Oracle Adaptive Access Manager
Encyclopedia
The Oracle Adaptive Access Manager (OAAM) is part of the Oracle
Oracle Corporation
Oracle Corporation is an American multinational computer technology corporation that specializes in developing and marketing hardware systems and enterprise software products – particularly database management systems...

 Identity Management
Oracle Identity Management
Oracle Identity Management is a software suite from Oracle providing identity and access management technologies.The name of the software suite is very similar to the name of one of its components, Oracle Identity Manager ....

 product suite that provides access control
Identity management
Identity management is a broad administrative area that deals with identifying individuals in a system and controlling access to the resources in that system by placing restrictions on the established identities of the individuals.Identity management is multidisciplinary and covers many...

 services to web and other online applications.

History

Oracle acquired the company "Bharosa" which means 'trust' in the Hindi
Hindi
Standard Hindi, or more precisely Modern Standard Hindi, also known as Manak Hindi , High Hindi, Nagari Hindi, and Literary Hindi, is a standardized and sanskritized register of the Hindustani language derived from the Khariboli dialect of Delhi...

 language to extend its web-based access management solutions. Bharosa was founded by Thomas Varghese, a research scientist
Scientist
A scientist in a broad sense is one engaging in a systematic activity to acquire knowledge. In a more restricted sense, a scientist is an individual who uses the scientific method. The person may be an expert in one or more areas of science. This article focuses on the more restricted use of the word...

 and a serial entrepreneur by background, in 2003. Don Bosco Durai and Jon Fisher
Jon Fisher
Jon Fisher is a Silicon Valley entrepreneur, author, and economic analyst. Fisher co-founded and was Chief Executive Officer of Bharosa, an Oracle Corporation company, which produced the Oracle Adaptive Access Manager. Fisher is known for making accurate predictions about the U.S. economy,...

 later came on board as co-founders.

Design philosophy

The premise was simple in that the existing authentication
Authentication
Authentication is the act of confirming the truth of an attribute of a datum or entity...

 technologies were unsatisfactory and easy to compromise. No authentication
Authentication
Authentication is the act of confirming the truth of an attribute of a datum or entity...

 technology can really provide its full and intended security
Security
Security is the degree of protection against danger, damage, loss, and crime. Security as a form of protection are structures and processes that provide or improve security as a condition. The Institute for Security and Open Methodologies in the OSSTMM 3 defines security as "a form of protection...

 benefits unless the computer
Computer
A computer is a programmable machine designed to sequentially and automatically carry out a sequence of arithmetic or logical operations. The particular sequence of operations can be changed readily, allowing the computer to solve more than one kind of problem...

 and computer network
Computer network
A computer network, often simply referred to as a network, is a collection of hardware components and computers interconnected by communication channels that allow sharing of resources and information....

are re-designed from the grounds up.

Oracle Adaptive Access Manager has two components, the strong Authentication-agnostic security component and the application-agnostic Risk component. One simple example of the Strong Authentication component is that a User can choose a personalized keypad and use mouse clicks to enter password to prevent passwords being stolen with key loggers and being phished or pharmed. The Risk Component analyzes the authentication and transaction data for abnormalities and anomalies in real-time to prevent fraud and also in off-line mode to identify and detect internet fraud.

External links

The source of this article is wikipedia, the free encyclopedia.  The text of this article is licensed under the GFDL.
 
x
OK