Oracle Adaptive Access Manager supports companies by protecting their exposed Web applications, services, and end-users from online threats and insider fraud. Oracle Adaptive Access Manager features include:
real-time behavior profiling,
transaction and event risk analysis.
Oracle Adaptive Access Manager provides real-time or offline risk analysis by calculating the risk of an access request, an event or a transaction and determining proper outcomes to prevent fraud and misuse. A portion of the risk evaluation is dedicated to verifying a user's identity and determining if the activity is suspicious.
Oracle Adaptive Access Manager provides end-user-facing functionality to prevent fraud through its Virtual Authentication Devices to secure credential data at the entry point.
Oracle Adaptive Access Manager also provides interdiction methods including risk-based authentication, blocking, and configurable actions to interdict in other systems.
This chapter explains how you can integrate Oracle Adaptive Access Manager with other components to provide risk management for your enterprise applications. It contains these sections:
Oracle Adaptive Access Manager integrates with other Oracle Identity Management components to provide additional risk management support.
Table 5-1 shows the supported integrations:
|Oracle Adaptive Access Manager Integrated with||Additional Information|
Applications can integrate natively with Oracle Adaptive Access Manager using APIs. The Universal Installer reverse proxy deployment option offers login risk-based, multi-factor authentication to web applications without requiring any change to the application code.
Table 5-2 shows the supported integrations:
|Oracle Adaptive Access Manager Integration||Additional Information|