Oracle Adaptive Access Manager 11g: Administration
This course covers installation, configuration and customization of user interface for the OAAM 11g product. It explains how to effectively create static policies, patterns and predictive policies to perform risk analysis. The course covers both native integration for transaction analysis and fraud prevention as well as OAM-OAAM integration scenarios. This course also covers monitoring, diagnostics and troubleshooting of the OAAM runtime deployment. Finally, the course has complete coverage on reporting and auditing capabilities within the product.
Learn To:- Install, Configure and Customize Oracle Adaptive Access Manager
- Create Policies and rules - Static, Patterns and Predictive
- Natively…
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
This course covers installation, configuration and customization of user interface for the OAAM 11g product. It explains how to effectively create static policies, patterns and predictive policies to perform risk analysis. The course covers both native integration for transaction analysis and fraud prevention as well as OAM-OAAM integration scenarios. This course also covers monitoring, diagnostics and troubleshooting of the OAAM runtime deployment. Finally, the course has complete coverage on reporting and auditing capabilities within the product.
Learn To:- Install, Configure and Customize Oracle Adaptive Access Manager
- Create Policies and rules - Static, Patterns and Predictive
- Natively integrate OAAM 11g with custom application for transaction fraud prevention
- Perform OAM-OAAM integration
- Monitor, diagnose and troubleshoot OAAM 11g environment
- Create OAAM 11g reports and audits and explore the OAAM offline capabilities
Audience
- System Administrator
- Sales Consultants
- System Integrator
- Technical Administrator
- Support Engineer
- Technical Consultant
- Security Administrators
- Administrator
Course Topics Overview
- Define four types of Internet attacks
- Propose four solutions for Internet attacks
- List the benefits of Oracle Adaptive Access Manager (OAAM)
- Describe the role of Oracle Adaptive Access Manager
- Explain how OAAM works
- List the new features in OAAM 11gR1 PS1
- Describe the high-level architectural and deployment topology
- Provide a use case for OAAM’s role in Oracle Identity Management Suite integration
- Describe prerequisites
- List the key steps to install and configure OAAM
- Post-install and Configure validation steps
- Start and stop the OAAM 11g environment
- List the different types of OAAM customizations
- Perform key customizations: Custom CSS
- Perform key customizations: Header and footer
- Perform key customizations: Custom Virtual Authentication Devices (VAD)
- Perform key customizations: User action and flows
- Perform key customizations: Custom layout
- Describe the key configuration files used in customizations
- Distinguish and describe three types of risk analyses
- Create static policies
- Create the artifacts – Checkpoint, Rules, Conditions, Alerts, and Actions Groups
- What is a pattern?
- In a pattern, what data is captured and when?
- In a pattern, where is data stored and how is data used?
- How to use predictive analysis
- Provide OAAM predictive analysis use cases
- Integrate OAAM natively with customer application by using: In-Proc or SOAP mode
- Native Integration by Using .NET SDK
- In-Proc Versus SOAP Mode
- In-Proc Native Integration in OAAM 11g
- Use sample application to perform a code walk through on Java APIs implementation
- Understand Entities, Data Elements and Transaction data
- Defining and Using Transaction Definition
- Mapping Entities to the Source Data
- Mapping Transaction Data to the Source Data
- Performing Transaction Fraud Analysis
- Install and configure BI Publisher Reports
- View out-of-the-box reports
- Setup configuration
- Creating custom reports
- Learn OAAM audit framework
- Understand audit events, reports, and data
- Use BI Publisher to run audit reports
- Identify tips on troubleshooting OAAM 11g environment
- Monitor the key metrics by using FMW EM Control
- View and configure logging
- Use the OAAM Dashboard
- Explain job types
- Explain how to schedule jobs
- Describe job management
- Explain the OAAM offline server Use Cases
- List different types of integration options
- Explain OAM-OAAM TAP integration use case
- Explain risk-based challenge by using KBA
- Explain step-up authentication by using OTP
Course Objectives
- Perform Installation and Configuration
- Perform OAAM Customizations
- Understand different Policies – Static, Patterns, and Predictive
- Setup and perform Native Integration
- Define Transactions and perform fraud analysis
- Setup Reporting and Auditing
- Understand Monitoring and Diagnostics
- Learn to work with OAAM Offline and Job Scheduler
- Understand OAAM – OAM Integration
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
