3/65
List of Tables
1-1 Oracle Adaptive Access Manager Functionality
3-1 OAAM Features
3-2 Create New of Selected Nodes
3-3 View Menu Commands
3-4 Actions Commands
3-5 Policy Tree Legend
3-6 Open Pages
3-7 Results Menu and Toolbar
3-8 Access Level
4-1 CSR and CSR Manager Role Permissions
4-2 Search Filters
4-3 Log Search Filters
4-4 Sessions Search Filters
4-5 Case Status
4-6 CSR Access
5-1 Case Status
5-2 Fraud Investigation Role Permissions
5-3 Search Filters
5-4 Case Details
5-5 User Data
5-6 Log Search Filters
5-7 CSR Access
5-8 CSR Searches for Cases Working On
5-9 Investigator Searches for Cases Working On
6-1 Session Search Filters
6-2 Search session results
6-3 Add and Remove from Group
6-4 Add to Group Dialog Filters
6-5 Add to Group Fields
6-6 Policies in a Checkpoint
6-7 Sessions Checkpoint Actions
6-8 User Details Tabs
6-9 User Details: Basic Information about the User
6-10 User Details: Registration Information
6-11 User Details; Profile Data
6-12 User Details: Group Filters
6-13 User Details: Device Tab
6-14 User Details: Locations Tab
6-15 User Details: Sessions tab
6-16 User Details: Alert Filters
6-17 User Details: Fingerprint Data Tab
6-18 Group Filters
6-19 Location Tab
6-20 Alert Filters
6-21 Sessions tab
6-22 Location Details Tabs
6-23 Country Details
6-24 State Details
6-25 City Details
6-26 IP Details
6-27 Location Details: Group Filters
6-28 Location Details: Users Tab
6-29 Location Details: Device Tab
6-30 Location Details: Alert Filters
6-31 Sessions tab
6-32 Fingerprint Data
6-33 Location Details: Group Filters
6-34 Device Details Tabs
6-35 Device Details Basic Information
6-36 Device Details Fingerprint Information
6-37 Device Details: Group Filters
6-38 Device Details: User tab
6-39 Device Details: Location Tab
6-40 Device Details: Alert Filters
6-41 Sessions tab
6-42 Device Details: Fingerprint Data
6-43 Group Filters
6-44 User tab
6-45 Location Tab
6-46 Alert Filters
6-47 Sessions tab
6-48 Fingerprint Details Tab
6-49 Fingerprint Details: Users tab
6-50 Fingerprint Details: Devices Tab
6-51 Fingerprint Details: Locations Tab
6-52 Fingerprint Details: Sessions tab
6-53 Fingerprint Details: Alerts Tab
6-54 Fingerprint Details: Users tab
6-55 Fingerprint Details: Users tab
6-56 Fingerprint Details: Locations Tab
6-57 Alert Details Tabs
6-58 Alert Details: Summary Tab
6-59 Alert Details: Users tab
6-60 Alert Details: Device Tab
6-61 Location Tab
6-62 Sessions tab
6-63 User Details: Fingerprint Data Tab
6-64 Alert Details: Users tab
6-65 Device Tab
6-66 Location Tab
6-67 User Details: Fingerprint Data Tab
7-1 Disable Results in Question and Category Logic
7-2 Question Search Criteria
7-3 Question Action menu commands
7-4 Validation Action menu commands
7-5 Validation Parameters
7-6 Question Search Criteria
7-7 Answer Logic Algorithm Example
9-1 OTP Challenge Types
9-2 Quick Start for Enabling OTP Out of the Box
9-3 OTP Setup Tasks
9-4 Connecting to the SMTP Server
9-5 Connecting to the Vendor
9-6 UMS Server URLs and Credentials
9-7 Properties for SMS Challenge Type
9-8 Properties for Email Channel Type
9-9 Enable OTP Profile Registration and Preference Setting
9-10 OTP opt-out properties
9-11 Enabling Opt-Out for OTP Registration and Challenge
9-12 Terms and Conditions Checkbox
