List of Figures

List of Tables

Title and Copyright Information


What's New in Oracle Adaptive Access Manager 11g Release 1 (11.1.1)?

Part I Getting Started with Oracle Adaptive Access Manager

1 Introduction to Oracle Adaptive Access Manager

2 Setting Up the Oracle Adaptive Access Manager Environment for the First Time

3 Oracle Adaptive Access Manager Navigation

Part II Customer Service and Forensics

4 Managing and Supporting CSR Cases

5 Investigation Using Agent Cases

6 Viewing Additional Details for Investigation

Part III Managing KBA and OTP

7 Managing Knowledge-Based Authentication

8 Enabling Challenge Questions

9 Setting Up OTP Anywhere

Part IV Managing Policy Configuration

10 Managing Policies, Rules, and Conditions

11 OAAM Security and Autolearning Policies

12 Managing Groups

13 Managing the Policy Set

14 Using the Scoring Engine

15 Creating Checkpoints

16 Managing System Snapshots

Part V Autolearning

17 Managing Autolearning

18 Managing Configurable Actions

19 Predictive Analysis

Part VI Managing Transactions

20 Creating and Managing Entities

21 Managing Transactions

Part VII OAAM Offline Environment

22 OAAM Offline

Part VIII Scheduling Jobs

23 Scheduling and Processing Jobs in OAAM

Part IX Reporting

24 Using the Dashboard

25 Configuring BI Publisher Reports

26 Monitoring Performance by Using Fusion Middleware Control

27 Monitor and Audit of Events

Part X Deployment Management

28 Using the Properties Editor

Part XI Command-Line Interface

29 Oracle Adaptive Access Manager Command-Line Interface Scripts

Part XII Multitenancy

30 Multitenancy Access Control for CSR and Agent Operation

Part XIII Troubleshooting

31 FAQ/Troubleshooting

Part XIV Appendixes

A Access Roles

B Pattern Processing

C Conditions Reference

D Oracle Adaptive Access Manager Reports Reference

E The Discovery and OAAM Policy Development Processes

F Globalization Support

G Oracle Adaptive Access Manager Properties

H Device Fingerprinting

I Setting Up Archive and Purge Procedures

J Configuring SOAP Web Services Access

K Configuring Logging

L Rule and Fingerprint Logging