OIM 11g R2 – Securing a Deployment

Securing an Oracle Identity Manager deployment is achieved through authorization and hardening. Authorization controls the access to various components. Hardening secures the components from potential security threats.

 

Topic Topic Type Information Covered
“Managing Scheduled Tasks” Hardening Scheduled tasks and scheduled jobs. Ensure that only required scheduled tasks are enabled.
“System Properties in Oracle Identity Manager” Hardening System properties related to system behavior. Ensure that password policies and challenge questions and answers are defined.
“Creating the User Account for Installing Connectors” Hardening Specific permissions required to install connectors.
“Enabling Secure Cookies” Hardening Enabling Oracle Identity Manager to work over SSL.
“Enabling SSL Between Identity Virtualization Library (libOVD) and the Directory Server” Hardening Instructions specific to Microsoft Active Directory, iPanet Directory Server, and Oracle Internet Directory for Identity Virtualization Library (libOVD)
“Configuring LDAP Authentication When LDAP Synchronization is Enabled” Hardening Enabling LDAP authentication.
“URL Changes Related to Oracle Identity Manager” Hardening Steps to make the corresponding changes in Oracle Identity Manager and Oracle WebLogic configuration for any change in the integrated and dependent applications
“Password Changes Related to Oracle Identity Manager” Hardening Steps to make the changes to the password in Oracle Identity Manger and Oracle WebLogic configuration for any change in the dependent or integrated products.
“Configuring SSL for Oracle Identity Manager” Hardening Securing Oracle Identity Manager by configuring SSL.
“Managing Password Policies” Hardening Password policy configuration.
“Adding the Trust Relation” Hardening Remote Manager SSL configuration.
“Configuring the Remote Manager by Using Your Own Certificate” Hardening Remote Manager configuration by using your own certificate instead of the default Oracle Identity Manager certificate.
“OES Integration” Authorization Reconciliation event access.
“Check Permissions for Roles” Authorization Permissions for role while importing and exporting roles. Check for any errors in setting data object permissions if data object is missing.
“User Management Authorization” in the Oracle Fusion Middleware User’s Guide for Oracle Identity Manager Authorization Authorization of user management operations.
“Role Membership Inheritance” in the Oracle Fusion Middleware User’s Guide for Oracle Identity Manager Authorization Inheritance of role by membership.
“Role Permission Inheritance” in the Oracle Fusion Middleware User’s Guide for Oracle Identity Manager Authorization Inheritance of role by permissions.
“Default Roles” in the Oracle Fusion Middleware User’s Guide for Oracle Identity Manager Authorization Predefined roles in Oracle Identity Manager.
“Updating Data Object Permissions” in the Oracle Fusion Middleware User’s Guide for Oracle Identity Manager Authorization Data object permissions at the role level.
“Managing Authorization for Roles” in the Oracle Fusion Middleware User’s Guide for Oracle Identity Manager Authorization Authorization for role management operations.
“Managing Administrative Roles” in the Oracle Fusion Middleware User’s Guide for Oracle Identity Manager Authorization Organization administration roles.
“Managing Permitted Resources” in the Oracle Fusion Middleware User’s Guide for Oracle Identity Manager Authorization Steps to assign and update permitted resources to the users of selected organizations.
“Organization Management Authorization” in the Oracle Fusion Middleware User’s Guide for Oracle Identity Manager Authorization Authorization of organization management operations.
“Managing Authorization Policies” in the Oracle Fusion Middleware User’s Guide for Oracle Identity Manager Authorization Using authorization policies to secure Oracle Identity Manager deployment.

Leave a Reply

Your email address will not be published. Required fields are marked *