Detailed Course Outline
Overview
- Define four types of Internet attacks
- Propose four solutions for Internet attacks
- List the benefits of Oracle Adaptive Access Manager (OAAM)
- Describe the role of Oracle Adaptive Access Manager
- Explain how OAAM works
- List the new features in OAAM 11gR2 PS3
- Describe the High-level Architectural and Deployment Topology
- Provide a use case for OAAM’s role in Oracle Identity Management Suite integration
Installation and Configuration
- Describe Prerequisites
- List the key steps to install and configure OAAM
- Post-install and Configure validation steps
- Start and stop the OAAM 11g environment
OAAM Customizations
- List the different types of OAAM customizations
- Perform key customizations: Custom CSS
- Perform key customizations: Header and Footer
- Perform key customizations: Custom Virtual Authentication Devices (VAD)
- Perform key customizations: User action and flows
- Perform key customizations: Custom layout
- Describe the key configuration files used in customizations
Policies – Static, Patterns, and Predictive
- Distinguish and describe three types of risk analyses
- Create Static Policies
- Create the artifacts – Checkpoint, Rules, Conditions, Alerts, and Actions Groups
- What is a pattern?
- In a pattern, what data is captured and when?
- In a pattern, where is data stored and how is data used?
- How to use predictive analysis
- Provide OAAM predictive analysis use cases
Custom Application Integration
- Integrate OAAM natively with a custom application using In-Proc mode integration
- Integrate OAAM natively with a custom application using SOAP mode integration
- Use sample application to perform a code walk through on Java APIs implementation
Transactions
- Understand Entities, Data Elements and Transaction data
- Defining and Using Transaction Definition
- Mapping Entities to the Source Data
- Mapping Transaction Data to the Source Data
- Performing Transaction Fraud Analysis
Reporting and Auditing
- Install and configure BI Publisher Reports
- View out-of-the-box reports
- Setup Configuration
- Creating Custom Reports
- Learn OAAM audit framework
- Understand Audit Events, Reports, and Data
- Use BI Publisher to run Audit Reports
Monitoring and Diagnostics
- Identify tips on troubleshooting OAAM 11g R2 PS3 environment
- Monitor the key metrics by using FMW EM Control
- View and configure logging
- Use the OAAM Dashboard
OAAM Offline and Job Scheduler
- Explain Job Types
- Explain how to Schedule Jobs
- Describe Job Management
- Explain the OAAM Offline Server Use Cases
OAAM – OAM Integration
- List different types of integration options
- Explain OAM-OAAM TAP integration use case
- Explain risk-based challenge by using KBA
- Explain step-up authentication by using OTP
Customer Service Representative and Agent Fraud Cases
- Understand Customer Service Representative Cases
- Understand Agent Cases for Fraud
- Perform Profile Resets for OTP
- Unblock users who fail OTP Challenges