Index

A  B  C  D  E  F  G  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W 

Numbers

11g vs. 10g
feature comparison chart, Preface
key conceptual and terminology changes, Preface

A

abbreviation file, adding to, 7.10.5, 7.10.5
Action and Alert Overrides, 10.2.17
Action and Score Overrides, 13.1.2
action instances
Action Priority, 16.9
creating, 16.9
edit, 16.18, 16.19
execution types, 16.8
search page, 16.7
Time to Live, 16.9
action override
adding or editing, 13.5
creating, 13.5
action templates, 16.1.2
creating, 16.6
deleting, 16.15
details, 16.5
editing, 16.11
exporting, 16.12
importing, 16.13
search page, 16.3
actions, 10.3.5
Actions group, 12.2, 12.15
activate
challenge questions, 7.5.10, 7.5.10
entities, 19.2.4.7, 19.2.4.7
patterns, 15.9.3.1
add
answer validation, 7.6.2
members to a new or an existing group, 12.10.2
add a sessions parameter from sessions, 6.6.1
add a sessions parameter to a group, 6.6.2
Add sessions parameter to sessions parameter group, 6.6
Add to Group, 6.6
AddItemToListAction, 16.20.2
Agent case
bulk editing, 5.4.6
Agent case creation
manual, 5.4.2.1
Agent case search page, 5.3.1
Agent case status
change manually, 5.4.5.1
agent case, escalated from CSR, 4.12.5
Aggregate scoring engine, 10.2.8
Alert Details, 5.3.35, 6.4
Devices Tab, 6.15.3
Locations Tab, 6.15.4
Sessions Tab, 6.15.5
Summary Tab, 6.15.1
Users Tab, 6.15.2
Alert Details Tasks, 6.15.7
alerts, 10.3.6
Alerts Details
Fingerprint Data, 6.15.6
Alerts group, 12.2, 12.2
AlertsBreakdown report, 24.1.8.6
anonymizer data, 26.3.4.1
anonymizer data, loading, 26.3.1.5
Answer Logic
configuring, 7.10
answer logic algorithms
fat fingering algorithm, F.3.2
phonetics, F.3.1
Answer Logic algorithms
common abbreviations, 7.10.2.1
common misspellings, 7.10.2.2
common nicknames, 7.10.2.1
common typos, 7.10.2.3
date format, 7.10.2.1
keyboard fat fingering, 7.10.2.3
phonetics, 7.10.2.2
Answer Logic level, 7.10.3
abbreviation, 7.10.3.1
fat fingering, 7.10.3.2
multiple word answers, 7.10.3.4
phonetics, 7.10.3.3
answer registration validations, 7.6
answer validation
adding, 7.6.2
Application ID, Preface, 27.1
archive and purge procedures, D
ASN, 12.2
ASN group, 12.2, 12.11
asynchronous actions, 16.8
attributes, 15.1.3
Audit Information
Customer Care Events, 24.2.3.1
Dynamic Action Management Events, 24.2.3.7
Entity Management Events, 24.2.3.8
Group/List Management Events, 24.2.3.5
Import Events, 24.2.3.13
KBA Questions Events, 24.2.3.2
OAAM Server Administration Events, 24.2.3.11
Pattern Management Events, 24.2.3.6
Policy Management Events, 24.2.3.3
Policy Set Management Events, 24.2.3.4
Snapshot Management Events, 24.2.3.10
Transaction Management Events, 24.2.3.9
User Events, 24.2.3.12
authenticate a closed case, 4.12.3.3
Authentication Status group, 12.2, 12.15
autolearning, Glossary
APIs for triggering pattern data processing, H.2
data/profiling data, 15.12
enabling, 15.2
in native integration, 15.3.4
pattern creations, best practices, 15.9.1
pattern data processing (On-Line and Scheduled), H.1
Auto-learning (Pattern-Based) Policy
OAAM Does User Have Profile, 10.9.3
OAAM Users vs. All Users, 10.9.5
OAAM Users vs. Themselves, 10.9.4
Autonomous System Numbers, 12.2
Average scoring engine, 10.2.8
AveragesSummary report, 24.1.8.7

B

basic environment setup
encryption and database credentials, 2.4
bharosa.trackeradmin.show.transaction.detail, 6.3.2
bharosa.uio.default.userinfo.inputs.enum, 8.8.2.2
BI Publisher reports
configuring, 24.1.2
bucket, 15.1.4
creation and population, 15.1.2
population, 15.1.6
By Digest, 19.2.4.3, A.11
By Key, 19.2.4.3, A.11

