Inside identity and access control products : blog
Visit my blog http://identitycontrol.blogspot.com to get inside working of the identity and access control products. My efforts here is to explain insides in a simple language.
Latest topic i added is "SAML in action"
Please post your comments also so I can improve the contents.
your efforts are simply awesome..
Frinends, Visit my blog http://identitycontrol.blogspot.com to get inside working of the identity and access control products. My efforts here is to explain insides in a simple language. Latest topic i added is "SAML in action" Please post your
Hello, For the past few months I was working on a blog which can help understanding under the hood of identity and access control products. Please have a look into it and let me know how to improve the contents. http://identitycontrol.blogspot.comLat
Hello Friends, For the past few months I was working on a blog where I shared my past experiences with the IAM products, New technologies and problems faced in the products at a conceptual level. I thought of sharing that with experienced team of tec
Hello Today we have more than 40 systems (dev, quality, prod) We use access enforcer for provisioning to all these 40 systems. Is there a way for us to find out if a user account exists in these 40 systems (connectors)? Example: User RAMSEY exists in
Hello, I can install Access Control products with Solution Manager, Enterprise Portal... But it is possible to install Access Controll 5.3 and IDM 7.1 on the same server? Thanks and best Regards AlexanderHi Alexander, SAP IDM 7.1 is still in the ramp
Hi. I have a problem with one of the fussion middleware control menus which is missing. The environment is as follows: - One server with OVD + OID - One server with Weblogic + ODSM + Fussion Middleware Control (All idm fmw 22.214.171.124.0) ODSM can connec
I have been asked to look at<b> Compliance Calibrator </b>and am getting confused about what functionality is offered. I have done the basic e-learning course for Compliance Calibrator (GRC200): this was all about separation of duties etc. Fai
Hi, I am starting to apply the access permissions for new users as being set by admin. I am choosing Role Based Access Control for this task. Can you please share the best practices or any built-in feature in JSF to achieve my goal? Regards, FaysiHi,
Hi, I hope some of you might have come across this kind of issues. I am trying to setup page level authentication and record level access control. Please see below for the detailed description. 1. Does APEX have any functionality where I can implemen
Hello, I'm attempting to get a SharePoint 2013 Provider Hosted Application working in a brand new SharePoint environment. I've created snapshots of both my dev and the sharepoint environments along the way and have meticulously documented every step
Hello All, I have to develop WebI reports on Access Control 5.3 data. Are there any direct connectivity options available in IDT for Access Control 5.3 or Do I have to go through Oracle database connectivity as Access control 5.3 backend database is
I live in China, have Dutch nationality, and no US address or Credit Card; how can I have access to products from the US iTunes store, in particular music, when such items are not available from the China iTunes store? In general, what are the differ
Hi, Can anybody suggest a detailed example or tutorials of how to implement a role based access control for my ADF UIX application. The application users can be dymanically added to specific roles (admin, Secretary, Guest). Based on the roles, they s
Identity and access management in the cloud refers to the processes, technologies, and policies for managing cloud systems identities and controlling how these identities can be used to access cloud resources. Three separate processes are used in mos
Hi, I have a problem in calculating the SPS to the SAP GRC Access Control 5.3. I recorded the system automatically from SLD. I defined the logical component and I created the solution. Now, when I try to calculate the Maintenance Optimizer error is g
Hi Experts, where can I find some information about the usage of BRF with respect to Access Controll (especially ERM and CUP)? Thanks in advance and best regards, MarlenHi Marlen, For ramp-up customers we have ramp-up knowledge transfer to be found h
Hello, I try to reproduce with WLST script the input from the consol to declare user on Access Control proxy (security). sbconsol->$Proxy Service->Security->General Confiruration->Access Control->Transport Access Control->Add Conditions
Hello, Information is scarce about User management and Access Control in Oracle Cloud generally. Today, I have two questions : - How can I bridge HCM Cloud user store with my on-premise IDM or security repository in order to allow identty governance
What is difference between Oracle Identity and Access Management (126.96.36.199.0) and Identity Management (188.8.131.52.0) ? From http://www.oracle.com/technetwork/middleware/downloads/oid-11g-161194.htmlWhen you run the config, you are asked to add some pro
I plan to replace Azure cloud services' provided subdomain (myapp.cloudapp.net) with our own domain, customDomain.com. I eventually find out that I cannot do that. I have to configure a custom domain name to route traffic to myapp.cloudapp.net. Why d