ABSTRACT

Identity preservation is absolutely necessary for data security, as security cannot be based on anonymity. The first step occurs when the user authenticates himself or herself to the application server. The application server must then convey this identity in context to the database. The database can then apply the authorizations (privileges) and access control policies as well as auditing based on the user actually performing the actions. This chapter highlights products in the Oracle Data Technology Platform which may be coupled with Identity Management (IdM) to enable compliance. This section also highlights integration points against which OVD, OIM, OAM, and ESSO may be configured to audit, provision, and protect the data management layer.