Oracle Identity Governance 11g R2: Develop Identity Provisioning (D82660) – Outline

Gedetailleerde cursusinhoud


  • Identify the objectives of the course
  • Discuss the course agenda
  • Access additional information and resources

Overview Oracle Identity Governance 11g Architecture and Development Tools

  • Review identity governance, management, and architecture concepts
  • Examine the functional areas of identity management
  • Identify Oracle Identity Manager as a solution for Identity Management tasks
  • Examine use cases for Oracle Identity Manager
  • Review Oracle Identity Manager user interfaces and development tools
  • Discuss ways to populate identities in Oracle Identity Manager
  • Explore the course practice environment

Developing Connectors to Integrate Systems

  • Discuss the Identity Connector Framework (ICF)
  • Identify the ICF application programming interface (API) and service provider interface (SPI) layers
  • Develop a Connector implementation class
  • Develop a Configuration implementation class
  • Exchange data with Oracle Identity Manager through Attribute or ConnectorObject object types
  • Create and modify Ant build files to generate a connector bundle JAR file ready for deployment or installation

Testing and Installing ICF Connectors

  • Develop a connector test application by using the ICF application programming interface (API)
  • Execute test applications in Oracle JDeveloper with the connect bundle JAR local to the test application
  • Install the ICF connector in Oracle Identity Manager
  • Manage the connector installation and configuration life cycle

Implementing Reconciliation

  • Explain reconciliation and the different types of reconciliation and modes
  • Discuss the Oracle Identity Manager reconciliation architecture
  • Create reconciliation objects by using the Design Console
  • Implement trusted or target reconciliation by applying the Oracle Identity Manager object model
  • Initiate reconciliation through a scheduled task

Customizing Reconciliation with Plug-ins, Event Handlers, and Scheduled Tasks

  • Describe the plug-in framework including plug-ins and plug-in points
  • Explain Oracle Identity Manager orchestration concepts
  • Create and register a plug-in contained in a zip file
  • Create and register an event handler
  • Develop and register a custom scheduled task

Provisioning Resources to Users

  • Configure an Oracle Identity Manager connector to make it operable
  • Identify an Oracle Identity Manager application instance
  • Describe how application instances relate to connector objects
  • Provide examples of application instances
  • Manage sandboxes
  • Describe how to create an application instance
  • Describe how to manage the Catalog
  • Compare ways to provision a resource to an Oracle Identity Manager user: policy-based (user membership rules and access policies), request-based, and autoprovisioning

Granting Entitlements to Users

  • Identify entitlements for application instances
  • Manage entitlements for application instances
  • Identify requests
  • Explain the types of requests that you can create and manage
  • Describe the two types of approval workflows associated with requests: request-level and operational-level approval workflows
  • Identify the stages of a request
  • Explain the request stages throughout a request’s life cycle
  • Complete request-level and operational-level approval workflows

Introduction to Oracle SOA Suite

  • Describe Oracle SOA Suite 11g and SOA composite applications
  • Describe the components of a SOA composite application
  • Create, condifure, and develop BPEL Process, Human Task, and Business Rule components
  • Deploy and test a SOA composite application

Customizing Approval Processes in SOA Suite

  • Design a custom approval composite
  • Implement a custom approval composite interface and its callback requirements
  • Generate a skeleton custom approval composite
  • Secure the Request Web Service and invoke its operations from a composite
  • Configure Oracle Universal Messaging Service (UMS) for notification services

Configuring Self Profile Management

  • Compare authorization and authentication
  • Identify authorization policies
  • Explain how to define authorization policies that control access rights that users have in Oracle Identity Manager
  • Discuss how to use authorization policies to determine whether a user can perform a specific action in Oracle Identity Manager
  • Describe the relationship between authorization policies and administrative roles in Oracle Identity Manager
  • Discuss how to manage authorization policies
  • Identify Oracle Identity Manager system entities
  • Add user-defined fields (UDFs) to system entities

Configuring Oracle Identity Manager Certifications

  • Describe identity certification and attestation
  • Identify the business drivers for certification
  • Configure certification in Oracle Identity Manager
  • Create and manage certification definitions
  • Explain how risk summaries are calculated
  • Describe closed-loop remediation and remediation tracking
  • Describe and configure multiphased reviews and event listeners for user certifications

Extending an Oracle Identity Manager Connector

  • Discuss how to extend an Oracle Identity Manager connector
  • List the steps to complete to extend a connector
  • Verify that the connector extensions are operable

Customizing the Oracle Identity Manager User Interface

  • Describe the MVC architectural design layers and its benefits
  • Explain the Oracle Identity Manager UI architecture
  • Explain the ADF main components and Expression Languages
  • Describe the approaches available to customize the Oracle Identity Manager UI
  • Extend Oracle Identity Manager with a custom ADF application
  • Provide links in Oracle Identity Manager
  • Change Oracle Identity Manager console logo

Customizing the Application Instance Form for Access Requests

  • Describe how to use the Oracle Identity Manager UI customization approaches to optimize application instance forms for access requests
  • List the steps needed to customize the application instance form