Feeds:
Posts
Comments

Posts Tagged ‘Authorization’

Oracle’s Chief Security Officer (CSO) Mary Ann Davidson visited Oracle Entitlements Server Demo Booth at RSA Conference. She was very impressed with OES. Specifically, she liked that:

  • OES can externalize authorization from applications and services
  • OES allows central management authorization and entitlements across the enterprise

Oracle Chief Security Officer Mary Ann Davidson

Read Full Post »

Oracle’s FMW (Fusion Middle Ware) 11gR1 PS5 (Patch Set 5) is now available. And this is great new for OES. “Why ?” you might ask. Let me give you the details.

 

Let us take a step back. When we were in BEA, OES used to certify individually with other BEA products. So back then, I would prioritize which certifications were important for OES and what versions to certify with. Let us call this as “Wizard chooses wand” model, where OES team decides on what/when to certify. Unlike BEA, Oracle uses a “Wand chooses the wizard” model, where the platform chooses who and when to certify with. This meant, we had to wait for the FMW platform to certify with OES. And finally that has happened. Now we can use OES in FMW environments such as SOA (OSB) etc. In many ways this was the last hurdle which we had to cross to become fully Oracle-ized.

(more…)

Read Full Post »

RSA Conference is the place to be in Feb! Get a free pass to access the main exhibit halls where you can check out the latest products from vendors across the world.

OES is the celebrity of this show! It will be highlighted at Oracle booth (#2425) and at OASIS XACML booth (#129).

I will be at Oracle booth (#2425) on Feb 28th and 29th. My fellow OES team members will be at the OES booth on other days.

 

Exhibit show floor hours:
February 27th, 6:00 p.m. – 8:00 p.m.
February 28th, 11:00 a.m. – 6:00 p.m.
February 29th, 11:00 a.m. – 6:00 p.m.
March 1, 11:00 a.m. – 3:00 p.m.

 

Oracle and PwC will be hosting a Networking Reception on Feb 28 (registration required). This is a nice opportunity to socialize and network with other Identity Management professionals.

 

To get your free pass:

Click here and enter Oracle Code EC12ORAC by Friday, February 24.

Read Full Post »

First a disclaimer: This article is based my personal experiences. And it is not a policy statement or a commitment from for me, Oracle or any other company.

 

I periodically get requests such as “We are a startup-company X (in enterprise space) and we make product Y. Our product Y brings enormous value to your-product. Our product Y has features A, B & C which you lack, so it supplements/compliments your offerings. It has the potential to increase your revenue 10x. . . . And this is why we need to form a close partnership, and you need to pitch product Y along with your-product”.

(more…)

Read Full Post »

Among all authorization models RBAC (Role Based Access Control) is the most mature and possibly the most widely used. I am yet to meet a person working on identity management who is not familiar with RBAC. Most people when they think of RBAC see a rigid model. This is far from truth, as it is possible to build fine grained access models easily using RBAC, without sacrificing standards compliance.

(more…)

Read Full Post »

« Newer Posts - Older Posts »