IdentityGov 11gR2
IdentityGov 11gR2
[email protected], [email protected]
Product Management, Oracle Identity Governance
Day 1
Introductions
Discussion
Lunch
Lets bring it to the desk for
today
Day 2
Lab 4 Empower Catalog, Configure Request Scenarios
Lab 5 Request Profiles (Practice Offline)
Discussion
Oracle Identity Manager 11gR2 Security
Lunch
Lab 6 Organizational Security based Delegated Administration
Lab 7 Advanced Security Scenarios
Day 3
Discussion
Oracle Identity Manager 11gR2 UI Customization
Lab 8 Personalization
Lab 9 Basic UI Customization
Lab 10 Adding UDF on User Schema
Lab 11 Transitioning Catalog LAF thru Advanced UI Customization
Lunch
Lab 12 Advanced UI Customization on User Creation page
Day 4
Lunch
Lab 17 Lab 22 ICF, Event Handlers, Notification, Reports, User
attribute trigger (Practice Offline)
5)
Access
Directory
Sun
User Provisioning
Identity Governance
Oracle Confidential Do Not Distribute
Access Management
8
Cloud
Mobile
Social
Web
Social
Mobile
User
Engagement
User Engagement
Business Process
Management
Service
Content
Management
Service
Integration
Integration
Business
Intelligence
Data
Integration
Data Integration
Cloud Application
Foundation
Enabling
the Interaction
Securing
the Experience
Enterprise
Management
10
Modernized Platform
Simplified Experience
Extreme Scale
Faster
Deployment
Oracle Confidential Do Not Distribute
Lower
TCO
11
Identity
Governance
Access
Management
Directory
Services
12
Access
Web Single Sign-on
Federation
Mobile, Social & Cloud
External Authorization
SOA Security
Integrated ESSO
Token Services
Fraud Detection
Directory
LDAP Storage
Virtual Directory
Meta Directory
13
Simplified Search
Tracking &
Visibility
14
Common UI Framework
One Platform Unlimited Potential
15
Account
Lifecycle
Policy
Control
Reduce
Risk
Checkin
Checkout
Audit
Logging
Improve
Compliance
16
Single Workflow
Single Attestation
Oracle Confidential Do Not Distribute
17
REST
Single
Sign-on
OAuth
Step-up
Auth
18
19
20
Social Sign-on
Select
Login
Authorize
21
22
Federation
Web Access
Control
Enterprise
Sign-on
Integrated
Fraud Detection
Fraud
Detection
Token Services
External
Authorization
Standards
Based
Fraud Detection
SOA Security
23
Operational Scale
Economies of Scale & Faster Performance
DIRECTORY SERVICES
ACCESS MANAGEMENT
Optimized System
Unified Directory
3x
Performance
Oracle
SPARC T4
Unified Directory
3xRead 5xWrite
250M Users
1/6
3K Auth/Second
Two Servers at 5250 TPS
Cost
24
User Interface
Customization
Performance
Fusion Middleware
Oracle Confidential Do Not Distribute
25
Upgrading
Gain a Platform Advantage
Lower TCO
Oracle Confidential Do Not Distribute
26
27
28
29
30
facebook.com/OracleIDM
White Papers
blogs.oracle.com/OracleIDM
Datasheets
twitter.com/OracleIDM
31
32
33
34
35
Connectors
Access
Request
Provision
De-Provision
Privileged
Role
Check-in/
Identity
IT Audit
Rogue
Reporting &
Account
Lifecycle
Checkout
Certifications
Monitoring
Detection &
Privileged
Request
Management
Reconciliation
Access
Monitoring
Roles
Access Catalog
Entitlements
Accounts
Glossaries
36
Harvesting
Catalog
definition
Catalog enrichment
37
Compare &
Select
Track
Receipt
Confirmation
38
39
Access
Request
Audit /
Monitoring
Certification
Password
Vault
Check-in /
Check-out
40
Cloud Applications
Access
Request
Access
Certification
Privileged
Access
Enterprise Applications
Identity
Connector
Framework
Identity
Connectors
Directories
Databases
Custom Applications
and Mainframes
41
Top-Down
Approach
Role Governance
Role
Audit, Analytics
Role
Mining
Change Mgmt
Bottom-Up
Approach
Role Audit
Role Entitlement Mapping
History
Role Membership History
Approvals History
Role Ownership History
Governance
42
43
Applications
Risk Factors
Identity Data
Sources
DB
Roles
Certification
History
Entitlements
Mainframe
Provisioning
Events
Resources
Policy
Violations
Risk Aggregation
Approve
Reject
Focused
Sign-off
Oracle
Confidential
Oracle Confidential
Do
Not Distribute
44
IT Audit Policies
Role Exceptions
Monitoring
50+ Reports
Compliance Dashboards
Mitigating Controls
Remediation Tracking
45
46
Common
Workflows
Privileged
Access
Audit
Common
Connectors
Provisioning
& Connectors
Access
Certification
Common
Catalog
Access
Catalog
47
Define
Roles and Policies
Privileged
Access
Audit
Audit and
certify access
Provisioning
& Connectors
Access
Certification
Approve and
fulfill access
Access
Catalog
48
Enterprise/
Roles
Provisioning
& Connectors
Audit/ Policy
Monitoring
Access
Certification
Monitor
Access
Reduce
Risk
Improve
Compliance
49
Lower TCO
Oracle Confidential Do Not Distribute
50
51
52
Approvals
Email Folder Style Inbox for Approvals, Manual Provisioning &
will be extended for Certification by R2 Patchset 1.
