SlideShare a Scribd company logo
Oracle tech fmw-05-idm-neum-16.04.2010
Oracle Identity Management:
Improving Security and Compliance

Duško Vukmanović
Senior Sales Consultant
The following is intended to outline our general
product direction. It is intended for information
purposes only, and may not be incorporated into any
contract. It is not a commitment to deliver any
material, code, or functionality, and should not be
relied upon in making purchasing decisions.
The development, release, and timing of any
features or functionality described for Oracle’s
products remains at the sole discretion of Oracle.
More breaches than ever…


          Data Breach                  Once exposed, the data is out there – the bell can’t be un-rung
                                                            PUBLICLY REPORTED DATA BREACHES
                                      400



                                      300
                                                                630%
                                                              Increase
                                      200



                                      100
               Total Personally
        Identifying Information
             Records Exposed             0
                       (Millions)
                                                     2005             2006       2007         2008


                               Average cost of a data breach $202 per record
                           Average total cost exceeds $6.6 million per breach

Source: DataLossDB, Ponemon Institute, 2009 - http://datalossdb.org
http://www.privacyrights.org/ar/ChronDataBreaches.htm
More threats than ever…




          70% attacks originate inside the firewall
90% attacks perpetrated by employees with privileged access
More regulations than ever…




                                                             • Federal, state, local,
                                                             industry…adding more
                                                              mandates every year!
                                                        • Need to meet AND demonstrate
                                                                   compliance
                                                             • Compliance costs are
                                                                 unsustainable
     ?                Report and audit

                                     90% Companies behind in compliance


Source: IT Policy Compliance Group, 2007.
Higher Costs Than Ever…




• User Management Costs
• User Productivity Costs
    • Compliance &
   Remediation Costs
   • Security Breach
   Remediation Costs        $   It Adds Up
IdM Delivers Sustainable Compliance


• Enforces Segregation of Duties

• Restricts Access

• Automates access management

• Automates compliance reports

• Automates attestation
IdM Centralizes & Strengthens Security

• Centralized security and policy management
  – Consistent policies enforced across enterprise
  – Accelerated compliance with evolving mandates

• Automated provisioning / de-provisioning
  – Role based user provisioning and de-provisioning
  – Automated updates triggered by user status change

• Single Sign-On, Delegated Administration, Risk-
  based Access
  – Reduce password compromises
  – Delegate policy administration to business owners
  – Proactively defend against sophisticated security
    threats
IdM Streamlines IT Efficiency

   • Lower Administrative costs
         – Cost savings via reduced help desk calls
         – Automated and aggregated audit reporting


   • Enhanced User Productivity
         – Reduce time to access systems from days to minutes
         – Automated provisioning – 212% ROI within 6 months1

   • Enhanced IT Productivity
         – Developers re-use centralized security functions
         – Accelerated application deployments



1 – Forrester Research Report – TEI Study of Oracle Identity Manager 2008
Oracle Security Inside Out

                                                                            Database Security
                                                                        •   Encryption and Masking
                                                                        •   Privileged User Controls
                                                                        •   Multi-Factor Authorization
                                                                        •   Activity Monitoring and Audit
                                                                        •   Secure Configuration


                                                                       Identity Management
                                                                        •   User Provisioning
                                                                        •   Role Management
Information
                                                                        •   Entitlements Management
                                                                        •   Risk-Based Access Control
              Infrastructure                                            •   Virtual Directories

                               Databases
                                                                    Information Rights Management
                                           Applications

                                                          Content
                                                                        • Document-level access control
                                                                        • All copies, regardless of location
                                                                          (even beyond the firewall)
                                                                        • Auditing and revocation
Oracle’s Identity Management
   Comprehensive Suite of Best-Of-Breed Products


  Identity Admin.       Access Management          Directory Services

                          Access Manager
  Identity Manager                                  Internet Directory
                     Adaptive Access Manager
                     Enterprise Single Sign-On
    Role Manager                                    Virtual Directory
                         Identity Federation
                        Entitlements Server




