SlideShare ist ein Scribd-Unternehmen logo
1 von 37
1

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Attract New Customers and
Users by Leveraging Bring
Your Own Identity (BYOI)
Forest Yin – Product Management, Oracle
Vikas Mahajan – Director, AARP
Arnaud Robert – CTO, BeachBody
Safe Harbor Statement
The following is intended to outline our general product
direction. It is intended for information purposes only, and
may not be incorporated into any contract. It is not a
commitment to deliver any material, code, or functionality,
and should not be relied upon in making purchasing
decisions. The development, release, and timing of any
features or functionality described for Oracle’s products
remains at the sole discretion of Oracle.

3

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Program Agenda
 Introduction to Bring Your Own Identity (BYOI)
 Oracle Solution

 Customer Case Studies
– AARP
– BeachBody

4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Subscription-based
Content Services
Online
Healthcare

Citizen
Services
Business
Transformation

Mobile
Banking
5

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Manufacturing
Services

MOST SIGNIFICANT
RE-ARCHITECTURE
IN 20 YEARS

Social
Retail

Cloud
Services

Mobile
Workforce

Social
CRM

Insert Information Protection Policy Classification from Slide 12
What’s Business Transformation?

Mobile
 BYOD complicates

privacy
 Enterprise and

personal data
 Poor device, app and

data security

Cloud
 On premise, private,

Social
 Users want to use

public apps
 Identity for SaaS apps

social ID
 Simplify registration

and marketing

 Cloud-based access

portals
 Fragments identity

 Trust is difficult
 OAuth & OpenID

 Unified approach iOS,

leading to other IdPs

Android, ?

Identity is core across these
transformations
6

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Trend – Social Identity Transforming Business
Social Commerce
– FaceBook 1+ billion users

– Preferences and interests
– Friends and relationships

Social Workplace
– Social while working
– Working while social

7

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Trend – Social Identity Transforming Business

SOCIAL MEDIA MERGES
WORK & PLAY

44%

Plan to social enable
applications in the near
future
Source: Enterprise strategy group 2012

82%
8

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12

Of the world reached by
social media sites
ComScore Datamine Jan 2012
Trend – Federated Identity Enabling Cloud
Service providers rely on existing IdP
Partners leverage existing enterprise
identity

9

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Why BYOI?
Better user experience
More effective marketing
Lower TCO

10

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Challenges of BYOI
How to enable it for your business?
Is it secure enough?
What if you need higher level of trust

and security?

11

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Introducing Oracle Access Management
Reference Architecture

• Complete
• Modernized

• Simplified
• Innovative
• Scalable

12

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Oracle Access Management 11gR2
Simplified and Innovative
 Converged Services
– Authentication and SSO
– Federated SSO
– Mobile & Social
– Security Token Service

 Innovation
– Mobile Security
– Social Identity
– REST Services
– Identity Context

13

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Oracle Access Management Social Identity
Social Sign On
Select

14

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Login

Insert Information Protection Policy Classification from Slide 12

Authorize
Oracle Access Management Social Identity
For Mobile Authentication

15

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Oracle Access Management Social Identity
Overview
Enable applications to consume
Social Identities
Enable customers to federate with
social networking sites
Support standard protocols like
OAUTH and OpenID

Add Social Identity Personalization
and Federation Options to Mobile
Applications, Websites, and
resources protected by
Oracle Access Manager and Oracle
Entitlements Server

Easily add to existing OAM sites

16

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
When You Need Higher Level of Trust
 Will you let a customer using FaceBook identity for
– Online banking transactions?
– Buying products from your online stores?
– Accessing company intellectual properties (IP)
 Higher risk transactions demand higher level of trust and

security

17

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Securely Enable BYOI for Your Business
 Require an intelligent access platform that understands

context and risk
– Identity context, device context, resource context, transaction context, etc
– Weighted risk based on real-time context

 Take actions based on context and risk

18

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Oracle Access Management Social Identity
Step Up Trust and Security
 Linking BYOI to local accounts
– A simple step for user to link social identity with existing local

account
– Only required initially
 Register for new local account
– Simplified registration process
– Pre-populated profile info for registration

