O'Reilly logo

Designing an IAM Framework with Oracle Identity and Access Management Suite by Scheidel Jeff

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 10Authentication and SSO: Accessing What I’ve Been Granted

The answer is Man, spake Oedipus. And so the Sphinx threw herself from the mount, and Oedipus entered the city of Thebes.

—An example of authentication in ancient mythology

We’re past the building blocks, the design and assembly of the foundation for the framework. Now we’re ready to use the framework on a day-to-day basis, the processes that govern users as they log in and make use of the organization’s digital resources. A user is identified, cataloged, placed in the hierarchy, provisioned for access, and is now ready to use those assets. The system knows who you are, but now you have to log in and say, this is me. This means authentication. It may seem simple, because the majority ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required