Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience



Similar documents
Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Identity Governance Evolution

Trust but Verify: Best Practices for Monitoring Privileged Users

Oracle Identity Management Securing The New Digital Experience

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

HOL9449 Access Management: Secure web, mobile and cloud access

Security Landscape of Cloud Computing

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010

Sun and Oracle: Joining Forces in Identity Management

Oracle Fusion Middleware 11g Release 1 IDM Suite

Oracle Mobile Security

<Insert Picture Here> Oracle Identity And Access Management

Oracle Fusion Middleware. 1 Oracle Identity Management Templates

Oracle E-Business Suite Single Sign On Using Oracle Access Manager

OracleAS Identity Management Solving Real World Problems

Oracle Cloud. Creating a Business Intelligence Cloud Extract E

March Oracle Business Intelligence Discoverer Statement of Direction

Quest One Identity Solution. Simplifying Identity and Access Management

Oracle IDM Integration with E-Business Suite & Middleware Technologies

Oracle s Cloud Computing Strategy

G Cloud 6 CDG Service Definition for Forgerock Software Services

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory-based Single Sign-On

How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development

Oracle Data Integrator and Oracle Warehouse Builder Statement of Direction

managing SSO with shared credentials

CA SiteMinder SSO Agents for ERP Systems

Oracle Process Cloud Service Rapidly Automate & Manage Process Applications

1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges

Securing the Cloud through Comprehensive Identity Management Solution

Secure Your Enterprise with Usher Mobile Identity

The Top 5 Federated Single Sign-On Scenarios

Oracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008

The Oracle Mobile Security Suite: Secure Adoption of BYOD

expanding web single sign-on to cloud and mobile environments agility made possible

June, 2015 Oracle s Siebel CRM Statement of Direction Client Platform Support

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Sales Cloud Securing Oracle Sales Cloud. Release 10

SUPERVALU Successfully Leverages Tablet Technology and Identity and Access Management Infrastructure for Increased Security and Business Productivity

The Unique Alternative to the Big Four. Identity and Access Management

Migration Best Practices for OpenSSO 8 and SAM 7.1 deployments O R A C L E W H I T E P A P E R M A R C H 2015

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

An Oracle White Paper September Directory Services Integration with Database Enterprise User Security

NCSU SSO. Case Study

An Oracle White Paper Dec Oracle Access Management Security Token Service

ORACLE WEBCENTER PORTAL

identity management in Linux and UNIX environments

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Delivering value to the business with IAM

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

B2C, B2B and B2E:! Leveraging IAM to Achieve Real Business Value

Identity Management and Single Sign-On

An Oracle White Paper January Oracle Identity Manager Business Overview

Company Facts. 1,800 employees. 150 countries. 12,000 customers and growing. 17 languages. 11 global offices

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

How Can Agile Customers Benefit from Oracle Fusion Middleware Today?

An Oracle White Paper Dec Oracle Access Management OAuth Service

An Oracle White Paper October Oracle Data Integrator 12c New Features Overview

Adding Stronger Authentication to your Portal and Cloud Apps

Intelligent Security Design, Development and Acquisition

OPENIAM ACCESS MANAGER. Web Access Management made Easy

Evaluation of different Open Source Identity management Systems

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

API-Security Gateway Dirk Krafzig

How To Manage A Plethora Of Identities In A Cloud System (Saas)

The increasing popularity of mobile devices is rapidly changing how and where we

Total Cost of Ownership Overview ADFS vs OneLogin WHITEPAPER

Identity Centric Security: Control Identity Sprawl to Remove a Growing Risk

PeopleSoft Enterprise Campus Solutions 9.0 Enrollment Web Services

Executive Summary P 1. ActivIdentity

JD Edwards EnterpriseOne Mobile Solutions

Flexible Identity Federation

E-Business Suite Oracle SOA Suite Integration Options

E l i m i n a t i n g Au t hentication Silos and Passw or d F a t i g u e w i t h Federated Identity a n d Ac c e s s

Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

Cloud Security: Is It Safe To Go In Yet?