Priority Queues and User Defined Views to Prioritize Assigned
Tasks
53
54
55
Change account
passwords
Perform business
functions
without leaving the
Home Page
Property-editing
without IDE or
code
Use EL
Expressions
for dynamic
control over
properties
56
Customized User
Interface
57
58
Data Security
59
60
61
62
63
64
65
66
67
68
Summary
Complete, Comprehensive Solution
Identity self service for personalized, business user friendly user experience
Extensible Access Catalog and Access cart for business user friendly access request
Support for intranet and extranet Identity Administration using an organization-scoped
security model
Pre-integrated with Oracle Identity Analytics and Oracle Privileged Account Manager
providing a complete Governance Platform
Applications Integration
Strategic Roadmap
69
Provisioning
70 Not Distribute
Oracle Confidential Do
70
Agenda - Provisioning
Concepts Application Instance, Entitlement, AdminRoles, Catalog, Connected /
Disconnected Application Instances & Entitlement, Account Types, Properties.
High level flow - How it all fits together?
On-boarding Application Instance, Entitlement
Catalog Based request for Application Instance & Entitlement and approval /
provisioning / manual provisioning SOA task.
Application Instance life cycle
Entitlement life cycle
Schedule Jobs
Impact on other OIM Features
Request Status for Application Instance / Entitlement
Access Policy Enhancements
Pre-Upgrade guidelines for Provisioning
71 Not Distribute
Oracle Confidential Do
71
Concepts
Application Instance An entity representing an actual target server instance.
Abstraction of ITResource and Resource.
Dependent App Instance Still based on Resource Object.
Entitlement First class entity representing privilege in target system.
Admin Roles OOTB roles having permissions for specific operations on entities.
Viewer operation via request & approval
Administrator To manage (CRUD) entity via sys admin console.
Authorizer direct operation without request & approval.
72
Concepts
Publishing App Instance/Entitlement to Org
To make them available for requester.
Account type
primary The very first Provisioned Account. Entitlements are initially associated to primary
account.
other All other accounts other than primary and service account.
service Account that is marked as a service account. Service account can not be a primary
account.
73
74
75
76
On-boarding Entitlements
Connected Entitlements
Import connector.
Tag Entitlement = true in child process form.
Run Lookup Reconciliation Job
Run Entitltment List Job
Run Catalog Synchronization Job.
Disconnected Entitlements
Create Child form using UI
Add field of type Lookup
Populate lookup manually or by using flat file
based lookup recon (covered in Lab 16)
Run Entitlement List Job
Run Catalog Synchronization Job.
77
78
79
Entitlement Provisioning
80
80
81
82
83
84
84
Schedule Jobs
Lookup Reconciliation Task - Populates Lookup
Target System LKU/LKV ENT_LIST (if marked Entitlement=true)
85
86
87
88
If more than one policies applies, one with Revoke and other with Disable, then Disable
takes precedence. i.e (OIU_REVOKE = 2)
Entitlements (child data) are always revoked (for both Disable/Revoke case).
If policy applies again, accounts in Disabled state are Enabled rather than Provisioning
new account.
If AP is with Approval, Request is only created for Access Policy Based Provision (and not
for Disable, Enable, Revoke action. )
Anything that is not RNLA, will become DNLA as a part of upgrade.
