247
Segregation of Duties......Page 249
Audit Support......Page 256
13 The Time Bomb Everybody Forgets: Things Change......Page 264
Impact Analysis......Page 266
Changes to Users and Policies......Page 267
Changes to the Organization......Page 271
Changes to Resources......Page 273
Accepting Recommendations from Auditors......Page 278
Changes to Infrastructure......Page 279
14 Legacy Considerations......Page 282
Definition of Legacy......Page 283
IAM Components to Keep......Page 284
IdM Discards......Page 288
IdM Sources to Mine for Data......Page 289
Legacy Business Components......Page 294
15 Testing Your Framework......Page 298
Incremental Testing......Page 299
Regression Testing......Page 302
Load Testing......Page 303
Penetration Testing......Page 305
Part IV: Pre- and Post-Implementation Advice......Page 308
16 Choosing Software......Page 310
Buy vs. Build......Page 311
So Youβve Decided to Build......Page 312
So Youβve Decided to Buy (or at Least Shop)......Page 313
Cloud Computing......Page 327
One Last Thing about Vendors......Page 328
17 Getting Help with Your IAM Project......Page 330
Types of External Resources......Page 331
When the Seller and the Builder Are a Package Deal......Page 332
Small-to-Medium Integrators......Page 333
Transfer of Knowledge......Page 334
Keeping the Peace......Page 335
18 Notes on the Actual Implementation......Page 338
Keep People in the Loop (Sort Of)......Page 339
Governance......Page 340
Cut-Overs......Page 342
Training......Page 343
Control the Communications......Page 345
Establish Ownership and Responsibilities......Page 347
19 Post-Implementation: Keeping the Framework Running......Page 348
Adoption......Page 349
Show Results......Page 350
Accountability......Page 351
Monitor, Maintain, Modify......Page 352
Standards Support......Page 354
What Did We Learn From All of This?......Page 356
A......Page 358
B......Page 359
C......Page 360
F......Page 361
I......Page 362
M......Page 363
O......Page 364
P......Page 365
R......Page 366
S......Page 367
T......Page 368
X......Page 369
β¦ Subjects
ΠΠΈΠ±Π»ΠΈΠΎΡΠ΅ΠΊΠ°;ΠΠΎΠΌΠΏΡΡΡΠ΅ΡΠ½Π°Ρ Π»ΠΈΡΠ΅ΡΠ°ΡΡΡΠ°;Oracle;
π SIMILAR VOLUMES
This book presents a process-based approach to implementing Oracleβs Identity and Access Management Suite. Learn everything from basic installation through to advanced topics such as leveraging Oracle Virtual Directory and Identity Federation. Also covered is integrating with applications such as Or
<p>Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data encryption, you will learn to work with transparent data, back-up, and networks. You will then go through the key principles of audits, where you will get to know more ab
Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data encryption, you will learn to work with transparent data, back-up, and networks. You will then go through the key principles of audits, where you will get to know more about
Focus on the security aspects of designing, building, and maintaining a secure Oracle Database application. Starting with data encryption, you will learn to work with transparent data, back-up, and networks. You will then go through the key principles of audits, where you will get to know more about
This book is written in a simple, easy to understand format with lots of screenshots and step-by-step explanations. If you are an IDAM or database administrator looking to carry out administration tasks right that begin with installation,and configuration, then this guide is for you. You need not ha