Export to Excel Close Multiple Tabs

3-20 Oracle Fusion Middleware Administrators Guide for Oracle Adaptive Access Manager

3.11 Access Level to OAAM Admin

OAAM Admin provides functions for security investigators and customer service representatives CSRs, business and security analysts, security administrators, system administrators, and quality assurance. The functions and navigation that are available depend on the roles. Refer to Table 3–8 for conceptual roles. These example roles are for reference only and do not refer to official OAAM out-of-the-box roles. For information on the Navigation and Policy trees, see Section 3.4, Navigation Tree and Section 3.5, Policy Tree. Oracle Adaptive Access Manager 11g users must be defined using the Oracle WebLogic Administration Console. For information on defining Oracle Adaptive Access Manager users, see the Oracle Fusion Middleware Installation Guide for Oracle Identity Management. Table 3–8 Access Level Oracle Adaptive Access Manager Conceptual Roles Descriptions Access Security investigators and customer service representatives CSR Security investigators and customer service representatives CSR use Oracle Adaptive Access Managers case management tools to handle security and customers cases daily. They have detailed knowledge about user activity and security issues. Customer support representatives can search, open and create CSR type cases. They do not have any access to the Navigation tree. Security investigators have wide access to OAAM Admin. Security administrators Security administrators plan, configure and deploy policies based on the requirements from analysts. Security administrators configure such items as policy set, patterns, rules, groups, and so on. They do not have access to environment properties, system snapshots, or the OAAM dashboard, and view-only access to cases. They can access the Navigation tree. Business and security analysts Analysts gather intelligence from various sources to identify business and security needs and develop requirements to address them. Their sources for intelligence include investigators, industry reports, antifraud networks, compliance mandates, and company policies. Analysts work with security investigators and CSRs to identify the policies that require adjustment and new policies that must be created. Business analysts do not have access to environment properties and system snapshots. They have read-only access the Navigation tree and cases. System administrator A system administrator configures environment-level properties and transactions. System administrators have limited access to OAAM Admin to manage the server environment and Scheduler: JobsScheduler: Job Queue. The server environment includes logging, properties, and enumerations. QA QA tests the policies to confirm that they meet requirements. QA have access to all the functionality. Part II Part II Customer Service and Forensics This part of the book presents information about the customer service and forensics tools of Oracle Adaptive Access Manager. It contains the following chapters: ■ Chapter 4, Managing and Supporting CSR Cases ■ Chapter 5, Investigation Using Agent Cases ■ Chapter 6, Viewing Additional Details for Investigation