Wir beraten Sie gerne!
+43 1 6000 880-0     Kontakt

Remote Trainings im virtuellen Klassenraum,
E-Learning Angebote und mehr!

Jetzt informieren

Oracle Identity Governance 11g R2: Essentials (D81835)

Detaillierter Kursinhalt

Introducing Oracle Identity Governance 11g R2 PS3
  • Receive a product overview
  • Manage users, user entities, and resources
  • Handle reconciliation workflows
  • Manage security, reports, and tools
  • Deploy configurations
  • Customize Oracle Identity Manager
Understanding Identity Management and Identity Governance
  • Discuss identity management
  • Explain Oracle Identity Management
  • Describe the four solutions-based, functional areas of Oracle Identity Management: Access Management, Identity Governance, Directory Services, and Mobile Security
  • Examine the role that Oracle Identity Manager plays in both Identity Governance and Oracle Identity Management
  • Describe the tiers of the Oracle Identity Manager architecture
Launching Oracle Identity Manager
  • Compare Oracle WebLogic Server, Oracle Identity Manager Server, and SOA Server
  • Discuss the Oracle Identity Manager interfaces: self-service interfaces, administrative interface, Design Console, and SCIM service
  • Identify the differences among the consoles available from Oracle Identity Manager and Oracle SOA
Understanding Organizations, Roles, and Users
  • Explain users, roles, and organizations
  • Compare parent and child organizations and roles
  • Compare types of Oracle Identity Manager users
  • Discuss Oracle Identity Manager user membership in organizations and roles
  • Describe dynamic organizations and parametric roles
  • Discuss Role Lifecycle Management (LCM) and role analytics
  • Explain the Bulk Load Utility and discuss its benefits
  • Discuss customized search results
Installing and Configuring Predefined Connectors
  • Identify an Oracle Identity Manager connector
  • List the connectors in the Oracle Identity Manager Connector Pack
  • Describe the ways to transfer connectors from one environment to another
  • Explain the advantages of and best practices for transferring connectors
  • Identify two tools used to import and export connectors: Manage Connector and Deployment Manager
  • Explain how the Manage Connector tool is used to import connectors for external resources
  • Configure a connector to make it operable
Understanding Application Instances
  • Identify an Oracle Identity Manager application instance
  • Describe how application instances relate to connector objects
  • Provide examples of application instances
  • Identify entitlements for application instances
  • Discuss complex entitlements for application instances
  • Describe and manage sandboxes
  • Describe how to create an application instance
  • Manage entitlements for application instances
Using the Access Request Catalog
  • Identify the Request Access Catalog
  • Describe the business challenges solved by the Request Access Catalog
  • Understand the concepts and terminology associated with the Request Access Catalog
  • Describe how to manage the Catalog
Understanding Policy-Based Provisioning
  • Identify and compare resources and Oracle Identity Manager connectors
  • Describe how connectors are used to assign resources to users
  • Discuss two ways to provision a resource to an Oracle Identity Manager user: through policies (user membership rules and access policies) and via requests
  • Discuss autoprovisioning
Understanding Advanced Request Functionality
  • Explain the types of requests that you can create and manage
  • Compare single requests and bulk requests
  • Discuss how to create draft versions of requests
  • Describe the two types of approval workflows associated with requests: request-level and operational-level approval workflows
  • Explain the stages of a request throughout a request’s life cycle for both single and bulk requests
  • Discuss the role that users, entities, approval workflows, email notifications, and SOA composites play in requests
  • Deploy SOA composites
  • Associate approval rules with, and complete, request-level and operational-level approval workflows
Understanding Application Instances for Disconnected Resources
  • Identify application instances
  • Describe disconnected resources
  • Create and manage application instances for disconnected resources
Understanding Reconciliation
  • Identify and compare two types of reconciliation associated with Oracle Identity Manager: authoritative and account reconciliation
  • Discuss three reconciliation events that Oracle Identity Manager can perform with a resource
  • Compare primary and non-primary user accounts
  • Discuss the role that reconciliation plays in designating user accounts as primary accounts
  • Identify scheduled tasks
  • Discuss the role that scheduled tasks have with authoritative reconciliation and account reconciliation
  • Explain how to implement authoritative reconciliation and account reconciliation workflows
  • Identify access policy harvesting, and discuss the role that access policy harvesting plays in a reconciliation workflow
Understanding Oracle Identity Manager Security
  • Compare authorization and authentication
  • Identify administrative roles
  • Examine types of administrative roles available in Oracle Identity Manager
  • Manage administrative roles
  • Describe self service capabilities
  • Discuss the role that policies and rules play in restricting a user’s self-service capabilities in Oracle Identity Manager
Managing Reports
  • Identify and compare types of reports that an administrator can create for Oracle Identity Manager organizations, roles, and users
  • List different reports available with Oracle Identity Manager
  • Identify Oracle Business Intelligence (BI) Publisher, the reporting tool for Oracle Identity Manager
Understanding Identity Certifications
  • Describe identity certification and attestation
  • Identify the business drivers for certification
  • Configure certification in Oracle Identity Manager
  • Create and manage certification definitions
  • Explain how risk summaries are calculated
  • Describe closed-loop remediation and remediation tracking
  • Describe event listeners
  • Describe and configure multi-phased reviews for user certifications
Understanding Identity Audit (IDA)
  • Describe Identity Audit (IDA)
  • Compare two IDA types: preventative and detective
  • Discuss IDA concepts
  • Enable IDA in Oracle Identity Manager
  • Manage four IDA components: rules, policies, scan definitions, and policy violations
Transferring Oracle Identity Manager Configurations
  • Identify the Deployment Manager and the sandbox
  • List the objects that you can import or export by using the Deployment Manager
  • Discuss the advantages and best practices of using the Deployment Manager
  • List other operations that you can perform with sandboxes
Customizing the Oracle Identity Manager UI
  • Discuss three approaches for customizing the Oracle Identity Manager web-based UI
  • Identify Web Composer
  • Describe Expression Language (EL)
  • Examine the role EL plays in web customization
  • Customize the Oracle Identity Manager UI by changing the Oracle Identity Manager console logo, providing links in Oracle Identity Manager, and adding descriptive information to entitlements