Oracle Identity Governance - Complete Identity Lifecycle Management



Similar documents
Oracle Identity Manager (OIM) as Enterprise Security Platform - A Real World Implementation Approach for Success

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010

Identity Governance Evolution

IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach

Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

Oracle IDM Integration with E-Business Suite & Middleware Technologies

Oracle Fusion Middleware 11g Release 1 IDM Suite

Enterprise Identity Management Reference Architecture

The Unique Alternative to the Big Four. Identity and Access Management

Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience

Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance

CLOUD SECURITY: THE GRAND CHALLENGE

Identity Management and Single Sign-On

Identity Management Overview. Bill Nelson Vice President of Professional Services

Governance, Risk & Compliance for Public Sector

Certified Identity and Access Manager (CIAM) Overview & Curriculum

PROTECT YOUR WORLD. Identity Management Solutions and Services

Oracle Identity And Access Management

Identity and Access Management for the Hybrid Enterprise

Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016

Oracle Identity Management Securing The New Digital Experience

Trust but Verify: Best Practices for Monitoring Privileged Users

CA Technologies Solutions for Criminal Justice Information Security Compliance

Introductions. KPMG Presenters: Jay Schulman - Managing Director, Advisory - KPMG National Leader Identity and Access Management

Authentication: Password Madness

Oracle E-Business Suite Single Sign On Using Oracle Access Manager

Multimodal Biometrics R&D Efforts to Exploit Biometric Transaction Management Systems

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Sun and Oracle: Joining Forces in Identity Management

THE BLUENOSE SECURITY FRAMEWORK

How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions

Arisant s Identity Management (IdM) for K-12 Education

<Insert Picture Here> Integrating your On-Premise Applications with Cloud Applications

Centralized Oracle Database Authentication and Authorization in a Directory

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Physical Security: A Biometric Approach Preeti, Rajni M.Tech (Network Security),BPSMV preetytushir@gmail.com, ratri451@gmail.com

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010

Role Based Identity and Access Management Basic Infrastructure for New Citizen Services and Lean Internal Administration

The Benefits of an Industry Standard Platform for Enterprise Sign-On

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

An Oracle White Paper January Oracle Identity Manager Business Overview

State of Vermont Guidance on the Re-use of Software Products, Shared Components, and Hosted Platform Environment Capabilities

Gabriel Magariño. Software Engineer. Overview Revisited

Autonomy Consolidated Archive

Oracle Identity Management 11gR2 Sizing and Capacity Planning

Moving to Multi-factor Authentication. Kevin Unthank

Identity and Access Management Point of View

<Insert Picture Here> Oracle Identity And Access Management

Framework for Biometric Enabled Unified Core Banking

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Best Practices in Identity and Access Management (I&AM) for Regulatory Compliance. RSA Security and Accenture February 26, :00 AM

JD Edwards Security Best Practices

Provide access control with innovative solutions from IBM.

Oracle Fusion Applications Security Leveraging Oracle Identity Management

Developing an Identity Management Strategy

Identity and Access Management Policy

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management

Biometric SSO Authentication Using Java Enterprise System

Role of Multi-biometrics in Usable Multi- Factor Authentication

Identity Access Management Challenges and Best Practices

Vermont Enterprise Architecture Framework (VEAF) Identity & Access Management (IAM) Abridged Strategy Level 0

MAESON MAHERRY. 3 Factor Authentication and what it means to business. Date: 21/10/2013

NFC & Biometrics. Christophe Rosenberger

What s new in AM 9.30 Accelerating business outcomes

Biometrics: Advantages for Employee Attendance Verification. InfoTronics, Inc. Farmington Hills, MI

Identity and Access Management

Biometric For Authentication, Do we need it? Christophe Rosenberger GREYC Research Lab - France

solutions Biometrics integration

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

C21 Introduction to User Access

Integrating Biometrics into the Database and Application Server Infrastructure. Shirley Ann Stern Principal Product Manager Oracle Corporation

Identity & Access Management

CERN, Information Technology Department

PRACTICAL IDENTITY AND ACCESS MANAGEMENT FOR CLOUD - A PRIMER ON THREE COMMON ADOPTION PATTERNS FOR CLOUD SECURITY

RSA Identity Management & Governance (Aveksa)