      Audit & Compliance                       Manageability
Identity & Access Management Suite       Enterprise Manager IdM Pack
Oracle Identity Administration
  Sustainable Compliance With High ROI


                                                             E-Mail




Directory Server
                                                           Databases
                                                          & OS/Legacy
                   Identity & Role Reconciliation




HR Applications
                                                          Applications




                                        Identity Data
Other Sources
                                                        Physical Security
Role Based User Provisioning
                                  Oracle Identity Manager

                                                   GRANT
                                                    REVOKE


                                                   GRANT
                                                    REVOKE

                                                   GRANT
                                                    REVOKE




      Employee        HR System       Approval               Applications
    Joins / Departs                  Workflows


•   Automate Roles Based Provisioning / Deprovisioning
•   Identify orphaned accounts
•   Report on “Who has access to what”
•   Self-service requests
Automated De-Provisioning



                                                Manual Task        Revoked
                                                                  Cell Phone
                    Identity Lifecycle Management



                                     Identity
                                      Store
Terminated   HRMS   Reconciliation              Provisioning    Connector
Employee               Engine                     Workflow




                                                                Revoked
                                                               Applications
Self Service and Delegated Admin

     Delegated Admin                  Self-Service




  Manager assigning proxy user   User doing password reset


• Self Service Account Requests
• Delegated Administration
• Password Reset and Profile Management
Role Management
                                                  E-mail App

                              Business Role
                                                  General Ledger App



                             Assigned Project     CRM App




                                Location          UK Benefits App




•   Centralized role management
•   Role and rule-based provisioning
•   Map business roles to IT roles & privileges
•   Multi-dimensional role hierarchies
Oracle Access Management Suite
   Centralized Security and Improved Business Agility




 Kerberos &
 Basic Auth.         Single Sign On Across Enterprise     Portals



                    Risk-based Strong Authentication
Secure Mutual
Authentication
                       Entitlements Management
                                                        Packaged Apps

                      Standards-based Federation
  Biometric




                                                        Custom Apps
 Smart Card
Entitlements Management

                 Before                           After




                                                                App
                                       App
        Application



                                              Oracle Access




                                                                      App
                                 App
                                             Management Suite




                                                  App
• Hard-coded security policies      • Externalized entitlements
 • Brittle policy management         • Agile business policies
   • Application policy silos    • Centralized policy management
Challenges With Entitlements

• Are subject to massive proliferation & “creep”
• Need to rely upon lots of context before making a decision
• Must work hand-in-hand with your existing Identity Management and
  Provisioning solutions
• Should be consistent across implementations
• Policies can and do evolve independently from your application’s
  requirements
• Entitlements implemented inside your application code are hard to
  change

                              Bottom Line:
        Changing your policies means changing your applications
Risk-Based Access Control


                           Oracle Access Management Suite
                  Secure Mutual                        Risk-Based
                  Authentication       Risk Scoring   Authorization

                                         Device
                                       Geography
                                          Time
                                         Activity




• Real time fraud prevention
• “Auto Learning” behavior profiling
• Pattern and anomaly detection
Oracle Directory Services
Rapid Application Deployment Accelerates IT Agility



                                                              Any Application




                                     Standard LDAP & Java APIs

                                   Dynamically binds at Runtime                 Oracle Virtual
                                                                                Directory

                                   Virtualizes Access to Id-Stores
                                                         Id-
  Directory Services Mgr.




