oracle adaptive access manager training
Introduction To Adaptive Access Manager Training Course:
Oracle Adaptive Access Manager in short called as OAAM. It addresses the business challenges in an cost effective & scalable manner. The OAAM provides an extensive set of capabilities including the device fingerprinting, real-time behavioral profiling & risk analytics that can be harnessed across both Web & mobile channels. It also provides the risk-based authentication methods including the Knowledge Based Authentication (KBA) challenge infrastructure with Answer Logic & OTP Anywhere server generated one-time passwords, delivered out of band via the SMS, email or the IM channels. Register for Adaptive access manager training and see how the OAAM also provides out-of-the-box integration with Oracle Identity Management, the industry leading identity management & Web SSO products, which are integrated with leading enterprise applications.
oracle adaptive access manager training Course Content
Overview
- Define four types of Internet attacks
- Propose four solutions for Internet attacks
- List the benefits of Oracle Adaptive Access Manager
- Describe the role of Oracle Adaptive Access Manager
- Explain how OAAM works
- OAAM 11gR1 PS1 New features
- Describe the high-level architectural and deployment topology
- Provide a use case for OAAM’s role in Oracle Identity Management Suite integration
Installation and Configuration
- Describe prerequisites
- Install and configure OAAM
- Post-install and Configure validation steps
- Start and stop the OAAM 11g environment
Customizing OAAM
- List the different types of OAAM customizations
- Perform key customizations: Custom CSS
- Perform key customizations: Header and footer
- Perform key customizations: Virtual Authentication Devices (VAD)
- Perform key customizations: User action and flows
- Perform key customizations: Custom layout
- Describe the key configuration files used in customizations
Policies – Static, Predictive and Patterns
- Distinguish and describe three types of risk analyses
- Create static policies
- Create the artifacts – Checkpoint, Conditions, Rules, Actions Groups, and Alerts
- What is a pattern?
- In a pattern, what data is captured and when
- In a pattern, where is data stored and how is data used?
- How to use predictive analysis
- Provide OAAM predictive analysis use
Native Integration
- Integrate OAAM natively with customer application by using: In-Proc or SOAP mode
- Native Integration by Using .NET SDK
- In-Proc Versus SOAP Mode
- In-Proc Native Integration in OAAM 11g
- Use sample application to perform code walk through on Java APIs implementation
Transactions
- Understand Entities, Data Elements and Transaction data
- Using and Defining Transaction Definition
- Mapping Entities to the Source Data
- Mapping Transaction Data to the Source Data
- Performing Transaction Fraud Analysis
Auditing and Reporting
- Install and configure BI Publisher Reports
- View out-of-the-box reports
- Configuration Setup
- Creating custom reports
- Learn OAAM audit framework
- Understand audit data, reports, and events
- Use BI Publisher to run audit reports
Monitoring and Diagnostics
- Identify tips on troubleshooting OAAM 11g environment
- Monitor the key metrics by using FMW EM Control
- View and configure logging
- Use the OAAM Dashboard
OAAM Offline and Job Scheduler
- Explain job types
- Explain how to schedule jobs
- Describe job management
- Explain the OAAM offline server Use Cases
OAAM – OAM Integration
- List different types of integration options
- Explain OAM-OAAM TAP integration use case
- Explain risk-based challenge by using KBA
- Explain step-up authentication by using OTP