Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity...

19
Copyright © 2014 Oracle and/or its affiliates. All rights reserved. | Oracle Identity & Access Management USTRANSCOM September 28, 2016

Transcript of Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity...

Page 1: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Oracle Identity & Access Management

USTRANSCOMSeptember 28, 2016

Page 2: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Safe Harbor Statement

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.

Oracle Confidential – Internal/Restricted/Highly Restricted 2

Page 3: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2016 Oracle and/or its affiliates. All rights reserved. |

GOVERNANCE

MANAGEMENT

SERVICES

USER

AUTHENTICATION

LOCATION

DATA

EXTREME

SCALE

LOW

TCO

INTEGRATED

INTEROPERABLE

DEVICE

AUTHN

NAMING

SERVICES

HOST

ACCESS

CONTROL

AP

P

THOUSANDS MILLIONS BILLIONS 10s of BILLIONS

VIRTUALDIRECTORY

METADIRECTORY

LDAPDIRECTORY

IDENTITYFEDERATION

EXTERNALAUTHORIZATION

ENTERPRISE &WEB SINGLE

SIGN-ON

MOBILE & SOCIALSIGN-ON

FRAUDDETECTION

EMPLOYEESCONTRACTORS

& PARTNERS

CUSTOMERS

& PROSPECTS

OPERATING

SYSTEMS

DIRECTORY

SERVICES

A

P

P

SAPPLICATIONS

COMMON REPOSITORY

DATABASES SINGLE

USER

VIEW

ACCESS

REQUEST

ENTITLEMENT

CATALOG PRIVILEGED

ACCOUNT

MANAGEMENT

ACCESS

CERTIFICATION

PRIVILIGEDACCOUNTS

USERPROVISIONING

CERTIFICATIONREVIEW

ACCESSREQUEST

INTEGRATEDPLATFORM

Page 4: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Oracle Access ManagementOracle Fusion Middleware’s Security Pillar

CloudOn-Premise

AuthenticationIntelligent, Risk-basedStrong Authentication

Common Policy Model – Shared Infrastructure Services

Web Mobile Social Internet of Things

4

AuthorizationReal-Time, Context-Aware

Externalized Policies

FederationStandards-Based

Leverages Social Identities

Mobile and APIRESTful Interfaces

API Security

Managed Cloud

Scalability, High Availability, Disaster Recovery

System Management

Page 5: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Oracle Access Management

• Complete

• Context-aware and risk-aware

• Scalable, highly available

• Standards-based and modular

5

Services and Capabilities

Authentication, SSO

Adaptive Access and Fraud Prevention

Identity Federation

Secure Token Service

Mobile Security and Social Identity

Access Portal

Enterprise SSO

External, Fine-Grained Authorization

Web Services Security

API Security

Page 6: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Access Management – Web SSO

• Web authentication

– User name and password

–Windows native authentication (WNA)

– Strong authentication (CAC / PIV)

–Multi-Factor

• Web Single Sign-On (SSO)

• Fine-grained authorization

6Oracle Confidential – Internal

Page 7: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2014, Oracle and/or its affiliates. All rights reserved. |

Integrated Risk, Fraud, and Strong Authentication

• Context-aware, risk-aware and content-aware

• Leverage real-time context for authentication and authorization

• Native mobile OTP for step-up authentication

• Real-time risk analysis and fraud prevention

• Data redaction through dynamic authorization based on risk

• Cross-platform consistent policies; adaptive to context, content and risk

7

LOW

HIGH

MED

RESPONSE

ALLOW DENY

RIS

K

Page 8: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Oracle Identity GovernanceUnified Approach to Complete Identity Governance