19

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Oracle Access Management
Access Intelligence
If the risk is very high:
Deny access and alert the
security team

HIGH

If the risk is high:
KBA or OTP

RISK

MEDHIGH

If the risk is medium:
Local account/ SAML
Federated accounts

MEDLOW
If the risk is low:
Social Identity

LOW

RESPONSE
DENY

ALLOW

20

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Federated Identity – Identity Provider B2B
Partner Resource
Service Provider

Oracle Identity Federation Identity Provider and Service Provider

Protected
Resources

21

Copyright © 2013, Oracle and/or its affiliates. All right
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12

Oracle Access
Management
Federated identity – Identity Provider SaaS
Partner Resource
Service Provider

Oracle Identity Federation Identity Provider and Service Provider

Protected
Resources

22

Copyright © 2013, Oracle and/or its affiliates. All right
Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12

Oracle Access
Management
Oracle Access Management Identity Federation
•

Converged services
•

•

•

Session Attributes support
•SAML

Protocol Support
•

SAML 2.0, SAML 1.1, OpenID 2.0
and WSFed

•

attributes in authorization policy

•Attribute

mapping

IdP/SP – initiated SSO, Logout
Identity Provider
Establish
Identity

Maintain
session

23

attributes in response headers

•SAML

Admin, server and data

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Filter
attributes

Assert
Identity

Insert Information Protection Policy Classification from Slide 12

Service Provider
Map
Attributes

Link
Identities

Pass Identity
Attributes to Apps
Oracle Access Management
Summary
 Enables business to leverage BYOI
– Social and federated identity

 Enhances security & improves user experience
– Intelligent flexible trust model

 Lowers Total Cost of Ownership (TCO)
– Complete, simplified and scalable solution
24

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Customer Case Studies

25

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Helping People
Get More Out of Life
26

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
The Business Needs
 Employees
 Enable BYOD
 Support Cloud/SaaS/Mobile

 Social Mission & Volunteers
 Empower Them with Tools & Technology
 Collaborate

 Adapt Quickly to Changing Needs

27

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
The Technology Issues
 The Technology Issues
 Defense-In-Depth
 Trust
 Scalability
 Cost & Manageability

 And Don’t Forget…
 Applications (are they mobile/social ready?)

28

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
Conceptual Access Mgmt Architecture

29

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
“help people achieve their goals and
enjoy a healthy, fulfilling life”.

30

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
multi-products
fitness

31

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

nutrition

Insert Information Protection Policy Classification from Slide 12

beauty
multi-channel

infomercial

32

online &
mobile

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12

MLM

certification
multi-profiles

consumers

customers
of coaches

coaches

trainers
33

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12

club
members
Don’t miss these IDM Sessions
CON8817

Tuesday 09/24,
5:15PM

Moscone West,
Room 2018

API Management: Enable Your Infrastructure for
Secure Mobile and Cloud Use

Ganesh Kirti, Oracle

CON8823

Wednesday 09/25,
5:00PM

Moscone West,
Room 2018

Access Management for the Internet of Things

Kanishk Mahajan, Oracle

CON8902

Thursday, 09/26
2:00PM

Marriot Marquis – Developing Secure Mobile Applications
Golden Gate C3

CON8837

Wednesday 09/25,
11:45AM

Moscone West,
Room 2018

Leverage Authorization to Monetize Content and
Media Subscriptions

Roger Wigenstam, Oracle

CON9024

Thursday 09/26,
2:00PM

Moscone West,
Room 2018

Next Generation Optimized Directory - Oracle
Unified Directory

Etienne Remillon, Oracle

34

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12

Mark Wilcox, Oracle
Oracle Fusion Middleware
Business Innovation Platform for the Enterprise and Cloud
 Complete and Integrated
Web

Social

Mobile

 Best-in-class

User Engagement
Business
Process
Management

 Open standards
Content
Management

Service Integration

Business
Intelligence

Data Integration

Identity Management
Development
Tools

35

Cloud Application
Foundation

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Enterprise
Management

Insert Information Protection Policy Classification from Slide 12

 On-premise and Cloud
 Foundation for Oracle Fusion
Applications and Oracle Cloud
36

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12
37

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Insert Information Protection Policy Classification from Slide 12

Weitere ähnliche Inhalte

Was ist angesagt?

Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureAtul Goyal
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overviewEslam Hafez
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation Delivery Centric
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIMTamim Khan
 
OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1Atul Goyal
 
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...GregOracle
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2OracleIDM
 
CIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCloudIDSummit
 
Oracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationOracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationDelivery Centric
 
Self Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More ProductivitySelf Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More ProductivityAtul Goyal
 
OIM Connector for Webservices
OIM Connector for WebservicesOIM Connector for Webservices
OIM Connector for WebservicesAtul Goyal
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)Identacor
 
Oracle Access Manager Overview
Oracle Access Manager OverviewOracle Access Manager Overview
Oracle Access Manager Overviewguestf6dc99b
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT Center
 
Case Study: McKesson
Case Study: McKessonCase Study: McKesson
Case Study: McKessonForgeRock
 

Was ist angesagt? (20)

Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
OIM11g R2PS2 Architecture
OIM11g R2PS2 ArchitectureOIM11g R2PS2 Architecture
OIM11g R2PS2 Architecture
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overview
 
Idm Workshop
Idm WorkshopIdm Workshop
Idm Workshop
 
Oracle Identity Manager Basics
Oracle Identity Manager BasicsOracle Identity Manager Basics
Oracle Identity Manager Basics
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
 
Presentation- on OIM
Presentation- on OIMPresentation- on OIM
Presentation- on OIM
 
OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1OIM Sizing Guide 11gR2PS1
OIM Sizing Guide 11gR2PS1
 
Oim Poc1.0
Oim Poc1.0Oim Poc1.0
Oim Poc1.0
 
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
 
CIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity ServiceCIS13: Bootcamp: PingOne as a Simple Identity Service
CIS13: Bootcamp: PingOne as a Simple Identity Service
 
Oracle Directory Services - Customer Presentation
Oracle Directory Services - Customer PresentationOracle Directory Services - Customer Presentation
Oracle Directory Services - Customer Presentation
 
Self Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More ProductivitySelf Service Access Control - Help Yourself to More Productivity
Self Service Access Control - Help Yourself to More Productivity
 
OIM Connector for Webservices
OIM Connector for WebservicesOIM Connector for Webservices
OIM Connector for Webservices
 
Oracle 360
Oracle 360Oracle 360
Oracle 360
 
Identity and Access Management (IAM)
Identity and Access Management (IAM)Identity and Access Management (IAM)
Identity and Access Management (IAM)
 
Oracle Access Manager Overview
Oracle Access Manager OverviewOracle Access Manager Overview
Oracle Access Manager Overview
 
Intel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management JourneyIntel IT's Identity and Access Management Journey
Intel IT's Identity and Access Management Journey
 
Case Study: McKesson
Case Study: McKessonCase Study: McKesson
Case Study: McKesson
 

Andere mochten auch

Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingJohn Bauer
 
Classification of Matter Overview
Classification of Matter OverviewClassification of Matter Overview
Classification of Matter Overviewjmori1
 
Atom Movie Notes Day 2
Atom Movie Notes Day 2Atom Movie Notes Day 2
Atom Movie Notes Day 2jmori1
 
Way storm 行動廣告簡介(games0124)
Way storm 行動廣告簡介(games0124)Way storm 行動廣告簡介(games0124)
Way storm 行動廣告簡介(games0124)MaVis Tseng
 
How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2OracleIDM
 
Pendahuluan IMK (Interaksi Manusia Komputer)
Pendahuluan IMK (Interaksi Manusia Komputer)Pendahuluan IMK (Interaksi Manusia Komputer)
Pendahuluan IMK (Interaksi Manusia Komputer)Robby Firmansyah
 
เครื่องใช้ไฟฟ้า304
เครื่องใช้ไฟฟ้า304เครื่องใช้ไฟฟ้า304
เครื่องใช้ไฟฟ้า304thananat
 
Sample watchdog uploaded
Sample watchdog uploadedSample watchdog uploaded
Sample watchdog uploadedcsully
 