C

Cache Policy, 12.6
case
actions, 4.5.1
activity log, 4.6
activity, viewing, 4.6
best practices and recommendations, 4.16
close multiple at once, 4.12.6
Closed status, 4.12.3, 5.4.1
closing, 4.12.3.2
create like, 4.8.2, 5.4.2.2
creating, 4.8
CSR, 4, 4.1.1.1
definition, 4.1
description keyword, searching by, 4.4.5
details, viewing, 4.5.2
escalated, 4.1.1.2
escalated case logs, 4.6.3
Escalated status, 4.12.3
expiration date, 4.1.8
expiry behavior, C.2.6
extending expiration, 4.12.4
history, viewing, 4.6.1
log, searching, 4.6.2
New status, 4.12.3, 5.4.1
notes, adding, 4.12.1
open and closed, searching, 4.4.4
Pending status, 4.12.3, 5.4.1
reopening closed cases, 4.12.3.3
severity level, 4.1.7
severity level, changing, 4.12.2, 5.4.4
status, 4.1.6
status, changing, 4.12.3, 5.4.5
user details, viewing, 4.5.3
case action
add notes, 4.5.1
adding notes to cases, 4.12.1
Ask Question, 4.5.1
Change Severity, 4.5.1
Change Status, 4.5.1
changing severity level of a case, 4.12.2
changing status of a case, 4.12.3
Customer Resets, 4.5.1
Escalate Case, 4.5.1
Extend Expiration Date, 4.5.1
Temporary Allow, 4.5.1
Case Details page, 4.5
case status
changing case status to closed, 4.12.3.2
changing case status to Pending, 4.12.3.1
Case Status, 4.1.6
CaseCreationAction, 16.20.1
Cases search page, 4.4
cases, bulk editing, 4.12.6
cases, viewing list of, 4.4.2
cases, viewing ones working on, 4.4.3
challenge questions
activating, 7.5.10, 7.5.10
Answer Logic, 7.1.8
categories, 7.1.5, 7.1.5
create like, 7.5.4
creating, 7.11.1
creating new, 7.5.3
deleting, 7.5.8
details and statistics, 7.5.2
disabling, 7.5.9
editing, 7.5.5
exporting, 7.5.7
Global Registration Validation (Global), 7.1.9
Global-Local validation, 7.1.9
importing, 7.5.6
increment to next question, 4.10.4
increment user to the next challenge question, 7.1.11.3
managing, 7.5
Question Registration Validation (Local), 7.1.9
question set, 7.1.6
registration, 7.1.4
registration logic, 7.1.7
resets, 4.10
resetting, 4.10.2, 7.1.11.1
searching for, 7.5.1
validate challenge question answers, 7.1.9
challenge questions, importing, 7.2.1
challenge response
configuration, 7.1.3
process, 7.1.2
challenge setup
answer logic, 7.2.3
registration logic, 7.2.3
ChallengeStatistics report, 24.1.8.3
checkpoints, Preface
Cities group, 12.2, 12.12, 12.12.1
City Confidence Factor, 11.7.5.2
CLI
export options, 26.2.2.5
import of files, 26.2.2.4
import options, 26.2.2.6
importing multiple types of entities in one transaction, 26.2.2.7
obtaining usage information for import or export, 26.2.1
options, 26.2.2
overview, 26.1
parameters, 26.2.2.2
setting up the environment, 2.3
transaction handling, 26.2.2.9
closing multiple tabs, 3.7.1.6
com.bharosa.vcrypt.tracker.dynamicactions.intf.DynamicAction java interface, 16.10
Command-Line Interface (CLI), 26
conditions, 10.2.4
adding conditions to a rule, 11.8.2
deleting, 11.8.6
deleting from a rule, 11.8.7
details of a rule, 11.8.4
editing, 11.8.3
exporting, 11.9.5
importing, 11.9.4
order in a rule, 11.8.5
searching for, 11.8.1
config_secret_key.file, 2.4.2
configurable action instances, 16.16
configurable actions
adding to runtime, 16.9, 16.17, 16.18
creating, 16.2
deploying, 16.1.3
out-of-the-box, 16.20
standard, 16.20
configurable actions, defining, 16.6
configurable actions, viewing, 16.9, 16.17, 16.18
configure
Answer Logic, 7.10
registration logic, 7.8
connection speed
group, 12.2
Connection Speed group, 12.15
connection speed mapping, 26.3.3.3
Connection Type group, 12.15
connection types
group, 12.2
connection types mapping, 26.3.3.2
copying
policy to another checkpoint, 11.6.8
rule to policy, 11.4.6, 11.7.1
Countries group, 12.2, 12.12
Country Confidence Factor, 11.7.5.2
Country group, 12.12.3
CountryAggregates report, 24.1.8.4
create
action templates, 16.6
challenge questions, 7.11.1
entities, 19.2.4
patterns, 15.9.1
transaction definitions, 20.4.2
create like
challenge questions, 7.5.4
create new
challenge questions, 7.5.3
Credential Store Framework, 2.4
credit card entity, 19.2.1.1
CSR and CSR Manager role permissions, 4.2
CSR Manager, 4.1.3
custom action instances
creating, 16.10
customer
logins, filter by authentication status or alert level, 4.7.4
logins, search by device or date range, 4.7.2, 4.7.3
logins, viewing, 4.7.1
profile, resetting, 4.9.8
resets, 4.1.9, 4.9
service representative (CSR), 4.1.2
session history, viewing, 4.7.1
sessions, searching, 4.7.2
sessions, viewing, 4.7
customer service representative, 4

