SlideShare a Scribd company logo
<Insert Picture Here>




Introducing Oracle Entitlements Server 11g
This document is for informational purposes.        It is not a
    commitment to deliver any material, code, or functionality, and
    should not be relied upon in making purchasing decisions. The
    development, release, and timing of any features or functionality
    described in this document remains at the sole discretion of
    Oracle.     This document in any form, software or printed
    matter, contains proprietary information that is the exclusive
    property of Oracle. This document and information contained
    herein may not be disclosed, copied, reproduced or distributed to
    anyone outside Oracle without prior written consent of
    Oracle. This document is not part of your license agreement nor
    can it be incorporated into any contractual agreement with Oracle
    or its subsidiaries or affiliates.




2
Agenda

                                                 <Insert Picture Here>



    • Oracle Entitlements Server Overview
    • Oracle Entitlements Server 11g – What’s New?
    • Planning Your Deployment (SENA Systems)




3
Homegrown Applications Pose Significant Risk

    • Vast Majority of Apps are Homegrown
    • 50% of applications budgets on in-house
      software *
    • Homegrown Apps often host sensitive
      information
    • Homegrown Apps are more vulnerable to
      security breaches




     * For large companies in competitive, fast-moving industries such as
     telecommunications, financial services, high tech, pharmaceuticals, and
     media, those outlays can run into hundreds of millions of dollars.



4
State of Security Solutions Today




    Homegrown Apps,            Cloud Applications         Mobile Computing
     SOA, and Portals
                               • Evolving security        • Modern IT initiatives
                                 needs and compliance       require enforcement of
    • Security policies are
                                 mandates require           granular access
      fragmented
                                 constant application       privileges
    • Often host sensitive
                                 retooling resulting in   • Insufficient tooling and
      information that is
                                 higher costs and           support for developing
      vulnerable to security
                                 diminished service         apps that require fine-
      risks.
                                 levels.                    grained authorization




5
Declarative Security
         Examples

Users            Roles            Privileges                  Resource                      Context


                                  Equity Trades            Mortgage Equity      •    NASDAQ trading 10am-4pm
                                                             Fund                 •    Restrict Trade Sizes to < $100K
                                   • By Geography
                                                             Municipal Equity    •    Daily trading limit of $5M
                                   • By Trade limit          Fund
Amy Harris      Junior Traders


                                                                                  •    Unauthorized for trading
                                  Equity Research           Oil & Gas
                                                                                  •    Authorized for Review of Energy
                                   • By Vertical industry     Semiconductors         Companies listed on NYSE
                                   • By Line of Business                          •    Authorized for access to research
                                                                                      reports
Ellen Stewart   Equity Analyst



                                                             Mortgage Equity     •    Authorized for 24x7 Trading
                                   Equity Trades             Fund                •    Rebalancing of Small-Cap Funds
                                   Rebalance Funds           Municipal Equity   •    Daily Trading Limit of $1B
                                                              Fund

Steve Jackson   Fund Manager
Oracle
Entitlements
Server
Fine-grained
Authorization for
Web Applications,
Portals, Middleware
& Databases
Oracle Entitlements Server
    Sample Fine-grained Authorization Policies


    • Example Policies
       • Junior Traders can submit nstock trades / day with a total value of $5M, during regular
         trading hours, if market volatility is low

       • Sensitive patient information should not be visible to clerical workers but allowed for
         Specialists as long as consent has been given or an emergency

       • Call Center Reps need approval from a Supervisor to transfer a support case to
         Engineering

       • Documents of a given type, sensitivity, and content is only available to employees of
         (x,y,z) with sufficient clearance, grade, and authentication level




8
Announcing
    Standards-based, Real-time External
                          Authorization




9
Oracle Entitlements Server 11g
     Key Design Themes




      Real-time      Rapid Application   Comprehensive
     Authorization      Integration      Standards Support




10
Real-time Authorization
        with Oracle Entitlements Server 11g


     • Massively scalable External Authorization
       Management

     • Scales easily to large number of protected
       resources

          • Hundreds of millions of users

          • Thousands of roles

          • From small workgroups to mission-critical
            deployments

     • Authorization checks enforced with real-time
       latency




11
Oracle Entitlements Server 11g
     Key Design Themes




       Real-time        Rapid       Comprehensive
      Authorization   Application   Standards Support
                      Integration




12
Fine-grained Authorization for SOA & Web Services

                                                                        isAuthorized(user     = Bob Doe,
                                                                        userOrg = Acme Corp
                                                             Request    userRole = Marketing Manager
                                                                        customerId   = 99999
                     HTTP GET/POST                                      action       =getCustomerDetail)