Publications, Book Chapters, And Selected Patents
Publications, Book Chapters, And Selected PatentsPublications, Book Chapters, And Selected Patents
Publications, Book Chapters, And Selected Patentsazilberstein
 
Classification of Matter Overview. Spring--- Day 2
Classification of Matter Overview. Spring--- Day 2Classification of Matter Overview. Spring--- Day 2
Classification of Matter Overview. Spring--- Day 2jmori1
 
Classification of Matter Overview... Spring
Classification of Matter Overview... SpringClassification of Matter Overview... Spring
Classification of Matter Overview... Springjmori1
 
06 enterprise resource planning
06 enterprise resource planning06 enterprise resource planning
06 enterprise resource planningArip Doanx
 
Year 7 websites evaluation
Year 7 websites evaluationYear 7 websites evaluation
Year 7 websites evaluationfrances20
 

Andere mochten auch (20)

Identity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud ComputingIdentity and Access Management Reference Architecture for Cloud Computing
Identity and Access Management Reference Architecture for Cloud Computing
 
Classification of Matter Overview
Classification of Matter OverviewClassification of Matter Overview
Classification of Matter Overview
 
Atom Movie Notes Day 2
Atom Movie Notes Day 2Atom Movie Notes Day 2
Atom Movie Notes Day 2
 
Way storm 行動廣告簡介(games0124)
Way storm 行動廣告簡介(games0124)Way storm 行動廣告簡介(games0124)
Way storm 行動廣告簡介(games0124)
 
00 ส่วนนำ1
00 ส่วนนำ100 ส่วนนำ1
00 ส่วนนำ1
 
How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2
 
Como ler a bíblia
Como ler a bíbliaComo ler a bíblia
Como ler a bíblia
 
How to hire a relief Dr without getting into Jeopardy!
How to hire a relief Dr without getting into Jeopardy!How to hire a relief Dr without getting into Jeopardy!
How to hire a relief Dr without getting into Jeopardy!
 
Pendahuluan IMK (Interaksi Manusia Komputer)
Pendahuluan IMK (Interaksi Manusia Komputer)Pendahuluan IMK (Interaksi Manusia Komputer)
Pendahuluan IMK (Interaksi Manusia Komputer)
 
เครื่องใช้ไฟฟ้า304
เครื่องใช้ไฟฟ้า304เครื่องใช้ไฟฟ้า304
เครื่องใช้ไฟฟ้า304
 
Sample watchdog uploaded
Sample watchdog uploadedSample watchdog uploaded
Sample watchdog uploaded
 
Murder mystery
Murder mysteryMurder mystery
Murder mystery
 
Publications, Book Chapters, And Selected Patents
Publications, Book Chapters, And Selected PatentsPublications, Book Chapters, And Selected Patents
Publications, Book Chapters, And Selected Patents
 
Mapping ERD ke tabel
Mapping ERD ke tabelMapping ERD ke tabel
Mapping ERD ke tabel
 
Classification of Matter Overview. Spring--- Day 2
Classification of Matter Overview. Spring--- Day 2Classification of Matter Overview. Spring--- Day 2
Classification of Matter Overview. Spring--- Day 2
 
ใบงานม.3
ใบงานม.3ใบงานม.3
ใบงานม.3
 
Classification of Matter Overview... Spring
Classification of Matter Overview... SpringClassification of Matter Overview... Spring
Classification of Matter Overview... Spring
 
Excel infinity and beyond
Excel infinity and beyondExcel infinity and beyond
Excel infinity and beyond
 
06 enterprise resource planning
06 enterprise resource planning06 enterprise resource planning
06 enterprise resource planning
 
Year 7 websites evaluation
Year 7 websites evaluationYear 7 websites evaluation
Year 7 websites evaluation
 

Ähnlich wie Con8834 bring your own identity - final

C3 cx in the real world how lines of business come together to adopt cx sol...
C3   cx in the real world how lines of business come together to adopt cx sol...C3   cx in the real world how lines of business come together to adopt cx sol...
C3 cx in the real world how lines of business come together to adopt cx sol...Dr. Wilfred Lin (Ph.D.)
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Oracle BPM Adaptive Case Management 2014
Oracle BPM Adaptive Case Management 2014Oracle BPM Adaptive Case Management 2014
Oracle BPM Adaptive Case Management 2014Bizagi Inc
 
