The Oracle Adaptive Access Manager
is part of the
Oracle Identity Management Oracle Identity Management, a software suite marketed by Oracle Corporation, provides identity and access management (IAM) technologies.
The name of the software suite closely resembles the name of one of its components, Oracle Identity Manager.
...
product suite that provides
access control
In physical security and information security, access control (AC) is the action of deciding whether a subject should be granted or denied access to an object (for example, a place or a resource). The act of ''accessing'' may mean consuming ...
services to web and other online applications.
Oracle Adaptive Access Manager was developed by the company Bharosa, which was founded by Thomas Varghese, Don Bosco Durai and CEO
Jon Fisher. The software was included in
Oracle's acquisition of Bharosa.
History
Oracle acquired Bharosa, which means 'trust' in the
Hindi
Modern Standard Hindi (, ), commonly referred to as Hindi, is the Standard language, standardised variety of the Hindustani language written in the Devanagari script. It is an official language of India, official language of the Government ...
language, to extend its web-based access management solutions. In 2003, Bharosa was founded by Thomas Varghese, a research
scientist
A scientist is a person who Scientific method, researches to advance knowledge in an Branches of science, area of the natural sciences.
In classical antiquity, there was no real ancient analog of a modern scientist. Instead, philosophers engag ...
and serial entrepreneur. Later, Don Bosco Durai and
Jon Fisher came on board as co-founders.
[
]
Design philosophy
The premise was simple in that the existing authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
technologies were unsatisfactory and easy to compromise. No authentication
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an Logical assertion, assertion, such as the Digital identity, identity of a computer system user. In contrast with iden ...
technology can really provide its full and intended security
Security is protection from, or resilience against, potential harm (or other unwanted coercion). Beneficiaries (technically referents) of security may be persons and social groups, objects and institutions, ecosystems, or any other entity or ...
benefits unless the computer
A computer is a machine that can be Computer programming, programmed to automatically Execution (computing), carry out sequences of arithmetic or logical operations (''computation''). Modern digital electronic computers can perform generic set ...
and computer network
A computer network is a collection of communicating computers and other devices, such as printers and smart phones. In order to communicate, the computers and devices must be connected by wired media like copper cables, optical fibers, or b ...
are re-designed from the grounds up.Oracle Adaptive Access Manager
/ref>
Oracle Adaptive Access Manager has two components, the strong Authentication-agnostic security component and the application-agnostic Risk component. One simple example of the Strong Authentication component is that a User can choose a personalized keypad and use mouse clicks to enter password to prevent passwords being stolen with key loggers and being phished or pharmed. The Risk Component analyzes the authentication and transaction data for abnormalities and anomalies in real-time to prevent fraud and also in off-line mode to identify and detect internet fraud.[
]
References
{{reflist, 2
External links
* ttp://blogs.oracle.com/bornidentity/ Thomas Varghese Aims to Address Challenges in Identity Management and Security in This Blog
Oracle software