SlideShare a Scribd company logo
1 of 18
1

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
API Management: Enable
Your Infrastructure for
Secure Mobile and Cloud Use
Sid Mishra
Sr. Principal Product Manager
The following is intended to outline our general product direction.
It is intended for information purposes only, and may not be
incorporated into any contract.
It is not a commitment to deliver any material, code, or
functionality, and should not be relied upon in making purchasing
decisions. The development, release, and timing of any features
or functionality described for Oracle’s products remains at the
sole discretion of Oracle.

3

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Program Agenda
 API Security and Management Challenges
 Access Control for SOA & Cloud Services

4

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Market Trend: New Challenges of a Modern Enterprise

 Rebirth and Proliferation of APIs has introduced a new

dimension.
 Publishing Internet APIs reliably is more important

than ever.
 Socializing and monetizing internal information
 Mobile, Social and Cloud Access

5

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
API Security Challenges

Security Inside-Out

Control & Assurance

Cloud Security

Secure the Enterprise from
external threats at the perimeter.
Perimeter Security

Broad & Deep integration

Application Security

Protect from internal threats, reduce
security burden on applications.

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Security for hybrid infrastructure
on-premise as well as in the
Cloud.

Consistency & Manageability
Provide end-point security in
heterogeneous environments.

Middleware
Security

6

Flexibility & Agility
Oracle Web Services and API Security
First Line Of
Defense
OWSM
Agent

Shared Services
Layer

HTTP, SOAP,
REST, XML,
JMS

HTTP, SOAP,
REST, XML,
JMS

OES PDP
OWSM
Agent
WS-Security,
Basic Auth,
Digest,
X509, UNT,
SAML, Kerberos
Sign & Encrypt

OAG

Extranet
Counter External Threat

7

End Point
Security

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

DMZ

OWSM
Agent
Service Bus
WS-Security,
Basic Auth,
Digest,
X509, UNT,
SAML, Kerberos
Sign & Encrypt

Intranet
Counter Internal Threats

* - Planned Capabilities
Externalized Access Control
Corporate DMZ

OES PDP
Corporate Network
Oracle Access Manager

OAM Agent

Directory Services

OES PDP
Mobile and Social
Oracle Adaptive Access
Manager

OES PDP
Oracle API Gateway

Web Services Manager Service Bus

HTTP/REST/SOAP/OAuth
Clients
8

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

SOAP/REST and
Legacy Web Services
Identity Context Service
Enterprise / Work
Social / Life
Mobile / Presence

Web
Tier

Smartphone

WEB SSO

Application

Tablet

Identity
Federation

Portal

Laptop

1. Collect Claims

Device
Tier

Application
Tier

Risk / Adaptive
Authentication

SOA

Service
Tier
Web Services
EJBs
Databases
Directories

Server

Context

9

Service Bus

2. Publish, Propagate & Evaluate claims across Oracle Fusion Middleware stack

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Oracle API Gateway
What’s New

OAUTH 2.0
Client & Server

11gR2 Certification

10

Improved REST
support with native
JSON

Simplified Administration &
Unified Admin Console

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

API Key Management

Parameterized
Policies

Oracle Business
Transaction Monitor

Oracle Mobile & Social
Access Management
REST API Reference Architecture
1 API Portal

3 Repository
Protocols
HTTP,
SOAP,
REST,
XML
JMS
FTP

4 Service Bus

Developers

REST

API Clients

JWT
OAM, SM
Basic Auth,
X.509

11

External developer portal, sits
on top of API repository & API
gateway - provides:
•Self service registration,
onboarding
•“API marketplace”
•API documentation, forums,
blogs, support
•API Key delivery
•API testing tools
•Visualization of runtime
usage metrics / monitoring
•Billing

Security
WS-Security,
Basic Auth,
Digest,
X509, UNT,
SAML, Kerberos
Sign & Encrypt

2 API Gateway
Repository

API Gateway

API Portal

1

2

Exposes API’s to the external world,
provides:
•API Key generation/validation
•Access enforcement
•OAUTH Server
•Rate Limiting / Client Throttling
•Response caching
•API virtualization in the DMZ
•Security token & protocol mediation
•Firewalling, method/parameter whitelisting
•API aggregation & mash-up
•API usage measurement & reporting

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

SOAP/REST
and Legacy
Web Services

3

Provides:
• API catalog
• API dependency analysis
• API lifecycle management

4

Service Bus
Directly accessed by internal
clients, provides:
• Routing, mediation,
versioning - abstracts
backend services from
internal clients
• Heavy duty payload
transformations
• Protocol translation for
legacy apps
To Summarize:
The enterprise web consists of APIs - driven by cloud and mobility

The security problems remain the same
• It’s still about DMZ Security, Access Control, Insider Threat
• Names have changed
Service Protection has a history of proprietary challenges

• Service abstraction and a standards based layer enables better security.
Entitlements based access control helps you respond to changes much quicker.
When you build APIs
• Build secure and managed APIs

12

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Join the Oracle IDM Community
Twitter
twitter.com/OracleIDM
Facebook
facebook.com/OracleIDM
Blog
blogs.oracle.com/OracleIDM

oracle.com/identity

13

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Questions?

