Identity Federation with Oracle allows Enterprise Customers adopt a hybrid cloud approach while keeping the same levels of security access control. We mention the hybrid thing, because the fundamentals of this pattern is that the Oracle Identity & Access Management solution is of course deployed in the on-premises side.

identityfed2

Thanks to the capabilities of Oracle Access Manager (OAM), you can provide users a unique Single Sign On experience for both: cloud and on-premises applications.

Thanks to the open standards utilised for the SSO thing (SAML2.0, SSL,…), there is no need for specific VPN connectivity between on-premises and cloud.

Thanks to the ability to replicate password-less identities in the Oracle cloud side, it is completely imposible for Users to gain access to their provisioned cloud services unless they login the corporate system provided by OAM from the on-premises side. This means that users not connected to corporate network will receive a login form that can’t never reach, therefore they are not able to gain access never ever from anywhere.

identityfed1

Thanks to the lack of passwords stored in cloud side, there is no risk of identities thieving.

Identity Cloud Service

Oracle Identity Management

Oracle IdCS Things Part I: Create Users Programatically in Node.js for Oracle Cloud Services with the REST API in less than a Basketball Quarter Length

Oracle IdCS Things Part II: Simple Workflow for Creating Registered Users in IdCS with Node.js

Enjoy 😉

Comments

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google photo

You are commenting using your Google account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.