Oracle Identity Analytics

Oracle Identity Analytics

0 STUDENTS ENROLLED

    Oracle Identity Analytics Course Content:

    1.Introducing Oracle Identity Analytics 11gR1

    • Identifying the business drivers for role management
    • Describing methods for meeting compliance
    • Describing how a role management solution streamlines the process
    • Describing the features and components of Oracle Identity Analytics
    • Describing an Oracle Identity Analytics implementation
    • Creating the Oracle Identity Analytics folder structure and schema
    • Installing, configuring, deploying, and launching Oracle Identity Analytics

    2.Building the Identity Warehouse

    • Describing Oracle Identity Analytics terminology, the Identity Warehouse, methods for importing data, job scheduling, and risk
    • Building an Identity Warehouse
    • Creating a provisioning server
    • Importing users, accounts, roles, and policies
    • Defining resource types and business structures
    • Configuring an application
    • Managing resource data
    • Configuring risk

    3.Configuring Oracle Identity Analytics Security

    • Identifying Oracle Identity Analytics users and roles
    • Comparing Oracle Identity Analytics users and global users
    • Configuring the creation and correlation between Oracle Identity Analytics users and a global user
    • Comparing Oracle Identity Analytics roles and Identity Warehouse roles
    • Creating and managing Oracle Identity Analytics roles
    • Describing proxy assignments
    • Creating proxies for users

    4.Managing Identity Certifications for User Entitlements and Data Owners

    • Describing security challenges faced by organizations
    • Describing the benefits of an automated certification process
    • Establishing a certification environment
    • Configuring the Oracle Identity Analytics Glossary
    • Describing the identity certification process
    • Configuring, creating, and completing identity certifications for user entitlements and data owners (User Entitlement and Data Owner identity certifications)
    • Performing remediation validation on the identity certifications

    5.Managing Identity Certifications for Resources and Roles

    • Comparing identity certifications for resources and roles (Resource Entitlement and Role Entitlement certifications)
    • Configuring, creating, and completing Resource Entitlement and Role Entitlement certifications
    • Explaining incremental certification

    6.Configuring Auditing

    • Describing identity auditing
    • Configuring audit rules and audit policies
    • Performing audit scans and detecting policy violations
    • Scheduling audit scan jobs

    7.Performing Role Engineering

    • Describing best practices for defining roles
    • Configuring logging for role mining
    • Performing role mining
    • Configuring, reviewing, and analyzing role mining results
    • Performing entitlements discovery

    8.Performing Role Management

    • Describing the phases of a role’s life cycle
    • Describing best practices for managing roles
    • Configuring role and rule workflows
    • Modifying and approving roles
    • Consolidating roles
    • Configuring role provisioning rules
    • Configuring rules, policies, and roles for segregation of duties (SoD)
    • Configuring event listeners

    9.Generating Reports

    • Creating predefined reports
    • Generating custom reports

    Write a Review

    Your email address will not be published. Required fields are marked *

    Course Reviews

    N.A

    ratings
    • 5 stars0
    • 4 stars0
    • 3 stars0
    • 2 stars0
    • 1 stars0

    No Reviews found for this course.

    PRIVATE COURSE
    • PRIVATE
    • 1 month, 1 week

    Drop us a query

    Job Support

    Course Features

    Live Instructor-led Classes

    This isn't canned learning. Its dynamic, its interactive, its effective

    Expert Educators

    Only the best or they're out. We are constantly evaluating our trainers

    24&7 Support

    We never sleep. Need something answered at 3 am? No Problem

    Flexible Schedule

    You don't learn as per our calendar. We work according to yours.

    Customized Training's

    The most part self-managed and adaptable to suit a person's particular adapting technology needs

    Priority Based Training's

    Real-time Scenario based Assignments and Case Studies

    Disclaimer

    This web site or keentechnologies.com team is not associated with SAP AG or any other product. We are providing this service absolutely for Education and Training purpose only. We charge for the support services only, not for the actual SAP System access. All SAP Systems operate under INITIAL evaluation license. All trademarks mentioned on this web site belongs to their owners. We do not share or distribute ANY personal information we collect on this web site. For any additional information

    475-212-0075

    +91 9989754807

    trainings@keentechnologies.com


    ONLINE MEETING PARTNERS

    top
    COPYRIGHT © 2019 KEEN IT TECHNOLOGIES PVT.LTD, ALL RIGHTS RESERVED
    X