NetIQ Identity Manager Setup Guide

HP ALM Masters 2014 Connected, collaborative mobile application development for the enterprise HP Anywhere

G-Cloud Framework. Service Definition. Oracle Fusion Middleware Design and Implementation

SaaS at Pfizer. Challenges, Solutions, Recommendations. Worldwide Business Technology

Building Secure Applications. James Tedrick

An Oracle White Paper December Implementing Enterprise Single Sign-On in an Identity Management System

Arisant s Identity Management (IdM) for K-12 Education

Build Your Mobile Strategy Not Just Your Mobile Apps

Authentication: Password Madness

Proposal Document TitleDocument Version 1.0 TitleDocument

IBM Tivoli Federated Identity Manager

Oracle Privileged Account Manager

An Oracle White Paper January, Enterprise Manager Cloud Control 12c: Configuring External User Authentication Using Microsoft Active Directory

Alex Wong Senior Manager - Product Management Bruce Ong Director - Product Management

Transcription:

Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience

This document is for informational purposes. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described in this document remains at the sole discretion of Oracle. This document in any form, software or printed matter, contains proprietary information that is the exclusive property of Oracle. This document and information contained herein may not be disclosed, copied, reproduced or distributed to anyone outside Oracle without prior written consent of Oracle. This document is not part of your license agreement nor can it be incorporated into any contractual agreement with Oracle or its subsidiaries or affiliates. Copyright 2011, Oracle and/or its affiliates. All right 2

The New Digital Experience Anywhere, Anytime any Device 90% of companies provide mobile apps by 2014 62% of companies will use social networking to connect with customers 3

Identity Management at the Center Complete, Open, Integrated Web Social Mobile Business Process Management Service Service Integration Integration Development Tools User Engagement User Engagement Content Management Data Data Integration Integration Identity Management & Security Cloud Application Foundation Business Intelligence Enterprise Management Enabling the Interaction Securing the Experience 4

11gR2 Themes and Drivers Simplify and Innovate Simplified Experience Modernized Platform Cloud, Mobile and Social Extreme Scale Clear Upgrade Path Faster Deployment Lower TCO 5

New Identity Platform Convergence: Simple to Adopt, Simple to Deploy Identity Governance Access Management Directory Services Lifecycle Management & 360 visibility Regular & Privileged identities Complete access control & SSO Fraud Detection Converged Policy Administration & Control LDAP, Virtualization Fraud & Meta-directory Detection Unified Administration & Management 6

New Identity Platform Convergence: Simple to Adopt, Simple to Deploy Identity Governance Access Management Directory Services Lifecycle Management & 360 visibility Regular & Privileged identities Complete access control & SSO Fraud Detection Converged Policy Administration & Control LDAP, Virtualization Fraud & Meta-directory Detection Unified Administration & Management 7

Re-designed Access Request Shopping Cart Simplicity Role & Entitlement Catalog Browse & Select Add to Cart Receipt Confirmation Simplified Search Tracking & Visibility 8

Common UI Framework One Platform Unlimited Potential 9

Privileged Account Management With Great Power Comes Great Risks Root Access 76% Data Stolen From Servers 86% Hacking Involve Stolen Credentials 48% Caused by Insiders 17% Involved Privilege Misuse Databases Directory Servers Unix Servers Privileged accounts are a key entry point for fraud Difficult to monitor shared accounts across multiple administrators Excessive access privileges is the number one attack vector against databases 10

Privileged Account Management Complete Lifecycle Management of High Risk Accounts Password Vault Reduce Risk Account Lifecycle Policy Control Checkin Checkout Audit Logging Improve Compliance 11

Managing Privileged Accounts A Platform Approach Single Workflow Single Connector Set Single Attestation 12

User Check-Out Password Screen Copyright 2011, Oracle and/or its affiliates. All right 13

New Identity Platform Convergence: Simple to Adopt, Simple to Deploy Identity Governance Access Management Directory Services Lifecycle Management & 360 visibility Regular & Privileged identities Complete access control & SSO Fraud Detection Converged Policy Administration & Control LDAP, Virtualization Fraud & Meta-directory Detection Unified Administration & Management 14