14

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
Don’t Miss These IDM Sessions

GM

Thursday, 09/26 2:00PM Marriot Marquis –
Golden Gate C3

Developing Secure Mobile Applications

Mark Wilcox, Oracle

Thursday, 09/26,
3:30PM

Zero Capital Investment by leveraging
Identity Management as a Service

Mike Neuenschwander,
Oracle

Wednesday 09/25,
11:45AM

Moscone West,
Room 2018

CON8823

Wednesday 09/25,
5:00PM

Moscone West,
Room 2018

CON8836

Thursday 09/26,
11:00AM

Moscone West,
Room 2018

CON 4342

Thursday 09/26,
12:30PM

Moscone West,
Room 2018

CON8902
CON8826

15

Roger Wigenstam, Oracle

Leverage Authorization to Monetize
Content and Media Subscriptions
Access Management for the Internet of
Things
Leveraging the Cloud to simplify your
Identity Management implementation
Identity Services in the New GM IT

CON8837

Moscone West,
Room 2018

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Kanishk Mahajan, Oracle
Guru Shashikumar, Oracle
Oracle Fusion Middleware
Business Innovation Platform for the Enterprise and Cloud
 Complete and Integrated
Web

Social

Mobile

 Best-in-class

User Engagement
Business
Process
Management

 Open standards
Content
Management

Service Integration

Business
Intelligence

Data Integration

Identity Management
Development
Tools

16

Cloud Application
Foundation

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Enterprise
Management

 On-premise and Cloud
 Foundation for Oracle Fusion
Applications and Oracle Cloud
17

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
18

Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

More Related Content

What's hot

Deconstructing API Security
Deconstructing API SecurityDeconstructing API Security
Deconstructing API SecurityAkana
 
Deep-Dive: API Security in the Digital Age
Deep-Dive: API Security in the Digital AgeDeep-Dive: API Security in the Digital Age
Deep-Dive: API Security in the Digital AgeApigee | Google Cloud
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...CA Technologies
 
Modernizing an Existing SOA-based Architecture with APIs
Modernizing an Existing SOA-based Architecture with APIsModernizing an Existing SOA-based Architecture with APIs
Modernizing an Existing SOA-based Architecture with APIsApigee | Google Cloud
 
Gateway/APIC security
Gateway/APIC securityGateway/APIC security
Gateway/APIC securityShiu-Fun Poon
 
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...MuleSoft
 
How APIs Can Be Secured in Mobile Environments
How APIs Can Be Secured in Mobile EnvironmentsHow APIs Can Be Secured in Mobile Environments
How APIs Can Be Secured in Mobile EnvironmentsWSO2
 
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CIS 2015 Easy Federation in Cloud and on Premises - Ian JaffeCIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CIS 2015 Easy Federation in Cloud and on Premises - Ian JaffeCloudIDSummit
 
Api management introduction and product overview v1.0 2014.08.28
Api management introduction and product overview v1.0 2014.08.28Api management introduction and product overview v1.0 2014.08.28
Api management introduction and product overview v1.0 2014.08.28floridawusergroup
 
APIConnect Security Best Practice
APIConnect Security Best PracticeAPIConnect Security Best Practice
APIConnect Security Best PracticeShiu-Fun Poon
 
Criticality of identity
Criticality of identityCriticality of identity
Criticality of identityNordic APIs
 
Melbourne API Management Seminar
Melbourne API Management SeminarMelbourne API Management Seminar
Melbourne API Management SeminarCA API Management
 
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointCA API Management
 
CloudStack Identity and Access Management (IAM)
CloudStack Identity and Access Management (IAM)CloudStack Identity and Access Management (IAM)
CloudStack Identity and Access Management (IAM)Min Chen
 
API Design Essentials - Akana Platform Overview
API Design Essentials - Akana Platform OverviewAPI Design Essentials - Akana Platform Overview
API Design Essentials - Akana Platform OverviewAkana
 
What’s behind a high quality web API? Ensure your APIs are more than just a ...
What’s behind a high quality web API? Ensure your APIs are more than just a ...What’s behind a high quality web API? Ensure your APIs are more than just a ...
What’s behind a high quality web API? Ensure your APIs are more than just a ...Kim Clark
 
OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater Apigee | Google Cloud
 

What's hot (20)

Deconstructing API Security
Deconstructing API SecurityDeconstructing API Security
Deconstructing API Security
 
Deep-Dive: API Security in the Digital Age
Deep-Dive: API Security in the Digital AgeDeep-Dive: API Security in the Digital Age
Deep-Dive: API Security in the Digital Age
 
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
Leveraging New Features in CA Single-Sign on to Enable Web Services, Social S...
 
