JavaScript is required to for searching.
Skip Navigation Links
Exit Print View
Oracle Identity Analytics Business Administrator's Guide 11g Release 1
search filter icon
search icon

Document Information

Preface

1.  Oracle Identity Analytics Identity Warehouse

2.  Oracle Identity Analytics Importing

3.  Oracle Identity Analytics ETL Process

4.  Oracle Identity Analytics Data Correlation

5.  Oracle Identity Analytics Role Engineering and Management

6.  Oracle Identity Analytics Workflows

7.  Oracle Identity Analytics Identity Certifications

8.  Oracle Identity Analytics Identity Audit

9.  Oracle Identity Analytics Reports

10.  Oracle Identity Analytics Scheduling

11.  Oracle Identity Analytics Configuration

System Configuration

Proxy Assignment Notification

Mail Server Settings

OIA Server Settings

Resource Types Configuration

To Create, Rename, and Delete a Resource Type

Understanding Resource Type Attributes and Attribute Categories

To Create, Rename, and Delete an Attribute Category

Configuring Resource Type Attributes

To Create, Rename, Edit, and Delete an Attribute

Provisioning Servers Configuration

To Create a New Provisioning Server Connection

Identity Certification Configuration

To Configure Identity Certification

Completing the Certification Configuration Form "General" Section

To Complete the Certification Configuration Form "Status Options" Section

To Complete the Certification Configuration Form "Reminders" Section

To Complete the Certification Configuration Form "Revoke and Remediation" Section

Role Management Configuration

To Configure Mining

To Configure Roles

Identity Audit Configuration

To Configure Identity Audit

To Configure E-Mails for Violation Reminder and Escalation

To Configure E-mails For Violation Lifecycle Event Notifications

Reports Configuration

To Configure Report Reminder E-mails

E-mail Templates Configuration (Configuring E-mail Notification)

To Create and Configure E-mail Notifications

E-mail Parameters Definitions

Import/Export

Workflows Configuration

Event Listeners Configuration

To Create a New Event Listener

12.  Oracle Identity Analytics Access Control

13.  Audit Event Log and Import-Export Log

Event Listeners Configuration

The Event Listener mechanism allows a user to create listeners to business events that are happening in the system and take some actions when those events happen. An example of a business event is a user update, which occurs when some of the user attributes are updated. A listener, when created, defines the events to examine based on a condition, and also defines the actions that are to be executed by the system in response to those events.

To Create a New Event Listener

  1. Log in to Oracle Identity Analytics.

  2. Choose Administration > Configuration.

  3. Click Events.

  4. Click Add Event Listener.

    The new event listener form opens.

  5. Add the name with which the event will be identified in the name section, the description, and the status, and click next.

  6. Add a condition that will be evaluated when an event takes place, then click Next.

    For example, when a user is updated, a condition can check if the user's title property or location property has changed.

    The Action Types form opens, specifying a list of actions that will be taken by the system when events that match the condition occur in the system.

  7. Select one or more of the following actions to execute when an event condition is met:

    • User to Business Structure Rule Scan - Runs selected user-to-business structure rules.

    • Role Membership Rules - Runs the selected role membership rules on users.

    • IDA Policy Scan - Run selected identity audit policies on users based on a condition.

    • User Entitlement Certification Creation - Creates a user entitlement certification.

  8. Use the following table to configure this form, then click Finish.

Table 11-9 - Add Event Listener Form Properties

Listener Action Properties
Description
Status
Must be enabled for execution. The status of the action can be active or inactive. Inactive actions will not be executed.
Event count
Specifies the upper limit of the number of events that can occur in the time interval for an action. If the event count exceeds this limit, then the action will not be executed. Use this to avoid executing an action in case of bulk updates.
Time interval
Defines the interval after which the action will be executed repeatedly.
Action configuration
Includes items such as the list of rules to be executed, or certification configuration in case of certification action.