  Web
 Client                    REST



                           XML

   Web                                                                                                       SOAP Web
                        REST/SOAP                                                                            Service
Service
 Client
                           JMS
                                                                   <SOAP:Envelope>
                                                                    …
                                                                   <SOAP:Body>
                                                                   <getCustomerDetailResponse>
                                                                   <customerID>99999</customerID>
                                                                   <name> Sally Smith </name>
                                  Oracle Entitlements Server       <phone> 555-1234567 </phone>
                                                                   <SSN>***********</SSN>
                                                                   <creditCardNo>@^*%&@$#%!</creditCardNo>
                                                                   <purchaseHistory> … </purchaseHistory>
  •Selective Data Redaction & Encryption of the         Response   </getCustomerDetailResponse>
   response payload                                                </SOAP:Body>
                                                                   </SOAP:Envelope>
  •OES authorization decision returns an “Obligation”
   with information on what to redact and/or encrypt




 13
Data Security
     withOracle Entitlements Server




                        Security Module                        Security Module




                                              Oracle
                                            Entitlements
                         Security Module   Server (Admin       Security Module
                                              Server)




     • Enforcement of data security for heterogeneous data sources
          - RDBMS, Object Relational, XML, Multi-Dimensional Cubes
     • Enforcement of security at Data, Business Logic and Presentation tiers
     • Integrates with Oracle and non-Oracle Databases, Hibernate, TopLink



14
Native & Custom Integrations

     Portals and Content Management   Identity Management




     App Servers & Dev Frameworks     XML Gateways




     Middleware                       Data Sources




15
Oracle Entitlements Server 11g
     Key Design Themes




       Real-time      Rapid Application    Comprehensive
      Authorization      Integration      Standards Support




16
Comprehensive Standards Support
     with Oracle Entitlements Server 11g

     • Supports modern authorization standards
         • Attribute based Access (ABAC, XACML, OpenAZ)
         • Role based Access (NIST RBAC, Enterprise RBAC)
         • Java security frameworks (JAAS)

     • Choice and flexibility ensures protection of existing investments
     • Supports different IT maturity levels for externalizing authorization
     • Commitment to innovation, contribution and implementation of
       open standards.




17
18| © 2011 Oracle Corporation – Proprietary and Confidential

More Related Content

PPTX
Scaling identity to internet proportions
PPTX
Gartner iam 2011-analytics-aj-orig-recordednp-final
PPTX
Ioug webcast entitlements in check
PDF
Cso oow12-summit-sonny-sing hv4
PPTX
A better waytosecureapps-finalv1
PDF
Od webcast-cloud-fraud final
PPT
Healthcare it consolidated
PPTX
Round table guide
Scaling identity to internet proportions
Gartner iam 2011-analytics-aj-orig-recordednp-final
Ioug webcast entitlements in check
Cso oow12-summit-sonny-sing hv4
A better waytosecureapps-finalv1
Od webcast-cloud-fraud final
Healthcare it consolidated
Round table guide

What's hot (17)

PDF
Oracle_Cisco identity platform approach_webcast
PPTX
Platform approach-series-the oracleplatform-final
PPTX
Oracle security-formula
PDF
Manpower group idm-platform
PDF
Sun2 oracle avea's identity management platform transformation
PPTX
Biz case-keynote-final copy
PPTX
Df2012 securing information_assets_in_saa_s_clouds_3_0
PDF
Platform approach-series-building a-roadmap-finalv1
PDF
Building a Strong Foundation for Your Cloud with Identity Management
PDF
Overview of Identity and Access Management Product Line
PPTX
Con8833 access at scale for hundreds of millions of users final
PPTX
Securing access inabyod-world-final-ext
PPSX
ITIL - IAM (Access Management)
PDF
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
PDF
The Revolution in Licensing - Cloud-Based Licensing
PPTX
Con8808 enabling business growth in the new economy final
PPTX
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Oracle_Cisco identity platform approach_webcast
Platform approach-series-the oracleplatform-final
Oracle security-formula
Manpower group idm-platform
Sun2 oracle avea's identity management platform transformation
Biz case-keynote-final copy
Df2012 securing information_assets_in_saa_s_clouds_3_0
Platform approach-series-building a-roadmap-finalv1
Building a Strong Foundation for Your Cloud with Identity Management
Overview of Identity and Access Management Product Line
Con8833 access at scale for hundreds of millions of users final
Securing access inabyod-world-final-ext
ITIL - IAM (Access Management)
CIS13: Avoiding the Pitfalls of Managing IAM for a Hybrid Environment
The Revolution in Licensing - Cloud-Based Licensing
Con8808 enabling business growth in the new economy final
Role Discovery and RBAC Design: A Case Study with IBM Role and Policy Modeler
Ad

