Wednesday, 19 March 2014

Oracle Identity Management 11g

Oracle Identity Management 11g is characterized by the following:

  • Establishment of Oracle Identity Management as a security development platform (see the Oracle Platform Security Services and Identity Governance Framework sections later in this document). 
  • Oracle Identity Management becomes Oracle Fusion Applications’ de facto security infrastructure. 
  • Enhanced integration between Oracle Identity Management’s components and other Oracle Fusion Middle ware components, Oracle Applications, and third-party security providers. 
  • Enhanced functionality allowing easier environment deployments (e.g., wizards to guide users through rapid deployment tasks, multi-level actionable dashboards for business users to analyze compliance and risk indicators, and take remediation actions). 
  • Streamlined release synchronization and technology uptake between the various products making up Oracle Identity Management

Oracle Web Services Manager (OWSM) is designed to protect access to multiple types of 
resources: 
  • General purpose, standards-compliant web services (Java EE, Microsoft .NET, PL/SQL, etc.). 
  •  Oracle ADF Data Control (DC) clients, Oracle ADF Business Component (BC) web services, JAX-WS web services, and Oracle ADF JAX-WS proxy dynamically invoking services of different endpoints. 
  • Service-oriented architecture (SOA) composite components including Business Process Execution Language (BPEL) and enterprise service bus (ESB) processes. 
  • Oracle WebCenter’s remote portlets.

Saturday, 22 February 2014

Introduction About Oracle Identity Manager



Oracle Identity Manager is a powerful and flexible enterprise identity management system that automatically manages users' access privileges within enterprise IT resources. Its flexible architecture easily handles the most uncompromising and rigorous IT and business requirements -- without requiring changes to existing infrastructure, policies or procedures.

 Oracle Identity Manager is designed to manage user access privileges across all of a firm's resources, throughout the entire identity management lifecycle -- from initial creation of access privileges to dynamically adapting to changes in business requirements. Because of Identity Manager's innovative design, enterprises can elegantly incorporate necessary business changes at minimal cost, while avoiding enforced customization that might be necessary with other provisioning systems.