        Multiple DBMS       Multiple Directories   HR Applications       Mainframe/Legacy
Audit And Compliance Features (1/2)


• Integrated architecture and data store
  –   High performance
  –   Integrate once for compliance and provisioning
  –   Aggregated audit and compliance data
  –   OOTB process automation integration
• Audit data capture
  –   User profile and group history
  –   User membership history
  –   User entitlement history
  –   Attestation review and action history
  –   Form versioning
  –   Workflow task status history
Audit And Compliance Features (2/2)


• Reporting framework
  – Pluggable and customizable architecture for standard reports
  – 3rd party reporting tools support
  – Out-of-the-box reporting DB with 37 reports
• Attestation
  –   Entitlement review
  –   User centric and/or application centric reviews
  –   Out-of-the-box delegate and decline processes
  –   Fully integrated to workflow engine
• Denial access policy
  – Prevention of non-compliant accounts and privileges
Web-Based Attestation

1      Set Up    2                          3   Automated Action           4      Report Built
                     Reviewer Is Notified
      Periodic
                                                is taken based on                And Results
                     Goes to Self Service
      Review
                                                Periodic Review                  Stored in DB

                     Reviewer Selections
                                                          Email
  What Is                   Certify                       Result
 Reviewed                                                to User
     ?
                                                         Automatically
                            Reject                      Terminate User



   Who                     Decline                         Notify the
Reviews It?                                             Process Owner

                                                                                  Archive
                                                        Notify Delegated
                          Delegate
                                                           Reviewer
                                                                                Attested Data
                                                                                  Attestation
                                                                                   Actions
Start When?
How Often?               Comments                                              Delegation Paths
Attestation


Certification Data          Scheduling           360 Degree View

User Attributes         Periodic Scheduling     Business Glossary
Role Memberships        Event Based             Audit Exceptions
Role Based              Attestation for On-     Historical Data
Entitlement Grants      Boarding, Transfers &
                        Termination             Approval Data
Exception Entitlement                           Attestation
Grants                  Reminders &
                        Escalations             Dashboards for
Role Definition                                 Compliance Officers
                        Spreadsheet Exports
Role Entitlement                                Closed Loop
Mapping                                         Remediation with OIM
                                                Integration
Oracle Security Inside Out

                                                                         Database Security


                                                                       Identity Management


                                                                    Information Rights Management

                                                                        • Document-level access control
                                                                        • All copies, regardless of location
                                                                          (even beyond the firewall)
Information                                                             • Auditing and revocation

              Infrastructure

                               Databases

                                           Applications

                                                          Content
Information Rights Management
       Securing Data Beyond the Application

                                      Applications



                                                               Seal         Distribute




                                                                                                   Users

Oracle IRM Management Console                                          Oracle IRM Desktop
                                    Oracle IRM Server
                                    Oracle RM Server


                                                         Automatic
                                                           sync of
                                                        rights/audit

 Business Managers                                                                Secure offline
                     Audit                                                           cache
   or IT Admins




                                Oracle Identity Management
Information Centric Security Solutions

                                     Content


INFORMATION
RIGHTS        Centralized Document    Revocation (Digital Document Activity
              Access Control          Shredding)          Monitoring and Audit
MANAGEMENT

                               Applications



IDENTITY
              Identity                Directory              Access
AND ACCESS
              Administration          Services               Management
MANAGEMENT



DATABASE      Activity               Access Control and     Encryption and
SECURITY      Monitoring             Authorization          Data Masking


                                Databases
Investing in Security Pays Off in Sustainable
Compliance

                                            Enforce Controls
ENFORCE                            • Segregation of duties
                        MONITOR
                       CONTROLS    • Access control
CONTROLS

                                                Monitor Controls
                                   • Who accessed what?

            Oracle                 • Who changed what?

       Security Solutions               Streamline Processes
                                   • Attestation / Recertification


                                           Automate Reporting
AUTOMATE              STREAMLINE   • Out-of-the-box
REPORTING             PROCESSES      compliance reports
                                   • Customized reports
Identity Management Market Leader
      “Oracle is currently the IdM vendor to beat”                                   “Oracle has established itself as Leader.”
  - Burton VantagePoint 2008: Identity and Privacy Trends                   - The Forrester Wave: Identity And Access Management, Q1 2008




             User Provisioning, H2 2008                                             Web Access Management, H2 2008




