

Jeff Scheidel is a Principal Security Consultant at Oracle and has been a software professional since 1984, with more than 14 years dedicated to identity and related security.
Meer over Jeff ScheidelDesigning an IAM Framework with Oracle Identity and Access Management Suite
Build and Manage a Dynamic and Compliant Security Architecture
Samenvatting
Develop and Implement an End-to-End IAM Solution
Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. 'Designing an IAM Framework with Oracle Identity and Access Management Suite' explains how to reduce risk exposure by effectively managing your full spectrum of users. Learn how to create and provision accounts, employ strong authentication and authorization, integrate legacy applications, and handle regulatory compliance. The latest performance-testing, self-auditing, and business intelligence reporting techniques are also covered in this comprehensive resource.
- Establish company requirements and develop implementation plans
- Build and execute your identity business case
- Set up accounts, roles, and provisioning workflows using Oracle Identity Manager and Analysis
- Authenticate and authorize users with Oracle Access Manager
- Enact strong authorization policies using Oracle Entitlements Server
- Identify anomalous behavior and create proactive fraud prevention rules with Oracle Adaptive Access Manager
- Enforce regulatory compliance and generate audit-ready reports
- Learn about latest additions from the acquired Sun stack
Specificaties
Inhoudsopgave
1. Who's Where, and Why Do You Care?;
2. Determining Your Need for an IAM Framework;
Part 2: Preparing the Enterprise for IAM;
3. Planning an IAM Project;
4. Compliance Considerations;
5. Making the Business Case;
6. Achieving Pitfalls: Common Mistakes in IAM;
Part 3: The Oracle Identity and Access Solution;
7. Designing an Oracle IAM Framework;
8. User Account Creation;
9. Provisioning: Now That I'm In, What Can I Have?;
10. Authentication and SSO: Accessing What I've Been Granted;
11. Authorization: Now That I've Got It, How Do I Get to It?;
12. Compliance Support;
13. The Time Bomb Everybody Forgets: Things Change;
14. Legacy Considerations;
15. Testing Your Framework;
Part 4: Pre- and Post-Implementation Advice;
16. Choosing Software;
17. Getting Help with Your IAM Project;
18. Notes on the Actual Implementation;
19. Post-Implementation: Keeping the Framework Running;
Index
Anderen die dit boek kochten, kochten ook
Net verschenen
Rubrieken
- aanbestedingsrecht
- aansprakelijkheids- en verzekeringsrecht
- accountancy
- algemeen juridisch
- arbeidsrecht
- bank- en effectenrecht
- bestuursrecht
- bouwrecht
- burgerlijk recht en procesrecht
- europees-internationaal recht
- fiscaal recht
- gezondheidsrecht
- insolventierecht
- intellectuele eigendom en ict-recht
- management
- mens en maatschappij
- milieu- en omgevingsrecht
- notarieel recht
- ondernemingsrecht
- pensioenrecht
- personen- en familierecht
- sociale zekerheidsrecht
- staatsrecht
- strafrecht en criminologie
- vastgoed- en huurrecht
- vreemdelingenrecht