Skip Headers

Oracle® Identity Management Concepts and Deployment Planning Guide
10g (9.0.4) for Windows or UNIX
Part No. B10660-01
  Go To Table Of Contents
Contents
Go To Documentation Library
Home
Go To Product List
Solution Area
Go To Index
Index

Previous Next  

List of Figures

1-1 Overview of an Identity Management System
1-2 Oracle Identity Management
2-1 Application Integration Model
2-2 Identity and Application Provisioning Life Cycle
2-3 Identity Management Integration with Oracle Products
3-1 The Deployment Planning Process
3-2 Central Identity Management Infrastructure
3-3 Using One Identity Management Infrastructure
3-4 Using Two Identity Management Infrastructures
3-5 Central Single Sign-on and Departmental Autonomy
3-6 Departmental Identity Management Infrastructure
3-7 Identity Management Infrastructure Integration with Enterprise Provisioning
3-8 Identity Management Infrastructure Integration with Windows User Provisioning
3-9 Multiple Identity Management Realms in a Hosted Deployment
3-10 Oracle Internet Directory Information Tree
3-11 Identity Management Realm
3-12 OracleAS Single Sign-On and Oracle Delegated Administration Services Default Deployment
3-13 OracleAS Single Sign-On, Oracle Delegated Administration Services Deployment, and Oracle Application Server Certificate Authority in a DMZ
3-14 Multiple OracleAS Single Sign-On and Oracle Delegated Administration Services Middle Tiers with one Oracle Internet Directory Server
3-15 Oracle Internet Directory Deployment Using Cold Failover
3-16 OracleAS Single Sign-On and Oracle Delegated Administration Services Deployment on Active Failover Cluster
3-17 Multiple OracleAS Single Sign-On and Oracle Delegated Administration Services Middle Tiers within a Replicated Oracle Internet Directory Network
3-18 Enterprise Applications Configured in a Replicated Environment
3-19 Geographically Distributed Deployment
3-20 Oracle Internet Directory Deployment Using Oracle Data Guard
4-1 Delegating User and Group Management Privileges
4-2 Delegating Deployment-time and Run-time Privileges