                                                “Oracle assumes the
                                                    No. 1 position”
                                                  - Earl Perkins, Perry
                                                  Carpenter, Aug. 15 2008
                                                  (Research G00159740)
Questions
For More Information




                                                         Quote Attribution
                                                            Title, Company

Get Started                                    Resources
• Visit the Oracle Fusion Middleware 11g web   • Visit the Oracle IdM Website at:
 site at                                        http://oracle.com/identity
 http://www.oracle.com/fusionmiddleware11g     • Technical information available at:
• Oracle Fusion Middleware on oracle.com        http://otn.oracle.com/
 www.oracle.com/middleware                     • Talk to an Oracle IdM Specialist:
• Oracle Fusion Middleware on OTN               1-800-633-0738
 http://otn.oracle.com/middleware              • View demos, videos, iseminars
                                                whitepapers: http://oracle.com/identity
Oracle tech fmw-05-idm-neum-16.04.2010

More Related Content

PDF
Enhancing Novell SecureLogin with Multi-factor Authentication
PDF
Oracle a TBIZ2011
PPTX
A better waytosecureapps-finalv1
PDF
Tänased võimalused turvalahendustes - Tarvi Tara
PDF
Od webcast-cloud-fraud final
PPT
Healthcare it consolidated
PDF
Cso oow12-summit-sonny-sing hv4
PDF
Securityinsideout
Enhancing Novell SecureLogin with Multi-factor Authentication
Oracle a TBIZ2011
A better waytosecureapps-finalv1
Tänased võimalused turvalahendustes - Tarvi Tara
Od webcast-cloud-fraud final
Healthcare it consolidated
Cso oow12-summit-sonny-sing hv4
Securityinsideout

What's hot (19)

PPT
P hallam baker_keynote
PPTX
Df2012 securing information_assets_in_saa_s_clouds_3_0
PDF
Day 2 p1 - operate simply
PDF
Hitachi ID Solutions Support GLB Compliance
PDF
Security Intelligence
PPT
Identity Access Management (IAM)
PDF
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
PDF
Identity Insights: Social, Local and Mobile Identity
PDF
Defining Enterprise Identity Management
PPT
Compliance and Governance Through Complex Entitlement Management
PDF
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
PDF
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
PDF
Secure Enterprise Cloud
PDF
Hitachi ID Identity Manager: Self-service and automated user provisioning
PPSX
Credexo IDM
PDF
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
PDF
Integrating Information Protection Into Data Architecture & SDLC
PDF
IDENTITY ACCESS MANAGEMENT
PDF
Document%20 Safer%20 Introduction
P hallam baker_keynote
Df2012 securing information_assets_in_saa_s_clouds_3_0
Day 2 p1 - operate simply
Hitachi ID Solutions Support GLB Compliance
Security Intelligence
Identity Access Management (IAM)
Hitachi ID Identity Manager: Faster onboarding, reliable deactivation and eff...
Identity Insights: Social, Local and Mobile Identity
Defining Enterprise Identity Management
Compliance and Governance Through Complex Entitlement Management
Microsoft India - Forefront Value Of Identity And Security Offerings Presenta...
Hitachi ID Password Manager (formerly P-Synch): Lower cost, improve service a...
Secure Enterprise Cloud
Hitachi ID Identity Manager: Self-service and automated user provisioning
Credexo IDM
Hitachi ID Password Manager: Enrollment, password reset and password synchron...
Integrating Information Protection Into Data Architecture & SDLC
IDENTITY ACCESS MANAGEMENT
Document%20 Safer%20 Introduction
Ad

Viewers also liked (20)

