Skip Headers
Oracle® Adaptive Access Manager Concepts
Release 10g (10.1.4.5)

Part Number E12049-03
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Feedback page
Contact Us

Go to previous page
Previous
View PDF

Index

A  B  C  D  E  F  G  H  I  K  M  N  O  P  Q  R  S  T 

A

Adaptive Risk Manager, 1.2.2, 3
engine, 3.2.1
Adaptive Risk Manager Offline, 1.2.2.2
Adaptive Risk Manager Online, 1.2.2.1
Adaptive Strong Authenticator, 1.2.1, 2
administration tools, 3.2.5
Agent Cases, 7
agent cases, 7.2.1
Auto-learning, Preface
autolearning, 5

B

BI Publisher reports
patterns reports, 5.4
buckets, 5, 5.1

C

Configurable Actions, Preface
CSR case
new, creating, 7.1.1
CSR Cases, 7
customer data, 3.2.1.1
Customizable reporting using BI Publisher, Preface

D

dashboard, 3.2.5.1
deployment options, 2.3
Device Registration, Preface
device registration, 8

E

Enumeration Editor, Preface

F

forensics, 3.2.1.2
fraudster rules, 3.2.1.1
fraudulent transaction, 2.1

G

Globalization Support, Preface
groups, 4.2.7

H

historical data (data warehouse), 3.2.1.1

I

internal flag/watch list, 3.2.1.3
Investigation tools, Preface
investigation tools, 3.2.5.6
IP intelligence, 3.2.1.1

K

KeyPad, 2.2.2

M

models, 3.2.4, 4
models/rules, customer, 3.2.1.2
multiple factor risk protection, 3.1

N

nested model, 3.2.1.2
new features, Preface

O

online fraud, impact, 1
Oracle Adaptive Access Manager (OAAM), 1

P

password theft, 2.1
pattern evaluation, 5.2
patterns, 5
phishing (social engineering), 2.1
phishing environment, 2.1
PinPad, 2.2.2
policies
security, 3.2.1.1
transaction, 3.2.1.1
policy type, 4.2.15
proprietary fingerprinting, 3.2, 3.2.3

Q

QuestionPad, 2.2.1

R

real-time response, 3.2.1.3
reports, 3.2.5.2
risk data, 3.2.1.1
risk scoring, 3.2.1.2, 4.2.12
Rule Template Editor, Preface
rules, 3.2.4, 4.1
rules engine, 3.2.1.1
runtime, 4.2.17

S

secondary authentication
online, 3.2.1.3
security policies, 3.2.1.1

T

TextPad, 2.2.3
third-party data, 3.2.1.1
Transaction Definitions, Preface
transaction definitions, 6
transaction policies, 3.2.1.1
trojan viruses, 2.1