Presents a comprehensive approach to an identity and access management (IAM) project with Oracle Identity and Access Management Suite. This book begins by defining identity and access management and explaining how to assess an organization's need for an IAM framework.
2010, 368 Seiten, mit Schwarz-Weiß-Abbildungen, Maße: 18,7 x 23,3 cm, Kartoniert (TB), Englisch
McGraw-Hill Professional ISBN-10: 0071741372 ISBN-13: 9780071741378
Nutzen Sie unsere kundenfreundlichen Filial-Öffnungszeiten! Diesen Artikel liefern
wir Ihnen auch versandkostenfrei zur Abholung in Ihre Weltbild-Filiale. Filialfinder
Klappentext zu: Designing an IAM Framework with Oracle Identity and Access Management Suite
Develop and Implement an End-to-End IAM Solution Maintain a high-performance, fully integrated security foundation across your enterprise using the detailed information in this Oracle Press guide. Designing an IAM Framework with Oracle Identity and Access Management Suite explains how to reduce risk exposure by effectively managing your full spectrum of users. Learn how to create and provision accounts, employ strong authentication and authorization, integrate legacy applications, and handle regulatory compliance. The latest performance-testing, self-auditing, and business intelligence reporting techniques are also covered in this comprehensive resource. Establish company requirements and develop implementation plans Build and execute your identity business case Set up accounts, roles, and provisioning workflows using Oracle Identity Manager and Analysis Authenticate and authorize users with Oracle Access Manager Enact strong authorization policies using Oracle Entitlements Server Identify anomalous behavior and create proactive fraud prevention rules with Oracle Adaptive Access Manager Enforce regulatory compliance and generate audit-ready reports Learn about latest additions from the acquired Sun stack
Jeff Scheidel is a Principal Security Consultant at Oracle and has been a software professional since 1984, with more than 14 years dedicated to identity and related security. He has overseen the exploration, acquisition, and implementation of identity and access frameworks at several global organizations throughout North and South America and Europe. Jeff has written on application security for Computerworld.
Wollen Sie über Neuerscheinungen des Autors per E-Mail informiert werden?
Melden Sie sich beim Autorenalarm an.