Search, Create, and Import

Oracle Adaptive Access Manager Navigation 3-19 ■ Right-clicking the node in the Navigation tree and selecting List item from the context menu. ■ Selecting the node in the Navigation tree and then choosing List item from the Actions menu. ■ Clicking the List item button in the Navigation tree toolbar. Create Depending on the selection, you can open a Create page by: ■ Clicking the New item button in the upper right of the console. ■ Right-clicking the node in the Navigation tree and selecting New item from the context menu. ■ Selecting the node in the Navigation tree and then choosing New item from the Actions menu. ■ Clicking the Create new items button in the Navigation tree toolbar. ■ Selecting the Create New item button from the Search Results toolbar. ■ Selecting New item from the Actions menu in Search Results. Import Depending on the selection, you can open a Import page by: ■ Clicking the Import item button in the upper right of the console. ■ Right-clicking the node in the Navigation tree and selecting Import item from the context menu. ■ Selecting the node in the Navigation tree and then choosing Import item from the Actions menu. ■ Clicking the Import items button in the Navigation tree toolbar.

3.10 Export to Excel

You can generate a report of the results from the Search pages for policies, questions, validations, snapshots, properties, entities, transactions, conditions, groups, patterns, and so on. To export results to an Excel report: 1. Ensure the oaam.export.max.rows.allowed property is configured so that you are able to export all the rows needed. This property limits the maximum row selection. 2. In a search page, select rows the rows of interest from the search results.

3. Click the Export To Excel button.

When the export confirmation dialog is shown, you can view the selected list. The export table with the selected rows shows the ID number and display name columns, so that you can easily identity and verify the selected rows before the export.

4. Click Export to export the rows to Excel.

3-20 Oracle Fusion Middleware Administrators Guide for Oracle Adaptive Access Manager

3.11 Access Level to OAAM Admin

OAAM Admin provides functions for security investigators and customer service representatives CSRs, business and security analysts, security administrators, system administrators, and quality assurance. The functions and navigation that are available depend on the roles. Refer to Table 3–8 for conceptual roles. These example roles are for reference only and do not refer to official OAAM out-of-the-box roles. For information on the Navigation and Policy trees, see Section 3.4, Navigation Tree and Section 3.5, Policy Tree. Oracle Adaptive Access Manager 11g users must be defined using the Oracle WebLogic Administration Console. For information on defining Oracle Adaptive Access Manager users, see the Oracle Fusion Middleware Installation Guide for Oracle Identity Management. Table 3–8 Access Level Oracle Adaptive Access Manager Conceptual Roles Descriptions Access Security investigators and customer service representatives CSR Security investigators and customer service representatives CSR use Oracle Adaptive Access Managers case management tools to handle security and customers cases daily. They have detailed knowledge about user activity and security issues. Customer support representatives can search, open and create CSR type cases. They do not have any access to the Navigation tree. Security investigators have wide access to OAAM Admin. Security administrators Security administrators plan, configure and deploy policies based on the requirements from analysts. Security administrators configure such items as policy set, patterns, rules, groups, and so on. They do not have access to environment properties, system snapshots, or the OAAM dashboard, and view-only access to cases. They can access the Navigation tree. Business and security analysts Analysts gather intelligence from various sources to identify business and security needs and develop requirements to address them. Their sources for intelligence include investigators, industry reports, antifraud networks, compliance mandates, and company policies. Analysts work with security investigators and CSRs to identify the policies that require adjustment and new policies that must be created. Business analysts do not have access to environment properties and system snapshots. They have read-only access the Navigation tree and cases. System administrator A system administrator configures environment-level properties and transactions. System administrators have limited access to OAAM Admin to manage the server environment and Scheduler: JobsScheduler: Job Queue. The server environment includes logging, properties, and enumerations. QA QA tests the policies to confirm that they meet requirements. QA have access to all the functionality.