89
89
90
90
91
91
Access Request
92 Not Distribute
Oracle Confidential Do
92
93 Not Distribute
Oracle Confidential Do
93
Catalog Configuration
Harvesting
Base Entity creation
Role - Create, describe
App instance - Create, describe
Entitlement
Have app instance created for underlying IT resource
Ensure form properties are set - Entitlement = true
Connector lookup recon, bring in LKU
ENT synch job
Navigate to app instance, open entitlements and describe
Catalog Harvesting
Role - automatic
App instance, entitlement - Catalog synch sch task
Approval workflow configured
Start using the request engine
94 Not Distribute
Oracle Confidential Do
94
Catalog Configuration
Extend Catalog
Add UDF on catalog form using form designer
UI customization of catalog page, add field
Data Enrichment (empower tagged searches, filtered by category, risk flagged by
colors)
Manual - catalog admin role. Edit Category, Audit Objective, Risk Level and User
Defined Tags attributes. Name, display name and Description comes from base
entity.
Bulk - check IT resource key, prepare CSV, run catalog synch (metadata mode)
API
Configure Security
Publish catalog (base entities) to respective organizations
Roles
Application Instances (with or without Entitlements)
Specific Entitlements
95 Not Distribute
Oracle Confidential Do
95
Effectively leveraging Open stds & SOA technology - Web services, XSDs, WSSecurity, Business rules.
Request Web service (reqsvc)
XSDs - User, Role, Org, Request (request and general request), App Instance, Entitlement,
Resource, Account, Catalog item, Fault data
WSDL - Operations to get data for all the above mentioned entities in the same
datastructure as defined by the XSD files
Secured by default with username token policy and exposes CSF key to clients.
96 Not Distribute
Oracle Confidential Do
96
97
AND
IF
risk == 3 (low)
THEN
stageType = Auto
IF
catalog item != ROLE
AND
IF
risk == 3 (low)
THEN
stageType = Manager
IF
risk == 5 (medium)
THEN
stageType = Parallel (Beneficiary Manager (User) || Audit Review Team(Role))
IF
risk == 7 (High)
THEN
stageType = Serial (Beneficiary Manager (User) Audit Review
Team(Role))
98 Not Distribute
Oracle Confidential Do
98
12. Define source values for Task parameters, using what we have from payload
13. Set identification key as request ID
14. Map output to the response.
15. Deploy workflow
16. Create Approval policies (IT details agnostic ), no logic in rules, use them as
dummy connection between OIM SOA Composite
99 Not Distribute
Oracle Confidential Do
99
100
101
102
103
Request Lifecycle
An operation performed by user may/may not require approvals based
on his/her access permissions.
Bulk operation always requires approval(s).
Operations performed by Entity Authorizers do not require approvals.
Future effective date requires approval
Request dataset management through form designer.
104
Heterogeneous requests
Request access for heterogeneous entities (any of
ApplicationInstance/Entitlement/Role) in a go.
An account in the Target is required before requesting access to the
Targets Entitlements.
Heterogeneous request split to individual request types after Request
level approval.
Eg: If a user requests access to an ApplicationInstance & an Entitlement,
after Request level approval, it would be split into child requests of
types Provision ApplicationInstance and Provision Entitlement.
105
106
107
108
If the approval workflow uses Business Rules, even the logic can be
updated both IF conditions and THEN assertions!!
109
110
Request Profiles
Its a saved cart, containing related entities and optionally, form data for
the entities.
Can be used to raise Access requests alone.
Created by Catalog Administrators and accessible to all users.
Pros:
- Simplified Access request creation for end-users.
- Re-usability of saved carts.
- Avoid human errors while filling form data.
111
112
113
Lab 2
Install connector, create app instance, extend the form schema, execute lookup recon
for gathering entitlements, create automated provisioning configuration (Access
Policies + Role membership rules).
Lab 3
Generic/IT application agnostic, compliance objectives driven approval workflow
and manual fulfillment SOA composite - development and deployment. Output
composites are already available in the VM.
Day 2..Lab 4
Base entity updates, Catalog harvesting, extension, manual/bulk enrichment, security,
catalog UI customization, Access request scenarios (using composite developed in
Lab 3)
Oracle Confidential Do Not Distribute
114
Security
115Not Distribute
Oracle Confidential Do
115
Agenda - Security
OIM Authorization using OES
Admin Roles
Entity Publication
Enhanced Security architecture
Authorization Policy Enforcement points
Functional placement and use cases
Updating OOTB Authorization Policies
Understanding the OOTB Authorization Policies
Authorization Use-cases
116
Authorization Service
OES Policy
Repository
Repository
Container (Weblogic)
OIM Database
117
Supports delegated administration of roles, organizations, entitlements, application instances, and LDAP groups.