D

dashboard, 1.2.12
Performance panel, 23.1.4.1.1
Summary panel, 23.1.4.2
viewing performance, 23.1.4.1.1
dashboards, 23.1.4.3
viewing browser and OS data by device, 23.1.4.3.5
viewing data type by performance, 23.1.4.3.6
viewing list of rule or alerts by security, 23.1.4.3.4
viewing list of scoring breakdowns, 23.1.4.3.2
data elements, 19.2.1.1
Data Identification Scheme, 19.2.4.3
Data Loaders, 21.1.7
Data mining, 17.1.2
database credentials
setup, 2.3.3, 2.4
database credentials in the Credential Store Framework, 2.3.3
deactivate
entities, 19.3.9.1
patterns, 15.9.3.2
transaction
definitions, 20.5.8
define
groups, 12.10.1
OTP email challenge, 8.6
delete
action templates, 16.15
challenge questions, 7.5.8
conditions, 11.8.6
entities, 19.3.9.2
groups, 12.20
patterns, 15.11
policies, 11.6.7
rules, 11.7.7
transaction definitions, 20.5.4
deployment options, 1.4
DESede_config_key_alias, 2.4.5
DESede_db_key_alias, 2.4.5
Details pages, 6.1
Device
fingerprinting data archive and purge criteria, D.3
Device conditions
Browser header substring, B.4.1
Browser Header Substring, B.4.1
Check if Device is of Given Type, B.4.2
Device
Velocity from last login and ignore IP group, B.4.11
Device firsttime for user, B.4.3
Excessive Use, B.4.4
In Group, B.4.5
Is registered, B.4.6
Timed not status, B.4.7
Used count for User, B.4.8
User count, B.4.9
User Status Count, B.4.10
Device Details, 5.3.35, 6.4
Alerts Tab, 6.13.5
Fingerprint Data Tab, 6.13.7
Groups Tab, 6.13.2
Locations Tabs, 6.13.4
Sessions Tab, 6.13.6
Summary Tab, 6.13.1
Tasks, 6.13.8
Users Tab, 6.13.3
Device Risk Gradient, 11.7.5.2
DeviceIdScoring report, 24.1.8.2
Devices group, 12.2, 12.13
devices, unregistering, 4.9.4
disable
challenge questions, 7.5.9
logic for KBA, 7.1.12
display elements, 19.2.1.2

E

edit
action templates, 16.11
challenge questions, 7.5.5
conditions, 11.8.3
entities, 19.3.5
patterns, 15.9.1, 15.9.4
policies, 11.6.5
policy set, 13.6
transaction definitions, 20.5.3
encoded secret key, generating, 2.4.4
encodeKey command, 2.4
encryption
key, 2.4, 21.3.6.2
setup, 2.4, 21.3.6.2
entities
activating, 19.2.4.7, 19.2.4.7
creating, 19.2.4, 19.2.4.1
creation, best practices, 19.5
deactivating, 19.3.9.1
deleting, 19.3.9.2
details, viewing, 19.3.3
display scheme, specifying data for, 19.2.4.4
editing, 19.3.5
exporting, 19.3.8.1
ID Scheme, selecting, 19.2.4.3
importing, 19.3.8.2
search page, 19.3.2
escalate a case to agent case, 4.12.5
evaluation priority, 15.9.7
Excluded User Group, 11.7.5.2
expiration date for cases, 4.1.8
expiration, cases, 4.12.4
expiry behavior for cases
disabling, C.2.6.1
setting, C.2.6.2
export
action templates, 16.12
challenge questions, 7.5.7
conditions, 11.9.5
entities, 19.3.8.1
groups, 12.19.1
patterns, 15.10.2
policies, 11.9.1
transaction definitions, 20.5.5
Export to Excel, 6.5
exporting linked sessions, 5.3.41

