CITATION

Scheidel, Jeff. Designing an IAM Framework with Oracle Identity and Access Management Suite. US: McGraw-Hill Osborne Media, 2010.

Designing an IAM Framework with Oracle Identity and Access Management Suite

Authors:

Published:  July 2010

eISBN: 9780071741385 0071741380 | ISBN: 9780071741378
  • Contents
  • Acknowledgments
  • Introduction
  • Part I: Defining the Value of and the Need for IAM
  • 1 Who’s Where, and Why Do You Care?
  • The Value of Identity to User and Enterprise
  • General Benefits of IAM
  • The Value of Identity to the Enterprise
  • The Value of Identity to the End User
  • Getting What You Need from IAM
  • 2 Determining Your Need for an IAM Framework
  • Investigating Your Internal Necessities
  • Starting from Scratch
  • Replacing or Augmenting IAM
  • Making the Business Case, Round One
  • Part II: Preparing the Enterprise for IAM
  • 3 Planning an IAM Project
  • Resources, Both Digital and Human
  • Remembering the Goal
  • Getting Ready to Break Things
  • Determining Specific Requirements
  • Governance by Committee
  • 4 Compliance Considerations
  • What Compliance Typically Includes
  • What Compliance Should Include
  • Regulatory Compliance Laws
  • The Takeaways
  • 5 Making the Business Case
  • Round Two in Front of Management
  • Return on Investment (ROI)
  • Asking for Help, One More Time
  • Finalizing the Request
  • 6 Achieving Pitfalls: Common Mistakes in IAM
  • Mistakes Both Large and Small
  • Part III: The Oracle Identity and Access Solution
  • 7 Designing an Oracle IAM Framework
  • The Latest and Greatest
  • The Purpose of the Framework
  • The Oracle Identity Suite
  • Defining Your Organization, Top to Bottom
  • Defining Your Resources
  • Source(s) of Truth and Authority
  • Populate Your Authoritative Source(s)
  • Enabling Your Population: Roles, Privileges, and Access
  • Authenticating and Authorizing Your Population
  • Governance, Compliance, and Reporting in the Design
  • Centralized and Delegated Administration
  • Security in the Development Process
  • The End Process: Termination
  • Deciding When Design Is Completed
  • 8 User Account Creation
  • Bulk Loading
  • One-Time Reconciliation
  • Identity Management System
  • HR Event
  • Customer Service
  • Self-Registration
  • Universal Requirements
  • 9 Provisioning: Now That I’m In, What Can I Have?
  • Oracle Provisioning
  • Organizations and Groups
  • Defined Resources and Connectors
  • User Profiles
  • Workflow Definitions
  • Manual Provisioning
  • Automated Provisioning
  • Role-Based Provisioning
  • Database Security and Provisioning
  • Reporting and Compliance
  • 10 Authentication and SSO: Accessing What I’ve Been Granted
  • Authentication Architecture
  • Simple Authentication
  • Strong Authentication, Historically
  • 11 Authorization: Now That I’ve Got It, How Do I Get to It?
  • Layers of Authorization
  • Coarse-Grained Authorization
  • Fine-Grained Entitlements
  • Federation
  • Database Security
  • 12 Compliance Support
  • Common Elements of Regulatory Compliance
  • Certification: The Ugliest Compliance Process?
  • Reconciliation of User Accounts
  • Segregation of Duties
  • Audit Support
  • 13 The Time Bomb Everybody Forgets: Things Change
  • Impact Analysis
  • Changes to Users and Policies
  • Changes to the Organization
  • Changes to Resources
  • Adding Federation
  • Accepting Recommendations from Auditors
  • Changes to Infrastructure
  • 14 Legacy Considerations
  • Definition of Legacy
  • IAM Components to Keep
  • IdM Discards
  • IdM Sources to Mine for Data
  • Legacy Business Components
  • 15 Testing Your Framework
  • Incremental Testing
  • Regression Testing
  • Load Testing
  • Penetration Testing
  • Part IV: Pre- and Post-Implementation Advice
  • 16 Choosing Software
  • Buy vs. Build
  • So You’ve Decided to Build
  • So You’ve Decided to Buy (or at Least Shop)
  • Cloud Computing
  • One Last Thing about Vendors
  • 17 Getting Help with Your IAM Project
  • Types of External Resources
  • When the Seller and the Builder Are a Package Deal
  • Small-to-Medium Integrators
  • Larger Integrators
  • References
  • Transfer of Knowledge
  • Keeping the Peace
  • 18 Notes on the Actual Implementation
  • Keep People in the Loop (Sort Of)
  • Governance
  • Phased Deployment
  • Cut-Overs
  • Training
  • Make Sure Everybody Plays Nice
  • Control the Communications
  • Establish Ownership and Responsibilities
  • 19 Post-Implementation: Keeping the Framework Running
  • Adoption
  • Show Results
  • Pass That Audit
  • Accountability
  • Monitor, Maintain, Modify
  • Deploying the Next Phase
  • Standards Support
  • What Did We Learn From All of This?
  • Index