PPT
Mobile Tools for Immigration Journalists
PDF
Kingdom living-part-1-embracing-the-virtues-of-the-king
PPT
НП "СРО "ОРПД" Презентация саморегулирование проектирование
PPTX
Láminas Tema 1 Fronteras
PPTX
Láminas tema 6 ADP
PPT
Buy this news, please?
PDF
"Jehovah Tsikenu" 8 Apr 2012
PDF
Ssmc dg-3-life impactinglives
PDF
Paying the Price for Revival, July 1 by mark goodwin
PDF
False Teachings
PPTX
Live Reporting, Live Blogging and Live Chats
PDF
Anchors in-the-storm
PPT
Translation: Vietnam taps reserves but dong still likely to slide
PDF
Tutkimustiivistelmä – Omat sisällöt markkinoinnin ytimenä 2014
PDF
الانتهازية السياسية ولعبة الديمقراطية بقلم عزالدين مبارك
PDF
Social media searching
DOC
Notarphpj 120828194837-phpapp02
PDF
Social Media Search and Verification
PDF
#Smc070 #smm5 state_of_social_media_for_web_201112
PPT
Mc Farland Studer
Mobile Tools for Immigration Journalists
Kingdom living-part-1-embracing-the-virtues-of-the-king
НП "СРО "ОРПД" Презентация саморегулирование проектирование
Láminas Tema 1 Fronteras
Láminas tema 6 ADP
Buy this news, please?
"Jehovah Tsikenu" 8 Apr 2012
Ssmc dg-3-life impactinglives
Paying the Price for Revival, July 1 by mark goodwin
False Teachings
Live Reporting, Live Blogging and Live Chats
Anchors in-the-storm
Translation: Vietnam taps reserves but dong still likely to slide
Tutkimustiivistelmä – Omat sisällöt markkinoinnin ytimenä 2014
الانتهازية السياسية ولعبة الديمقراطية بقلم عزالدين مبارك
Social media searching
Notarphpj 120828194837-phpapp02
Social Media Search and Verification
#Smc070 #smm5 state_of_social_media_for_web_201112
Mc Farland Studer
Ad

Similar to Oracle tech fmw-05-idm-neum-16.04.2010 (20)

PDF
Platform approach-series-building a-roadmap-finalv1
PPTX
Sw keynote
PDF
Keynote oracle entitlement-driven idm
PPTX
Platform approach-series-the oracleplatform-final
PPTX
On Demand Cloud Services Coury
PPTX
Gartner iam 2011-analytics-aj-orig-recordednp-final
PPTX
Best Practice For Public Sector Information Security And Compliance
PPTX
Internet Security Threat Report (ISTR) Vol. 16
PDF
Overview of Identity and Access Management Product Line
PDF
Oracle_Cisco identity platform approach_webcast
PPTX
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
PDF
Intro to Identity Management
PDF
Sun2 oracle avea's identity management platform transformation
PDF
What's New in Novell Identity Manager 4.0
PDF
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
PDF
Hitachi ID Solutions Supporting SOX Compliance
PDF
SYMCAnnual
PPT
Building an Effective Identity Management Strategy
PPTX
Sådan undgår du misbrug af kundedata og fortrolig information
PDF
Ppt security-database-overview-11g r2
Platform approach-series-building a-roadmap-finalv1
Sw keynote
Keynote oracle entitlement-driven idm
Platform approach-series-the oracleplatform-final
On Demand Cloud Services Coury
Gartner iam 2011-analytics-aj-orig-recordednp-final
Best Practice For Public Sector Information Security And Compliance
Internet Security Threat Report (ISTR) Vol. 16
Overview of Identity and Access Management Product Line
Oracle_Cisco identity platform approach_webcast
Information and Identity Protection - Data Loss Prevention, Encryption, User ...
Intro to Identity Management
Sun2 oracle avea's identity management platform transformation
What's New in Novell Identity Manager 4.0
En arkitektonisk vy av en ledande och dynamisk IT-säkerhetsportfölj - PCTY 2011
Hitachi ID Solutions Supporting SOX Compliance
SYMCAnnual
Building an Effective Identity Management Strategy
Sådan undgår du misbrug af kundedata og fortrolig information
Ppt security-database-overview-11g r2

More from Oracle BH (16)