F

Fingerprint Details, 5.3.35, 5.3.35, 6.4
Alerts Tab, 6.14.6
Devices Tab, 6.14.3
Locations Tab, 6.14.4
Sessions Tab, 6.14.5
Summary Tab, 6.14.1
Tasks, 6.14.7
Users Tab, 6.14.2
Forgot Password flow, 10.4.2

G

genEncodedKey, 2.4
Generic Integers group, 12.11
Generic Longs group, 12.2, 12.11
Generic Strings group, 12.2, 12.11
Generics group, 12.2
globalization support, F, F.1
group linking, 10.2.18.2
group types, 12.2
groups, 10.2.18, 12
Actions, 12.2, 12.15
add members from cities, states, and countries by filtering an existing list (no creation option), 12.10.2
adding alerts, 12.10.2
adding alerts to a group, 12.14
adding members, 12.10.2
Alerts, 12.2, 12.2
ASN, 12.2, 12.2, 12.11
Authentication Status, 12.2, 12.15
characteristics, 12.9
Cities, 12.2, 12.12, 12.12.1
Connection Speed, 12.2, 12.15
Connection Type, 12.2, 12.15
Countries, 12.2, 12.12, 12.12.3
create a new member to add to the group, 12.10.2
creating a new element/member to add to the group (no search and filter options), 12.11
defining, 12.10.1
deleting, 12.20
details page, 12.7
Devices, 12.2, 12.13
editing, 12.16
exporting, 12.19.1
exporting and importing, 12.19
filtering an existing list to select an element to add to the group (no creation of a new element), 12.12
Generic Integers, 12.11
Generic Longs, 12.2, 12.11
Generic Strings, 12.2, 12.11
Generics, 12.2
importing, 12.19.2
IP, 12.2, 12.13
IP Carriers, 12.2, 12.11
IP Range, 12.13
IP Ranges, 12.2
ISP, 12.2, 12.13
member, editing, 12.16
removing a user from a User Group, 12.18
removing members of, 12.17
Routing Type, 12.2, 12.15
search and add existing elements only (no creation), 12.10.2
search for existing elements or create new elements, 12.10.2
search page, 12.5
searching for, 12.6
searching for and adding existing elements, 12.15
searching for and adding existing elements or creating and adding a new element, 12.13
Second-Level Domains, 12.2, 12.11
States, 12.2, 12.12, 12.12.2
Top-Level Domains, 12.2, 12.11
transaction
status, 12.2, 12.15
updating directly, 12.21, 12.21
usage, 12.3
User ID, 12.2, 12.13
Username, 12.2, 12.13
viewing details about, 12.7

I

ID scheme, 19.2.1.3
image and phrase, resetting, 4.9.3
image, resetting, 4.9.1
import
action templates, 16.13
challenge questions, 7.2.1, 7.5.6
conditions, 11.9.4
entities, 19.3.8.2
groups, 12.19.2
IP
location data, 2.7, 21.3.6.5
patterns, 15.10.1
policies, 11.9.2
transaction definitions, 20.5.6
incrementing to next challenge question, 4.10.4
in-session transaction data archive and purge criteria, D.3
IP
carriers group, 12.2, 12.11
group, 12.2, 12.13
Loader properties, 26.3.1.2
location data, importing, 2.7, 21.3.6.5, 26.3
Location Loader Properties, 26.3.1.2
range group, 12.13
ranges group, 12.2
IP Address Details, 5.3.35, 5.3.35, 6.4
ISP group, 12.2, 12.13

J

Job Creation Wizard, 22.3
Job Queue, 22.2.2
jobs
canceling a job, 22.5.6
deleting jobs, 22.5.9
disabling jobs, 22.5.8
editing jobs, 22.6
editing the Monitor Data Rollup, 22.6.2
enabling jobs, 22.5.7
migration, 22.7
pausing a job, 22.5.4
processing a job immediately, 22.5.3
rescheduling jobs, 22.5.2
resuming a paused job, 22.5.5
running jobs, 22.5.1
scheduling and processing, 22
viewing and sorting the Job Queue, 22.5.13
viewing instances of a job, 22.5.11
viewing job details, 22.5.10
viewing the job log, 22.5.12
Jobs search page, 22.2.3

K

KBA
disabling logic for, 7.1.12
failure counters, 7.1.10
Locked status, 7.1.13
phone challenge, 4.10.6, 7.1.11.5
resets, 7.1.11
security solution guidelines, 7.12
unlock a user, 7.1.11.4
KBA vs. OTP, 8.1.6
KeyPad, 1.2.3
KeyStore command, 2.4.2
knowledge-based authentication (KBA), 1.2.5, 7

