Oracle Adaptive Access Manager

Last updated
NameOracle Adaptive Access Manager
Formerly calledBharosa
FoundersThomas Varghese
Don Bosco Durai
Jon Fisher, Bharosa CEO
Company Oracle Corporation
Software Oracle Identity Management
Website www.oracle.com/technetwork/middleware/id-mgmt/index-096126.html

The Oracle Adaptive Access Manager (OAAM) is part of the Oracle Identity Management product suite that provides access control services to web and other online applications. [1] [2] [3] Oracle Adaptive Access Manager was developed by the company Bharosa, which was founded by Thomas Varghese, Don Bosco Durai and CEO Jon Fisher. The software was included in Oracle's acquisition of Bharosa. [4]

Contents

History

Oracle acquired Bharosa, which means 'trust' in the Hindi language, to extend its web-based access management solutions. In 2003, Bharosa was founded by Thomas Varghese, a research scientist and serial entrepreneur. Later, Don Bosco Durai and Jon Fisher came on board as co-founders. [3]

Design philosophy

The premise was simple in that the existing authentication technologies were unsatisfactory and easy to compromise. No authentication technology can really provide its full and intended security benefits unless the computer and computer network are re-designed from the grounds up. [5]

Oracle Adaptive Access Manager has two components, the strong Authentication-agnostic security component and the application-agnostic Risk component. One simple example of the Strong Authentication component is that a User can choose a personalized keypad and use mouse clicks to enter password to prevent passwords being stolen with key loggers and being phished or pharmed. The Risk Component analyzes the authentication and transaction data for abnormalities and anomalies in real-time to prevent fraud and also in off-line mode to identify and detect internet fraud. [3]

Related Research Articles

Simple Network Management Protocol (SNMP) is an Internet Standard protocol for collecting and organizing information about managed devices on IP networks and for modifying that information to change device behavior. Devices that typically support SNMP include cable modems, routers, switches, servers, workstations, printers, and more.

Authentication The act of proving an assertion, often the identity of a computer system user

Authentication is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. It might involve validating personal identity documents, verifying the authenticity of a website with a digital certificate, determining the age of an artifact by carbon dating, or ensuring that a product or document is not counterfeit.

The Network Information Service, or NIS, is a client–server directory service protocol for distributing system configuration data such as user and host names between computers on a computer network. Sun Microsystems developed the NIS; the technology is licensed to virtually all other Unix vendors.

Internet security is a branch of computer security specifically related to not only Internet, often involving browser security and the World Wide Web, but also network security as it applies to other applications or operating systems as a whole. Its objective is to establish rules and measures to use against attacks over the Internet. The Internet represents an insecure channel for exchanging information, which leads to a high risk of intrusion or fraud, such as phishing, online viruses, trojans, worms and more.

A one-time password (OTP), also known as a one-time PIN or dynamic password, is a password that is valid for only one login session or transaction, on a computer system or other digital device. OTPs avoid several shortcomings that are associated with traditional (static) password-based authentication; a number of implementations also incorporate two-factor authentication by ensuring that the one-time password requires access to something a person has as well as something a person knows.

A password policy is a set of rules designed to enhance computer security by encouraging users to employ strong passwords and use them properly. A password policy is often part of an organization's official regulations and may be taught as part of security awareness training. Either the password policy is merely advisory, or the computer systems force users to comply with it. Some governments have national authentication frameworks that define requirements for user authentication to government services, including requirements for passwords.

Self-service password reset (SSPR) is defined as any process or technology that allows users who have either forgotten their password or triggered an intruder lockout to authenticate with an alternate factor, and repair their own problem, without calling the help desk. It is a common feature in identity management software and often bundled in the same software package as a password synchronization capability.

A password manager is a computer program that allows users to store, generate, and manage their passwords for local applications and online services.

Electronic authentication is the process of establishing confidence in user identities electronically presented to an information system. Digital authentication, or e-authentication, may be used synonymously when referring to the authentication process that confirms or certifies a person's identity and works. When used in conjunction with an electronic signature, it can provide evidence of whether data received has been tampered with after being signed by its original sender. Electronic authentication can reduce the risk of fraud and identity theft by verifying that a person is who they say they are when performing transactions online.

