Securing IAM
Manage IAM security features.
This section contains information about various security aspects of IAM:
- Managing Terms of Use: Lets you set the terms and conditions to access the Console or a target application, based on the user's consent.
- Managing Password Policies: Create and manage group-based password policies for an identity domain.
- Managing Adaptive Security and Risk Providers: Learn about adaptive security and risk providers, how to activate adaptive security, how to configure the Default risk provider, and how to add a third-party risk provider.
- Managing Delegated Authentication: Find out how users can use their Microsoft Active Directory (AD) passwords to sign in to their identity domain to access resources and applications protected by IAM.
- Configuring Account Recovery: Learn how to use an automated process designed to help users regain access to their accounts if they have trouble signing in, if they're locked out, or they forget their passwords.
- Managing Multifactor Authentication: Multifactor authentication (MFA) is a method of authentication that requires the use of more than one factor to verify a user's identity. Find out how to enable it in an identity domain.
- Managing Passwordless Authentication: Passwordless authentication allows users to sign in using their username and another authentication factor, such as a passcode sent to them in email. Learn how to set it up.
- Managing Trusted Partner Certificates: A trusted partner is any application or organization, remote to IAM that communicates with IAM. Learn how to use trusted partner certificates, which are X.509 digital certificates, to manage the trust relationship.
- Managing Network Perimeters: Find out how to use blocklists to define network perimeters to manage access to identity domains.
Managing Network Perimeters
Network perimeters in an identity domain in IAM restrict the IP addresses that users can use to sign in.
You can perform the following tasks related to network perimeters:
- Listing Network Perimeters
- Creating a Network Perimeter
- Getting a Network Perimeter's Details
- Updating a Network Perimeter
- Deleting a Network Perimeter
Introduction
After creating a network perimeter, you can prevent users from signing in to IAM if they use one of the IP addresses in the network perimeter. This is known as blocking. A blocklist contains IP addresses or domains that are suspicious. As an example, a user might be trying to sign in to IAM with an IP address that comes from a country where hacking is rampant.
An IP address is a string of numbers that identifies the network of any device connected to the internet. Similar to a return address on an envelope, it's associated with a human-readable domain. Because the IP address tells other devices where data is coming from, it can be a good way to track bad content.
Blocklists can list a single IP address or a (set) range of IPs. IAM can use this information to block users who try to sign in from suspicious IP addresses.
You can also configure IAM so that users can sign in, using only IP addresses contained in the network perimeter. This is known as allowlisting, where users who try to sign in to IAM with these IP addresses are accepted. allowlisting is the reverse of blocklisting, the practice of identifying IP addresses that are suspicious, and as a result, denied access to IAM.
You can configure IAM so that only users who use a particular IP address or IP address in a specific range will be allowed to sign in to IAM. Or, you can configure IAM to monitor for suspicious IP addresses or IP address ranges, and prevent users who use these IP addresses from signing in to IAM.
With a network perimeter, you can define, in a standard format, an exact IP address, a range of IP addresses, or a set of masked IP addresses. Both Internet Protocol version 4 (IPv4) and Internet Protocol version 6 (IPv6) protocols are supported.
-
Exact IP address. You can enter a single IP address or multiple IP addresses. If you enter multiple exact IP addresses, then put a comma between each one.
-
Two IP addresses, separated by a hyphen, which is an IP range. For example, if you specify the IP range of
10.10.10.1-10.10.10.10, any user who tries to sign in to IAM with an IP address from10.10.10.1through10.10.10.10are using an IP address that falls within the IP range. -
Masked IP address range. Each number of an IP address is 8 bits. For example, if you have a masked range of
10.11.12.18/24, then the first three numbers (24 bits) is the mask that must be applied to see if an IP address falls in this range. For this example, valid IP addresses are those that begin with10.11.12.Caution
Don't use an IP address range of0.0.0.0/0as it encompasses all IPv4 addresses globally.
The examples listed use IP addresses with the IPv4 protocol. However, you can apply the same formats to IP addresses that use the IPv6 protocol (for example,
B138:C14:52:8000:0:0:4D8).After defining network perimeters, you can assign them to a sign-on policy, and configure the policy so that if you're trying to sign in to IAM using an IP address that's defined in the network perimeter, you can sign in to IAM or be prevented from accessing IAM.
See Add a Sign-On Policy for more information about assigning network perimeters to a sign-on policy.
Listing Network Perimeters
Retrieve a list of network perimeters.
Creating a Network Perimeter
Create a network perimeter in an identity domain in IAM and configure it to restrict the IP addresses that users can use to sign in.
Getting a Network Perimeter's Details
View the name and the IP addresses for a network perimeter in an identity domain in IAM.
Updating a Network Perimeter
Update the name and the IP addresses for a network perimeter in an identity domain in IAM.
