The Oracle Adaptive Access Manager
is part of the
Oracle Identity Management Oracle Identity Management, a software suite marketed by Oracle Corporation, provides identity and access management (IAM) technologies.
The name of the software suite closely resembles the name of one of its components, Oracle Identity Manager.
...
product suite that provides
access control
In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of ''accessing'' may mean consuming ...
services to web and other online applications.
Oracle Adaptive Access Manager was developed by the company Bharosa, which was founded by Thomas Varghese, Don Bosco Durai and CEO
Jon Fisher
Jon Fisher (born January 19, 1972) is a Silicon Valley entrepreneur and writer.
Jon sold his own NFTs before founding software company, ViciNFT. As a co-inventor and co-founding CEO, Fisher built three companies including Bharosa—which produc ...
. The software was included in
Oracle's acquisition of Bharosa.
History
Oracle acquired Bharosa, which means 'trust' in the
Hindi
Hindi (Devanāgarī: or , ), or more precisely Modern Standard Hindi (Devanagari: ), is an Indo-Aryan languages, Indo-Aryan language spoken chiefly in the Hindi Belt region encompassing parts of North India, northern, Central India, centr ...
language, to extend its web-based access management solutions. In 2003, Bharosa was founded by Thomas Varghese, a research
scientist
A scientist is a person who conducts scientific research to advance knowledge in an area of the natural sciences.
In classical antiquity, there was no real ancient analog of a modern scientist. Instead, philosophers engaged in the philosophica ...
and serial entrepreneur. Later, Don Bosco Durai and
Jon Fisher
Jon Fisher (born January 19, 1972) is a Silicon Valley entrepreneur and writer.
Jon sold his own NFTs before founding software company, ViciNFT. As a co-inventor and co-founding CEO, Fisher built three companies including Bharosa—which produc ...
came on board as co-founders.
[
]
Design philosophy
The premise was simple in that the existing authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicat ...
technologies were unsatisfactory and easy to compromise. No authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicat ...
technology can really provide its full and intended security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
benefits unless the computer and computer network
A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other. These interconnections ar ...
are re-designed from the grounds up.Oracle Adaptive Access Manager
/ref>
Oracle Adaptive Access Manager has two components, the strong Authentication-agnostic security component and the application-agnostic Risk component. One simple example of the Strong Authentication component is that a User can choose a personalized keypad and use mouse clicks to enter password to prevent passwords being stolen with key loggers and being phished or pharmed. The Risk Component analyzes the authentication and transaction data for abnormalities and anomalies in real-time to prevent fraud and also in off-line mode to identify and detect internet fraud.[
]
References
{{reflist, 2
External links
* ttp://blogs.oracle.com/bornidentity/ Thomas Varghese Aims to Address Challenges in Identity Management and Security in This Blog
Oracle software