PDF
2 d4.poslovna analitika_160410
PDF
2 d3.javne nabavke_neum160410
PDF
2 d2.casemgmt
PDF
2 d1.hcm neum_160410
PDF
1 d3.cob neum150410
PDF
1 d2.an neum_bh_treasury_systems_development_perspectives_v1.0
PDF
1 d1.reforma it_u_javnoj_upravi
PDF
Sun welcome middleware_overview 0324101_bosnia
PDF
Sun welcome middleware_overview 0324101_bosnia(2)
PDF
Exadata 11-2-overview-v2 11
PDF
Oracle tech fmw-04-sun-virtualization.and.solaris-neum-16.04.2010
PDF
Oracle tech fmw-03-cloud-computing-neum-15.04.2010
PDF
Oracle tech fmw-02-soa-suite-11g-neum-15.04.2010
PDF
Oracle tech db-05-sun-servers.and.storage-16.04.2010
PDF
Oracle tech db-04-cost-effective-neum-16.04.2010
PDF
Oracle tech db-02-hacking-neum-15.04.2010
2 d4.poslovna analitika_160410
2 d3.javne nabavke_neum160410
2 d2.casemgmt
2 d1.hcm neum_160410
1 d3.cob neum150410
1 d2.an neum_bh_treasury_systems_development_perspectives_v1.0
1 d1.reforma it_u_javnoj_upravi
Sun welcome middleware_overview 0324101_bosnia
Sun welcome middleware_overview 0324101_bosnia(2)
Exadata 11-2-overview-v2 11
Oracle tech fmw-04-sun-virtualization.and.solaris-neum-16.04.2010
Oracle tech fmw-03-cloud-computing-neum-15.04.2010
Oracle tech fmw-02-soa-suite-11g-neum-15.04.2010
Oracle tech db-05-sun-servers.and.storage-16.04.2010
Oracle tech db-04-cost-effective-neum-16.04.2010
Oracle tech db-02-hacking-neum-15.04.2010

