Oracle Access Manager
Oracle Access Manager allows users of your applications or IT systems to log in once and gain access to a broad range of IT resources. Oracle Access Manager provides an identity management and access control system that is shared by all your applications. The result is a centralized and automated single sign-on (SSO) solution for managing who has access to what information across your entire IT infrastructure. Oracle Access Manager 11g is available as a stand-alone product or as part of Oracle's award-winning Oracle Identity & Access Management Suite Plus.
BENEFITS
* Strong authentication for secure access control—Eliminate latency in changes to identity policy information and improves authentication flexibility across mission critical applications
* Extranet Scale Security Architecture—Apply access security throughout your organization with an evolutionary architecture that provides the scaling and high availability needed for Extranet Scale enterprise applications
* Seamless interoperability for the heterogeneous enterprise—Get scalability and reduce TCO with support the widest range of third party platforms including IBM Websphere, BEA Weblogic, and SAP
* Identity administration combined with access control—Enforce compliance by protecting resources at the point of access, and delegating authentication and authorization decisions to a central authority
BENEFITS
* Strong authentication for secure access control—Eliminate latency in changes to identity policy information and improves authentication flexibility across mission critical applications
* Extranet Scale Security Architecture—Apply access security throughout your organization with an evolutionary architecture that provides the scaling and high availability needed for Extranet Scale enterprise applications
* Seamless interoperability for the heterogeneous enterprise—Get scalability and reduce TCO with support the widest range of third party platforms including IBM Websphere, BEA Weblogic, and SAP
* Identity administration combined with access control—Enforce compliance by protecting resources at the point of access, and delegating authentication and authorization decisions to a central authority
Rating
0 vote
Favoured:
0