Viewers also liked (20)

PDF
Festa della madre della salvezza (mini book)
PDF
Dskp rbt tahun 6
PDF
China in African Agriculture - Henry Tugendhat
PDF
PPTX
Katie & demi audience american hustle
PDF
Puusniekka: Tupakointi ammatillisissa oppilaitoksissa – tuloksia Kouluterveys...
PPTX
Aparato digestivo
DOC
S t o r y b o a r d
PDF
AWS for everyone - 「今」からはじめるAWS@JAWS-UG 東北
PDF
Estrategias de venta en la internacionalización
PDF
Decisão de Celso de Mello de manter Moreira Franco
DOCX
Summary for rough edit two idiots and a lady
PDF
SafePeak - How to configure SQL Server agent in a safepeak deployment
PPTX
Acc 626 slidecast
PDF
Wellbeing 2011 Fact Sheet English
PPTX
Top 5 australian rock bands
PPS
Manal p.
PPTX
Alternate Concepts, Quotes, ideologies, Ideas o…
PPTX
Project presentation1
PDF
Bewonersbedrijf na tekening
Festa della madre della salvezza (mini book)
Dskp rbt tahun 6
China in African Agriculture - Henry Tugendhat
Katie & demi audience american hustle
Puusniekka: Tupakointi ammatillisissa oppilaitoksissa – tuloksia Kouluterveys...
Aparato digestivo
S t o r y b o a r d
AWS for everyone - 「今」からはじめるAWS@JAWS-UG 東北
Estrategias de venta en la internacionalización
Decisão de Celso de Mello de manter Moreira Franco
Summary for rough edit two idiots and a lady
SafePeak - How to configure SQL Server agent in a safepeak deployment
Acc 626 slidecast
Wellbeing 2011 Fact Sheet English
Top 5 australian rock bands
Manal p.
Alternate Concepts, Quotes, ideologies, Ideas o…
Project presentation1
Bewonersbedrijf na tekening
Ad

Similar to Declarative security-oes (20)

PPT
Compliance and Governance Through Complex Entitlement Management
PPTX
Enterprise Access Control Patterns for REST and Web APIs Gluecon 2011, Franco...
PDF
Sa202 Sn
PPTX
A Lap around Microsoft .NET Services
PPT
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
PPTX
SANS Institute Product Review of Oracle Identity Manager
PPTX
SANS Institute Product Review: Oracle Entitlements Server
PDF
Ria Enterprise
PPTX
API Security and Management Best Practices
PDF
Csooow12 amit-jasuja-securing-new-experience6
PDF
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
PDF
I Phone Dev
PPTX
Enterprise API Security & Data Loss Prevention - Intel
PDF
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
PDF
API Security with OAuth2.0.
PDF
Wallix AdminBastion - Privileged User Management &amp; Access Control
PDF
Taking a Pragmatic Look at the Salesforce Security Model
PPT
Building an Effective Identity Management Strategy
PPT
Tech Executives Risk Mgmt And It Gov Frm Iam Persp Nov13
PDF
Layer 7: 2010 RSA Presentation on REST and Oauth Security
Compliance and Governance Through Complex Entitlement Management
Enterprise Access Control Patterns for REST and Web APIs Gluecon 2011, Franco...
Sa202 Sn
A Lap around Microsoft .NET Services
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review: Oracle Entitlements Server
Ria Enterprise
API Security and Management Best Practices
Csooow12 amit-jasuja-securing-new-experience6
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
I Phone Dev
Enterprise API Security & Data Loss Prevention - Intel
Security Challenges in Cloud Integration - Cloud Security Alliance, Austin Ch...
API Security with OAuth2.0.
Wallix AdminBastion - Privileged User Management &amp; Access Control
Taking a Pragmatic Look at the Salesforce Security Model
Building an Effective Identity Management Strategy
Tech Executives Risk Mgmt And It Gov Frm Iam Persp Nov13
Layer 7: 2010 RSA Presentation on REST and Oauth Security

More from OracleIDM (20)

