Escolar Documentos
Profissional Documentos
Cultura Documentos
Presented by
Antony Krilis
www.agreon.com
Agenda
Enterprise Identity
You and Me
You and Me
Symptoms of the Silos
Enterprise Identity
Identity Drivers
Perception Gap
Identity
Applications Management Security
Infrastructure
• Self-Service
Workflow
• Single Sign-On Oracle
Identity Oracle
• Self-Registration Services Internet
• Delegated Management Directory
• Password Management Oracle Identity
• Auditing & Compliance Management
RBAC
WS-*
XACML 2.0
SPML
Common framework for defining usage policies, attribute requirements, and developer APIs
pertaining to the use of identity related information.
IGF will assist corporations with increased transparency and demonstrable compliance with
respect to policies for identity-related data.
Deployment
People Resources
Business Roles IT Roles
What part do I play in Map What resources do I have
the organisation? access to?
Business
Responsibilities What Roles to Privileges
amI accountable for? What rights do I have?
IT Roles
Business Rules IT Rules
Define operations – “If then else”rules that
Who can do what and when represent business
decision processes
Managing Complex Relationships
Fine Grained Policy: Allows the security model to extend from RBAC model to other security
principles such as Attribute Base Access Control (ABAC),
Central Authorisation Policy Store: Access control based on temporality (such as start
date/end date) or IP-based can now be centralized into a single authorization model with
centralized storage and administration of the policies.
Adaptive Authentication
Oracle Adaptive Strong Authenticator - Agnostic security mechanism protects sensitive
credentials from Phishing, Pharming, Trojans attacks and a range of online threats
Oracle Adaptive Risk Manager - Real-time fraud detection enables real-time actions (block,
challenge, etc.) and alerts to effectively combat fraud while also arming investigators with valuable
fraud-related data
Authenticates Access
Strong Authentication
Workflow &
Authorisation
Behaviour
Devices Authentication
Directories
Workflow
& History
Location
Oracle Adaptive Strong Authenticator
Oracle Adaptive Risk Manager
Conclusions
Woven-In versus Bolted-On: Security is integrated into applications from the start
and not force-fitted on afterwards, ensuring improved security, easier development, and
lower administrative costs.
Identity is a Journey
Web 2.0 for the Enterprise
Presented by
Antony Krilis
www.agreon.com