Oracle tech fmw-05-idm-neum-16.04.2010

  • 2. Oracle Identity Management: Improving Security and Compliance Duško Vukmanović Senior Sales Consultant
  • 3. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
  • 4. More breaches than ever… Data Breach Once exposed, the data is out there – the bell can’t be un-rung PUBLICLY REPORTED DATA BREACHES 400 300 630% Increase 200 100 Total Personally Identifying Information Records Exposed 0 (Millions) 2005 2006 2007 2008 Average cost of a data breach $202 per record Average total cost exceeds $6.6 million per breach Source: DataLossDB, Ponemon Institute, 2009 - http://datalossdb.org http://www.privacyrights.org/ar/ChronDataBreaches.htm
  • 5. More threats than ever… 70% attacks originate inside the firewall 90% attacks perpetrated by employees with privileged access
  • 6. More regulations than ever… • Federal, state, local, industry…adding more mandates every year! • Need to meet AND demonstrate compliance • Compliance costs are unsustainable ? Report and audit 90% Companies behind in compliance Source: IT Policy Compliance Group, 2007.
  • 7. Higher Costs Than Ever… • User Management Costs • User Productivity Costs • Compliance & Remediation Costs • Security Breach Remediation Costs $ It Adds Up
  • 8. IdM Delivers Sustainable Compliance • Enforces Segregation of Duties • Restricts Access • Automates access management • Automates compliance reports • Automates attestation
  • 9. IdM Centralizes & Strengthens Security • Centralized security and policy management – Consistent policies enforced across enterprise – Accelerated compliance with evolving mandates • Automated provisioning / de-provisioning – Role based user provisioning and de-provisioning – Automated updates triggered by user status change • Single Sign-On, Delegated Administration, Risk- based Access – Reduce password compromises – Delegate policy administration to business owners – Proactively defend against sophisticated security threats
  • 10. IdM Streamlines IT Efficiency • Lower Administrative costs – Cost savings via reduced help desk calls – Automated and aggregated audit reporting • Enhanced User Productivity – Reduce time to access systems from days to minutes – Automated provisioning – 212% ROI within 6 months1 • Enhanced IT Productivity – Developers re-use centralized security functions – Accelerated application deployments 1 – Forrester Research Report – TEI Study of Oracle Identity Manager 2008
  • 11. Oracle Security Inside Out Database Security • Encryption and Masking • Privileged User Controls • Multi-Factor Authorization • Activity Monitoring and Audit • Secure Configuration Identity Management • User Provisioning • Role Management Information • Entitlements Management • Risk-Based Access Control Infrastructure • Virtual Directories Databases Information Rights Management Applications Content • Document-level access control • All copies, regardless of location (even beyond the firewall) • Auditing and revocation
  • 12. Oracle’s Identity Management Comprehensive Suite of Best-Of-Breed Products Identity Admin. Access Management Directory Services Access Manager Identity Manager Internet Directory Adaptive Access Manager Enterprise Single Sign-On Role Manager Virtual Directory Identity Federation Entitlements Server Audit & Compliance Manageability Identity & Access Management Suite Enterprise Manager IdM Pack
  • 13. Oracle Identity Administration Sustainable Compliance With High ROI E-Mail Directory Server Databases & OS/Legacy Identity & Role Reconciliation HR Applications Applications Identity Data Other Sources Physical Security
  • 14. Role Based User Provisioning Oracle Identity Manager GRANT REVOKE GRANT REVOKE GRANT REVOKE Employee HR System Approval Applications Joins / Departs Workflows • Automate Roles Based Provisioning / Deprovisioning • Identify orphaned accounts • Report on “Who has access to what” • Self-service requests
  • 15. Automated De-Provisioning Manual Task Revoked Cell Phone Identity Lifecycle Management Identity Store Terminated HRMS Reconciliation Provisioning Connector Employee Engine Workflow Revoked Applications
  • 16. Self Service and Delegated Admin Delegated Admin Self-Service Manager assigning proxy user User doing password reset • Self Service Account Requests • Delegated Administration • Password Reset and Profile Management
  • 17. Role Management E-mail App Business Role General Ledger App Assigned Project CRM App Location UK Benefits App • Centralized role management • Role and rule-based provisioning • Map business roles to IT roles & privileges • Multi-dimensional role hierarchies
  • 18. Oracle Access Management Suite Centralized Security and Improved Business Agility Kerberos & Basic Auth. Single Sign On Across Enterprise Portals Risk-based Strong Authentication Secure Mutual Authentication Entitlements Management Packaged Apps Standards-based Federation Biometric Custom Apps Smart Card
  • 19. Entitlements Management Before After App App Application Oracle Access App App Management Suite App • Hard-coded security policies • Externalized entitlements • Brittle policy management • Agile business policies • Application policy silos • Centralized policy management