Self ServiceAccess Request, Password

Management

Platform & Integration Layer

8

ComplianceAccess Certification, SOD, Continuous Compliance

Identity IntelligenceOperational Reporting,

Access Dashboards

Privileged AccessPrivileged Access, Privileged

Audit, Session Recording

Common Data Model Role & Policy LibraryWorkflows and Service

Desk IntegrationAccess Catalog

Identity Connector Framework – Provisioning/De-Provisioning

CloudOn-Premise

Managed Cloud

Cloud MobileEnterprise

Page 9: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2015, Oracle and/or its affiliates. All rights reserved. |

Business-Friendly Request Catalog

• Business-friendly Access Catalog

• Self-Service Application On-boardingAnd Administration

• Search, Browse And Contextual Recommendations

• In-line Policy Checks To Prevent SOD Violations

• Flexible Forms For Advanced Data Capture

• End-to-end Visibility Into The Approval and Fulfillment Process

Enabling end-users to get the access they need

Search,

Browse,

Recommend

Policy-compliant

Access Request

Business-Friendly

Access Catalog

Page 10: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Oracle Identity Governance

• Access Catalog provides ability to browse and search

• Smart search forms allow users to navigate the Catalog in a guided manner

• Catalog search results indicate relevance

• Access Catalog can recommend access based on pre-defined and user-defined criteria

• Support for Start/End Dates for Access Grants

• Preventative SoD Analysis

Intelligent Access Catalog

Page 11: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Oracle Identity Governance

• Business users can request creation of new roles and changes to existing ones

• Role requests can leverage the same request and approval framework available for Access Requests and Certification

• Role owners can see comprehensive auditing and prior versions

Comprehensive Role Lifecycle Management

Page 12: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Oracle Identity Governance

• Comprehensive role analytics allows business users to see the impact of new roles and changes to existing ones

• Role owners can reduce role explosion by review the effectiveness of the roles and consolidate new roles with existing ones

• Business users can create roles using “model users”

Comprehensive Role Lifecycle Management

Page 13: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Oracle Identity GovernanceSOD Detection and Closed Loop Remediation

• SOD Rule and Policy Definition• Define rules across users, applications, roles and

entitlements

• Detective SOD Analysis• Detective Policy Enforcement – Closed Loop

Remediation

• Access History to audit all violations and decisions

• Review High Risk policy violations in Certifications

• Preventative SOD Analysis• Enforce SOD policies during access requests

• Review policy violations during approvals and launch exception workflows

Page 14: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Oracle Identity Governance

• Administrators can define custom security roles to control who can do what at an attribute level

• Users can be assigned security roles via rules reducing administration burden

• User actions and the context that they used to perform the action are audited

Simplified yet granular security

Page 15: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

Oracle Privileged Account Manager

• Check-Out / Check-In Self Service Console

• Custom built approvals (e.g. phone)

• Custom built ticketing system integration

• Custom built notifications

• Access Request Interface – Privilege Accounts added to OIG resource catalog

• Keystroke logging

• Session recording

15

Accountability

Page 16: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2014 Oracle and/or its affiliates. All rights reserved. |

• Extended managed targets

• UNIX SSH Targets

• LDAP

• Database

• Windows

• SSH based targets

• SAP

• UNIX / Linux server

• Oracle Database

• Microsoft SQL Server

• Sybase

• IBM DB2

• Microsoft Active DirectorySessionManagement control policies

• Session Recording

OPAM

16

More managed targets, greater control and more visibility

Page 17: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

Copyright © 2015 Oracle and/or its affiliates. All rights reserved. |

OUDVirtualizationStorage Synchronization

Cloud AppsDatabases

Enterprise Apps Servers

Mobile Apps

HR DBDSEEActive

Directory

OUD – The All in One Directory

17

• Storage, virtualization and Sync

• High performance

• Extreme scalability

• REST support

Page 18: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration

3 - 18Copyright © 2015, Oracle and/or its affiliates. All rights reserved.

Oracle Enterprise Manager Fusion Middleware Control

Page 19: Oracle Identity & Access ManagementOracle Identity Governance Unified Approach to Complete Identity Governance Self Service Access Request, Password Management Platform & Integration