9-13 Mobile Input Registration Fields
9-14 Mobile Input
9-15 Email Input
9-16 Email Input
9-17 Authentication Device Type
9-18 User: Check OTP failures Values
9-19 Messaging of Terms and Conditions
9-20 Terms & Conditions and Privacy Policy Popup Messaging
9-21 Mobile Input - Resource Bundle
9-22 Registration Resource Bundle
9-23 Challenge Type Resource Bundle Items
9-24 Challenge Type Resource Bundle Items
10-1 Multiple Conditions
10-2 Policies Search Filter Criteria
10-3 Policy Details Summary Tab
10-4 New Rule Page
10-5 Trigger Combination
10-6 Trigger Combination Toolbar Options
10-7 Copy Policy to Checkpoint
10-8 Rules Results
10-9 Rule Details Summary Tab
10-10 Results Tab
10-11 Conditions Search fields
10-12 Rule Details Conditions Tab
11-1 OAAM Checkpoints and Responsibilities
11-2 OAAM Pre-Authentication Policy Summary
11-3 OAAM Pre-Authentication Policy Rules Details
11-4 OAAM AuthenticationPad Policy Summary
11-5 OAAM Authentication Pad Policy Rules Details
11-6 OAAM AuthenticationPad Policy Trigger Combinations
11-7 OAAM Post-Authentication Security Policy Summary
11-8 OAAM Post Authentication Security Policy Rules Details
11-9 OAAM Predictive Analysis Policy Summary
11-10 OAAM Predictive Analysis Policy Rules Details
11-11 Auto-learning (Pattern-Based) Policy: OAAM Does User Have Profile Summary
11-12 Auto-learning (Pattern-Based) Policy Rules Details: OAAM Does User Have Profile
11-13 Auto-learning (Pattern-Based) Policy: OAAM Does User Have Profile Trigger Combination
11-14 Auto-learning (Pattern-Based) Policy: OAAM Users vs. Themselves Summary
11-15 Auto-learning (Pattern-Based) Policy Rules Details: OAAM Users vs. Themselves
11-16 Auto-learning (Pattern-Based) Policy: OAAM users vs. All Users Summary
11-17 Auto-learning (Pattern-Based) Policy Rules Details: OAAM Users vs. All User
11-18 OAAM Registration Policy Summary
11-19 OAAM Registration Policy Rules Details
11-20 OAAM Challenge Policy Summary
11-21 OAAM Challenge Policy Rules Details
11-22 OAAM Challenge Trigger Combinations
11-23 OAAM Customer Care Ask Question Policy
11-24 OAAM Customer Care Ask Question Rule Details
12-1 Group Types
12-2 Groups Search Filter Criteria
12-3 Add to Group
12-4 Summary of Group Characteristics
12-5 Create New Member (No Search Option)
12-6 Add Members by Filtering Existing (No Creation Option)
12-7 Search for existing or create new elements
12-8 Search and add existing only (no creation option)
12-9 Create Parameters
12-10 Searching for Elements
12-11 Create Parameters
12-12 Searching for Alerts
12-13 Create Parameters for Alerts
12-14 Editing a Member of a Group
12-15 Fraudulent Country Policy
12-16 Country Group
12-17 Fraud High Alert Group
12-18 Block Group
14-1 Scoring Engines
16-1 System Search Filter Criteria
17-1 Search Filter Criteria
17-2 Autolearning Classes and Logging
17-3 Pattern Attributes
18-1 Action Template Search Filter Criteria
18-2 Action Instances Search Filter Criteria
19-1 Properties for oracle.oaam.odm.model.enum
19-2 Custom Mapping
20-1 Search Filter Criteria
21-1 Search Filter Criteria
21-2 Transaction Rule Configuration
21-3 Transaction Frequency Checks
21-4 Transaction Frequency and Amount Check against Suspicious Beneficiary Accounts