Deleting a Network Perimeter
Delete one or more network perimeters in an identity domain in IAM.
Managing Continuous Workforce Verification (Beta)
Pre-General Availability: 2023-10-14
This documentation is in pre-General Availability status and is intended for demonstration and preliminary use only. It may not be specific to the hardware on which you are using the software. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to this documentation and will not be responsible for any loss, costs, or damages incurred due to the use of this documentation.
This documentation is not a commitment by Oracle to deliver any material, code, functionality or services. This documentation, and Oracle Pre-GA programs and services are subject to change at any time without notice and, accordingly, should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality for Oracle’s Pre-GA programs and services remains at the sole discretion of Oracle. All release dates or other predictions of future events are subject to change. The future availability of any future Oracle program or service should not be relied on in entering into any license or service agreement with Oracle.
See Oracle Legal Notices.
Signup Instructions
Introduction (Beta)
Identity Verification (IDV) is a process that validates a person's real-world identity by comparing their physical facial attributes to government-issued identification documents, such as passports and driver's licenses. This provides a high level of assurance that the user is who they claim to be.
Continuous Workforce Verification (CWV) builds on IDV by periodically re-validating a user's identity using facial biometrics after initial enrollment. This ensures that the person accessing applications or resources is the individual who is supposed to access the application or resource (and not someone who happened to gain possession of the credentials), strengthening your organization's security posture against imposters and unauthorized access.
This service integrates with third-party identity verification (or identity proofing) providers to perform the initial document and identity check. Once a user's identity is verified, their facial biometric data is enrolled with Oracle's native service for ongoing verification checks. Currently, Oracle supports Daon.
Concepts (Beta)
Identity Verification (IDV): The one-time process of proving a user's identity by matching a live selfie against a government-issued ID document. This is performed via a third-party provider.
Facial Biometrics: The process of capturing a user's unique facial characteristics to create a secure biometric template. This template is used for initial enrollment and subsequent verification checks. Facial biometrics in IAM is an OCI-native capability.
Continuous Workforce Verification (CWV): An ongoing security posture where a user's identity is periodically checked using facial biometrics to ensure the authorized user is still the one operating the account.
Identity Verification Provider: A third-party service (for example, Daon) that is integrated into OCI IAM to handle the initial identity proofing by verifying government-issued documents.
Liveliness Detection: Technology used during facial biometric scans to ensure the user is physically present and not using a photo, video, or mask to spoof the system. This involves prompts like tilting the head or blinking.
Inline Enrollment: An enrollment process that is mandated by an administrator and occurs directly within the sign-in flow. Users are typically required to complete it before they can access applications.
Continuous Workforce Verification Process
The process involves two key personas:
- Administrators: Configure Identity Verification providers and set up Continuous Workforce Verification policies that define when and how often users must verify their identity.
- Users: Enroll in the service by verifying their identity with a government-issued ID and their face. Subsequently, they complete periodic facial biometric checks as defined by the administrator.
Administrators Workflow (Beta)
- An administrator at Example Inc. first establishes a commercial relationship with a supported identity verification provider, such as Daon.
- In the OCI Console, the administrator navigates to the Identity Domain, configures Daon as an identity verification provider using credentials such as client ID and secret, and activates it.
- The administrator then creates a Continuous Workforce Verification policy and adds a rule that specifies which user groups are affected.
- Within the rule, the administrator enables facial biometrics and sets the frequency for periodic checks (for example, every 7 to 14 days) and re-enrollment (for example, every 6 to 12 months).
Oracle recommends combining Identity Verification and Biometrics for enhanced identity assurance. However, each capability is optional and can be used separately. Administrators have the flexibility to configure Continuous Workforce Verification with Identity Verification and Facial Biometrics, or with Facial Biometrics alone according to their organization’s specific needs. When both identity verification and facial biometrics are enabled for inline enrollment, the IDV process will be prompted first, followed by Biometric verification.
Administrators also have the option to specify enrollment as a mandatory inline option or a feature that users can skip and define settings such as verification frequency.
End-User Workflow (Beta)
- Initial Enrollment: An employee, John, is prompted to enroll inline after authentication (if Continuous Workforce Verification policy is configured for inline enrollment), or from My Profile. This is a one-time process.
- Identity Verification: A QR code appears on John's computer screen. He scans it with his smartphone to initiate the identity verification process with Daon. He takes a live selfie and then scans his government-issued ID. Daon validates the document's authenticity and confirms that the selfie matches the photo in the document.
- Biometric Enrollment: John is redirected back to his computer's web browser. He is prompted to position his face in a frame and complete randomized liveness prompts, such as tilting his head. The system captures his facial data, creates a biometric template, and stores it securely to complete his enrollment.
- Ongoing Verification: Two weeks later, when John accesses an application, he signs in with his standard credentials. Immediately afterward, CWV initiates a facial biometric challenge. He positions his face, completes a liveness prompt, and the system validates his identity against the stored template, granting him access.
