Category: <span>role management</span>

Certification Process in OIA

Certification in Oracle Identity Analytics A few quick hints for the OIA newbies out there: To Auto revoke user entitlements on certification end date:  Start in Identity Certification->My Certification: and click on “New Certification”  and click next. In the General tab enter the certification name and select “User Entitlement” as the Type (and if its incremental
Read More

Best Practice Role Management Methodologies

Best Practice Role Management Methodologies When developing Roles within an organization it is important to pre-select the proper Role Management Methodology for use on your project and for ongoing operations once your roles are ready to go live.  There are two approaches that can be used when developing access roles for a company or organization:
Read More

Export of CA Role and Compliance Manager (RCM) data to CA IdM

Accomplishing synchronization or provisioning of users, resources and/or roles from CA RCM into CA IdM involves a complicated configuration setup for RCM and IdM and understanding what requirements and limitations exist. Accomplishing synchronization or provisioning of users, resources and/or roles from CA RCM into CA IdM involves a complicated configuration setup for RCM and IdM
Read More

CA Role and Compliance Manager (RCM) 101

CA’s Role and Compliance Manager (RCM) is a product designed to accomplish two core tasks for Role Based Access Control (RBAC):  Locate, design, and model user access roles based upon user characteristics or patterns.  Provide a Web portal for certifying (attesting) user access to resources. Role and Compliance Manager (CA RCM) Introduction to Role and
Read More

Do I really need Role Management? Yes you do (aka I pity the fool that don’t have Role Management)!

Enterprise role management is a critical technology for allowing organizations to verify and enforce regulatory mandates and to audit the effectiveness of user access policies. Role management facilitates business and IT policy alignment by helping you translate business policy into technical IT controls such as separation-of-duty rules. With reporting and identity analytics capabilities, you have
Read More

Using the ORM API

I had a question come to me about the ORM API, albeit I haven’t had that much exposure to it, I do have some information for folks looking to use it: Basic program flow: 1) use JNDI to get a hold of a running ORM server object 2) login to the server (credentials do matter!)
Read More