L

Linked Sessions, 5.3.18
linked sessions, exporting, 5.3.41
Load and Run Job creation, 22.4.3
Load Job, 21.1.4
Load Jobs creation, 22.4.1
loading MaxMind IP data, setting up for, 26.3.1.3
location
data, loading, 26.3.1.5
loading tables, 26.3.4.2
Location
Domain in Group, B.5.17
In State Group, B.5.11
IP Connection Speed in Group, B.5.18
IP Connection Type, B.5.12
IP Excessive Use, B.5.14
IP in Group, B.5.16
IP Maximum Logins, B.5.13
IP Multiple Devices, B.5.21
IP Routing Type, B.5.22
IP Type, B.5.23
ISP in Group, B.5.19
Timed Not Status, B.5.15
Top-Level Domain in Group, B.5.20
User Status Count, B.5.24
Location conditions
ASN in group, B.5.1
City in group, B.5.2
In carrier group, B.5.3
In Country group, B.5.4
IP Connection type in group, B.5.5
IP in Range group, B.5.6
IP line speed type, B.5.7
IP Maximum Users, B.5.8
IP Routing Type in group, B.5.9
Is IP from AOL, B.5.10
Location Details, 5.3.35, 5.3.35, 6.4
Alerts Tab, 6.12.5
Devices Tab, 6.12.4
Fingerprints Tab, 6.12.7
Groups Tab, 6.12.2
Sessions Tab, 6.12.6
Summary Tab, 6.12.1
Tasks, 6.12.8
Users Tab, 6.12.3
Locked status, 4.1.4
KBA, 7.1.13
logging, K
output, J
LoginSummary report, 24.1.8.7

M

Maximum scoring engine, 10.2.8
member types, 15.1.3
member types and attributes, 15.1.3
Microsoft SQL Server database, setting up, 26.3.1.1
Minimum scoring engine, 10.2.8
models
editing, 11.6.5
Monitor Data Rollup Job creation, 22.4.4
Monitoring Information
APIs Execution Information, 23.2.3
Login Information, 23.2.1
Rules Engine Execution Information, 23.2.2
multi-bucket patterns, 15.1.4, Glossary
multiple tabs, closing, 3.7.1.6
MultipleDevices report, 24.1.8.8
MultipleFailures report, 24.1.8.2
MultipleUsers report, 24.1.8.2, 24.1.8.4
multitenancy, 27.1
CSR examples, 4.14.5
providing CSR access to particular organizations, 27.3.2
set up access control for multitenancy, 27.3
multitenancy access control, 27

N

navigation panel, 3.5
Navigation panel
menu and toolbar, 3.5.2
nested policies, 10.2.15
new features, 11g, Preface
notes, adding to cases, 4.12.1

O

OAAM Admin, Preface
access level, 3.12
console and controls, 3.3
details pages, 3.7.2
management areas, 3.7
search pages, 3.7.1
sign in, 3.2
OAAM AuthenticationPad policy, 10.8.1
OAAM Challenge policy, 10.11.1
OAAM Customer Care Ask Question, 10.12.1
OAAM environment, setting up, 2.1
OAAM Jobs, 22.2
OAAM offline, 21
OAAM Offline
architecture, 21.1.2
changing the checkpoints to run, 21.9
existing deployment using OAAM Offline, 21.5.2
installation, 21.3
jobs, 21.1.3
loading from non-Oracle or non-Microsoft Server SQL Server database, 21.8
monitoring OAAM Offline, 21.7
new deployment using OAAM Offline, 21.5.1
testing policies and rules, 21.5
OAAM Post-Authentication Security policy, 10.9.1
OAAM Pre-Authentication policy, 10.6.1
OAAM Predictive Analysis policy, 10.9.2
OAAM properties
bharosa.uio.proxy.mode.flag, C.1.13
dynamicactions.enabled, C.1.4
vcrypt.tracker.ip.detectProxiedIP, C.1.13
vcrypt.tracker.rulelog.detailed.minMillis, K.2
vcrypt.tracker.rules.trace.policySet.XXXXXX, K.2
OAAM Registration policy, 10.10.1
OAAM Server, Preface
OAAM snapshot
challenge questions for English, 2.6
configurable actions, 2.6
entity definitions, 2.6
groups, 2.6
out-of-the-box patterns, 2.6
out-of-the-box policies, 2.6
OAAM Snapshot, importing, 2.6, 11
oaam_base_snapshot.zip, 2.6
oaam_db_key, 2.4.6
OAAM_LOAD_DATA_VIEW, 21.8.2.1
ODM
custom input data mappings, 17.10
ODM Models rebuilding, 17.4
ODM models, adding, 17.9
one-time password, 8.1.1
Oracle Adaptive Access Manager URL, 3.2, 21.3.5
Oracle Enterprise Manager Fusion Middleware Control, 28.2
Organization ID, Preface, 4.8.1, 5.4.2.1, 27.1
OTP
challenge type, 8.1.5
configuring OTP presentation, 8.11.4
configuring policies and rules to use OTP Challenge, 8.9
configuring UMS Server URLs and credentials, 8.5
Email Challenge Type, 8.6
email challenge, defining, 8.6
email registration, 8.8.2.2
enabling and defining the OTP Challenge, 8.6
enabling profile registration, 8.7
failure counter, 8.11.3
Failure Counters, 8.1.4
performance data, viewing, 23.4.6
setup overview, 8.3
SMS Challenge Type, 8.6
Terms and Conditions, 8.8.2.1
unlocking, 4.9.7
OTP Anywhere, 8
OTP profile, resetting, 4.9.5

