OCI-IAM Overview
OCI-IAM Overview
Alexandre Fagundes
Cloud Architect | Oracle Latin America
IDC Worldwide IAM Market Shares, 2022 (June 2023)
OCI IAM will provide a single, unified IDaaS for Oracle and non-Oracle apps across hybrid
cloud environments with robust MFA options, Adaptive Access, and Lifecycle Management
On-Prem
OCI Apps 3rd-Party
Apps
Apps
140K 4500
Employees Applications
***
External
Id Providers Federated
Social SaaS Apps
Logon SSO
Oracle Sign-In
SDKs and
Sample Code Custom App
OCI Account
password
Native support for popular social
Supports common federation protocols and Social Identity Providers.
social logon with multiple identity providers Logon
SAML, OpenID Connect, OAuth
Numerous options for MFA including a
Numerous options for Multi-Factor mobile app, Email, SMS, KBA, third-
Authentication (MFA) MFA party and FIDO2 authenticators.
Included mobile app supports passwordless logon
!
Evaluates risk based on several factors
Adaptive security evaluates risk in real-time ? including device, network, location, and
based on context and session awareness Adaptive
Security
user behavior.
Apps
Network
Geographic Location Network App Risk
IP Reputation External App Policies
Feeds
Risk Scoring
FIDO2
FIDO2 Authenticators
Voice Phone Call
Mobile App Passcode or Notification
SMS Text
Security Questions
Email
Bypass Code
Third-Party Authenticators
Duo, Yubico, etc.
Trusted Devices
Create a security model (tenancy, compartments, tagging) before adding users, resources.
Enforce Least Privilege; gradually add permissions as needed.
Do not use OCI default Administrator or Administrators group after initial account setup.
Leverage situational permissions (time- or location-based) where possible.
Leverage compartments and tagging to simplify access management. Align your OCI
compartment design with your department or project structures.
Use instance principals and dynamic groups to manage machine access to APIs.
Enforce multi-factor authentication and leverage adaptive security whenever possible.
Use different identity domains for each user population.
Whitepaper: Best practices for identities and authorization.
Load Load
Balancer Balancer
Availability Domain 1 Availability Domain 2 Availability Domain 1
(or Fault Domain)
High
Availability
OCI IAM OCI IAM OCI IAM
ADG Automatic
Exadata Replication Exadata Cross-Region Exadata
Replication for DR
Security Security
Lists Lists
32 Copyright © 2024, Oracle and/or its affiliates. For authorized use only. Do not distribute. Diagram is representative and for discussion only.
Common Hybrid IAM Use-Cases
OCI Identity and Access Management
Provisioning
OCI
IAM
Provisioning
Bridge ICF
ICF
ICF
Enterprise Apps
SSO
OCI
IAM Supports
HTTP Headers
App Gateway
Enterprise Apps
SSO
OCI
IAM EBS Asserter
SSO
Provisioning
Provisioning
Supports Federated SSO!
Bridge OAM
OID
Supports Application Roles!
No longer necessary
After
Remain in place
Remain in place
High value proposition with Integrated experience via Zero-touch IAM integrations
more included features APEX and Visual Builder with Oracle apps for access,
Unified IDaaS for access Shared fabric via APIs with roles, and lifecycle mgmt.
management, governance, hooks across OCI, security Deep security and risk
and privileged access services and apps exposing visibility, insights for OCI
Robust set of risk indicators user, session, app, platform, and Oracle apps
and analytics and access pattern data Improved automation for
Far reach of control across Leverage automation for service operations
hybrid, heterogeneous IT easier integrations Auto-tuning security
Enhanced ML and analytics Enhanced risk analytics for policies based on risk
via OCI service integrations CIAM use-cases Shared security models
44 Copyright © 2024, Oracle and/or its affiliates. For authorized use only. Do not distribute.
Why choose Oracle for IDaaS?
User Enrollment
Signing Certificate
(Public Key)
Today, you can configure any Identity Provider (inc. OCI IAM) to federate to multiple OCI tenancies.
OCI IAM is planning for improved use of credentials across multiple OCI tenancies. This is part of a
broader effort to create a single Oracle identity for use across all Oracle services. Timing TBD.
Associate DNS domain names with an identity domain making it authoritative for that DNS
domain name suffix. Users who authenticate with matching credentials see available resources.
Authoritative identity domains with links to user identities in non-authoritative identity domains
which can exist in other tenancies. Organizations cloud leverage authoritative identity domains
making it easier to manage users across parent and child tenancies.