Hardware-based full disk encryption (FDE) is available from many hard disk drive (HDD/SSD) vendors, including: Hitachi, Integral Memory, iStorage Limited, Micron, Seagate Technology, Samsung, Toshiba, Viasat UK, Western Digital. The symmetric encryption key is maintained independently from the computer's CPU, thus allowing the complete data store to be encrypted and removing computer memory as a potential attack vector.

Jon Fisher Economic analyst

Jon Fisher is a Silicon Valley entrepreneur, investor, author, speaker, philanthropist and inventor. Fisher is known for advocating start-up acquisition strategy versus an IPO and is the author of Strategic Entrepreneurism: Shattering the Start-Up Entrepreneurial Myths.

LastPass is a freemium password manager that stores encrypted passwords online. The standard version of LastPass comes with a web interface, but also includes plugins for various web browsers and apps for many smartphones. It also includes support for bookmarklets. LogMeIn, Inc. acquired LastPass in October 2015.

An identity-management system refers to an information system, or to a set of technologies that can be used for enterprise or cross-network identity management.

OpenAM

OpenAM is an open-source access management, entitlements and federation server platform. It was sponsored by ForgeRock until 2016. Now it is supported by Open Identity Platform Community.

OneLogin, Inc. is a cloud-based identity and access management (IAM) provider that designs, develops, and sells a unified access management (UAM) platform to enterprise-level businesses and organizations. Founded in 2009 by brothers Thomas Pedersen and Christian Pedersen, OneLogin is a late stage venture, privately held company.

FIDO Alliance Industry consortium working on authentication mechanisms

The FIDOAlliance is an open industry association launched in February 2013 whose mission is to develop and promote authentication standards that help reduce the world’s over-reliance on passwords. FIDO addresses the lack of interoperability among strong authentication devices and reduces the problems users face creating and remembering multiple usernames and passwords.

The following outline is provided as an overview of and topical guide to computer security:

ERP Security is a wide range of measures aimed at protecting Enterprise resource planning (ERP) systems from illicit access ensuring accessibility and integrity of system data. ERP system is a computer software that serves to unify the information intended to manage the organization including Production, Supply Chain Management, Financial Management, Human Resource Management, Customer Relationship Management, Enterprise Performance Management. Common ERP systems are SAP, Oracle E-Business Suite, Microsoft Dynamics.

Credential stuffing is a type of cyberattack in which stolen account credentials, typically consisting of lists of usernames and/or email addresses and the corresponding passwords, are used to gain unauthorized access to user accounts through large-scale automated login requests directed against a web application. Unlike credential cracking, credential stuffing attacks do not attempt to use brute force or guess any passwords – the attacker simply automates the logins for a large number of previously discovered credential pairs using standard web automation tools such as Selenium, cURL, PhantomJS or tools designed specifically for these types of attacks, such as Sentry MBA, SNIPR, STORM, Blackbullet and Openbullet.

Passwordless authentication is an authentication method in which a user can log in to a computer system without the entering a password or any other knowledge-based secret.

References

  1. "Adaptive Access Management Enabling Fraud Prevention and Strong Authentication for Online Services" (PDF). Retrieved 23 May 2013.CS1 maint: discouraged parameter (link)
  2. "Oracle Adaptive Access Manager". ApTec. Retrieved 23 May 2013.CS1 maint: discouraged parameter (link)
  3. 1 2 3 "Access Oracle Adaptive Access Manager: What, Why, How" (PDF). Piocon. Retrieved 23 May 2013.CS1 maint: discouraged parameter (link)
  4. Kathleen Goolsby (11 April 2013). "CrowdOptic's Jon Fisher Warns Software Startup CEOs: Buck the Trends". Sand Hill. Retrieved 8 September 2014.CS1 maint: discouraged parameter (link)
  5. Oracle Adaptive Access Manager