P

pattern attributes operators
Equals, 15.20.2
For Each, 15.20.1
Greater Than, 15.20.4
Greater Than Equal To, 15.20.6
In, 15.20.8
Less Than, 15.20.3
Less Than Equal To, 15.20.5
Like, 15.20.10
Not Equal, 15.20.7
Not In, 15.20.9
Not Like, 15.20.11
Range, 15.20.12
Pattern (Authentication)
Entity is a Member of the Pattern Bucket Less Than Some Percent with All Entities in the Picture, B.3.3
Entity is a Member of the Pattern Less Than Some Percent of Time, B.3.2
Entity is a member of the pattern N times in a given time period, B.3.5
Pattern (Authentication) conditions
Entity is Member of Pattern Bucket for First Time in Certain Time Period, B.3.1
Entity is Member of Pattern N Times, B.3.4
pattern rules evaluations, 15.1.5
Pattern (Transaction) conditions
Entity is a Member of the Pattern Bucket for the First Time in a Certain Time Period, B.3.8
Entity is a Member of the Pattern Bucket Less than Some Percent with All Entities in the Picture, B.3.10
Entity is a Member of the Pattern Less Than Some Percent of Time, B.3.9
Entity is a Member of the Pattern N Times in a Given Time Period, B.3.7
Entity is Member of Pattern N Times, B.3.6
Entity is Member of Pattern X% More Frequently All Entities’ Average Over Last N Time Periods, B.3.11
Entity is Member of Pattern X% More Frequently Than Entity’s Average Over Last N Time Periods, B.3.12
patterns, 15.1.2
activating, 15.9.3.1
adding attributes, 15.9.2
adding or changing member type, 15.9.6
changing status of, 15.9.5
creating, 15.9.1
creation method, 15.6
data processing, H
deactivate, 15.9.3.2
deactivating and activating, 15.9.3.1
deleting, 15.11
details page, 15.7
editing, 15.9.1, 15.9.4
exporting, 15.10.2
importing, 15.10.1
multi-bucket, 15.1.4, 15.9.1
search page, 15.5
single-bucket, 15.1.4, 15.9.1
status, 15.6
transaction type, 15.6
performance and activity, monitoring, 28.2
phrase, resetting, 4.9.2
PinPad, 1.2.3
policies, 10.2.5
authentication flow, 10.4.1
deleting, 11.6.7
editing, 11.6.5
evaluating policy within a rule, 11.10
exporting, 11.9.1
importing, 11.9.2
migrated from 10g to 11g, 11.9.2
out-of-the-box OAAM policies, 10.5
search page, 11.6.1
searching for, 11.6.2
viewing, 11.6.2, 11.6.3
policy, Preface
management, 1.2.11
Policy Details page, 11.6.4
Policy Explorer, 6.8.1
policy set, 13
details page, 13.2
editing, 13.6
Policy tree, 3.6
Post-Authentication Policies, 10.9
PostAuthScoring report, 24.1.8.6
Pre-Authentication Policies, 10.6
PreAuthScoring report, 24.1.8.6
predictive analysis, 17.1
predictive analysis evaluation, 17.5
predictive analysis rule conditions, tuning, 17.6
processPatternAnalysis, H.2.3, H.2.3
properties
creating, 25.5
deleting database type properties, 25.7
editing the values for Database and File type, 25.6
exporting database and file type properties, 25.8
importing database type properties, 25.9
Oracle Adaptive Access Manager, C
Properties Editor, using, 25