PPTX
Con9573 managing the oim platform with oracle enterprise manager
PPTX
Con9024 next generation optimized directory - oracle unified directory - final
PPTX
Con8902 developing secure mobile applications-final
PPTX
Con8896 securely enabling mobile access for business transformation - final
PPTX
Con8837 leverage authorization to monetize content and media subscriptions ...
PPTX
Con8836 leveraging the cloud to simplify your identity management implement...
PPTX
Con8834 bring your own identity - final
PPTX
Con8828 justifying and planning a successful identity management upgrade final
PPTX
Con8823 access management for the internet of things-final
PPTX
Con8819 context and risk aware access control any device any where - final
PPTX
Con8817 api management - enable your infrastructure for secure mobile and c...
PPTX
Con8813 securing privileged accounts with an integrated idm solution - final
PPTX
Con8811 converged identity governance for speeding up business and reducing c...
PPTX
Con 8810 who should have access to what - final
PPTX
Opening remarks-dave-profozichv2
PPTX
Innovations dbsec-12c-pub
PPTX
Identityofthings amitjasuj av10
PDF
Identityofthings amitjasuj av10
PPTX
Trends gartner iam-amit12-4-12-v1
PPTX
Trends gartner iam-amit12-4-12
Con9573 managing the oim platform with oracle enterprise manager
Con9024 next generation optimized directory - oracle unified directory - final
Con8902 developing secure mobile applications-final
Con8896 securely enabling mobile access for business transformation - final
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8836 leveraging the cloud to simplify your identity management implement...
Con8834 bring your own identity - final
Con8828 justifying and planning a successful identity management upgrade final
Con8823 access management for the internet of things-final
Con8819 context and risk aware access control any device any where - final
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8813 securing privileged accounts with an integrated idm solution - final
Con8811 converged identity governance for speeding up business and reducing c...
Con 8810 who should have access to what - final
Opening remarks-dave-profozichv2
Innovations dbsec-12c-pub
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Modernizing your data center with Dell and AMD
PPT
Teaching material agriculture food technology
PDF
Review of recent advances in non-invasive hemoglobin estimation
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
A Presentation on Artificial Intelligence
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
cuic standard and advanced reporting.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
Building Integrated photovoltaic BIPV_UPV.pdf
MYSQL Presentation for SQL database connectivity
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
20250228 LYD VKU AI Blended-Learning.pptx
Diabetes mellitus diagnosis method based random forest with bat algorithm
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Modernizing your data center with Dell and AMD
Teaching material agriculture food technology
Review of recent advances in non-invasive hemoglobin estimation
The AUB Centre for AI in Media Proposal.docx
Encapsulation_ Review paper, used for researhc scholars
A Presentation on Artificial Intelligence
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectral efficient network and resource selection model in 5G networks
Mobile App Security Testing_ A Comprehensive Guide.pdf
NewMind AI Monthly Chronicles - July 2025
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
cuic standard and advanced reporting.pdf
Network Security Unit 5.pdf for BCA BBA.