Use Case: Example of how Example Inc Leverages IDV and CWV (Beta)
This use case highlights how Example Inc leverages the identity verification vendor Daon for continuous workforce verification (CWV). An administrator configures IAM to integrate with the identity verification provider and creates continuous workforce verification policies for periodic verification of users. Employee of Example Inc. verifies identity with a government-issued ID, enrolls in facial biometrics, and is re-verified through periodic identity checks.
Admin Configuration (Beta)
- An administrator at Example Inc. navigates to the Identity Domain and configures an identity verification provider, Daon.
- The administrator enters credentials provided by the vendor (client id, client secret, discovery URL), maps the Supported claims with identity domain attributes, and then selects Create. The Identity verification provider is created. Administrator then activates the identity verification provider.
- The administrator creates a continuous workforce verification policy and creates a rule. In the rule, administrator sets the prerequisites in the conditions field, with passkey as the first authentication factor and Oracle Mobile Authenticator (OMA) as the second factor and select the user groups that are evaluated by the rule.
- The Example Inc. administrator then enables facial biometrics, schedules facial biometric checks at randomized intervals between 7 and 14 days, and re-enrollment frequency between 6 to 12 months.
- Administrator enables identity verification, and selects the provider created in step 2.
- Once defined, the policy is enforced across the identity domain for the users who satisfy the conditions specified in the rule.
User Enrollment (Beta)
- An employee, John, receives an email informing him of the new requirement. He signs in with his primary and second factor and is prompted to Enroll with Biometrics. If not prompted to enroll in biometrics during sign-in, the user signs in to My Login Profile and selects Enroll with biometrics.
- The user reviews and accepts the terms and conditions.
-
Identity Verification
- A QR code appears on his computer screen. John scans it with his smartphone, which initiates identity verification with Daon. Depending on Daon configuration, John might be asked to download the Daon app or an app provided by Example Inc. to complete identity verification.
- John takes a live selfie. Daon verifies the user’s selfie for liveliness.
- He then scans his government-issued ID using his phone. Daon validates the document’s authenticity and confirms that the selfie matches the photo in the document.
- A success message indicates that his identity has been verified.
-
Facial Biometrics Enrollment
- John is redirected back to his computer's web browser.
- The browser requests access to his webcam. He is prompted to position his face in a frame and complete the randomized liveliness prompts, such as tilting the user’s head up, to the right, and left. These steps protect against spoofing and replay attacks.
- The system captures his facial data, creates a biometric template, and stores it securely. His enrollment is now complete.
Continuous Workforce Verification (Beta)
- Once enrolled, periodic facial biometric verification occurs seamlessly in the background. For example, two weeks later, when accessing an enterprise application, John completes the standard passkey login followed by Oracle Mobile Authenticator (OMA) as the second factor.
- Immediately afterward, CWV initiates a facial biometric verification challenge. John positions his face within the frame, completes a randomized liveliness prompt, and the system validates his identity against the securely stored biometric template.
- John is granted access to the application. The verification event is logged for auditing purposes.
Getting Started (Beta)
Pre-General Availability: 2023-10-14
This documentation is in pre-General Availability status and is intended for demonstration and preliminary use only. It may not be specific to the hardware on which you are using the software. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to this documentation and will not be responsible for any loss, costs, or damages incurred due to the use of this documentation.
This documentation is not a commitment by Oracle to deliver any material, code, functionality or services. This documentation, and Oracle Pre-GA programs and services are subject to change at any time without notice and, accordingly, should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality for Oracle’s Pre-GA programs and services remains at the sole discretion of Oracle. All release dates or other predictions of future events are subject to change. The future availability of any future Oracle program or service should not be relied on in entering into any license or service agreement with Oracle.
See Oracle Legal Notices.
Before You Begin (Beta)
Before you configure this feature, ensure you have the following:
- Third-party Identity Verification Provider Subscription: You must have an active commercial relationship and license with a supported third-party Identity Verification provider. IAM supports identity verification with providers using OpenID Connect (OIDC) integration. You will need to obtain a license from a supported vendor (for example, Daon) before you can begin the identity verification provider configuration.
- From your IDV provider, you will need the following credentials for configuration:
- Client ID
- Client Secret
- Discovery URL
- Feature availability: Identity Verification and Continuous Workforce Verification features are available in OCI IAM Oracle Apps Premium and Premium domain types only. If you have a domain with Free domain type, you must upgrade to one of these domain types.
- Admin Access: You need permissions to manage identity verification providers and domain policies.
- User Pre-requisites: Ensure your users are aware of the requirements for enrollment:
- A mobile device with a camera and the ability to install the IDV provider's application.
- A government-issued ID with NFC capabilities (for example, a modern passport).