Lets backend make various security decisions, for example, who can request what, who can have what, and who
needs to go through approval. Facilitates the security of catalog-based request module and of converged UI and
backend of self service and delegated-administration.
Scoping mechanism for delegated administration and data security of various entities. All
entities are scoped by the organization structure
118
119
Admin Roles
The new authorization model works on the basis of the admin role assignment to a user.
New admin roles cannot be added. Admin roles cannot be created, updated, deleted or
requested
Admin Roles: System-Wide/Global Assigned in scope of Top org only.
Admin Roles: Assigned in the scope of Organizations Any org including Top
120
Admin Roles
Admin role membership organization scoping is hierarchy-aware, and can be cascaded
downwards to the child organizations.
Admin role membership is always given in an organization scope, and can only be assigned by
the System Administrator or System Configuration Administrator.
Inherent permissions: The organization to which a user is a member is referred as the Home
organization for that user. A user has certain implicit permissions on the entities available to the
Home organization.
Management hierarchy: If User A is the manager of User B and User C, then User A has implicit
permissions on User B and User C, even if User B and User C are in different organizations.
User A does not need explicit privileges on the direct reports, irrespective of which organization
the direct reports belong.
Each admin role in Oracle Identity Manager has one-to-one mapping to the application roles in
the OES.
The application roles have associated policies that govern what permissions are allowed for
users who belong to this role. Changing the functional and data constraints on these policies,
you must open the respective policy in Authorization Policy Management (APM) UI in OES, and
modify the policy
The basic-info permission gives the permission only to view-search the given entity.
121
Top Org
122
Display Name
Description
OrclOIMSystemAdministrator **
System Administrator
OrclOIMSystemConfigurator **
OrclOIMCatalogAdmin **
OrclOIMRoleAdministrator
OrclOIMRoleAuthorizer
OrclOIMRoleViewer
OrclOIMEntitlementAdministrator
OrclOIMEntitlementAuthorizer
OrclOIMEntitlementViewer
Role Administrator
Role Authorizer
Role Viewer
Entitlement Administrator
Entitlement Authorizer
Entitlement Viewer
OrclOIMApplicationInstanceAdministratorRole
OrclOIMApplicationInstanceAuthorizerRole
OrclOIMApplicationInstanceViewerRole
OrclOIMOrgAdministrator
OrclOIMOrgViewer
OrclOIMUserAdmin
OrclOIMUserHelpDesk
OrclOIMUserViewer
OrclOIMSPMLAdmin **
123
Helpdesk Admin
User Viewer
Function Security
Create User
Delete User
Get user in search results
View User (requires attribute-level security)
Modify User attributes (includes updating the organization attribute of a user in Standard Edition). Requires attribute-level security
Enable User
Disable User
Unlock User
Change User Password
Change Password in Application Instance
Grant/ Revoke Roles
Provision/ Deprovision/ Modify/ Enable/ Disable Application Instances
Grant/ Revoke Entitlements
Get user in search results
View User (requires attribute-level security)
Enable User
Disable User
Unlock User
Change User Password
Change Password in Application Instance
Create User through Request
Delete User through Request
Get user in search results
View User (requires attribute-level security)
Modify User attributes (includes updating the organization attribute of a user) through Request. Requires attribute-level security
Enable User through Request
Disable User through Request
Grant/ Revoke Roles through Request
Provision/ Deprovision/ Modify/ Enable/ Disable Application Instances through Request
Grant/ Revoke Entitlements through Request
Any and All Users (Any OIM users, Self Modify user profile
All Users is not a role)
Self Change Passwords/ Challenge Questions
Raise Request for self
Scoping Rules
1)
I can perform the functions (given in Function Security)
on users that are in the orgs that I am allowed to
manage.
2)
I can only perform the functions on user attributes for
which I have access
124
Create Role
View Role
Update Role attributes
Delete Role
View Role Members
Create Role Category
Update Role Category
Delete Role Category
Manage Role Hierarchy
Publish role to a set of organizations (in this context, data security applies)
1)
Role Viewer
Role Authorizer
2)
3)
125
Create Organization
View and Manage (Update) Organization attributes
Delete Organization
All Role Admin Privileges for Admin Roles.
