Skip to main content

Oracle Identity Cloud Service (IDCS)

   Oracle Identity Cloud Service is the next generation comprehensive security and identity platform that is cloud-native and designed to be an integral part of the enterprise security fabric, providing modern identity for modern applications.
 IDCS is a cloud-based identity management system that works by associating specific rights and restrictions with each user’s established identity. User provisioning, access control, and directory services are critical components of Oracle’s cloud-based security portfolio.
Oracle Identity Cloud Service has been designed to meet the needs of organizations in a number of typical use-case scenarios, such as the cloud (allowing both on-premise and cloud resources to be secured from a single set of controls), mobile access (providing sign on for native or browser-based apps), employee-facing intranet and customer-facing extranet solutions. 

Key Features:

Oracle Identity Cloud Service provides the following functionality, licensed and enabled as required: 
Single Sign On: Users sign in once into Identity Cloud Service and gain one click access to applications. 
Identity and Access Management: Administrators can centrally manage users and their access to different applications. Administrators also have the ability to immediately shut off access to applications. 
Integration with On-Premise AD/OAM: For organizations with existing enterprise systems like Active Directory, admininistrators can utilize automated synchronization of users and Single Sign On. 
User Authentication Service: This service implements standard OpenID Connect (OIDC) 3-legged User Authentication flows on top of the standard OAuth2 protocol. Interactive web-based and native applications leverage standard browser-based OIDC flows to request user authentication, receiving standard JWT-based identity tokens conveying the user’s authenticated identity. 
Identity Federation Service: This service provides support for standard SAML2 Browser POST Login & Logout Profiles. 
Token Service: This service provides support for standard 2-legged and 3-legged interactions covering User Authentication, User Consent, Identity Propagation and Web Service Authorization patterns. 
Reporting Service: This service generates dashboard information and reports from collected audit data
All components of IDCS are built on modern Cloud principles and use standard open stack protocols.
  •  OpenID Connect for browser-based user authentication 
  •  OAuth2 for securing REST API calls 
  •  HTTP cookies for tracking user’s active sessions
  •  JWT-based tokens for applications to map authenticated Cloud identities to local application identities 
  •  SAML for providing Single Sign on for Cross Domain applications using Federation
  •  SCIM for simplified user management in the Cloud by defining a schema for representing users and groups 
  •  RESTful APIs for all identity functions for customization and headless operations

Below are some of the screens of IDCS. 








Comments

  1. I really appreciate information shared above. It’s of great help. If someone want to learn Online (Virtual) instructor lead live training in oracle cloud service, kindly contact us http://www.maxmunus.com/contact
    MaxMunus Offer World Class Virtual Instructor led training on oracle cloud service. We have industry expert trainer. We provide Training Material and Software Support. MaxMunus has successfully conducted 100000+ trainings in India, USA, UK, Australlia, Switzerland, Qatar, Saudi Arabia, Bangladesh, Bahrain and UAE etc.
    For Demo Contact us:
    Name : Arunkumar U
    Email : arun@maxmunus.com
    Skype id: training_maxmunus
    Contact No.-+91-9738507310
    Company Website –http://www.maxmunus.com



    ReplyDelete
  2. Thanks for sharing this information!
    I totally agree with you. Your information is very interesting and important. I really like this information.Our easy web plans company is famous in Advanced Oracle Identity Manager Online Training in Hyderabad .
    If you want to see our training venue then click on links: http://www.lucidtechsystems.com/oracle-identity-manager-online-training/
    Call Now: +91-965-292-6376
    Drop Mail: info@lucidtechsystems.com

    ReplyDelete

Post a Comment

Popular posts from this blog

Developing Prepopulate Adapter with OIM 11g R2

1.      Prepopulate Adapter in OIM uses the plugin point oracle.iam.request.plugins.PrePopulationAdapte r. 2.      Write the Java code which returns the value which has to be populated on the form. 3.      This code will implement the plugin point oracle.iam.request.plugins.PrePopulationAdapte r. Code Snippet: - package com.oracle.oim.utility.eventhandler; import java.io.Serializable; import java.util.Iterator; import java.util.List; import java.util.logging.Logger; import oracle.iam.identity.exception.NoSuchUserException; import oracle.iam.identity.exception.UserLookupException; import oracle.iam.identity.usermgmt.api.UserManager; import oracle.iam.identity.usermgmt.vo.User; import oracle.iam.platform.Platform; import oracle.iam.platform.authz.exception.AccessDeniedException; import oracle.iam.request.exception.RequestServiceException; import oracle.iam.request.vo.Beneficiary; import oracle.iam.request.vo.RequestData; public c

OIM Tuning

Application Module tuning is a critical setting which will affect the UI performance. Following are the recommended application module settings for OIM and these are already set out-of-box (OOB) in later releases of OIM 11g R2. Ensure that these settings are implemented as recommended in your environment. -Djbo.ampool.doampooling=true -Djbo.ampool.minavailablesize=1 -Djbo.ampool.maxavailablesize=120 -Djbo.recyclethreshold=60 - Djbo.ampool.timetolive=-1 -Djbo.load.components.lazily=true - Djbo.doconnectionpooling=true -Djbo.txn.disconnect_level=1 - Djbo.connectfailover=false -Djbo.max.cursors=5 - Doracle.jdbc.implicitStatementCacheSize=5 - Doracle.jdbc.maxCachedBufferSize=19 open DOMAIN_HOME/bin/setDomainEnv.sh file for the WebLogic Server instance.find these lines: JAVA_OPTIONS="${JAVA_OPTIONS}" export JAVA_OPTIONS and change it to: JAVA_OPTIONS="-Djbo.ampool.doampooling=true -Djbo.ampool.minavailablesize=1 -Djbo.ampool.maxavailablesize=120 -D

Creating Role through OIM API - 11gR2

package com.oim.utilities; import java.util.HashMap; import oracle.iam.identity.rolemgmt.api.RoleManager; import oracle.iam.identity.rolemgmt.api.RoleManagerConstants; import oracle.iam.identity.rolemgmt.vo.Role; import oracle.iam.platform.OIMClient; public class RoleManagement  { static RoleManager roleManager=null; static OIMClient client=null; @SuppressWarnings("null") public static void createRole(String roleName){ System.out.println("RoleManagement :: createRole :: role name is "+roleName); try  { if (roleName!=null) { HashMap<String, Object> mapAttrs = new HashMap<String, Object>();; mapAttrs.put(RoleManagerConstants.ROLE_NAME, roleName); mapAttrs.put(RoleManagerConstants.ROLE_DISPLAY_NAME,roleName); mapAttrs.put(RoleManagerConstants.ROLE_DESCRIPTION, roleName); Role role = new Role(mapAttrs); // Initialising the OIM Connection client=ClientOIM.initialise(); System.out.println("RoleManagemen