Skip Headers
Oracle® Identity Management Concepts and Deployment Planning Guide
10g Release 2 (10.1.2)
B14084-02
  Go To Documentation Library
Home
Go To Product List
Solution Area
Go To Table Of Contents
Contents
Go To Index
Index

Previous
Previous
Next
Next
 

2 Oracle Identity Management Concepts and Architecture

This chapter introduces concepts that deployment planners must understand to effectively deploy identity management. It provides an overview of the Oracle Identity Management architecture, the provisioning lifecycle of applications and users in the Oracle environment, and presents the terms that are commonly used to describe identity management.

This chapter contains the following sections:

2.1 Identity Management Terminology

The following list defines some important identity management terms and concepts:

2.2 Identity Management Concepts

This section describes the fundamental concepts of identity management and contains the following topics:

2.2.1 Integrating Application Security with Identity Management

This section provides a framework for understanding the roles of various Oracle Identity Management components and services, and provides a basis for understanding how to create secure application deployments in an enterprise environment.

The application integration model is shown in Figure 2-1.

Figure 2-1 Application Integration Model

Described in text.

In this model, the following essential services are performed by the identity management infrastructure:

  • Administration and provisioning: Provides administration and provisioning services for the identities managed by the identity management infrastructure. In Oracle Identity Management, these services are performed using tools such as Oracle Delegated Administration Services and Oracle Directory Integration and Provisioning.

  • Policy decision services: Oracle Internet Directory performs policy decision services for the identity management infrastructure itself.

  • Identity policy assertion services: In Oracle Identity Management these services are performed by OracleAS Single Sign-On and OracleAS Certificate Authority

Applications deployed against the identity management infrastructure interact with the infrastructure in the following ways:

  • User authentication: When a user accesses an application, it validates the user credentials using the services provided by the identity management infrastructure. The authentication and the associated communication to the application is accomplished with the identity policy assertion services. For example, in the case of the Oracle Identity Management infrastructure, this would be validation of the credential, in the form of an encrypted browser cookie, by OracleAS Single Sign-On.

  • User authorization: Once authenticated, the application must also check if the user has sufficient privileges over resources protected by the application. This check is performed by the application based on identity information managed in the identity management infrastructure. For example, a Java2 Enterprise Edition application uses Oracle Application Server Java Authentication and Authorization Service (JAAS) Provider (OracleAS JAAS Provider) to access user and role information in the Oracle Identity Management infrastructure, after authentication.

2.2.2 Identity and Application Provisioning Lifecycle

This section provides an overview of the user identity and application provisioning flow in the Oracle environment.

Figure 2-2 Identity and Application Provisioning Flow

Described in text.

The following describes the provisioning flow shown in Figure 2-2:

  1. Deploy the Oracle Identity Management infrastructure using the product's installation and configuration tools.

  2. Define the identity management security policies. These policies determine what data users and applications can access. They are stored as access control lists (ACLs) in Oracle Internet Directory, and are typically managed using Oracle Directory Manager.

  3. The following activities typically take place on an ongoing basis. Each activity can happen in parallel, and in no particular order.

    • User identities are provisioned in Oracle Internet Directory. These identities can come from multiple sources: human resources applications, user administration tools (such as the Oracle Internet Directory Self-Service Console), synchronization with other directories, or bulk loading tools.

    • Groups and roles are administered in Oracle Internet Directory. Groups and group memberships can be defined in a number of ways, such as through the Oracle Internet Directory Self-Service Console or through synchronization with another directory service.

    • Application instances are deployed against the Oracle Identity Management infrastructure. This typically involves an identity management infrastructure administrator first granting access to the application administrator using the Oracle Internet Directory administration tools. The application administrator uses application installation and configuration tools to create the required directory objects and entries to support the application.

  4. User identities, groups and roles, and applications are associated through the process of application provisioning. This can be performed manually using application administration tools or automatically through provisioning integration.

2.2.3 Administrative Delegation

Oracle Identity Management requires a central repository for enterprise users, groups, and services. Business requirements, however, make it difficult to manage a central repository with a centralized set of administrators.

For example, in a business, the administrator of enterprise user management might be different from that of the e-mail service; the administrator of financials may need full control over the privileges of its users; and the OracleAS Portal administrator may need full control over the Web pages for a specific user or a specific group. To meet the needs of these administrators and satisfy their different security requirements, the identity management system needs delegated administration.

With delegated administration, the management of data inside the identity management system can be distributed to many different administrators depending upon their security requirements. This combination of centralized repository and delegated privileges results in a secure and scalable administration in the identity management infrastructure.

2.3 Identity Management Integration with Oracle Products

Each of the Oracle technology stacks—Oracle Application Server, Oracle Database, Oracle E-Business Suite, and Oracle Collaboration Suite—supports a security model appropriate for its design. Nevertheless, they all use the Oracle Identity Management infrastructure to implement their respective security models and capabilities, as shown in Figure 2-3.

Figure 2-3 Identity Management Integration with Oracle Products

Described in text.

Oracle Application Server supports a J2EE compliant security service called Java Authentication and Authorization Service (JAAS). JAAS can be configured to use the users and roles defined in Oracle Internet Directory.

Similarly, the metadata repository security capabilities—enterprise user and Oracle Label Security—provide a way to take advantage of users and roles defined in Oracle Internet Directory. Both of these platforms facilitate the applications developed using the platforms' respective native security capabilities to transparently leverage the underlying identity management infrastructure.

Oracle E-Business Suite and Oracle Collaboration Suite application stacks are layered over Oracle Database and Oracle Application Server, providing indirect integration with the Oracle Identity Management infrastructure. In addition, these products have independent features that rely on Oracle Identity Management. For example, Oracle Collaboration Suite components, such as Oracle Email and Oracle Voicemail & Fax, use Oracle Internet Directory to manage component-specific user preferences, personal contacts, and address books.

These Oracle technology stacks also use Oracle Directory Integration and Provisioning to automatically provision and de-provision user accounts and privileges. Oracle Delegated Administration Services is used extensively for self-service management of user preferences and personal contacts. In addition, the security management interfaces of these products use the user and group management building blocks called service units.