Modernizing an Existing SOA-based Architecture with APIs
Modernizing an Existing SOA-based Architecture with APIsModernizing an Existing SOA-based Architecture with APIs
Modernizing an Existing SOA-based Architecture with APIs
 
Gateway/APIC security
Gateway/APIC securityGateway/APIC security
Gateway/APIC security
 
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
How Cisco is Leveraging MuleSoft to Drive Continuous Innovation​ at Enterpris...
 
How APIs Can Be Secured in Mobile Environments
How APIs Can Be Secured in Mobile EnvironmentsHow APIs Can Be Secured in Mobile Environments
How APIs Can Be Secured in Mobile Environments
 
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CIS 2015 Easy Federation in Cloud and on Premises - Ian JaffeCIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
CIS 2015 Easy Federation in Cloud and on Premises - Ian Jaffe
 
API strategy with IBM API connect
API strategy with IBM API connectAPI strategy with IBM API connect
API strategy with IBM API connect
 
Api management introduction and product overview v1.0 2014.08.28
Api management introduction and product overview v1.0 2014.08.28Api management introduction and product overview v1.0 2014.08.28
Api management introduction and product overview v1.0 2014.08.28
 
APIConnect Security Best Practice
APIConnect Security Best PracticeAPIConnect Security Best Practice
APIConnect Security Best Practice
 
Criticality of identity
Criticality of identityCriticality of identity
Criticality of identity
 
Melbourne API Management Seminar
Melbourne API Management SeminarMelbourne API Management Seminar
Melbourne API Management Seminar
 
IBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use CasesIBM DataPower Gateway - Common Use Cases
IBM DataPower Gateway - Common Use Cases
 
Enable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePointEnable Secure Mobile & Web Access to Microsoft SharePoint
Enable Secure Mobile & Web Access to Microsoft SharePoint
 
CloudStack Identity and Access Management (IAM)
CloudStack Identity and Access Management (IAM)CloudStack Identity and Access Management (IAM)
CloudStack Identity and Access Management (IAM)
 
API Design Essentials - Akana Platform Overview
API Design Essentials - Akana Platform OverviewAPI Design Essentials - Akana Platform Overview
API Design Essentials - Akana Platform Overview
 
API Security Lifecycle
API Security LifecycleAPI Security Lifecycle
API Security Lifecycle
 
What’s behind a high quality web API? Ensure your APIs are more than just a ...
What’s behind a high quality web API? Ensure your APIs are more than just a ...What’s behind a high quality web API? Ensure your APIs are more than just a ...
What’s behind a high quality web API? Ensure your APIs are more than just a ...
 
OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater OAuth - Don’t Throw the Baby Out with the Bathwater
OAuth - Don’t Throw the Baby Out with the Bathwater
 

Viewers also liked

Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1OracleIDM
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessForgeRock
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationDelivery Centric
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracleIDM
 
ING webcast platform
ING webcast platformING webcast platform
ING webcast platformOracleIDM
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalOracleIDM
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerOracleIDM
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Developing Web Services With Oracle Web Logic Server
Developing Web Services With Oracle Web Logic ServerDeveloping Web Services With Oracle Web Logic Server
Developing Web Services With Oracle Web Logic ServerGaurav Sharma
 
The Rest Architectural Style
The Rest Architectural StyleThe Rest Architectural Style
The Rest Architectural StyleRobert Wilson
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introductionwardell henley
 
API Management Reference Architecture
API Management Reference ArchitectureAPI Management Reference Architecture
API Management Reference ArchitectureSeong-Bok Lee
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overviewEslam Hafez
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access ManagementDLT Solutions
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access ManagementNeo4j
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...oow123
 
GraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access ManagementGraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access ManagementNeo4j
 

Viewers also liked (20)

Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1Platform approach-series-building a-roadmap-finalv1
Platform approach-series-building a-roadmap-finalv1
 
Developing an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your BusinessDeveloping an IAM Roadmap that Fits Your Business
Developing an IAM Roadmap that Fits Your Business
 