  • 20. Challenges With Entitlements • Are subject to massive proliferation & “creep” • Need to rely upon lots of context before making a decision • Must work hand-in-hand with your existing Identity Management and Provisioning solutions • Should be consistent across implementations • Policies can and do evolve independently from your application’s requirements • Entitlements implemented inside your application code are hard to change Bottom Line: Changing your policies means changing your applications
  • 21. Risk-Based Access Control Oracle Access Management Suite Secure Mutual Risk-Based Authentication Risk Scoring Authorization Device Geography Time Activity • Real time fraud prevention • “Auto Learning” behavior profiling • Pattern and anomaly detection
  • 22. Oracle Directory Services Rapid Application Deployment Accelerates IT Agility Any Application Standard LDAP & Java APIs Dynamically binds at Runtime Oracle Virtual Directory Virtualizes Access to Id-Stores Id- Directory Services Mgr. Multiple DBMS Multiple Directories HR Applications Mainframe/Legacy
  • 23. Audit And Compliance Features (1/2) • Integrated architecture and data store – High performance – Integrate once for compliance and provisioning – Aggregated audit and compliance data – OOTB process automation integration • Audit data capture – User profile and group history – User membership history – User entitlement history – Attestation review and action history – Form versioning – Workflow task status history
  • 24. Audit And Compliance Features (2/2) • Reporting framework – Pluggable and customizable architecture for standard reports – 3rd party reporting tools support – Out-of-the-box reporting DB with 37 reports • Attestation – Entitlement review – User centric and/or application centric reviews – Out-of-the-box delegate and decline processes – Fully integrated to workflow engine • Denial access policy – Prevention of non-compliant accounts and privileges
  • 25. Web-Based Attestation 1 Set Up 2 3 Automated Action 4 Report Built Reviewer Is Notified Periodic is taken based on And Results Goes to Self Service Review Periodic Review Stored in DB Reviewer Selections Email What Is Certify Result Reviewed to User ? Automatically Reject Terminate User Who Decline Notify the Reviews It? Process Owner Archive Notify Delegated Delegate Reviewer Attested Data Attestation Actions Start When? How Often? Comments Delegation Paths
  • 26. Attestation Certification Data Scheduling 360 Degree View User Attributes Periodic Scheduling Business Glossary Role Memberships Event Based Audit Exceptions Role Based Attestation for On- Historical Data Entitlement Grants Boarding, Transfers & Termination Approval Data Exception Entitlement Attestation Grants Reminders & Escalations Dashboards for Role Definition Compliance Officers Spreadsheet Exports Role Entitlement Closed Loop Mapping Remediation with OIM Integration
  • 27. Oracle Security Inside Out Database Security Identity Management Information Rights Management • Document-level access control • All copies, regardless of location (even beyond the firewall) Information • Auditing and revocation Infrastructure Databases Applications Content
  • 28. Information Rights Management Securing Data Beyond the Application Applications Seal Distribute Users Oracle IRM Management Console Oracle IRM Desktop Oracle IRM Server Oracle RM Server Automatic sync of rights/audit Business Managers Secure offline Audit cache or IT Admins Oracle Identity Management
  • 29. Information Centric Security Solutions Content INFORMATION RIGHTS Centralized Document Revocation (Digital Document Activity Access Control Shredding) Monitoring and Audit MANAGEMENT Applications IDENTITY Identity Directory Access AND ACCESS Administration Services Management MANAGEMENT DATABASE Activity Access Control and Encryption and SECURITY Monitoring Authorization Data Masking Databases
  • 30. Investing in Security Pays Off in Sustainable Compliance Enforce Controls ENFORCE • Segregation of duties MONITOR CONTROLS • Access control CONTROLS Monitor Controls • Who accessed what? Oracle • Who changed what? Security Solutions Streamline Processes • Attestation / Recertification Automate Reporting AUTOMATE STREAMLINE • Out-of-the-box REPORTING PROCESSES compliance reports • Customized reports
  • 31. Identity Management Market Leader “Oracle is currently the IdM vendor to beat” “Oracle has established itself as Leader.” - Burton VantagePoint 2008: Identity and Privacy Trends - The Forrester Wave: Identity And Access Management, Q1 2008 User Provisioning, H2 2008 Web Access Management, H2 2008 “Oracle assumes the No. 1 position” - Earl Perkins, Perry Carpenter, Aug. 15 2008 (Research G00159740)
  • 33. For More Information Quote Attribution Title, Company Get Started Resources • Visit the Oracle Fusion Middleware 11g web • Visit the Oracle IdM Website at: site at http://oracle.com/identity http://www.oracle.com/fusionmiddleware11g • Technical information available at: • Oracle Fusion Middleware on oracle.com http://otn.oracle.com/ www.oracle.com/middleware • Talk to an Oracle IdM Specialist: • Oracle Fusion Middleware on OTN 1-800-633-0738 http://otn.oracle.com/middleware • View demos, videos, iseminars whitepapers: http://oracle.com/identity