> > > D81835 Detaillierte Beschreibung

Oracle Identity Governance 11g R2: Essentials (D81835)

Kursbeschreibung Kurstermine Detaillierter Kursinhalt

Detaillierter Kursinhalt

Introducing Oracle Identity Governance 11g R2 PS3
  • Receive a product overview
  • Manage users, user entities, and resources
  • Handle reconciliation workflows
  • Manage security, reports, and tools
  • Deploy configurations
  • Customize Oracle Identity Manager
Understanding Identity Management and Identity Governance
  • Discuss identity management
  • Explain Oracle Identity Management
  • Describe the four solutions-based, functional areas of Oracle Identity Management: Access Management, Identity Governance, Directory Services, and Mobile Security
  • Examine the role that Oracle Identity Manager plays in both Identity Governance and Oracle Identity Management
  • Describe the tiers of the Oracle Identity Manager architecture
Launching Oracle Identity Manager
  • Compare Oracle WebLogic Server, Oracle Identity Manager Server, and SOA Server
  • Discuss the Oracle Identity Manager interfaces: self-service interfaces, administrative interface, Design Console, and SCIM service
  • Identify the differences among the consoles available from Oracle Identity Manager and Oracle SOA
Understanding Organizations, Roles, and Users
  • Explain users, roles, and organizations
  • Compare parent and child organizations and roles
  • Compare types of Oracle Identity Manager users
  • Discuss Oracle Identity Manager user membership in organizations and roles
  • Describe dynamic organizations and parametric roles
  • Discuss Role Lifecycle Management (LCM) and role analytics
  • Explain the Bulk Load Utility and discuss its benefits
  • Discuss customized search results
Installing and Configuring Predefined Connectors
  • Identify an Oracle Identity Manager connector
  • List the connectors in the Oracle Identity Manager Connector Pack
  • Describe the ways to transfer connectors from one environment to another
  • Explain the advantages of and best practices for transferring connectors
  • Identify two tools used to import and export connectors: Manage Connector and Deployment Manager
  • Explain how the Manage Connector tool is used to import connectors for external resources
  • Configure a connector to make it operable
Understanding Application Instances
  • Identify an Oracle Identity Manager application instance
  • Describe how application instances relate to connector objects
  • Provide examples of application instances
  • Identify entitlements for application instances
  • Discuss complex entitlements for application instances
  • Describe and manage sandboxes
  • Describe how to create an application instance
  • Manage entitlements for application instances
Using the Access Request Catalog
  • Identify the Request Access Catalog
  • Describe the business challenges solved by the Request Access Catalog
  • Understand the concepts and terminology associated with the Request Access Catalog
  • Describe how to manage the Catalog
Understanding Policy-Based Provisioning
  • Identify and compare resources and Oracle Identity Manager connectors
  • Describe how connectors are used to assign resources to users
  • Discuss two ways to provision a resource to an Oracle Identity Manager user: through policies (user membership rules and access policies) and via requests
  • Discuss autoprovisioning
Understanding Advanced Request Functionality
  • Explain the types of requests that you can create and manage
  • Compare single requests and bulk requests
  • Discuss how to create draft versions of requests
  • Describe the two types of approval workflows associated with requests: request-level and operational-level approval workflows
  • Explain the stages of a request throughout a request’s life cycle for both single and bulk requests
  • Discuss the role that users, entities, approval workflows, email notifications, and SOA composites play in requests
  • Deploy SOA composites
  • Associate approval rules with, and complete, request-level and operational-level approval workflows
Understanding Application Instances for Disconnected Resources
  • Identify application instances
  • Describe disconnected resources
  • Create and manage application instances for disconnected resources
Understanding Reconciliation
  • Identify and compare two types of reconciliation associated with Oracle Identity Manager: authoritative and account reconciliation
  • Discuss three reconciliation events that Oracle Identity Manager can perform with a resource
  • Compare primary and non-primary user accounts
  • Discuss the role that reconciliation plays in designating user accounts as primary accounts
  • Identify scheduled tasks
  • Discuss the role that scheduled tasks have with authoritative reconciliation and account reconciliation
  • Explain how to implement authoritative reconciliation and account reconciliation workflows
  • Identify access policy harvesting, and discuss the role that access policy harvesting plays in a reconciliation workflow
Understanding Oracle Identity Manager Security
  • Compare authorization and authentication
  • Identify administrative roles
  • Examine types of administrative roles available in Oracle Identity Manager
  • Manage administrative roles
  • Describe self service capabilities
  • Discuss the role that policies and rules play in restricting a user’s self-service capabilities in Oracle Identity Manager
Managing Reports
  • Identify and compare types of reports that an administrator can create for Oracle Identity Manager organizations, roles, and users
  • List different reports available with Oracle Identity Manager
  • Identify Oracle Business Intelligence (BI) Publisher, the reporting tool for Oracle Identity Manager
Understanding Identity Certifications
  • Describe identity certification and attestation
  • Identify the business drivers for certification
  • Configure certification in Oracle Identity Manager
  • Create and manage certification definitions
  • Explain how risk summaries are calculated
  • Describe closed-loop remediation and remediation tracking
  • Describe event listeners
  • Describe and configure multi-phased reviews for user certifications
Understanding Identity Audit (IDA)
  • Describe Identity Audit (IDA)
  • Compare two IDA types: preventative and detective
  • Discuss IDA concepts
  • Enable IDA in Oracle Identity Manager
  • Manage four IDA components: rules, policies, scan definitions, and policy violations
Transferring Oracle Identity Manager Configurations
  • Identify the Deployment Manager and the sandbox
  • List the objects that you can import or export by using the Deployment Manager
  • Discuss the advantages and best practices of using the Deployment Manager
  • List other operations that you can perform with sandboxes
Customizing the Oracle Identity Manager UI
  • Discuss three approaches for customizing the Oracle Identity Manager web-based UI
  • Identify Web Composer
  • Describe Expression Language (EL)
  • Examine the role EL plays in web customization
  • Customize the Oracle Identity Manager UI by changing the Oracle Identity Manager console logo, providing links in Oracle Identity Manager, and adding descriptive information to entitlements

Cookies verbessern unsere Services. Durch die Benutzung unserer Website erklären Sie sich mit unserer Verwendung von Cookies einverstanden.   Verstanden.