Mobile & Social Sign-on REST Single Sign-on OAuth Step-up Auth 15

Mobile Security is Beyond Device Management 46% Of organizations that allow BYOD reported experiencing a data or security breach Source: Trend Micro Survey, Feb 2012 50% Of helpdesks struggle to keep up with mobile apps support Source: Mobility Revolution Redux, March 2012 58% Source: Partnerpedia Survey, Aug 2011 Building corporate app stores MOBILE SECURITY STARTS FROM INSIDE 16

Mobile Application Security Copyright 2011, Oracle and/or its affiliates. All right 17

Example Login Flow Native App with OAM Client App(Mobile) Security App (Mobile) Mobile and Social Server(Server) 1 5 Request Access Token Use token to make calls to server application protected by OAM Oracle SDK - If valid token in local credential store, return token to App, else continue below. 2 3 4 - Present login page - Accept username/password - Extracts device attributes and ID contexts - Makes authentication call with user/password, device attributes and device tokens - Stores User/Access Token - Validates device tokens - Registers Device/App if unregistered - Authenticates with OAM Server - Publishes ID context to OAM Server and OES for authorization decisions - Invokes OAAM for risk analysis - Responds User/Access Tokens - Returns token to Client App 18

Social Sign-on Select Login Authorize 19

Visibility & Control Copyright 2011, Oracle and/or its affiliates. All right 20

1. Collect Attributes Access Management Context and Risk Aware Real-time context collection, propagation for risk analysis, authentication and authorization Enterprise / Work Social / Life Mobile / Presence Device Tier Web Tier Application Tier Service Tier Smartphone WEB SSO Application Web Services Context Tablet Laptop Server Identity Federation Risk / Adaptive Authentication Portal SOA Service Bus OES Authorization Container EJBs Databases Directories OES Authorization 2. Publish, Propagate & Evaluate attributes across Oracle s Fusion Middleware stack 21

Access Management Highlights Interoperability & Cohesion Federation Web Access Control Enterprise Sign-on Integrated Fraud Detection Token Services External Authorization SOA Security Fraud Detection Fraud Detection Standards Based 22

New Identity Platform Convergence: Simple to Adopt, Simple to Deploy Identity Governance Access Management Directory Services Lifecycle Management & 360 visibility Regular & Privileged identities Complete access control & SSO Fraud Detection Converged Policy Administration & Control LDAP, Virtualization Fraud & Meta-directory Detection Unified Administration & Management 23

Operational Scale Economies of Scale & Faster Performance 3x DIRECTORY SERVICES Unified Directory Read 5x Write Optimized System Unified Directory 3x Performance 1/6 Cost Oracle SPARC T4 ACCESS MANAGEMENT 250M Users 3K Auth/Second Two Servers at 5250 TPS 24

Taking a Platform Approach Building on Components of Fusion Middleware User Interface Customization Performance Fusion Middleware 25

Identity Management Portfolio 11gR2 Modern, Innovative & Integrated Governance Password Reset Privileged Accounts Access Request Roles Based Provisioning Role Mining Attestation Separation of Duties Access Web Single Sign-on Federation Mobile, Social & Cloud External Authorization SOA Security Integrated ESSO Token Services Fraud Detection Directory LDAP Storage Virtual Directory Meta Directory Platform Security Services 26

Upgrading Gain a Platform Advantage Complete & Modern End to End Compliance Lower TCO 27

What Customers Are Saying Platform is an Advantage Compliance is one of our biggest worries, and managing privileged accounts is a top priority. We are really impressed with the platform approach it matches our long term strategy to shift to more of a self service model for IDM We really like the user interface and the ability to integrate with OIM for approval workflows. We have been considering buying a point product, but we prefer OPAM because of all the built in integration 28

How Customers Are Applying R2 Platform is an advantage Increase quality of service for customers Reduce risk with fraud detection service Improve operational scale Single identity for customers Composite identity for drivers and cards Connecting cars, drivers, social & mobile 29

White Papers Datasheets facebook.com/oracleidm blogs.oracle.com/oracleidm twitter.com/oracleidm Copyright 2011, Oracle and/or its affiliates. All right 30