O'Reilly logo

Applied Oracle Security by Bryan Wise, Richard Wark, Patrick Sack, Tyler Muth, Hamza Jahangir, Scott Gaetjen, David Knox

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 8Architecting Identity Management

This chapter discusses the architectural processes and methods used for solving the identity management problems that many enterprises face today when trying to secure access to their applications and information. “Architecting” a solution requires that you understand the functional nature of the problem (such as protecting customer data from privacy threats, and so on) and create a technical solution to address those problems.

Often, as technical people, we can get caught up with possible technological solutions before we fully understand the possible ways of solving the problem from a practical perspective. Subsequently, this chapter covers common techniques and patterns that help you quickly and easily ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required