Oracle Cloud Marketplace
Oracle Cloud MarketplaceOracle Cloud Marketplace
Oracle Cloud MarketplaceDiby Malakar
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...OracleIDM
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
Social Selling - The ABC's of Social Selling: Always Be Connecting - Jill Rowley
Social Selling - The ABC's of Social Selling: Always Be Connecting - Jill RowleySocial Selling - The ABC's of Social Selling: Always Be Connecting - Jill Rowley
Social Selling - The ABC's of Social Selling: Always Be Connecting - Jill RowleyInsideSales.com
 
206490 implementation best practice
206490 implementation best practice206490 implementation best practice
206490 implementation best practicep6academy
 
Reporting from contract management 14.0 using bi publisher 11g ppt
Reporting from contract management 14.0 using bi publisher 11g pptReporting from contract management 14.0 using bi publisher 11g ppt
Reporting from contract management 14.0 using bi publisher 11g pptp6academy
 
EBS-endeca-technical-considerations
EBS-endeca-technical-considerationsEBS-endeca-technical-considerations
EBS-endeca-technical-considerationsBerry Clemens
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.CIOEastAfrica
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everythingDr. Wilfred Lin (Ph.D.)
 
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primend
 
PaaSing a Java EE Application
PaaSing a Java EE ApplicationPaaSing a Java EE Application
PaaSing a Java EE ApplicationJagadish Prasath
 
Oracle big data and rtd v5
Oracle big data and rtd v5Oracle big data and rtd v5
Oracle big data and rtd v5techsuda
 
Oracle Fusion functional setup manager
Oracle Fusion functional setup managerOracle Fusion functional setup manager
Oracle Fusion functional setup managerBerry Clemens
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraLuca Martelli
 

Ähnlich wie Con8834 bring your own identity - final (20)

C3 cx in the real world how lines of business come together to adopt cx sol...
C3   cx in the real world how lines of business come together to adopt cx sol...C3   cx in the real world how lines of business come together to adopt cx sol...
C3 cx in the real world how lines of business come together to adopt cx sol...
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Oracle BPM Adaptive Case Management 2014
Oracle BPM Adaptive Case Management 2014Oracle BPM Adaptive Case Management 2014
Oracle BPM Adaptive Case Management 2014
 
Oracle Cloud Marketplace
Oracle Cloud MarketplaceOracle Cloud Marketplace
Oracle Cloud Marketplace
 
Con8817 api management - enable your infrastructure for secure mobile and c...
Con8817   api management - enable your infrastructure for secure mobile and c...Con8817   api management - enable your infrastructure for secure mobile and c...
Con8817 api management - enable your infrastructure for secure mobile and c...
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
Social Selling - The ABC's of Social Selling: Always Be Connecting - Jill Rowley
Social Selling - The ABC's of Social Selling: Always Be Connecting - Jill RowleySocial Selling - The ABC's of Social Selling: Always Be Connecting - Jill Rowley
Social Selling - The ABC's of Social Selling: Always Be Connecting - Jill Rowley
 
206490 implementation best practice
206490 implementation best practice206490 implementation best practice
206490 implementation best practice
 
Reporting from contract management 14.0 using bi publisher 11g ppt
Reporting from contract management 14.0 using bi publisher 11g pptReporting from contract management 14.0 using bi publisher 11g ppt
Reporting from contract management 14.0 using bi publisher 11g ppt
 
EBS-endeca-technical-considerations
EBS-endeca-technical-considerationsEBS-endeca-technical-considerations
EBS-endeca-technical-considerations
 
Apouc 2014-learn-from-oracle-support
Apouc 2014-learn-from-oracle-supportApouc 2014-learn-from-oracle-support
Apouc 2014-learn-from-oracle-support
 
Oracle here. now. your choice.
Oracle   here.  now.  your choice.Oracle   here.  now.  your choice.
Oracle here. now. your choice.
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everything
 
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
Primendi Visiooniseminar 2014 - Kuidas lahendada võrgu turvalisus mobiilses k...
 