Update Organization Hierarchy (for a specific organization)
Update organization attributes (of a specific organization)
Organization
Viewer
126
Entitlement
Authorizer
Entitlement
Viewer
Publish Entitlements available to a set of organizations (in this context, 1) I can publish the
data security applies)
Entitlements to the orgs
View Entitlement Members
that I am allowed to
manage
2) I can manage the
entitlements that are
published to org(s) that I
can manage
View Entitlement in search results
I can perform functions on
View Entitlement attributes
entitlements that have been
View Entitlement Members
published to org(s) that I am
Request Entitlement grant/ revoke for users
allowed to manage
No approval needed
View Entitlement in search results
I can perform functions on
View Entitlement attributes
entitlements that have been
Request Entitlement grant/ revoke for users
published to org(s) that I am
allowed to manage
127
Application
Viewer
Application
Admin
Catalog Admin
1)
2)
128
Admin role membership defines the relationship between a user and an admin role in the context
of an org.
Admin role memberships are hierarchy aware, that means that a user having a admin role at
parent org can also act with the same admin role in the child org too if hierarchy flag is set to
true.
Can be viewed from the context of an org OR from the context of a user.
129
Deleted
Delete
Active
Modify
130
1. Search User
3. Click Add
131
132
Entity Publication
Publication is the way of making an entity available to an org.
Role, App Instance, and Entitlement can be published by respective administrators from the entity
details screen.
Publication is hierarchy aware, so an entity can be made visible to child orgs too, though its actually
published to parent org.
Auto Publish :When an entity administrator creates an entity, then that entity is automatically made
available to all the organizations for which the administrator has entity admin role. For example, when
a user with Role Administrator privilege creates an enterprise role, the newly created role is
automatically made available to all the organizations on which the user is the Role Administrator.
Publishes dependent data too: The publishing service also supports publishing of dependent data (like
entitlements for app-instance), when the parent entity is published.
133
Users admin-role
memberships in
organizations
Entities available in
organizations
134
Delete
Deleted
Active
Modify
Please Note : The life-cycle of publication entity is separate from the actual entity (like role etc) life
cycle itself. However when the entity is deleted, the actual publication also gets deleted.
135
Create a Role
To manually publish .
Click Assign
1. Search Org
3. Click Ok
Role published to org
136
137
138
139
140
Data Security
Who can perform actions on what data?
Tool: OIM Admin Role Assignment
Data Scoping
141
OIM Self Service console will have ADF security enabled. Which means access to all task-flows and page
definitions is governed by ADF Security policies defined in the JAZN file.
All OOTB OIM task-flows must be protected by defining them as a resource and adding them in JAZN file
with appropriate permissions to application roles. There are two special roles, authenticated-user and
anonymous-user.
If logged in user does not have permission to perform an action as per his admin roles, then the action
(menu, button, or link) will be either disabled or not visible to the user in the UI. This is enforced by using EL
scripts in the ADF UI. As an example, to check if user has permission to create a user, the EL script is as
follows:
<af:commandNavigationItem rendered=#{oimuser.create.allowed} />
142
143
144
User Management
Role Management
Organization Management
Application Instance
Entitlement
Entity Configuration
Reconciliation Management
Scheduler
Approval Policy Management
Notification Management
System Properties
Diagnostic Dashboard
Plug In Framework
Authenticated User Self Service
145
146
Management Hierarchy
147
148
149
150
151
152
153
We have various policies defined for System Configurator and they don't have any datascoping for Scheduler/Notification & so on.
Note: There are no authorization policies defied for the System administrator role, All the
actions are allowed for user having the system admin role.
154
Helpdesk community
Can only reset password and on various accounts
Can lock/unlock & disable/enable an user
Role Authorizers can request for roles as Direct operation while for role-viewer its request
operation
End-User can request for role-grants published to the Home-Organization.
Organization Admin can create sub-organizations only if they are admin with includehierarchy as true.
Managers can search for reports and raise requests for role-grants.
Organization Viewer can only search and view the organizations
Role Administrators can publish the roles to the organizations.
