Oracle Identity Management

3.8
(32)

Oracle Identity Management enables organizations to effectively manage the end-to-end lifecycle of user identities across all enterprise resources, both within and beyond the firewall and into the cloud. The Oracle Identity Management platform delivers scalable solutions for identity governance, access management and directory services.

Work for Oracle Identity Management?

Learning about Oracle Identity Management?

We can help you find the solution that fits you best.

Find the Right Product

Oracle Identity Management Features

User on/off Boarding

Self Service Access requests

Users can request access to an application and be automatically provisioned if they meet policy requirements

81%
(Based on 8 reviews)

Smart/Automated Provisioning

Automates account/access rights creation, changes and removals for on-premise and cloud apps

76%
(Based on 7 reviews)

Role Management

Establish roles that create a set of authentication rights for each user in the role

83%
(Based on 7 reviews)

Policy Management

Enables administrators to create access policies and applies policy controls throughout request and provisioning processes

81%
(Based on 6 reviews)

Access Termination

Terminate access to multiple applications based on dates

79%
(Based on 7 reviews)

Approval Workflows

Allow business stake-holders/managers to approve or reject requested changes to access via a defined workflow

81%
(Based on 6 reviews)

Authentication Options

Authentication User experience

Process of providing credentials and logging into multiple systems is easy and intuitive for users

77%
(Based on 5 reviews)

Local Access

Controls access to legacy applications, web based applications, network resources and servers.

75%
(Based on 6 reviews)

Partner Access

Controls access to users that are not company employees that are either within the companies local area network or outside the network

73%
(Based on 5 reviews)

Mobile Support

Provides mobile application for required mobile os platform and enables single sign on for native and web based business applications

63%
(Based on 5 reviews)

Breath of support for target systems

Standard integrations to most common cloud and on premise applications

80%
(Based on 5 reviews)

Supports BYOD users

Enables users to use their own device to access company applications.

70%
(Based on 5 reviews)

Access Control

Role Management

Establish roles that create a set of authentication rights for each user in the role

Not enough data available

Access Termination

Terminate access to multiple applications based on dates

Not enough data available

Remote Access

Controls access to legacy applications, web based applications, networks resources while employees are outside the local area network.

Not enough data available

Partner Access

Controls access to users that are not company employees that are either within the companies local area network or outside the network

Not enough data available

User Maintenance

Self Service Password Reset

Enables users to reset passwords without administrator interaction. Enforces password policies when resetting.

83%
(Based on 7 reviews)

Bulk Changes

Change users and permissions in bulk

78%
(Based on 6 reviews)

Bi-directional Identity Synchronization

Keep identity attributes consistent across applications whether the change is made in the provisioning system or the application

72%
(Based on 6 reviews)

Multi-Factor Authentication

Supports Required Access Types

Works with required networking products and applications out of the box such as: VPN, Web, Cloud applications, Local/Remote Desktop

81%
(Based on 6 reviews)

Supports Required Authentication systems

Includes or supports required authentication technologies. Example systems: One Time Passwords, bioMetric, knowledge based, key cards, mobile phone based tokens, etc

83%
(Based on 6 reviews)

Administration

Smart/Automated Provisioning

Automates account/access rights creation, changes and removals for on-premise and cloud apps

Not enough data available

Policy Management

Enables administrators to create access policies and applies policy controls throughout request and provisioning processes

Not enough data available

On-premise identity repositories supported

Variety and Quality of integrations (ie Active Directory, LDAP)

Not enough data available

Ease of Connecting Applications

Easily provisions new systems, platforms or applications using configuration and not customization.

Not enough data available

Governance

Identifies and Alerts for Threats

Alerts administrators when inappropriate access occurs

77%
(Based on 5 reviews)

Compliance Audits

Proactively audits access rights against policies

76%
(Based on 7 reviews)

Identity Directories

On-premise identity repositories supported

Variety and Quality of integrations (ie Active Directory, LDAP)

80%
(Based on 5 reviews)

Application as profile master

Directory treats the user's profile that is in an application as the ongoing source of truth for that user's profile. Changes to profile in master application drive changes to profiles in other applications.

Not enough data available

Cloud Directory

Provides cloud based directory option that contains all user names and attributes

Not enough data available

Functionality

SSO

Provides a single access point for users to access multiple cloud products without multiple logins.

Not enough data available

Multi-Factor Authentication

Provides support for Multi-Factor authentication, so users are required to provide multiple factors to authenticate. For example, something they know, Something they have or something they are.

Not enough data available

Supports Required Authentication systems

Supports required 3rd party Authentication Technologies. Example systems: bioMetric, passwords, key cards, token based systems, etc.

Not enough data available

Administration

Reporting

Standard and customized report creation to ensure appropriate access rights have been assigned

70%
(Based on 5 reviews)

Mobile App

Provides mobile application that alerts administrators of potential issues and allows administrators manage access rights

Not enough data available

Ease of set up for target systems

Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured

80%
(Based on 5 reviews)

APIs

Provides appropriate application interfaces to enable custom integrations for unique business requirements

73%
(Based on 5 reviews)

Provisioning

Self Service Access requests

Users can request access to an application and be automatically provisioned if they meet policy requirements

73%
(Based on 5 reviews)

Smart/Automated Provisioning

Automates account/access rights creation, changes and removals for on-premise and cloud apps

80%
(Based on 5 reviews)

Bi-directional Profile Synchronization

Keeps all profile attributes consistent across applications whether the change is made in the provisioning system or the application

73%
(Based on 5 reviews)

Profile attribute transformation

Transforms profile atributes to the required format for all of the systems being updated

77%
(Based on 5 reviews)

Role Management

Establish roles that create a set of authentication rights for each user in the role

87%
(Based on 5 reviews)

Policy Management

Enables administrators to create access policies and applies policy controls throughout request and provisioning processes

Not enough data available

Access Termination

Terminate access to multiple applications based on dates

Not enough data available

Approval Work-flows

Allow business stake-holders/managers to approve or reject requested changes to access via a defined work-flow

80%
(Based on 5 reviews)

Governance

Identifies and Alerts for Threats

Alerts administrators when inappropriate access occurs

Not enough data available

Compliance Audits

Proactively audits access rights against policies

Not enough data available

Administration

Administration Console

Provides Administration tools/console that are easy to use and learn for routine maintenance tasks

Not enough data available

Ease of set up for target systems

Support for wide variety of cloud and on premise apps to automate provisioning for existing and new applications procured

Not enough data available

Bulk Changes

Change users and permissions in bulk

Not enough data available

Self Service Password Administration

Users can set, change passwords without interaction from IT staff

Not enough data available

Platform

Customization

Supports customizable UI

80%
(Based on 5 reviews)

Reliability

Cloud based service has minimal downtime

87%
(Based on 5 reviews)

Performance/Scalability

Service performs well under significant use and can scale to support large number of users

87%
(Based on 5 reviews)

Security

Vendor follows appropriate security protocols and has appropriate certifications to ensure no breech of confidential data occurs

87%
(Based on 5 reviews)

Logging and Reporting

Provides required reports to manage business. Provides adequate logging to troubleshoot and support auditing.

87%
(Based on 5 reviews)

Federation/SAML support

Can serve as the identity provider to external service providers so that when the user logs into a service, instead of providing credentials to the service provider, the service provider trusts the identity provider to validate the credentials.

Not enough data available

Cross Browser support

Support access to browser based applications across required browser types

Not enough data available

Reporting

Contains pre-built and custom reporting tools to required to manage business

Not enough data available

APIs

Provides appropriate application interfaces to enable custom integrations for unique business requirements

Not enough data available