Social BPO
Social BPOSocial BPO
Social BPO
 
PaaSing a Java EE Application
PaaSing a Java EE ApplicationPaaSing a Java EE Application
PaaSing a Java EE Application
 
Oracle big data and rtd v5
Oracle big data and rtd v5Oracle big data and rtd v5
Oracle big data and rtd v5
 
Oracle Fusion functional setup manager
Oracle Fusion functional setup managerOracle Fusion functional setup manager
Oracle Fusion functional setup manager
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba EraThe Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
The Enablement of an Identity-Centric SOC in the Regulatory Rumba Era
 

Mehr von OracleIDM

Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1OracleIDM
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12OracleIDM
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…OracleIDM
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerOracleIDM
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4OracleIDM
 

Mehr von OracleIDM (20)

Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
 
Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4Cso oow12-summit-sonny-sing hv4
Cso oow12-summit-sonny-sing hv4
 

Kürzlich hochgeladen

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality AssuranceInflectra
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...panagenda
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityIES VE
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfpanagenda
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditSkynet Technologies
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Hiroshi SHIBATA
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 

Kürzlich hochgeladen (20)

Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance[Webinar] SpiraTest - Setting New Standards in Quality Assurance
[Webinar] SpiraTest - Setting New Standards in Quality Assurance
 
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
Why device, WIFI, and ISP insights are crucial to supporting remote Microsoft...
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Decarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a realityDecarbonising Buildings: Making a net-zero built environment a reality
Decarbonising Buildings: Making a net-zero built environment a reality
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdfSo einfach geht modernes Roaming fuer Notes und Nomad.pdf
So einfach geht modernes Roaming fuer Notes und Nomad.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Manual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance AuditManual 508 Accessibility Compliance Audit
Manual 508 Accessibility Compliance Audit
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024Long journey of Ruby standard library at RubyConf AU 2024
Long journey of Ruby standard library at RubyConf AU 2024
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 

