Skip Headers
Oracle® Adaptive Access Manager Administrator's Guide
Release 10g (10.1.4.5)

Part Number E12055-03
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
View PDF

1 Introduction

Oracle Adaptive Access Manager provides fraud management in multiple ways. Oracle Adaptive Access Manager and its components effectively reduce fraudulent activities by detecting and providing remedial actions in real time.

Oracle Adaptive Access Manager is composed of two primary components: Adaptive Strong Authenticator (ASA) which provides front-end protection against online identify theft and Adaptive Risk Manager (ARM) which provides real-time, fraud detection.

The audience for the Oracle Adaptive Access Manager Administrator's Guide includes:

1.1 Concepts

To get started using Oracle Adaptive Access Manager you need to import or create models and rule templates. You configure new models by creating the component rules, defining manual overrides to control the behavior of the rules, and connecting the models to the target groups. Here's an overview of the component parts of models and rules:

1.2 Fraud Management Steps

The following steps are best practices for the discovery/planning process. They are not actual steps to be taken in the application's user interface.

  1. Identify fraud scenarios and derivative scenarios.

  2. Define parameters for each derivative fraud scenario.

  3. Group the relevant fraud scenarios, or derivatives, or both.

  4. Map parameter and group details into implementation design.

  5. Use mappings to configure Oracle Adaptive Access Manager.

1.2.1 Identify Fraud Scenarios and Derivatives

A fraud scenario is a potential or actual deceptive situation involving malicious activity directed at a company's online application. Fraud scenario derivatives are the different sub-scenarios that support the existence of the parent fraud scenario. These fraud scenario and derivatives must be mapped into rules to protect against fraudulent behavior.

To identify a fraud scenario derivative, start by doing the following:

  • Identify gated security checkpoints and Runtimes

  • Define transaction entities and attributes using data models for each of those Runtimes

1.2.2 Define Parameters for Each Derivative Fraud Scenario

The parameters are the details in the derivatives. These details specifically are the datapoints that are used to compare against a threshold to determine an outcome.

A threshold is the quantitative point at which an action is triggered. For example, a threshold might be ten authentication attempts within 24 hours. An outcome is the response initiated when a threshold is satisfied and a rule is triggered. For example, an outcome might be twofold: an action event activated and an alert message activated.

Datapoints are classified in one of two categories:

  • Runtime Datapoints—Runtime datapoints are the entities and attributes that exist in a current transaction.

  • Historical Datapoints—Historical datapoints are the entities and attributes that exist in past transactions.

1.2.3 Group the Relevant Fraud Scenarios, or Derivatives, or Both

You first group the fraud scenarios into models and then you assign the models to an Oracle Adaptive Access Manager policy.

1.2.3.1 Grouping Derivatives into Models

Fraud scenario derivatives are grouped into models based on the following considerations:

  1. Identify the derivatives that logically fit together:

    • Manageability: derivatives have like policies (for example, application specific).

    • Similarity: derivatives are trying to detect or prevent like fraud instances (for example, Brute Force).

    • Dependencies: derivatives have relationships (for example, if this and this is true do this).

    • Risk: derivatives are evaluated based on previous risk scores.

  2. Validate each model based on a single Runtime.

  3. Evaluate models to eliminate redundancies.

1.2.3.2 Assigning Models to Policies

After you define the models and assign the fraud scenario derivatives to the models, the models need to be assigned to an Oracle Adaptive Access Manager policy. These Policies include:

  • Security Policy—A Security Policy is based on cross-industry best practices.

  • Business Policy—A Business Policy is based upon parameters established for mitigation of transaction risk

1.2.4 Map Parameters and Group Details into an Implementation Design

The Implementation Design includes all the fields necessary to configure Oracle Adaptive Access Manager. This requires a mapping of the existing data to the Oracle Adaptive Access Manager fields.

Existing data include:

  • Fraud Scenario Derivatives

  • Parameters, Thresholds & Outcomes

  • Policies & Models

Oracle Adaptive Access Manager fields include:

  • Rule Template Name

  • Model Name

  • Alert Group

  • Action Group

  • Affected Group(s)

  • Score

1.2.5 Use Mappings to Configure Oracle Adaptive Access Manager

Finally the Implementation Design is used to configure Oracle Adaptive Access Manager.

1.3 Knowledge-Based Authentication

Oracle Adaptive Access Manager provides out of the box secondary authentication in the form of knowledge based authentication questions. The KBA infrastructure handles registration, challenge and customer service of questions. KBA challenges can be presented online or over the phone by a customer service representative.

You can extend or customize the base models to support additional business and security requirements. Additionally, models can be easily configured for exceptions.

1.4 Reporting

Limited reporting is available through the Adaptive Risk manager application. In addition, a limited license of Oracle Business Intelligence Publisher is included for customizable reporting capabilities.