oracle adaptive access manager training

Introduction To Adaptive Access Manager Training Course:

Oracle Adaptive Access Manager in short called as OAAM. It addresses the business challenges in an cost effective & scalable manner. The OAAM provides an extensive set of capabilities including  the device fingerprinting, real-time behavioral profiling & risk analytics that can be harnessed across both Web & mobile channels. It also provides the risk-based authentication methods including the Knowledge Based Authentication (KBA) challenge infrastructure with Answer Logic & OTP Anywhere server generated one-time passwords, delivered out of band via the SMS, email or the IM channels. Register for Adaptive access manager training  and see how the OAAM also provides out-of-the-box integration with Oracle Identity Management, the industry leading identity management & Web SSO products, which are integrated with leading enterprise applications.



oracle adaptive access manager training Course Content

  • Define four types of Internet attacks
  • Propose four solutions for Internet attacks
  • List the benefits of Oracle Adaptive Access Manager
  • Describe the role of Oracle Adaptive Access Manager
  • Explain how OAAM works
  • OAAM 11gR1 PS1 New features
  • Describe the high-level architectural and deployment topology
  • Provide a use case for OAAM’s role in Oracle Identity Management Suite integration
Installation and Configuration
  • Describe prerequisites
  • Install and configure OAAM
  • Post-install and Configure validation steps
  • Start and stop the OAAM 11g environment
Customizing OAAM
  • List the different types of OAAM customizations
  • Perform key customizations: Custom CSS
  • Perform key customizations: Header and footer
  • Perform key customizations: Virtual Authentication Devices (VAD)
  • Perform key customizations: User action and flows
  • Perform key customizations: Custom layout
  • Describe the key configuration files used in customizations
Policies – Static, Predictive and Patterns
  • Distinguish and describe three types of risk analyses
  • Create static policies
  • Create the artifacts – Checkpoint, Conditions, Rules, Actions Groups, and Alerts
  • What is a pattern?
  • In a pattern, what data is captured and when
  • In a pattern, where is data stored and how is data used?
  • How to use predictive analysis
  • Provide OAAM predictive analysis use
Native Integration
  • Integrate OAAM natively with customer application by using: In-Proc or SOAP mode
  • Native Integration by Using .NET SDK
  • In-Proc Versus SOAP Mode
  • In-Proc Native Integration in OAAM 11g
  • Use sample application to perform code walk through on Java APIs implementation
  • Understand Entities, Data Elements and Transaction data
  • Using and Defining Transaction Definition
  • Mapping Entities to the Source Data
  • Mapping Transaction Data to the Source Data
  • Performing Transaction Fraud Analysis
Auditing and Reporting
  • Install and configure BI Publisher Reports
  • View out-of-the-box reports
  • Configuration Setup
  • Creating custom reports
  • Learn OAAM audit framework
  • Understand audit data, reports, and events
  • Use BI Publisher to run audit reports
Monitoring and Diagnostics
  • Identify tips on troubleshooting OAAM 11g environment
  • Monitor the key metrics by using FMW EM Control
  • View and configure logging
  • Use the OAAM Dashboard
OAAM Offline and Job Scheduler
  • Explain job types
  • Explain how to schedule jobs
  • Describe job management
  • Explain the OAAM offline server Use Cases
OAAM – OAM Integration
  • List different types of integration options
  • Explain OAM-OAAM TAP integration use case
  • Explain risk-based challenge by using KBA
  • Explain step-up authentication by using OTP