Con8834 bring your own identity - final

  • 1. 1 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 2. Attract New Customers and Users by Leveraging Bring Your Own Identity (BYOI) Forest Yin – Product Management, Oracle Vikas Mahajan – Director, AARP Arnaud Robert – CTO, BeachBody
  • 3. Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 3 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 4. Program Agenda  Introduction to Bring Your Own Identity (BYOI)  Oracle Solution  Customer Case Studies – AARP – BeachBody 4 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 5. Subscription-based Content Services Online Healthcare Citizen Services Business Transformation Mobile Banking 5 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Manufacturing Services MOST SIGNIFICANT RE-ARCHITECTURE IN 20 YEARS Social Retail Cloud Services Mobile Workforce Social CRM Insert Information Protection Policy Classification from Slide 12
  • 6. What’s Business Transformation? Mobile  BYOD complicates privacy  Enterprise and personal data  Poor device, app and data security Cloud  On premise, private, Social  Users want to use public apps  Identity for SaaS apps social ID  Simplify registration and marketing  Cloud-based access portals  Fragments identity  Trust is difficult  OAuth & OpenID  Unified approach iOS, leading to other IdPs Android, ? Identity is core across these transformations 6 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 7. Trend – Social Identity Transforming Business Social Commerce – FaceBook 1+ billion users – Preferences and interests – Friends and relationships Social Workplace – Social while working – Working while social 7 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 8. Trend – Social Identity Transforming Business SOCIAL MEDIA MERGES WORK & PLAY 44% Plan to social enable applications in the near future Source: Enterprise strategy group 2012 82% 8 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 Of the world reached by social media sites ComScore Datamine Jan 2012
  • 9. Trend – Federated Identity Enabling Cloud Service providers rely on existing IdP Partners leverage existing enterprise identity 9 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 10. Why BYOI? Better user experience More effective marketing Lower TCO 10 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 11. Challenges of BYOI How to enable it for your business? Is it secure enough? What if you need higher level of trust and security? 11 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 12. Introducing Oracle Access Management Reference Architecture • Complete • Modernized • Simplified • Innovative • Scalable 12 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 13. Oracle Access Management 11gR2 Simplified and Innovative  Converged Services – Authentication and SSO – Federated SSO – Mobile & Social – Security Token Service  Innovation – Mobile Security – Social Identity – REST Services – Identity Context 13 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 14. Oracle Access Management Social Identity Social Sign On Select 14 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Login Insert Information Protection Policy Classification from Slide 12 Authorize
  • 15. Oracle Access Management Social Identity For Mobile Authentication 15 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 16. Oracle Access Management Social Identity Overview Enable applications to consume Social Identities Enable customers to federate with social networking sites Support standard protocols like OAUTH and OpenID Add Social Identity Personalization and Federation Options to Mobile Applications, Websites, and resources protected by Oracle Access Manager and Oracle Entitlements Server Easily add to existing OAM sites 16 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 17. When You Need Higher Level of Trust  Will you let a customer using FaceBook identity for – Online banking transactions? – Buying products from your online stores? – Accessing company intellectual properties (IP)  Higher risk transactions demand higher level of trust and security 17 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 18. Securely Enable BYOI for Your Business  Require an intelligent access platform that understands context and risk – Identity context, device context, resource context, transaction context, etc – Weighted risk based on real-time context  Take actions based on context and risk 18 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 19. Oracle Access Management Social Identity Step Up Trust and Security  Linking BYOI to local accounts – A simple step for user to link social identity with existing local account – Only required initially  Register for new local account – Simplified registration process – Pre-populated profile info for registration 19 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 20. Oracle Access Management Access Intelligence If the risk is very high: Deny access and alert the security team HIGH If the risk is high: KBA or OTP RISK MEDHIGH If the risk is medium: Local account/ SAML Federated accounts MEDLOW If the risk is low: Social Identity LOW RESPONSE DENY ALLOW 20 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 21. Federated Identity – Identity Provider B2B Partner Resource Service Provider Oracle Identity Federation Identity Provider and Service Provider Protected Resources 21 Copyright © 2013, Oracle and/or its affiliates. All right Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 Oracle Access Management
  • 22. Federated identity – Identity Provider SaaS Partner Resource Service Provider Oracle Identity Federation Identity Provider and Service Provider Protected Resources 22 Copyright © 2013, Oracle and/or its affiliates. All right Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 Oracle Access Management
  • 23. Oracle Access Management Identity Federation • Converged services • • • Session Attributes support •SAML Protocol Support • SAML 2.0, SAML 1.1, OpenID 2.0 and WSFed • attributes in authorization policy •Attribute mapping IdP/SP – initiated SSO, Logout Identity Provider Establish Identity Maintain session 23 attributes in response headers •SAML Admin, server and data Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Filter attributes Assert Identity Insert Information Protection Policy Classification from Slide 12 Service Provider Map Attributes Link Identities Pass Identity Attributes to Apps
  • 24. Oracle Access Management Summary  Enables business to leverage BYOI – Social and federated identity  Enhances security & improves user experience – Intelligent flexible trust model  Lowers Total Cost of Ownership (TCO) – Complete, simplified and scalable solution 24 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 25. Customer Case Studies 25 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 26. Helping People Get More Out of Life 26 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 27. The Business Needs  Employees  Enable BYOD  Support Cloud/SaaS/Mobile  Social Mission & Volunteers  Empower Them with Tools & Technology  Collaborate  Adapt Quickly to Changing Needs 27 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 28. The Technology Issues  The Technology Issues  Defense-In-Depth  Trust  Scalability  Cost & Manageability  And Don’t Forget…  Applications (are they mobile/social ready?) 28 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 29. Conceptual Access Mgmt Architecture 29 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 30. “help people achieve their goals and enjoy a healthy, fulfilling life”. 30 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 31. multi-products fitness 31 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. nutrition Insert Information Protection Policy Classification from Slide 12 beauty
  • 32. multi-channel infomercial 32 online & mobile Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 MLM certification
  • 33. multi-profiles consumers customers of coaches coaches trainers 33 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 club members
  • 34. Don’t miss these IDM Sessions CON8817 Tuesday 09/24, 5:15PM Moscone West, Room 2018 API Management: Enable Your Infrastructure for Secure Mobile and Cloud Use Ganesh Kirti, Oracle CON8823 Wednesday 09/25, 5:00PM Moscone West, Room 2018 Access Management for the Internet of Things Kanishk Mahajan, Oracle CON8902 Thursday, 09/26 2:00PM Marriot Marquis – Developing Secure Mobile Applications Golden Gate C3 CON8837 Wednesday 09/25, 11:45AM Moscone West, Room 2018 Leverage Authorization to Monetize Content and Media Subscriptions Roger Wigenstam, Oracle CON9024 Thursday 09/26, 2:00PM Moscone West, Room 2018 Next Generation Optimized Directory - Oracle Unified Directory Etienne Remillon, Oracle 34 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12 Mark Wilcox, Oracle
  • 35. Oracle Fusion Middleware Business Innovation Platform for the Enterprise and Cloud  Complete and Integrated Web Social Mobile  Best-in-class User Engagement Business Process Management  Open standards Content Management Service Integration Business Intelligence Data Integration Identity Management Development Tools 35 Cloud Application Foundation Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Enterprise Management Insert Information Protection Policy Classification from Slide 12  On-premise and Cloud  Foundation for Oracle Fusion Applications and Oracle Cloud
  • 36. 36 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12
  • 37. 37 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Insert Information Protection Policy Classification from Slide 12