Q

QuestionPad, 1.2.3
QuestionStatistics report, 24.1.8.3
Quova file layout, 26.3.3

R

RecentLogins report, 24.1.8.1
registration logic
configuring, 7.8
registration phrase, 7.1.4
Registration report, 24.1.8.3
reporting, BI Publisher, 1.2.13
reset
challenge questions, 4.10, 4.10.2, 7.1.11.1
challenge questions and set of questions to choose from, 7.1.11.2
challenge questions and the question set, 4.10.3
customer, 4.1.9, 4.9
customer profile, 4.9.8
image, 4.9.1
image and phrase, 4.9.3
OTP profile, 4.9.5
phrase, 4.9.2
virtual authentication device, 4.9.6
Reset Password (KBA-Challenge) Flow, 10.4.3
role permissions, CSR and CSR Manager, 4.2
Routing Type group, 12.15
routing types
group, 12.2
mapping, 26.3.3.1
rule and fingerprint logging, K
rules
adding new, 11.4
creation process, 11.4.1
deleting, 11.7.7
details, 11.7.4
editing, 11.7.5
engine, 11.7.5.3
preconditions, 11.7.5.2
results, 11.7.5.3
search page, 11.7.2
searching for, 11.7.3
RulesAPIPerformance report, 24.1.8.5
RulesBreakdown report, 24.1.8.6
RulesPerformance report, 24.1.8.5
Run Job, 21.1.5
Run Job creation, 22.4.2

S

scores
override
adding or deleting, 13.4
creating, 13.4
propagation, 10.2.11
scoring engine, Glossary
scoring override, 10.2.16
ScoringCombinations report, 24.1.8.6
search for
challenge questions, 7.5.1
conditions, 11.8.1
groups, 12.6
policies, 11.6.2
Search Results table, 3.7.1.2
menu and toolbar, 3.7.1.3
searching for
rules, 11.7.3
secondary authentication, 7.1.1, F.3
Second-Level Domains group, 12.2, 12.11
secret key for encrypting database values, 2.4.3
secret keys, backup, 2.4.7
Session conditions
Check Current Session Using the Filter Conditions, B.6.8
Check Param Value, B.6.1
Check parameter value for regular expression, B.6.3
Check parameter value in group, B.6.2
Check Risk Score Classification, B.6.9
Check String Value, B.6.5
Check two string parameter values, B.6.4
Check value in comma separated values, B.6.14
Compare Two Parameter Values, B.6.7
Compare with Current Date Time, B.6.12
Cookie Mismatch, B.6.10
IP Changed, B.6.13
Mismatch in Browser Fingerprint, B.6.11
Time Unit Condition, B.6.6
Session Details, 5.3.35, 6.4
Checkpoint panels, 5.3.30.3, 6.8.4
panels, 6.7
Transactions panel, 6.8.2.3
Sessions Details, 6.4
sessions search, 5.3.28, 6.4
Sessions Search, 5.3.28
single-bucket patterns, 15.1.4, Glossary
snapshot
backup, 14.1.4, 14.6
best practices, 14.12
deleting, 14.8
details, 14.5
limitations, 14.9
metadata, 14.1.3
restore, 14.1.5, 14.7
search page, 14.2
storage, 14.1.2
soap_key.file, I.7
State Confidence Factor, 11.7.5.2
StateAggregates report, 24.1.8.4
States group, 12.2, 12.12, 12.12.2
symmetric key to CSF, adding, 2.4.5
synchronous actions, 16.8
System conditions
Check Boolean Property, B.7.1
Check Enough Pattern Data, B.7.2
Check If Enough Data is Available for Any Pattern, B.7.3
Check Int Property, B.7.4
Check Request Date, B.7.5
Check String Property, B.7.6
system_soap.keystore, I.7

T

tables in location loading, 26.3.4.2
tables used by the ETL process, 26.3.4
temporary allow, 4.11
Temporary Allow, 4.1.5
TextPad, 1.2.3
three-way integration
overview of integration tasks, 20.2
time zone, setting, 2.9
Top-Level Domains group, 12.2, 12.11
TrackerAPIPerformance report, 24.1.8.5
transaction
definition
adding existing entity, 20.4.3
definitions
create new entity to add, 20.4.4
creating, 20.4.2
deactivating and activating, 20.5.7
defining source data, 20.4.6
deleting, 20.5.4
editing, 20.5.3
exporting, 20.5.5
importing, 20.5.6
mapping source data, 20.4.7
viewing, 20.5.2
status group, 12.15
status groups, 12.2
Transaction
Check Number of Times Entity Used in Transaction, B.8.5
Transaction conditions
Check Count of any entity or element of a Transaction using filter conditions, B.8.2
Check Current Transaction Using Filter Condition, B.8.3
Check if consecutive Transactions in given duration satisfy the filter conditions, B.8.4
Check Transaction Aggregrate and Count Using Filter, B.8.6
Check Transaction Count Using Filter Condition, B.8.7
Check Unique Transaction Entity Count with the specified count, B.8.11
Compare Transaction Aggregrates (Sum/Avg/Min/Max) across two different durations, B.8.8
Compare Transaction counts across two different durations, B.8.9
Compare Transaction Entity/Element counts across two different durations, B.8.10
Transaction Details, 5.3.35
trigger combination, Preface
trigger combinations, 10.2.13, 11.5
trigger return combinations
specifying, 11.5, 11.5

