Đang chuẩn bị nút TẢI XUỐNG, xin hãy chờ
Tải xuống
Applied Oracle Security: Developing Secure Database and Middleware Environments- P42:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful | This page intentionally left blank CHAPTER 9 Oracle Identity Manager 386 Part III Identity Management his chapter covers Oracle Identity Manager OIM which is central to Oracle s identity management strategy. OIM provides a platform for designing provisioning processes for user and access information to solve the challenge of getting the right accounts and privileges automatically set up for users across all applications they need to access. Configuration of such provisioning automation can be done in many ways we ll show you some examples and best practice implementations of user provisioning. This chapter does not intend to cover the full set of OIM features and functionalities and instead it highlights those that are used most frequently in solving provisioning problems. The User Provisioning Challenge When a new employee joins a company she needs an office a computer office supplies an e-mail address access to business applications and so forth. This process goes by many names such as on-boarding or hire-to-retire. User provisioning is a subprocess initiated by the onboarding or hire-to-retire process that deals specifically with giving users access to resources. NOTE Resource is a general term that can represent anything from a physical asset such as computers phones offices cubicles printers and so on to logical assets such as e-mail payroll system expense accounts and so on . In the context of logical user provisioning resources typically represent applications databases and other systems where accounts and privileges are set up for each user. User provisioning has become a critical problem for most enterprises looking to lower their administrative burdens of account management while also trying to reduce risk by centralizing the control for granting access to important applications. Instead with a user provisioning solution new account creation tasks can execute in a consistent manner whereby certain approvals and verifications are mandated before access is