Demonstrate Organization based scoping
Publishing entities to organization (with/without hierarchy)
155
UI Customization
156Not Distribute
Oracle Confidential Do
156
Agenda UI Customization
OIM UI Applications Deployment Topology
Customization Scenarios
Personalization
WebCenter and Web Composer
Sandbox
157Not Distribute
Oracle Confidential Do
157
158
Customization Scenarios
Personalization
Customizations @ run time, done on browser itself, activate without
restarting server
Seeded Customizations- Adding taskflows, changing skin, deploy and
restart
159
Personalization
Rearrange sections in home page, add, delete them
Saved Searches
Personalized View of search results table
160
Web Composer
Customize
SANDBOX
Publish
161
Sandbox
Activate
Deactivate
Publish
CLOSE ALL OPEN TABS
Recovery strategy 1 Take MDS back, so that you can restore the previous state again
Follow instructions to revert back the changes made by a sandbox
Export
Before publishing
Import
Conflict Management
162
163
164
165
Internationalization
166
167
User Context
#{oimcontext.currentUser.adminRoles['OrclOIMSystemAdministrator'] != null}
#{oimcontext.currentUser['ATTRIBUTE_NAME']}
Many More
RequestForm Context
#{pageFlowScope.requestFormContext.requestEntityType == 'APP_INSTANCE'}
#{pageFlowScope.requestFormContext.beneficiaryIds}
Many More
http://docs.oracle.com/cd/E27559_01/dev.1112/e27150/uicust.htm#BABHBFGH
168
169
170
171
Seeded Customizations
Changing Skin
Using ADF data validations
Adding custom Help topics
Building a custom ADF taskflow
Adding one more custom region to the home page
Creating an external link
172
Seeded Customizations
Developing Managed Beans
Showing components conditionally: Show the Contact Information panel on the Create User
page only when the User Type is Full-Time Employee
Cascading LOVs : Based on the selected value in the User Type list on the Create User page, you
might want to display the Job Code list or another LOV component whose list of values is dependent
on the currently selected value in the User Type list.
Form pre-population based on a condition: Pre-populate values in the User Login and E-mail
fields on the Create User page based on the values of the First Name and Last Name fields
Setting fields as Mandatory based on a condition: Make the Manager field on the Create User
page mandatory only if the User Type is Intern
Form data validation: OOTB ADF validation, Custom Validations - Start Date cannot be after End
Date
173
and Infrastructure
174Not Distribute
Oracle Confidential Do
174
LCM Improvements
One Example Developing Event handler.
Deployment, Un-deployment using OIM Customization Installer
Not a part of the product, Asset available on OTN
Create connection to OIM managed server and OIM MDS database
Deploy
Undeploy
Option to deploy it using Plugin registration utility. No separate deployment of event
handler XML using MDS utilities is required.
Verify the deployment using Enterprise Manager
Navigate to the relevant form and query using Entity and Orchestration name.
Travers through the ordered list of Event handlers and verify that your guy is IN.
Export using Improved Deployment manager
Exports EVERYTHING, not only the metadat
175Not Distribute
Oracle Confidential Do
175
Overall LCM
176Not Distribute
Oracle Confidential Do
176
177Not Distribute
Oracle Confidential Do
177
Upgrade from R1 to R2
Pre-upgrade Analysis
What will get upgraded, What not etc. Run reports
Pre-upgrade checklist
take backups- database, middleware home, domain
Schema Upgrade
From the IAM home, run Patchset Assistant (PSA) upgrade schema of all IAM products (OIM, OAM
etc.). Choose to upgrade database schema OIM PS1 DB user and other schema like MDS, SOA etc.
178Not Distribute
Oracle Confidential Do
178
Upgrade from R1 to R2
Middleware Upgrade - Admin and SOA servers should be running but not OIM. Run Standalone OIM
Upgrade script (OIMs homegrown script) which would upgrade middleware and domain of OIM. Upgrade the
MDS schema plus the domain configurations. This step logs on the execution to a HTML report.
Verification
Restart all servers (even this would carry out a lot of important steps for upgrade, like populating more
policies to DB policy store etc.). This step also logs on the execution to a HTML report.
Navigate to the relevant directory and check all reports for verification of upgrade and errors if any, to
plan manual remediation.
179Not Distribute
Oracle Confidential Do
179
1HCY2012:
- OIM 11g R2
- Business User friendly
Experience
- Simplified Customization
- Integrated with OIA for closed
loop governance
- Integrated with OPAM for
Privileged Account Governance
1HCY2013:
OIM R2 PS1
- WebSphere Certification
- Common Data Model for
Access Request and
Certification
2HCY2013:
OIM R2 PS2
- Oracle Identity Manager XE
- Connector Attribute Mapping
- Hierarchical Attribute
Description
- Complete Accessibility
180
181
182