- A computer with a webcam for facial biometric enrollment and verification.
- A passkey configured as an authentication factor, as it is a prerequisite for CWV.
Required IAM Policies (Beta)
To manage Identity Domain security settings and continuous workforce verification policies, you must have one of the following grants:
- Be a member of the Administrators group
- Be granted the Identity Domain Administrator role or the Security Administrator role
- Be a member of a group granted manage identity-domains permissions
Using Identity Verification Providers (Beta)
Pre-General Availability: 2023-10-14
This documentation is in pre-General Availability status and is intended for demonstration and preliminary use only. It may not be specific to the hardware on which you are using the software. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to this documentation and will not be responsible for any loss, costs, or damages incurred due to the use of this documentation.
This documentation is not a commitment by Oracle to deliver any material, code, functionality or services. This documentation, and Oracle Pre-GA programs and services are subject to change at any time without notice and, accordingly, should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality for Oracle’s Pre-GA programs and services remains at the sole discretion of Oracle. All release dates or other predictions of future events are subject to change. The future availability of any future Oracle program or service should not be relied on in entering into any license or service agreement with Oracle.
See Oracle Legal Notices.
Creating an Identity Verification Provider (Beta)
Getting an Identity Verification Provider’s Details (Beta)
- On the Domains list page, select the domain in which you want to make changes. If you need help finding the list page for the domain, see Listing Identity Domains.
- Go to Security, and then select Identity verification providers.
- Select one of the identity verification providers to view the details.
Updating an Identity Verification Provider (Beta)
- On the Domains list page, select the domain in which you want to make changes. If you need help finding the list page for the domain, see Listing Identity Domains.
- Go to Security, and then Identity verification providers.
- Select one of the identity verification providers to view the details.
- (Optional) Make any necessary updates to the Details page.
- Select Save.
Deleting an Identity Verification Provider (Beta)
- On the Domains list page, select the domain in which you want to make changes. If you need help finding the list page for the domain, see Listing Identity Domains.
- Go to Domain, Security, and then Identity verification providers.
- Select one of the identity verification providers to delete.
- Confirm the deletion.
Activate an Identity Verification Provider (Beta)
- On the Domains list page, select the domain in which you want to make changes. If you need help finding the list page for the domain, see Listing Identity Domains.
- Go to Domain, Security, and then Identity verification providers.
- From the of the identity verification provider you want to activate, select Activate verification provider.
- Confirm the activation.
Deactivating an Identity Verification Provider (Beta)
- On the Domains list page, select the domain in which you want to make changes. If you need help finding the list page for the domain, see Listing Identity Domains.
- From the Actions menu (three dots), of the identity verification provider you want to deactivate, select Deactivate verification provider.
- Confirm the deactivation.
Using Continuous Workforce Verification (Beta)
Pre-General Availability: 2023-10-14
This documentation is in pre-General Availability status and is intended for demonstration and preliminary use only. It may not be specific to the hardware on which you are using the software. Oracle Corporation and its affiliates are not responsible for and expressly disclaim all warranties of any kind with respect to this documentation and will not be responsible for any loss, costs, or damages incurred due to the use of this documentation.
This documentation is not a commitment by Oracle to deliver any material, code, functionality or services. This documentation, and Oracle Pre-GA programs and services are subject to change at any time without notice and, accordingly, should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality for Oracle’s Pre-GA programs and services remains at the sole discretion of Oracle. All release dates or other predictions of future events are subject to change. The future availability of any future Oracle program or service should not be relied on in entering into any license or service agreement with Oracle.
See Oracle Legal Notices.
Listing Continuous Workforce Verification Policies (Beta)
- On the Domains list page, select the domain in which you want to make changes. If you need help finding the list page for the domain, see Listing Identity Domains.
- Go to Domain, Domain Policies, find the Continuous Workforce Verification policy section to view a list of verification policies.
Adding a Continuous Workforce Verification Policy (Beta)
Getting a Continuous Workforce Verification Policy’s Details (Beta)
- On the Domains list page, select the domain in which you want to make changes. If you need help finding the list page for the domain, see Listing Identity Domains.
- Select one of the continuous workforce verification policies to view the details.
Activate a Continuous Workforce Verification Policy (Beta)
- On the Domains list page, select the domain in which you want to make changes. If you need help finding the list page for the domain, see Listing Identity Domains.
- Select the continuous workforce verification policy you wish to activate.
- In the Details page, from the , select Activate policy.
- To confirm the activation, select Activate policy.
Deactivate a Continuous Workforce Verification Policy (Beta)
- On the Domains list page, select the domain in which you want to make changes. If you need help finding the list page for the domain, see Listing Identity Domains.
- Select the continuous workforce verification policy you wish to deactivate.
- In the details page, from the Actions menu (three dots), select Deactivate policy.
- To confirm the deactivation, select Deactivate policy.