Modifying a Resource Managing Resource Profile

8-8 Oracle Fusion Middleware Users Guide for Oracle Identity Manager

2. In the Current Proxies section, from the Actions list, select Add Proxy. The Add

Proxy window is displayed.

3. In the Proxy Name field, select My Manager to specify your manager as proxy.

Otherwise, select Other User to specify any other user as proxy. To do so, click the lookup icon to search for the user you want to specify as proxy. 4. In the Start Date field, specify a start date. 5. In the End Date field, specify an end date.

6. Click Apply. A message box is displayed asking for confirmation.

7. Click Yes.

8.4.2 Editing a Proxy

To edit a proxy:

1. Go to My Profile, Proxies.

2. In the Current Proxies section, from the Actions list, select Open Proxy Detail. The

Proxy Detail window is displayed.

3. In the Proxy Name field, select My Manager to specify your manager as proxy.

Otherwise, select Other User to specify any other user as proxy. You can search for the user name.

4. Click Edit. In case of active proxy, you cannot edit the proxy name and the start

date, but in case of the proxy that has not started, you can change the proxy user, start date, and end date.

5. Click Apply. A message box is displayed asking for confirmation.

6. Click Yes.

8.4.3 Removing a Proxy

To edit a proxy:

1. Go to My Profile, Proxies. A table with the list of proxies is displayed.

2. Select a proxy to be removed.

3. In the Current Proxies section, from the Actions list, select Remove Proxy. The

Remove Proxy window is displayed.

4. Click Remove. A message box is displayed asking for confirmation.

Note: The user search result is governed by authorization policies. For more information, see Chapter 15, Managing Authorization Policies . Note: Oracle Identity Manager does not allow adding another proxy whose start and end dates overlap with the existing proxy. Note: To change the proxy user, you can search only those users for which you have search permission. Managing Profile 8-9

5. Click Yes.

8.5 Managing Security

The Security tab allows you to change your profile attributes related to password security. Using this tab, you can perform the following tasks: ■ Changing Password ■ Setting Challenge Questions and Response

8.5.1 Changing Password

Using this feature, you can reset your enterprise password. To specify a new password, enter and re-confirm the new passwords. The new password is evaluated for compliance against the applicable password policy, which is displayed on the Change Password page. If the new password does not comply with the password policies, then the password change will be rejected and you will be informed of the failing conditions. If the password evaluates successfully against all policies, then the enterprise password is changed. To change the password:

1. Go to My Profile page, click the Security tab.

2. In the Password section, click Change Password. The Change Password window

is displayed with the applicable password policy.

3. In the Old Password field, enter the existing password.

4. In the New Password field, enter the new password that you want to set.

5. In the Re-Type New Password field, re-enter the new password.

6. Click Apply. If the old password is valid and the new password is in compliance

with the password policy, then the password is changed. Otherwise, an error message is displayed.

8.5.2 Setting Challenge Questions and Response

The challenge-response service allows you to set up a series of challenge questions that are used to validate the users identity. Only the user should know the correct answers to the challenge questions. Questions and answers are stored as part of the users profile as a name-value pair list, where the name is the question, and the value is the answer to that question. For example, for user John Doe, the challenge-response set could be as follows: Challenge Response What is your favorite color? Blue What is the name of your pet? Rex What is the city of your birth? New York Note: Oracle recommends defining answers to challenge questions that cannot be guessed easily by collecting information about the user from the Internet or other public sources.