Hinweis der Redaktion

  1. Slide 4: The Most Significant Re-Architecture in 20 YearsBIG IDEA – IDENTITY IS TIED TO EVERY MAJOR BUSINESS TRANSFORMATIONThe transformation is pervasive across every vertical Public sector and government – Governments around the world are modernizing systems to provide better access to citizens Example: State of California will let you renew your drivers license on line and apply for welfare services online Healthcare – Is a transaction business and depends on the collaboration of patients, providers, payers and hospitals If you are a payer today .. you transforming to support the Obama care health information exchange requirements You are transforming to provide better service online to compete.Every manufacturing company has to become a manufacturing services company Example Rolls Royce has to provide telemetry data from every engine real time.The applications that power these businesses have to be built on monolithic platforms that do not scale.. The platforms for the modern business will built on Service Oriented – for flexibility and cohesion BPM – for collaboration and participation Big Data – For better business analytics Fast Data – For the massive scale that will be expected for social, mobile and cloud ALL OF THIS IS TURNING SECURITY UPSIDE DOWN AND INSIDE OUT.
  2. Social networking has captured the imagination of people globally and is really driving a lot of integration by organizations wishing to get access to this market space to drive more revenue and brand awareness. Integration with social networks is important for employee and consumer relationshipsStudy by Enterprise Consulting group: 44% of organizations plan to social enable apps in the near future and the number is expected to grow rapidly across all sectors.Facebook alone has more than 700 million users worldwide and new social networking sites continue to proliferate. Increasingly users are demanding seamless logon to applications using their social networking credentials. This trend is now spreading to low value enterprise applications like blogs, communities, marketing assets etc. The way we do business has changed. The enterprise is embracing a new digital experience.58% or organizations are building mobile app store 62% of our customers will provide mobile apps by 2014 And the world will re-architect to embrace the cloud.
  3. Mobile or Web basedCan plug in to existing OAM deployments
  4. Username and PasswordSocial LogonStep up Auth and OTP, can be applied:-first time with this device (device registration)-sensitive application-high risk score-user with high level of access to application
  5. With Fusion Middleware, you can extend and maximize your existing technology investment with the same technologies used in Fusion Applications, including embedded analytics and social collaboration, and mobile and cloud computing. Oracle’s complete SOA platform lets your IT organization rapidly design, assemble, deploy, and manage adaptable business applications and—with Oracle’s business process management tools—even bring the task of modeling business processes directly to the business analysts. Oracle Business Intelligence foundation brings together all your enterprise data sources in a single, easy-to-use solution, delivering consistent insights whether it’s through ad hoc queries and analysis, interactive dashboards, scorecards, OLAP, or reporting. And, your existing enterprise applications can leverage the rich social networking capabilities and content sharing that users have come to expect in consumer software. Oracle Fusion Middleware is based on 100 percent open standards, so you aren’t locked into one deployment model when your business requirements change.