Cloud SSO and Federated Identity Management Solutions and Services

Quest One Identity Solution. Simplifying Identity and Access Management

Three Campus Case Studies: Managing Access with Grouper

Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15

The Principles of Audit Automation for Access Control

Identity Management Basics. OWASP May 9, The OWASP Foundation. Derek Browne, CISSP, ISSAP

Who s There? A Methodology for Selecting Authentication Credentials. VA-SCAN October 5, 2009 Mary Dunker dunker@vt.edu

Oracle Reference Architecture and Oracle Cloud

Master Data Management What is it? Why do I Care? What are the Solutions?

Dynamic M2M Event Processing Complex Event Processing and OSGi on Java Embedded

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

Business Process Management and Cloud Computing

Transcription:

Oracle Identity Governance - Complete Identity Lifecycle Management M.Sc.Eng. Mārtiņš Orinskis, DPA Ltd lead project manager 07.11.2013

About me M.Sc.Eng. Mārtiņš Orinskis DPA Ltd lead project manager Value of information Quality of service Importance of identity Team work

Our story DPA Ltd founded in Lithuania Ukraine Belarus Georgia Estonia

Our specialties IT security policy, IT audit, ISO 27001 Custom development / Business processes streamline/ automatization User repositories and user management Product implementation Biometry solutions Software licensing

Our experience in identity management SSO and multi factor authentication Casino Face recognition Federated enterprise authentication Biometrical physical access SOA and enterprise processes ISO 27001 IT policy development Biometrical data processing system Digital identity provisioning

Agenda Identity Complete identity lifecycle Vision of complete identity governance Technology for identity management

Physical and digital identity

Complete Identity Lifecycle its a process New employee Change password Role modification New role Block account Change events Delete account IT infrastructu re / information New account Partner and client interaction Attribute change Access request IT resource change Physical access change Employee leave

Vision of complete identity governance Physical identity Authentication and SSO Account provisioning Authorization Fraud detection Federation Self service On-line auditing On-line monitoring Role governance Automated requests and approvals Reconciliation and certification Physical identity (access and identification) Segregation of duties Compliance Platform security Software Devices

1. Get access in time - productivity Physical access to premises for employees and guests Access to business applications Fast partnership / on boarding / off boarding Password management

2. IT system protection from back doors and developers - safety Authorization - AUTHZ platform Authentication - AUTHN platform

3. Know who is accessing your assets Certification Real time auditing Information classification Real time access monitoring

4. Streamline business processes Approval and request management Provisioning / deprovisioning Delegated administration Trust your partners Self service Single sign on

5. Physical access, security and surveillance Streamline logical and physical security Real-time fraud detection - unauthorized changes Physical person identification - security

6. Protect the information Attestation Compliance Risks Segregation of duties Reconciliation Role management

Oracle Identity Governance Identity services Authorization Authentication Federation Provisioning De-provisioning Identity admin Trust Role mgmt Policy mgmt Oracle Identity Governance products OIM OES OAAM OPSS OIF OIA OAM OWSM Technology SOA BI UI Adapter OVD Storage DB LDAP Custom File

Oracle Identity Governance and biometrics Security policy Biometrics: Finger veins, Iris, Voice, Palm veins, Palm-prints, Fingerprints Location, Badges, Tokens, Passwords, RFID, Certificate, Smart cards Role, business identity and access management Enterprise access, Enterprise SSO, Federated access Enterprise physical access, identification Authentication services, Authorization services, User provisioning, User de-provisioning, Password management, Infrastructure services Alarms / messages Reports, Monitoring, Analytics, Risks, User Auditing, Compliance, Policy Fraud detection, Governance

Summary Streamlined access (logical and physical) Streamlined business processes Control improvement IT risk minimization

Every journey starts with a first steps... Account provisioning to critical systems Streamline business processes Improve onboarding and offboarding Streamline physical and logical access Implement Biometrics

Thank You! Mārtiņš Orinskis: Martins.Orinskis@dpa.lv LinkedIn: http://lv.linkedin.com/in/orinskis Twitter: https://twitter.com/dpa_latvia Facebook: https://www.facebook.com/dpalatvia Blog: http://blogs.dpa.lv/