Detailed Course Outline
Introducing Oracle Identity Governance 11g R2 PS3
- Receive a product overview
- Manage users, user entities, and resources
- Handle reconciliation workflows
- Manage security, reports, and tools
- Deploy configurations
- Customize Oracle Identity Manager
Understanding Identity Management and Identity Governance
- Discuss identity management
- Explain Oracle Identity Management
- Describe the four solutions-based, functional areas of Oracle Identity Management: Access Management, Identity Governance, Directory Services, and Mobile Security
- Examine the role that Oracle Identity Manager plays in both Identity Governance and Oracle Identity Management
- Describe the tiers of the Oracle Identity Manager architecture
Launching Oracle Identity Manager
- Compare Oracle WebLogic Server, Oracle Identity Manager Server, and SOA Server
- Discuss the Oracle Identity Manager interfaces: self-service interfaces, administrative interface, Design Console, and SCIM service
- Identify the differences among the consoles available from Oracle Identity Manager and Oracle SOA
Understanding Organizations, Roles, and Users
- Explain users, roles, and organizations
- Compare parent and child organizations and roles
- Compare types of Oracle Identity Manager users
- Discuss Oracle Identity Manager user membership in organizations and roles
- Describe dynamic organizations and parametric roles
- Discuss Role Lifecycle Management (LCM) and role analytics
- Explain the Bulk Load Utility and discuss its benefits
- Discuss customized search results
Installing and Configuring Predefined Connectors
- Identify an Oracle Identity Manager connector
- List the connectors in the Oracle Identity Manager Connector Pack
- Describe the ways to transfer connectors from one environment to another
- Explain the advantages of and best practices for transferring connectors
- Identify two tools used to import and export connectors: Manage Connector and Deployment Manager
- Explain how the Manage Connector tool is used to import connectors for external resources
- Configure a connector to make it operable
Understanding Application Instances
- Identify an Oracle Identity Manager application instance
- Describe how application instances relate to connector objects
- Provide examples of application instances
- Identify entitlements for application instances
- Discuss complex entitlements for application instances
- Describe and manage sandboxes
- Describe how to create an application instance
- Manage entitlements for application instances
Using the Access Request Catalog
- Identify the Request Access Catalog
- Describe the business challenges solved by the Request Access Catalog
- Understand the concepts and terminology associated with the Request Access Catalog
- Describe how to manage the Catalog
Understanding Policy-Based Provisioning
- Identify and compare resources and Oracle Identity Manager connectors
- Describe how connectors are used to assign resources to users
- Discuss two ways to provision a resource to an Oracle Identity Manager user: through policies (user membership rules and access policies) and via requests
- Discuss autoprovisioning
Understanding Advanced Request Functionality
- Explain the types of requests that you can create and manage
- Compare single requests and bulk requests
- Discuss how to create draft versions of requests
- Describe the two types of approval workflows associated with requests: request-level and operational-level approval workflows
- Explain the stages of a request throughout a request’s life cycle for both single and bulk requests
- Discuss the role that users, entities, approval workflows, email notifications, and SOA composites play in requests
- Deploy SOA composites
- Associate approval rules with, and complete, request-level and operational-level approval workflows
Understanding Application Instances for Disconnected Resources
- Identify application instances
- Describe disconnected resources
- Create and manage application instances for disconnected resources
Understanding Reconciliation
- Identify and compare two types of reconciliation associated with Oracle Identity Manager: authoritative and account reconciliation
- Discuss three reconciliation events that Oracle Identity Manager can perform with a resource
- Compare primary and non-primary user accounts
- Discuss the role that reconciliation plays in designating user accounts as primary accounts
- Identify scheduled tasks
- Discuss the role that scheduled tasks have with authoritative reconciliation and account reconciliation
- Explain how to implement authoritative reconciliation and account reconciliation workflows
- Identify access policy harvesting, and discuss the role that access policy harvesting plays in a reconciliation workflow
Understanding Oracle Identity Manager Security
- Compare authorization and authentication
- Identify administrative roles
- Examine types of administrative roles available in Oracle Identity Manager
- Manage administrative roles
- Describe self service capabilities
- Discuss the role that policies and rules play in restricting a user’s self-service capabilities in Oracle Identity Manager
Managing Reports
- Identify and compare types of reports that an administrator can create for Oracle Identity Manager organizations, roles, and users
- List different reports available with Oracle Identity Manager
- Identify Oracle Business Intelligence (BI) Publisher, the reporting tool for Oracle Identity Manager
Understanding Identity Certifications
- Describe identity certification and attestation
- Identify the business drivers for certification
- Configure certification in Oracle Identity Manager
- Create and manage certification definitions
- Explain how risk summaries are calculated
- Describe closed-loop remediation and remediation tracking
- Describe event listeners
- Describe and configure multi-phased reviews for user certifications
Understanding Identity Audit (IDA)
- Describe Identity Audit (IDA)
- Compare two IDA types: preventative and detective
- Discuss IDA concepts
- Enable IDA in Oracle Identity Manager
- Manage four IDA components: rules, policies, scan definitions, and policy violations
Transferring Oracle Identity Manager Configurations
- Identify the Deployment Manager and the sandbox
- List the objects that you can import or export by using the Deployment Manager
- Discuss the advantages and best practices of using the Deployment Manager
- List other operations that you can perform with sandboxes
Customizing the Oracle Identity Manager UI
- Discuss three approaches for customizing the Oracle Identity Manager web-based UI
- Identify Web Composer
- Describe Expression Language (EL)
- Examine the role EL plays in web customization
- Customize the Oracle Identity Manager UI by changing the Oracle Identity Manager console logo, providing links in Oracle Identity Manager, and adding descriptive information to entitlements