Sign in
|
Register
|
Mobile
Home
Browse
About us
Help/FAQ
Advanced search
Home
>
Browse
>
Designing an IAM Framework with Oracle Identity and Access Management Suite
CITATION
Scheidel, Jeff
.
Designing an IAM Framework with Oracle Identity and Access Management Suite
.
US
: McGraw-Hill Osborne Media, 2010.
Add to Favorites
Email to a Friend
Download Citation
Designing an IAM Framework with Oracle Identity and Access Management Suite
Authors:
Jeff Scheidel
Published:
July 2010
eISBN:
9780071741385 0071741380
|
ISBN:
9780071741378
Open eBook
Book Description
Table of Contents
Contents
Acknowledgments
Introduction
Part I: Defining the Value of and the Need for IAM
1 Who’s Where, and Why Do You Care?
The Value of Identity to User and Enterprise
General Benefits of IAM
The Value of Identity to the Enterprise
The Value of Identity to the End User
Getting What You Need from IAM
2 Determining Your Need for an IAM Framework
Investigating Your Internal Necessities
Starting from Scratch
Replacing or Augmenting IAM
Making the Business Case, Round One
Part II: Preparing the Enterprise for IAM
3 Planning an IAM Project
Resources, Both Digital and Human
Remembering the Goal
Getting Ready to Break Things
Determining Specific Requirements
Governance by Committee
4 Compliance Considerations
What Compliance Typically Includes
What Compliance Should Include
Regulatory Compliance Laws
The Takeaways
5 Making the Business Case
Round Two in Front of Management
Return on Investment (ROI)
Asking for Help, One More Time
Finalizing the Request
6 Achieving Pitfalls: Common Mistakes in IAM
Mistakes Both Large and Small
Part III: The Oracle Identity and Access Solution
7 Designing an Oracle IAM Framework
The Latest and Greatest
The Purpose of the Framework
The Oracle Identity Suite
Defining Your Organization, Top to Bottom
Defining Your Resources
Source(s) of Truth and Authority
Populate Your Authoritative Source(s)
Enabling Your Population: Roles, Privileges, and Access
Authenticating and Authorizing Your Population
Governance, Compliance, and Reporting in the Design
Centralized and Delegated Administration
Security in the Development Process
The End Process: Termination
Deciding When Design Is Completed
8 User Account Creation
Bulk Loading
One-Time Reconciliation
Identity Management System
HR Event
Customer Service
Self-Registration
Universal Requirements
9 Provisioning: Now That I’m In, What Can I Have?
Oracle Provisioning
Organizations and Groups
Defined Resources and Connectors
User Profiles
Workflow Definitions
Manual Provisioning
Automated Provisioning
Role-Based Provisioning
Database Security and Provisioning
Reporting and Compliance
10 Authentication and SSO: Accessing What I’ve Been Granted
Authentication Architecture
Simple Authentication
Strong Authentication, Historically
11 Authorization: Now That I’ve Got It, How Do I Get to It?
Layers of Authorization
Coarse-Grained Authorization
Fine-Grained Entitlements
Federation
Database Security
12 Compliance Support
Common Elements of Regulatory Compliance
Certification: The Ugliest Compliance Process?
Reconciliation of User Accounts
Segregation of Duties
Audit Support
13 The Time Bomb Everybody Forgets: Things Change
Impact Analysis
Changes to Users and Policies
Changes to the Organization
Changes to Resources
Adding Federation
Accepting Recommendations from Auditors
Changes to Infrastructure
14 Legacy Considerations
Definition of Legacy
IAM Components to Keep
IdM Discards
IdM Sources to Mine for Data
Legacy Business Components
15 Testing Your Framework
Incremental Testing
Regression Testing
Load Testing
Penetration Testing
Part IV: Pre- and Post-Implementation Advice
16 Choosing Software
Buy vs. Build
So You’ve Decided to Build
So You’ve Decided to Buy (or at Least Shop)
Cloud Computing
One Last Thing about Vendors
17 Getting Help with Your IAM Project
Types of External Resources
When the Seller and the Builder Are a Package Deal
Small-to-Medium Integrators
Larger Integrators
References
Transfer of Knowledge
Keeping the Peace
18 Notes on the Actual Implementation
Keep People in the Loop (Sort Of)
Governance
Phased Deployment
Cut-Overs
Training
Make Sure Everybody Plays Nice
Control the Communications
Establish Ownership and Responsibilities
19 Post-Implementation: Keeping the Framework Running
Adoption
Show Results
Pass That Audit
Accountability
Monitor, Maintain, Modify
Deploying the Next Phase
Standards Support
What Did We Learn From All of This?
Index