E N D
Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decision. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle.
CON8811 Converged Identity Governance for speeding up business and reducing cost Sanjay Rallapally Sr. Manager, Product Management
Program Agenda • Converged Identity Governance • Panel Discussion • Q & A
Business Problems SIMPLIFY GETTING THE RIGHT ACCESS STAYING IN COMPLIANCE REDUCE FRAGMENTATION AND COST
The Right Approach is Self-Reinforcing Access Request VISIBILITY ACROSS COMPLETE USER ACCESS IS KEY Self-Reinforcing Reporting & Certification Provisioning Remediation
Identity GovernanceBusiness-user friendly • Simplify access request using an Access Catalog • Allow users to request what others in their workgroup have • Empower approvers by enabling email-based approvals • Enforce security using digital signatures and re-authentication
Identity GovernanceSimple, yet Scalable architecture • Onboard and manage thelifecycle of millions ofidentities • Onboard 1000s ofapplications withoutexpensive Connectors • Onboard accounts and entitlements and manage their complete lifecycle • Shared workflows to accelerate request, fulfillment and Certification AuthoritativeSources Business Users Application On-boardingIdentity SynchronizationCatalog Management LDAP ServersDatabases IT Administrators,Application Owners Approval and ProvisioningWorkflows ERP, MainframeCloud Applications
Identity GovernanceManage Regular and Privileged Access • Manage access to applicationsusing Access Request • Use break glass workflows to get emergency access • Leverage common Connectorsto manage privileged accountsand credentials • Leverage AccessCertificationto ensure Compliance User requests privilege to manage the server User is granted privilege User checks out the passwords Return SYSTEM password User checks in passwords Unix Server Database Server • User logs in as root • Adds disk space Oracle Identity Governance
Identity GovernanceContinuous Compliance • Manage the lifecycle ofRoles and Policies • Carry out Role Miningto discover roles • Prevent violations usingSegregation of Duties • Implement AccessCertification • Address violations usingClosed-loop Remediation ReportingGovernance Analytics
Identity GovernanceA Platform Approach Simplify Access Reduce Risk Improve Compliance Access Request and Certification Provisioning and Reconciliation Role and Policy Management Reporting and Analytics Identity Administration
Customer Panel Dariusz Spiewak ZUS, Poland Rich Flees Qualcomm
Join the Oracle Community Twittertwitter.com/OracleIDM Facebookfacebook.com/OracleIDM Oracle Blogs Blogs.oracle.com/OracleIDM Oracle.com/Identity
Oracle Fusion Middleware Business Innovation Platform for the Enterprise and Cloud • Complete and Integrated • Best-in-class • Open standards • On-premise and Cloud • Foundation for Oracle Fusion Applications and Oracle Cloud Web Social Mobile User Engagement Business Process Management Content Management Business Intelligence Service Integration Data Integration Identity Management Development Tools Cloud Application Foundation Enterprise Management