Declarative security-oes

  • 1. <Insert Picture Here> Introducing Oracle Entitlements Server 11g
  • 2. This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates. 2
  • 3. Agenda <Insert Picture Here> • Oracle Entitlements Server Overview • Oracle Entitlements Server 11g – What’s New? • Planning Your Deployment (SENA Systems) 3
  • 4. Homegrown Applications Pose Significant Risk • Vast Majority of Apps are Homegrown • 50% of applications budgets on in-house software * • Homegrown Apps often host sensitive information • Homegrown Apps are more vulnerable to security breaches * For large companies in competitive, fast-moving industries such as telecommunications, financial services, high tech, pharmaceuticals, and media, those outlays can run into hundreds of millions of dollars. 4
  • 5. State of Security Solutions Today Homegrown Apps, Cloud Applications Mobile Computing SOA, and Portals • Evolving security • Modern IT initiatives needs and compliance require enforcement of • Security policies are mandates require granular access fragmented constant application privileges • Often host sensitive retooling resulting in • Insufficient tooling and information that is higher costs and support for developing vulnerable to security diminished service apps that require fine- risks. levels. grained authorization 5
  • 6. Declarative Security Examples Users Roles Privileges Resource Context  Equity Trades Mortgage Equity • NASDAQ trading 10am-4pm Fund • Restrict Trade Sizes to < $100K • By Geography  Municipal Equity • Daily trading limit of $5M • By Trade limit Fund Amy Harris Junior Traders • Unauthorized for trading  Equity Research Oil & Gas • Authorized for Review of Energy • By Vertical industry  Semiconductors Companies listed on NYSE • By Line of Business • Authorized for access to research reports Ellen Stewart Equity Analyst Mortgage Equity • Authorized for 24x7 Trading  Equity Trades Fund • Rebalancing of Small-Cap Funds  Rebalance Funds  Municipal Equity • Daily Trading Limit of $1B Fund Steve Jackson Fund Manager
  • 8. Oracle Entitlements Server Sample Fine-grained Authorization Policies • Example Policies • Junior Traders can submit nstock trades / day with a total value of $5M, during regular trading hours, if market volatility is low • Sensitive patient information should not be visible to clerical workers but allowed for Specialists as long as consent has been given or an emergency • Call Center Reps need approval from a Supervisor to transfer a support case to Engineering • Documents of a given type, sensitivity, and content is only available to employees of (x,y,z) with sufficient clearance, grade, and authentication level 8
  • 9. Announcing Standards-based, Real-time External Authorization 9
  • 10. Oracle Entitlements Server 11g Key Design Themes Real-time Rapid Application Comprehensive Authorization Integration Standards Support 10
  • 11. Real-time Authorization with Oracle Entitlements Server 11g • Massively scalable External Authorization Management • Scales easily to large number of protected resources • Hundreds of millions of users • Thousands of roles • From small workgroups to mission-critical deployments • Authorization checks enforced with real-time latency 11
  • 12. Oracle Entitlements Server 11g Key Design Themes Real-time Rapid Comprehensive Authorization Application Standards Support Integration 12
  • 13. Fine-grained Authorization for SOA & Web Services isAuthorized(user = Bob Doe, userOrg = Acme Corp Request userRole = Marketing Manager customerId = 99999 HTTP GET/POST action =getCustomerDetail) Web Client REST XML Web SOAP Web REST/SOAP Service Service Client JMS <SOAP:Envelope> … <SOAP:Body> <getCustomerDetailResponse> <customerID>99999</customerID> <name> Sally Smith </name> Oracle Entitlements Server <phone> 555-1234567 </phone> <SSN>***********</SSN> <creditCardNo>@^*%&@$#%!</creditCardNo> <purchaseHistory> … </purchaseHistory> •Selective Data Redaction & Encryption of the Response </getCustomerDetailResponse> response payload </SOAP:Body> </SOAP:Envelope> •OES authorization decision returns an “Obligation” with information on what to redact and/or encrypt 13
  • 14. Data Security withOracle Entitlements Server Security Module Security Module Oracle Entitlements Security Module Server (Admin Security Module Server) • Enforcement of data security for heterogeneous data sources - RDBMS, Object Relational, XML, Multi-Dimensional Cubes • Enforcement of security at Data, Business Logic and Presentation tiers • Integrates with Oracle and non-Oracle Databases, Hibernate, TopLink 14
  • 15. Native & Custom Integrations Portals and Content Management Identity Management App Servers & Dev Frameworks XML Gateways Middleware Data Sources 15
  • 16. Oracle Entitlements Server 11g Key Design Themes Real-time Rapid Application Comprehensive Authorization Integration Standards Support 16
  • 17. Comprehensive Standards Support with Oracle Entitlements Server 11g • Supports modern authorization standards • Attribute based Access (ABAC, XACML, OpenAZ) • Role based Access (NIST RBAC, Enterprise RBAC) • Java security frameworks (JAAS) • Choice and flexibility ensures protection of existing investments • Supports different IT maturity levels for externalizing authorization • Commitment to innovation, contribution and implementation of open standards. 17
  • 18. 18| © 2011 Oracle Corporation – Proprietary and Confidential

Editor's Notes

  • #5: The problem is that some of the most mission critical applications are still home grown. This is especially true in industries where the line of business applications can provide a competitive advantage. Today 50% of application budgets are spent on Home grown apps.In Financial services – trading platforms and wealth management applications are a competitive advantage and are typically home grown In health care – the claims management and optimization systems These applications also hold the most critical information for a business – This would be consumer information, product data and market information. These applications are usually at the top of the audit list for most regulated companies. These apps are also the most vulnerable because the security is typically hard coded into the application and difficult to change. Most of these applications have the toughest audit constraints.When new regulations come out companies have to spend millions of dollars to retool the applications and developers re-invent security policy within the application. In cases like Societe General its just a matter of time before an insider outsmarts the system.To reduce the risk companies need a solution that will separate access to data and transactions in a policy driven solution that can change without re-tooling the application and provide high scale authorization to grow with the business