Gedetailleerde cursusinhoud
Introduction
- Identify the objectives of the course
- Discuss the course agenda
- Access additional information and resources
Overview Oracle Identity Governance 11g Architecture and Development Tools
- Review identity governance, management, and architecture concepts
- Examine the functional areas of identity management
- Identify Oracle Identity Manager as a solution for Identity Management tasks
- Examine use cases for Oracle Identity Manager
- Review Oracle Identity Manager user interfaces and development tools
- Discuss ways to populate identities in Oracle Identity Manager
- Explore the course practice environment
Developing Connectors to Integrate Systems
- Discuss the Identity Connector Framework (ICF)
- Identify the ICF application programming interface (API) and service provider interface (SPI) layers
- Develop a Connector implementation class
- Develop a Configuration implementation class
- Exchange data with Oracle Identity Manager through Attribute or ConnectorObject object types
- Create and modify Ant build files to generate a connector bundle JAR file ready for deployment or installation
Testing and Installing ICF Connectors
- Develop a connector test application by using the ICF application programming interface (API)
- Execute test applications in Oracle JDeveloper with the connect bundle JAR local to the test application
- Install the ICF connector in Oracle Identity Manager
- Manage the connector installation and configuration life cycle
Implementing Reconciliation
- Explain reconciliation and the different types of reconciliation and modes
- Discuss the Oracle Identity Manager reconciliation architecture
- Create reconciliation objects by using the Design Console
- Implement trusted or target reconciliation by applying the Oracle Identity Manager object model
- Initiate reconciliation through a scheduled task
Customizing Reconciliation with Plug-ins, Event Handlers, and Scheduled Tasks
- Describe the plug-in framework including plug-ins and plug-in points
- Explain Oracle Identity Manager orchestration concepts
- Create and register a plug-in contained in a zip file
- Create and register an event handler
- Develop and register a custom scheduled task
Provisioning Resources to Users
- Configure an Oracle Identity Manager connector to make it operable
- Identify an Oracle Identity Manager application instance
- Describe how application instances relate to connector objects
- Provide examples of application instances
- Manage sandboxes
- Describe how to create an application instance
- Describe how to manage the Catalog
- Compare ways to provision a resource to an Oracle Identity Manager user: policy-based (user membership rules and access policies), request-based, and autoprovisioning
Granting Entitlements to Users
- Identify entitlements for application instances
- Manage entitlements for application instances
- Identify requests
- Explain the types of requests that you can create and manage
- Describe the two types of approval workflows associated with requests: request-level and operational-level approval workflows
- Identify the stages of a request
- Explain the request stages throughout a request’s life cycle
- Complete request-level and operational-level approval workflows
Introduction to Oracle SOA Suite
- Describe Oracle SOA Suite 11g and SOA composite applications
- Describe the components of a SOA composite application
- Create, condifure, and develop BPEL Process, Human Task, and Business Rule components
- Deploy and test a SOA composite application
Customizing Approval Processes in SOA Suite
- Design a custom approval composite
- Implement a custom approval composite interface and its callback requirements
- Generate a skeleton custom approval composite
- Secure the Request Web Service and invoke its operations from a composite
- Configure Oracle Universal Messaging Service (UMS) for notification services
Configuring Self Profile Management
- Compare authorization and authentication
- Identify authorization policies
- Explain how to define authorization policies that control access rights that users have in Oracle Identity Manager
- Discuss how to use authorization policies to determine whether a user can perform a specific action in Oracle Identity Manager
- Describe the relationship between authorization policies and administrative roles in Oracle Identity Manager
- Discuss how to manage authorization policies
- Identify Oracle Identity Manager system entities
- Add user-defined fields (UDFs) to system entities
Configuring Oracle Identity Manager Certifications
- Describe identity certification and attestation
- Identify the business drivers for certification
- Configure certification in Oracle Identity Manager
- Create and manage certification definitions
- Explain how risk summaries are calculated
- Describe closed-loop remediation and remediation tracking
- Describe and configure multiphased reviews and event listeners for user certifications
Extending an Oracle Identity Manager Connector
- Discuss how to extend an Oracle Identity Manager connector
- List the steps to complete to extend a connector
- Verify that the connector extensions are operable
Customizing the Oracle Identity Manager User Interface
- Describe the MVC architectural design layers and its benefits
- Explain the Oracle Identity Manager UI architecture
- Explain the ADF main components and Expression Languages
- Describe the approaches available to customize the Oracle Identity Manager UI
- Extend Oracle Identity Manager with a custom ADF application
- Provide links in Oracle Identity Manager
- Change Oracle Identity Manager console logo
Customizing the Application Instance Form for Access Requests
- Describe how to use the Oracle Identity Manager UI customization approaches to optimize application instance forms for access requests
- List the steps needed to customize the application instance form