Oracle Identity Governance Review

Oracle Identity and Access Manager provide a comprehensive identity management and access control system that simplifies user access and usage monitoring across applications.

Valuable Features:

Oracle Identity Management - Pros: •Automates user identity provisioning and deprovisioning and enables organizations to manage the entire life cycle of user identities across all resources in the organization. •Oracle Delegated Administration Services: Provides trusted proxy-based administration of directory information to users and application administrators. •You can create access polices to manage users, e.g. modify, disable, delete, and unlock user accounts, passwords can also be changed for user accounts. •It can also be a means to conduct a comprehensive audit of user activities and their access privileges. •The Resource Management features, of the Administrative and User Console, enable you to manage resource objects for an organization or individual user. Managing resources includes the following activities: •Searching for and viewing the details of a resource •Disabling, enabling, and revoking a resource from users or organizations •Managing resource administrator and authorizer groups •Viewing, creating, and modifying workflows •Creating and managing IT resources •Creating and managing scheduled tasks Oracle Access Manager - Pros: •Oracle Access Manager provides Web-based identity administration and access control to web applications and resources running in heterogeneous environments. •Oracle Application Server Single Sign-On provides single sign-on access to Oracle and third-party web applications. •Oracle Enterprise Single Sign-On Suite, provides single sign-on for all applications and resources in an enterprise, without modification to the applications.

Room for Improvement:

In my opinion it has no cons.Oracle Access Manager (OAM) mainly consists of two main systems 1.Oracle Identity Management 2.Oracle Access Manager Oracle Identity management enables enterprises to manage the entire life cycle of user identities across all enterprise resources, both within and beyond a firewall. An enterprise identity management solution can provide a mechanism for implementing the user management aspects of a corporate policy. Oracle Access Manager:

Other Advice:

Access Management Oracle Access Manager stores information about configuration settings and security policies, that control access to resources in a directory server that uses Oracle Access Manager-specific object classes. You can use the same directory to store the Access System configuration settings, access policy data, and user data, or you can store this data on separate directory servers. Administrators can use the Access System to protect web resources and enterprise resources such as J2EE applications, servlets, Enterprise Java Beans (EJBs), and legacy systems. The Access System also supports both Web (HTTP) and similar types of data in non-Web (non-HTTP) resources. Using the Access System for security administration enforces your company's access security policies for Web applications and content; provides common security measures across multiple Web servers and applications; combines a centralized policy creation with decentralized management and enforcement; and enables granular control over security, across heterogeneous applications, as well as out-of-the-box integration with Oracle products, such as Oracle Portal, Oracle Collaboration Suite, and Oracle E-Business Suite.
**Disclosure: I am a real user, and this review is based on my own experience and opinions.
More Oracle Identity Governance reviews from users
...who work at a Manufacturing Company
...who compared it with SailPoint IdentityIQ
Find out what your peers are saying about Oracle, SailPoint, ForgeRock and others in Identity Management (IM). Updated: June 2021.
512,711 professionals have used our research since 2012.
Add a Comment
ITCS user