Overview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer PresentationOverview of Oracle Identity Management - Customer Presentation
Overview of Oracle Identity Management - Customer Presentation
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
 
ING webcast platform
ING webcast platformING webcast platform
ING webcast platform
 
Platform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-finalPlatform approach-series-the oracleplatform-final
Platform approach-series-the oracleplatform-final
 
SANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity ManagerSANS Institute Product Review of Oracle Identity Manager
SANS Institute Product Review of Oracle Identity Manager
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Developing Web Services With Oracle Web Logic Server
Developing Web Services With Oracle Web Logic ServerDeveloping Web Services With Oracle Web Logic Server
Developing Web Services With Oracle Web Logic Server
 
WS-Trust
WS-TrustWS-Trust
WS-Trust
 
The Rest Architectural Style
The Rest Architectural StyleThe Rest Architectural Style
The Rest Architectural Style
 
Oracle API Gateway Installation
Oracle API Gateway InstallationOracle API Gateway Installation
Oracle API Gateway Installation
 
Iam suite introduction
Iam suite introductionIam suite introduction
Iam suite introduction
 
API Management Reference Architecture
API Management Reference ArchitectureAPI Management Reference Architecture
API Management Reference Architecture
 
Oracle IDAM overview
Oracle IDAM overviewOracle IDAM overview
Oracle IDAM overview
 
Oracle API Gateway
Oracle API GatewayOracle API Gateway
Oracle API Gateway
 
Oracle Identity & Access Management
Oracle Identity & Access ManagementOracle Identity & Access Management
Oracle Identity & Access Management
 
Identity and Access Management
Identity and Access ManagementIdentity and Access Management
Identity and Access Management
 
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
CON8040 Identity as a Service - Extend Enterprise Controls and Identity to th...
 
GraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access ManagementGraphTalks Rome - Identity and Access Management
GraphTalks Rome - Identity and Access Management
 

Similar to API Management for Secure Mobile and Cloud Use

OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)GregOracle
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalOracleIDM
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-finalOracleIDM
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...OracleIDM
 
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...GregOracle
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalOracleIDM
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - finalOracleIDM
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everythingDr. Wilfred Lin (Ph.D.)
 
Con8439 fusion apps customs to ebs
Con8439 fusion apps customs to ebsCon8439 fusion apps customs to ebs
Con8439 fusion apps customs to ebsBerry Clemens
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...OracleIDM
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...CA API Management
 
Wise Men Oracle Mobility Webinar- 11-December-2014
Wise Men Oracle Mobility Webinar- 11-December-2014Wise Men Oracle Mobility Webinar- 11-December-2014
Wise Men Oracle Mobility Webinar- 11-December-2014Wise Men
 
Prakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudIndus Khaitan
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - VasuVasu Surabhi
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation Delivery Centric
 
API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...
API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...
API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...CA API Management
 
Exploring Oracle Enterprise Mobility using Oracle Mobile Solutions
Exploring Oracle Enterprise Mobility using Oracle Mobile SolutionsExploring Oracle Enterprise Mobility using Oracle Mobile Solutions
Exploring Oracle Enterprise Mobility using Oracle Mobile SolutionsWise Men
 

Similar to API Management for Secure Mobile and Cloud Use (20)

OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)OOW13: Developing secure mobile applications (CON8902)
OOW13: Developing secure mobile applications (CON8902)
 
Con8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-finalCon8902 developing secure mobile applications-final
Con8902 developing secure mobile applications-final
 
Con8823 access management for the internet of things-final
Con8823   access management for the internet of things-finalCon8823   access management for the internet of things-final
Con8823 access management for the internet of things-final
 
Con8836 leveraging the cloud to simplify your identity management implement...
Con8836   leveraging the cloud to simplify your identity management implement...Con8836   leveraging the cloud to simplify your identity management implement...
Con8836 leveraging the cloud to simplify your identity management implement...
 
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
OOW13:Leveraging the Cloud to Simplify Your Identity Management Implementatio...
 
Con8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade finalCon8828 justifying and planning a successful identity management upgrade final
Con8828 justifying and planning a successful identity management upgrade final
 
Con8896 securely enabling mobile access for business transformation - final
Con8896  securely enabling mobile access for business transformation - finalCon8896  securely enabling mobile access for business transformation - final
Con8896 securely enabling mobile access for business transformation - final
 
B4 the identity of things-securing the internet of everything
B4   the identity of things-securing the internet of everythingB4   the identity of things-securing the internet of everything
B4 the identity of things-securing the internet of everything
 
Con8439 fusion apps customs to ebs
Con8439 fusion apps customs to ebsCon8439 fusion apps customs to ebs
Con8439 fusion apps customs to ebs
 
Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...Con8811 converged identity governance for speeding up business and reducing c...
Con8811 converged identity governance for speeding up business and reducing c...
 