U

Universal Risk Snapshot, 14
unlock
customer, 4.10.5
OTP, 4.9.7
user, 7.1.11.4
unregistering devices, 4.9.4
updateAuthStatus, H.2.2, H.2.2
updateTransaction, H.2.1
upgrading components, 2.6
upgrading configurations, 2.6
upgrading policies, 2.6
use cases
CSR, 4.15
User
Account Status, B.9.27
Action Count, B.9.24
Action Count Timed, B.9.25
ASN for First Time, B.9.52
Authentication Image Assigned, B.9.10
Authentication Mode, B.9.11
Challenge Channel Failure, B.9.14
Challenge Failure - Minimum Failures, B.9.16
Challenge Failure Is Last Challenge Before, B.9.18
Challenge Maximum Failures, B.9.17
Challenge Questions Failure, B.9.15
Challenge Timed, B.9.13
Check Anomalous User Request, B.9.38
Check First Login Time, B.9.51
Check Fraudulent User Request, B.9.37
Check Information, B.9.33
Check Last Session Action, B.9.26
Check Login Count, B.9.60
Check Login Time, B.9.63
Check OTP Failures, B.9.19
Check User Data, B.9.34
Checkpoint Score, B.9.67
City First Time for User, B.9.46
Client And Status, B.9.28
Country Failure Count for User, B.9.59
Country First Time for User, B.9.41
Country First Time from Group, B.9.42
Distance from Last Successful Login, B.9.8
Distance from Last Successful Login within Limits, B.9.9
Image Status, B.9.30
In Group, B.9.21
IP Carrier for First Time, B.9.48
Is Last IP Match with Current IP, B.9.65
Is User Agent Match, B.9.36
Last Login Status, B.9.61
Last Login within Specified Time, B.9.62
Location Used Timed, B.9.66
Login for First Time, B.9.47
Login in Group, B.9.22
Login Time Between Specified Times, B.9.64
Maximum Cities, B.9.56
Maximum Countries, B.9.54
Maximum IPs Timed, B.9.58
Maximum Locations Timed, B.9.57
Maximum States, B.9.55
Multiple Failures, B.9.20
Phrase Status, B.9.31
Preferences Configured, B.9.32
Question Status, B.9.29
State First Time for User, B.9.44
Status Count Timed, B.9.12
User Agent Percentage Match, B.9.35
User Carrier for First Time, B.9.53
User City for First Time, B.9.45
User Country for First Time, B.9.40
User Group in Group, B.9.23
User IP for First Time, B.9.49
User is Member of Pattern N Times, B.9.39
User ISP for First Time, B.9.50
User State for First Time, B.9.43
Velocity from Last Successful Login, B.9.6
Velocity from Last Successful Login within Limits, B.9.7
User conditions
Check If Devices Of Certain Type Are Used, B.9.3
Check Number of Registered Devices Of Given Type, B.9.4
Devices Used, B.9.2
Stale Session, B.9.1
Velocity from Last Success, B.9.5
User Details, 5.3.35, 6.4
Alerts Tab, 6.11.6
Devices Tab, 6.11.3
Fingerprint Data, 6.11.7
Groups Tab, 6.11.2
Locations Tab, 6.11.4
Policies Tab, 6.11.8
Sessions Tab, 6.11.5
Summary Tab, 6.11.1
Tasks, 6.11.9
user groups, 2.5, G.1, G.1
User ID group, 12.2, 12.13
Username group, 12.2, 12.13
uses cases
details pages, 6.16

V

vcrypt.tracker.autolearning.enabled, 15.3.2
vcrypt.tracker.autolearning.use.auth.status.for.analysis, 15.3.2
vcrypt.tracker.autolearning.use.tran.status.for.analysis, 15.3.2
vcrypt.tracker.rules.allowControlledActions, 13.1.3
VCryptUser, L.1
view
OTP performance data, 23.4.6
view of a non-OAAM database, creating, 21.8.2
virtual authentication device, resetting, 4.9.6
virtual authentication devices
KeyPad, 1.2.3
PinPad, 1.2.3
QuestionPad, 1.2.3
TextPad, 1.2.3

W

Weighted Maximum scoring engine, 10.2.8
Weighted Minimum scoring engine, 10.2.8
Weighted scoring engine, 10.2.8