Overview
Define four types of Internet attacks
Propose four solutions for Internet attacks
List the benefits of Oracle Adaptive Access Manager (OAAM)
Describe the role of Oracle Adaptive Access Manager
Explain how OAAM works
List the new features in OAAM 11gR1 PS1
Describe the high-level architectural and deployment topology
Provide a use case for OAAM’s role in Oracle Identity Management Suite integration
Installation and Configuration
Describe prerequisites
List the key steps to install and configure OAAM
Post-install and Configure validation steps
Start and stop the OAAM 11g environment
OAAM Customizations
List the different types of OAAM customizations
Perform key customizations: Custom CSS
Perform key customizations: Header and footer
Perform key customizations: Custom Virtual Authentication Devices (VAD)
Perform key customizations: User action and flows
Perform key customizations: Custom layout
Describe the key configuration files used in customizations
Policies – Static, Patterns, and Predictive
Distinguish and describe three types of risk analyses
Create static policies
Create the artifacts – Checkpoint, Rules, Conditions, Alerts, and Actions Groups
What is a pattern?
In a pattern, what data is captured and when?
In a pattern, where is data stored and how is data used?
How to use predictive analysis
Provide OAAM predictive analysis use cases
Native Integration
Integrate OAAM natively with customer application by using: In-Proc or SOAP mode
Native Integration by Using .NET SDK
In-Proc Versus SOAP Mode
In-Proc Native Integration in OAAM 11g
Use sample application to perform a code walk through on Java APIs implementation
Transactions
Understand Entities, Data Elements and Transaction data
Defining and Using Transaction Definition
Mapping Entities to the Source Data
Mapping Transaction Data to the Source Data
Performing Transaction Fraud Analysis
Reporting and Auditing
Install and configure BI Publisher Reports
View out-of-the-box reports
Setup configuration
Creating custom reports
Learn OAAM audit framework
Understand audit events, reports, and data
Use BI Publisher to run audit reports
Monitoring and Diagnostics
Identify tips on troubleshooting OAAM 11g environment
Monitor the key metrics by using FMW EM Control
View and configure logging
Use the OAAM Dashboard
OAAM Offline and Job Scheduler
Explain job types
Explain how to schedule jobs
Describe job management
Explain the OAAM offline server Use Cases
OAAM – OAM Integration
List different types of integration options
Explain OAM-OAAM TAP integration use case
Explain risk-based challenge by using KBA
Explain step-up authentication by using OTP
Description:
This course covers installation, configuration and customization of user interface for the OAAM 11g product. It explains
how to effectively create static policies, patterns and predictive policies to perform risk analysis. The course covers both
native integration for transaction analysis and fraud prevention as well as OAM-OAAM integration scenarios. This
course also covers monitoring, diagnostics and troubleshooting of the OAAM runtime deployment. Finally, the course
has complete coverage on reporting and auditing capabilities within the product.
Learn To:
Install, Configure and Customize Oracle Adaptive Access Manager
Create Policies and rules - Static, Patterns and Predictive
Natively integrate OAAM 11g with custom application for transaction fraud prevention
Perform OAM-OAAM integration
Monitor, diagnose and troubleshoot OAAM 11g environment
Create OAAM 11g reports and audits and explore the OAAM offline capabilities