Oracle Adaptive Access Manager 11g: Administration (D66036) – Outline

Detailed Course Outline

Overview
  • Define four types of Internet attacks
  • Propose four solutions for Internet attacks
  • List the benefits of Oracle Adaptive Access Manager (OAAM)
  • Describe the role of Oracle Adaptive Access Manager
  • Explain how OAAM works
  • List the new features in OAAM 11gR2 PS3
  • Describe the High-level Architectural and Deployment Topology
  • Provide a use case for OAAM’s role in Oracle Identity Management Suite integration
Installation and Configuration
  • Describe Prerequisites
  • List the key steps to install and configure OAAM
  • Post-install and Configure validation steps
  • Start and stop the OAAM 11g environment
OAAM Customizations
  • List the different types of OAAM customizations
  • Perform key customizations: Custom CSS
  • Perform key customizations: Header and Footer
  • Perform key customizations: Custom Virtual Authentication Devices (VAD)
  • Perform key customizations: User action and flows
  • Perform key customizations: Custom layout
  • Describe the key configuration files used in customizations
Policies – Static, Patterns, and Predictive
  • Distinguish and describe three types of risk analyses
  • Create Static Policies
  • Create the artifacts – Checkpoint, Rules, Conditions, Alerts, and Actions Groups
  • What is a pattern?
  • In a pattern, what data is captured and when?
  • In a pattern, where is data stored and how is data used?
  • How to use predictive analysis
  • Provide OAAM predictive analysis use cases
Custom Application Integration
  • Integrate OAAM natively with a custom application using In-Proc mode integration
  • Integrate OAAM natively with a custom application using SOAP mode integration
  • Use sample application to perform a code walk through on Java APIs implementation
Transactions
  • Understand Entities, Data Elements and Transaction data
  • Defining and Using Transaction Definition
  • Mapping Entities to the Source Data
  • Mapping Transaction Data to the Source Data
  • Performing Transaction Fraud Analysis
Reporting and Auditing
  • Install and configure BI Publisher Reports
  • View out-of-the-box reports
  • Setup Configuration
  • Creating Custom Reports
  • Learn OAAM audit framework
  • Understand Audit Events, Reports, and Data
  • Use BI Publisher to run Audit Reports
Monitoring and Diagnostics
  • Identify tips on troubleshooting OAAM 11g R2 PS3 environment
  • Monitor the key metrics by using FMW EM Control
  • View and configure logging
  • Use the OAAM Dashboard
OAAM Offline and Job Scheduler
  • Explain Job Types
  • Explain how to Schedule Jobs
  • Describe Job Management
  • Explain the OAAM Offline Server Use Cases
OAAM – OAM Integration
  • List different types of integration options
  • Explain OAM-OAAM TAP integration use case
  • Explain risk-based challenge by using KBA
  • Explain step-up authentication by using OTP
Customer Service Representative and Agent Fraud Cases
  • Understand Customer Service Representative Cases
  • Understand Agent Cases for Fraud
  • Perform Profile Resets for OTP
  • Unblock users who fail OTP Challenges