TAILIEUCHUNG - Applied Oracle Security: Developing Secure Database and Middleware Environments- P42

Applied Oracle Security: Developing Secure Database and Middleware Environments- P42:Computer security is a field of study that continues to undergo significant changes at an extremely fast pace. As a result of research combined with increases in computing capacity, computer security has reached what many consider to be “early adulthood.” From advances in encryption and encryption devices to identity management and enterprise auditing, the computer security field is as vast and complex as it is sophisticated and powerful | This page intentionally left blank CHAPTER 9 Oracle Identity Manager 386 Part III Identity Management his chapter covers Oracle Identity Manager OIM which is central to Oracle s identity management strategy. OIM provides a platform for designing provisioning processes for user and access information to solve the challenge of getting the right accounts and privileges automatically set up for users across all applications they need to access. Configuration of such provisioning automation can be done in many ways we ll show you some examples and best practice implementations of user provisioning. This chapter does not intend to cover the full set of OIM features and functionalities and instead it highlights those that are used most frequently in solving provisioning problems. The User Provisioning Challenge When a new employee joins a company she needs an office a computer office supplies an e-mail address access to business applications and so forth. This process goes by many names such as on-boarding or hire-to-retire. User provisioning is a subprocess initiated by the onboarding or hire-to-retire process that deals specifically with giving users access to resources. NOTE Resource is a general term that can represent anything from a physical asset such as computers phones offices cubicles printers and so on to logical assets such as e-mail payroll system expense accounts and so on . In the context of logical user provisioning resources typically represent applications databases and other systems where accounts and privileges are set up for each user. User provisioning has become a critical problem for most enterprises looking to lower their administrative burdens of account management while also trying to reduce risk by centralizing the control for granting access to important applications. Instead with a user provisioning solution new account creation tasks can execute in a consistent manner whereby certain approvals and verifications are mandated before access is

TÀI LIỆU MỚI ĐĂNG
TAILIEUCHUNG - Chia sẻ tài liệu không giới hạn
Địa chỉ : 444 Hoang Hoa Tham, Hanoi, Viet Nam
Website : tailieuchung.com
Email : tailieuchung20@gmail.com
Tailieuchung.com là thư viện tài liệu trực tuyến, nơi chia sẽ trao đổi hàng triệu tài liệu như luận văn đồ án, sách, giáo trình, đề thi.
Chúng tôi không chịu trách nhiệm liên quan đến các vấn đề bản quyền nội dung tài liệu được thành viên tự nguyện đăng tải lên, nếu phát hiện thấy tài liệu xấu hoặc tài liệu có bản quyền xin hãy email cho chúng tôi.
Đã phát hiện trình chặn quảng cáo AdBlock
Trang web này phụ thuộc vào doanh thu từ số lần hiển thị quảng cáo để tồn tại. Vui lòng tắt trình chặn quảng cáo của bạn hoặc tạm dừng tính năng chặn quảng cáo cho trang web này.