21-5 Transaction Check against Blacklisted Deposit and Beneficiary Accounts
21-6 Transaction Pattern
22-1 Jobs
22-2 OAAM Loader vs. Custom Loader
22-3 Offline Environment
22-4 Tasks in OAAM Offline Setup
23-1 Online Job Scheduling System
23-2 Offline Environment
23-3 Jobs
23-4 Job Actions
23-5 Search Filters
23-6 Results Table Toolbar Actions
23-7 OAAM Job Types
23-8 Custom and OAAM Loaders
23-9 OAAM Loader Details
23-10 Schedule Page Options
23-11 Job Priority Examples
23-12 Scheduling Types
23-13 Scheduling Type Examples
23-14 Database Connection Parameters
23-15 Characteristics of the Load Job
23-16 Schedule Details
23-17 Run Type
23-18 Schedule Details for a Run Job that Executes Once
23-19 Schedule Details for Recurring Run Job
23-20 Database Connection Parameters
23-21 Schedule Details for a Run Job that Executes Once
23-22 Schedule Details
23-23 Default Value for Cutoff Time
23-24 Schedule Details for a Run Job that Executes Once
23-25 Schedule Details
23-26 Deleting Jobs
23-27 Filter Job Instances
23-28 Job Log Filters
23-29 Edit Job
23-30 Job Log Filters
24-1 Common Dashboard Terms and Definition
24-2 Performance Data Types
24-3 Summary Data Types
24-4 Data Types by Location
24-5 Data Type by Performance
25-1 VCRYPT_TRACKER_USERNODE_LOGS
25-2 VCRYPT_ALERT
25-3 Information about Data Types
27-1 Log In Information
27-2 Rules Engine Execution
27-3 API Execution
27-4 Customer Care Events
27-5 Policy Management Events
27-6 KBA Questions Events
27-7 Group/List Management Events
28-1 Search Filter Criteria
29-1 CLI Parameters
29-2 Support Modules
29-3 IP Loader Properties
29-4 Quova/Neustar File Layout
29-5 Routing Types Mappings
29-6 Connection Types Mappings
29-7 Connection Speed Mappings
29-8 Anonymizer Data
30-1 Multitenant Experiences for CSR and Agents
31-1 Troubleshooting Tools
31-2 Troubleshooting Tips
31-3 Problems and Tips
A-1 Support Representatives
A-2 Support Manager
A-3 Fraud Investigator
A-4 Fraud Investigation Manager
A-5 Security Administrator
A-6 System Administrator
A-7 Auditor
B-1 updateTransaction Parameter and Returned Value
B-2 updateAuthStatus Parameters
B-3 processPatternAnalysis
C-1 Rule Conditions
C-2 Device ID Policies
C-3 Day of Week
C-4 System - Check enough pattern data
C-5 System - Check enough pattern data parameters
C-6 System - Check If Enough Data is Available for Any Pattern
C-7 System - Check If Enough Data is Available for Any Pattern Parameters
C-8 User: Velocity from Last Success
C-9 Use Case 1
C-10 Use Case 2
C-11 Use Case 3
E-1 Example of Policy Development Actors
E-2 Edit Policy: Research/Troubleshooting
E-3 New Policy: Discovery/Research
E-4 Problem Statement Mapping
E-5 Problem Statement Mapping
I-1 Archive and Purge Routine Parameters
I-2 Archive and Purge Scripts Based on Types of Data
I-3 Login and Device
I-4 Rules and Policy Log Data Tables
I-5 Transactions and Entity Data Tables
I-6 Autolearning Data Tables
I-7 Profile Data Tables
I-8 Case-Related Data Tables
I-9 Monitor Data Tables
I-10 Archive and Purge Criteria
K-1 Oracle Adaptive Access Manager Loggers
K-2 Logging Levels
K-3 Handler Classes
L-1 Rule Logging Properties
L-2 Rules and Policy Log Data Tables
Scripting on this page enhances content navigation, but does not change the content in any way.