Oracle Identity Management
Oracle Identity Management
OIM is implemented as the backbone of the company’s single sign-on infrastructure, interfacing with Active Directory to achieve a finely …
We use Oracle Identity Management as a single sign-on for almost all applications. Internal systems are connected through Oracle Identity …
We used OIM for zero-day provisioning, same day de-provisioning, with various connectors like Active Directory, Exchange, Sametime, etc. …
Leaving a video review helps other professionals like you evaluate products. Be the first one in your network to record a review of Oracle Identity Management, and make your voice heard!
Entry-level set up fee?
- No setup fee
- Free Trial
- Free/Freemium Version
- Premium Consulting / Integration Services
Would you like us to let the vendor know that you want pricing?
1 person want pricing too
Oracle Identity Management is a suite of applications for IAM, now in edition 12c, which includes Oracle Identity Governance, Oracle Access Management, as well as Oracle's Directory Services.
A Brief Overview of Oracle Identity Management
A Short Demo of Oracle Identity Management
- Idaptive Next-Gen Access (formerly Centrify)
Companies can't remove reviews or game the system. Here's why
OIM is implemented as the backbone of the company’s single sign-on infrastructure, interfacing with Active Directory to achieve a finely defined authorization architecture. This has enabled us to consolidate the user roles across all the systems in the company. It has also been scaled up to handle a B2B environment and has enough redundancy to mitigate failures. The ease of implementation and Oracle’s security patching regime were the key factors in picking this product.
- Ability to configure multiple directories into a virtual directory so as to manage them as one Identity store.
- LDAP based synchronization with Microsoft Active Directory with minimum lag between the directories.
- Ease of implementation and maintenance.
- The web interface has gotten better over the years, but some functionality is still being handled via shell commands.
- SSL setup can be simplified into one place instead of having to navigate to multiple pages and update different key-stores or wallets.
- Migrating and or replicating between versions can be more intuitive with a side-by-side comparison of schema/attributes.
Oracle Identity Management is a great product, especially when working with multiple directories. It is best suited in a company that has multiple business divisions catering to different objectives. And not all companies would be able to utilize all of its features, especially if the users base is too small or the business model is restricted into one area.
We use Oracle Identity Management as a single sign-on for almost all applications. Internal systems are connected through Oracle Identity Management to provide a single sign-on experience to our internal customers, that includes, but is not limited to, our GRP system, HR, and Talent Management. It's also been extended to an external system for printing certificates for contractors in Dubai. That system is more critical than all other internal systems due to its use by business and external users.
- Simple installation
- Good user experience
- Stable performance
- Auto switch to DR (Very key and not yet been experienced or implemented well)
- Ability to connect with other legacy systems
- Mobile friendly
I've always preferred to have a single solution for identity access management for both internal and external. In our case, we started with this project to have an internal single sign-on that worked very well. However, the external services were further integrated with the city-wide single sign system. Oracle Identity Management was an easy integration with the city identity management
We used OIM for zero-day provisioning, same day de-provisioning, with various connectors like Active Directory, Exchange, Sametime, etc. We used OIA for analytics of access. OIA helped us perform role certification.
- OIM was working for us for several years, but we had a lot of custom code we had to write to use it effectively.
- OIA was able to help us perform role and access reviews periodically, in a scheduled fashion.
- The product had an OK user interface.
- The entitlements catalog was not robust enough for our needs. We ended up keeping an internal system to catalog our entitlements. This meant more integration code was necessary than we'd like.
- We evaluated the access request functionality, but again, it was not flexible enough and had a bunch of strange quirks (unnecessary button presses, etc).
- OIA was pretty slow and users would complain about it repeatedly. We tried working with Oracle to improve the performance, but didn't get anywhere after months of troubleshooting.
It's good if you have a small number of entitlements to catalogue/review, or systems to integrate with. It was not a good fit for our enterprise needs because it was missing connectors or required too much customization which we'd rather do ourselves using custom code.