The solution Oracle Identity Governance does the job of offering self-service, provisioning, compliance, and password management services for applications, whether on the Cloud or on-premise. This governance solution enables the organizations to handle everything on a single platform like identity management and access privileges of their clients, business partners, and workers. The users get the privilege to handle their own identities along with others, with the support of the delegated administration. Enterprises can set up users' empowered delegated administrators to manage passwords, identities, password policies, and other users' access. Besides, organization users can build and govern the lifecycle of business roles, which can be granted involuntarily by utilizing rules and are responsible for giving access to endusers. Organizations, with the support of these roles and access policies, can make sure that their users are offboarded or on-boarded on time and in an automated way.
Oracle Identity Manager allows the end-users to use access catalog, which makes their job a lot more simple by giving them access in a userfriendly manner. The users can further send their requests for approval to managers.
Oracle Identity Manager automates the provisioning and de-provisioning process, which includes updating or creating, and deleting user accounts, password provisioning, and revoking or granting of entitlements throughout the application on the Cloud or on-premise. This process takes place by using connectors for provisioning an de-provisioning with linked applications. It also gives support to manual de-provisioning and provisioning in disconnected applications.
Through the help of the process called identity certification, Oracle Identity Manager enables the authorized users, managers, and compliance administrators for reviewing and certifying user access in a simple manner. The simple wizards feature allows the authorized administrators in creating and configuring certification campaigns, on an ad-hoc or scheduled basis. The information is presented before the certifiers, who are responsible for certifying the user access. The certifiers have complete authority to either reject the access or approve it. The access is rejected in the event of violation detection. In this scenario, Oracle Identity Manager initiates a procedure enabling the administrators to fix the violation. The closed-loop remediation process can de-provision the access privileges from the application of the target platform, while also keeping track of the actions to be taken. The Identity Manager provides support to distinct kinds of certifications, which are based on different user personas like enterprise managers, application owners, role owners, and entitlement owners.
Oracle Identity Manager enables enterprise users to describe audit policies, empowering the businesses to meet their compliance objectives. The decision of the kind of access a user can have or cannot have depended on audit policies. Besides, Oracle Identity Manager facilitates enterprises to define policies of Sarbanes-Oxley guidelines that can be imposed while requesting for access. The policies can also be utilized for scanning the present access to detect lethal access privileges combinations, also called policy violations. After the identification of the violations, The Oracle Identity Manager prompts a workflow enabling business managers or administrators for fixing these violations. This whole process is called remediation. All the decisions and actions taken by these business managers or administrators are recorded, and a comprehensive audit trail is retained.
Oracle Identity Manager leverages comprehensive auditing capabilities that enable security staff and auditors to keep track of the changes initiated by someone. It also helps in creating audit events by allowing the clients to audit their processes and workflows. The manner in which complete audit information is available, it can be easily reported by utilizing standard reporting tools.