1)What is an Identity?
Ans : An identity is the virtual representation of an enterprise resource user including employees, customers, partners and vendors. Identity Management shows the rights and relationships the user has when interacting with a company’s network.
2)What are the benefits of Identity Management?
3)How does Identity Management (IDM) work?
4)What is the purpose of rule designer?
Ans : Rule deigner is used to create rules that can be applied to password policy selection, automatic group membership, provisioning process selection, task assignment, and prepopulating adapters
5)What is Adapter? What Adapters available in OIM?
Ans : An adapter is a Java class that is created by an Oracle Identity Manager user through the Adapter Factory.
6)What are various domains that fall under identity management?
Oracle Products that fall under Identity Management are Oracle Identity Manager and Oracle Role Manager. Oracle products that fall under Access Management are Oracle Access Manager, Oracle Entitlement Server, Oracle Adaptive Access Manager, Oracle Identity federation and Enterprise Single Sign-On. Oracle products that fall under Directory Management are OID and OVD.
7)What is an object class and their different types?
Ans: An object class specifies set of attributes that are used to define an object.
8)How are Identity Management Solutions Implemented?
Inventory and assess current investments and processes. Clean and consolidate identity data stores. Create virtual identities for enterprise users.
Design and deploy identity infrastructure components. Create identity provisioning and deploy password management, user self-service, and regulatory compliance.
Deliver applications and services. Access management deployed to a clean environment. Leverage federated identity for improving supply chain and employee efficiencies.
9)What do mean by Connectors?
Ans : Connectors are the plugins that helps in integrating OIM with External Sources or Target Systems. In any OIM implementation, Reconciliation and Provisioning is dependent on configuration provided by this Connectors.Connectors are the containers that consist of several components like IT Resources, Process Forms, Adapters, and Event Handlers which are needed to integrate the External Sources, Applications and Target Systems.Scalable and flexible integration architecture is critical for the successful deployment of a company’s provisioning solutions. Oracle Identity Manager offers proven integration architecture and predefined connectors for fast and low-cost deployments.
10)What is Resource Object (RO)?
Ans : A RO is in its most basic form basically a virtual representation of an account on a target system. If anOIM user has an account on the target system the user has an RO instance associated with it.The most basic process that you do with ROs is to provision the account to a target system. The provisioning is handled by a provisioning process. The provisioning processes usually consists of a number of provisioning tasks that fires adapters that in turn calls code, often Java code, that actually does the provisioning work.
11)What is Application Server and Web server?
Ans : A Web server exclusively handles HTTP requests, whereas an application server serves business logic to application programs through any number of protocols.Webserver mainly handles the Http requests but app server can be used to handle the http, rmi, TCP/IP and many more protocols. Webserver just handles the requests of the webpage – means suppose, a html page(presentation layer) requests a data - here script is written containing the business logic , then it just give the response with the required data from the database. Then the html page with script is used to show the retrieved information.
In case of application server, it does the same thing, of getting and gives the response but it can process the requests. i.e. in this case, instead of script know how to fetch the data, the script is simply used to call the applications server'lookup service to retrieve and process the data. i.e here, application server is used for processing/applyinglogic. The web server can be considered as the subset of app server.The basic difference between a web server and an application server is:
WebServer can execute only web applications i.e. servlets and JSPs and has only a single container known as Web container which is used to interpret/execute web applications
Application server can execute Enterprise application, i,e (servlets, jsps, and EJBs) it is having two containers
1. WebContainer (for interpreting/executing servlets and jsps)
2. EJB container (for executing EJBs). It can perform operations like load balancing , transaction demarcation etc
12)What is Event Handler?
Ans : In an Identity Management system, any action performed by a user or system is called an operation or Event. Examples of Events are creating users, updating users, creating password policy, and so on.
1. Pre-process Event Handler
2. Post-Process Event Handler
Pre-process Event Handler :Mostly Pre-process Event Handlers are used for Validation Purpose.
Post-process Event Handler :Post-process Event Handlers are written mainly when there is a need of making changes internally after any event is triggered in OIM.
For E.g.: Assign Role according to Organization, Auto Assign an email ID using Firstname and Lastname of user and so on.
13)What is OIM user? How many Types of users are there in oracle identity manager?
OIM User:OIM user is an account which helps in managing the compliance of any organization and helps in providingthe access rights according to its identity in the related organization.
Types of Users:Two types of Oracle Identity Manager users determine access rights to specific aspects of Oracle Identity Manager.
These types include:
• End-User Administrator:
14)Explain the Architecture of Oracle identity Manager?
Ans : The Oracle Identity Manager architecture consists of three tiers
Tier 1: Client:
The Oracle Identity Manager application GUI component reside in this tier. Users log in by using the Oracle Identity Manager client.The Oracle Identity Manager client interacts with the Oracle Identity Manager server, providing it with the user's login credentials.
Tier 2: Application Server:
The second tier implements the business logic, which resides in the Java Data Objects that are managed by the supported J2EE application server (JBoss application server, BEA WebLogic, and IBM WebSphere). The Java Data Objects implement the business logic of the Oracle Identity Manager application, however, they are not exposed to any methods from the outside world. Therefore, to access the business functionality of Oracle Identity Manager, you can use the API layer within the J2EE infrastructure, which provides the lookup and communication mechanism.
Tier 3: Database:
The third tier consists of the database. This is the layer that is responsible for managing the storage of data within Oracle Identity Manager.
15)What is Authentication & Authorization
Ans :The process of identifying an individual usually based on a username and password. In security systems,authentication is distinct from authorization , which is the process of giving individuals access to system objects based on their identity. Authentication ensures that the individual is who he or she claims to be, but says nothing about the access rights of the individual.
After Authentication the process of granting or denying access to a network resource is called Authorization..Most computer security systems are based on a two-step process. The first stage is authentication, which ensures that a user is who he or she claims to be. The second stage is authorization, which allows the user access to various resources based on the user's identity.
16)What is Oracle Webgate?
Ans : An Oracle WebGate is a Web server plug-in that is shipped out-of-the-box with Oracle Access Manager. The WebGate intercepts HTTP requests from users for Web resources and forwards them to the Access Server for authentication and authorization.
17)How to Reconfigure the IDM WAR file after installation?
To update your IDM WAR file:
1.Run the ConfigUpdate utility in the User Application install directory by executing configupdate.sh or configupdate.bat. This allows you to update the WAR file in the install directory.
2.Deploy the new WAR file to your application server.
Oracle IDM interview questions & material
|Selection||File type icon||File name||Description||Size||Revision||Time||User|