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
5 Reasons Why APIs Must be Part of Your Mobile Strategy - Scott Morrison, Dis...
 
Oracle mobile cloud service
Oracle mobile cloud serviceOracle mobile cloud service
Oracle mobile cloud service
 
Oracle 360
Oracle 360Oracle 360
Oracle 360
 
Wise Men Oracle Mobility Webinar- 11-December-2014
Wise Men Oracle Mobility Webinar- 11-December-2014Wise Men Oracle Mobility Webinar- 11-December-2014
Wise Men Oracle Mobility Webinar- 11-December-2014
 
Prakhar Sood-Resume-CV
Prakhar Sood-Resume-CVPrakhar Sood-Resume-CV
Prakhar Sood-Resume-CV
 
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the CloudOracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
Oracle OpenWorld 2015 | CON9456 Mobile Security in the Cloud
 
CA Security - Deloitte IAM Summit - Vasu
CA Security - Deloitte IAM Summit  - VasuCA Security - Deloitte IAM Summit  - Vasu
CA Security - Deloitte IAM Summit - Vasu
 
Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation   Oracle Access Management - Customer presentation
Oracle Access Management - Customer presentation
 
API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...
API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...
API Roles In Cloud and Mobile Security - Greg Olsen, IT Manager, Integration ...
 
Exploring Oracle Enterprise Mobility using Oracle Mobile Solutions
Exploring Oracle Enterprise Mobility using Oracle Mobile SolutionsExploring Oracle Enterprise Mobility using Oracle Mobile Solutions
Exploring Oracle Enterprise Mobility using Oracle Mobile Solutions
 

More from OracleIDM

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager OracleIDM
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalOracleIDM
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...OracleIDM
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - finalOracleIDM
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users finalOracleIDM
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - finalOracleIDM
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalOracleIDM
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - finalOracleIDM
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2OracleIDM
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pubOracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10OracleIDM
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformationOracleIDM
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidatedOracleIDM
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1OracleIDM
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12OracleIDM
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…OracleIDM
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyOracleIDM
 
How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2OracleIDM
 

More from OracleIDM (20)

Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager Con9573 managing the oim platform with oracle enterprise manager
Con9573 managing the oim platform with oracle enterprise manager
 
Con9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - finalCon9024 next generation optimized directory - oracle unified directory - final
Con9024 next generation optimized directory - oracle unified directory - final
 
Con8837 leverage authorization to monetize content and media subscriptions ...
Con8837   leverage authorization to monetize content and media subscriptions ...Con8837   leverage authorization to monetize content and media subscriptions ...
Con8837 leverage authorization to monetize content and media subscriptions ...
 
Con8834 bring your own identity - final
Con8834   bring your own identity - finalCon8834   bring your own identity - final
Con8834 bring your own identity - final
 
Con8833 access at scale for hundreds of millions of users final
Con8833 access at scale for hundreds of millions of users   finalCon8833 access at scale for hundreds of millions of users   final
Con8833 access at scale for hundreds of millions of users final
 
Con8819 context and risk aware access control any device any where - final
Con8819   context and risk aware access control any device any where - finalCon8819   context and risk aware access control any device any where - final
Con8819 context and risk aware access control any device any where - final
 
Con8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - finalCon8813 securing privileged accounts with an integrated idm solution - final
Con8813 securing privileged accounts with an integrated idm solution - final
 
Con 8810 who should have access to what - final
Con 8810 who should have access to what - finalCon 8810 who should have access to what - final
Con 8810 who should have access to what - final
 
Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2Opening remarks-dave-profozichv2
Opening remarks-dave-profozichv2
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Innovations dbsec-12c-pub
Innovations dbsec-12c-pubInnovations dbsec-12c-pub
Innovations dbsec-12c-pub
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Identityofthings amitjasuj av10
Identityofthings amitjasuj av10Identityofthings amitjasuj av10
Identityofthings amitjasuj av10
 
Sun2 oracle avea's identity management platform transformation
Sun2 oracle   avea's identity management platform transformationSun2 oracle   avea's identity management platform transformation
Sun2 oracle avea's identity management platform transformation
 
Healthcare it consolidated
Healthcare it consolidatedHealthcare it consolidated
Healthcare it consolidated
 
Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1Trends gartner iam-amit12-4-12-v1
Trends gartner iam-amit12-4-12-v1
 
Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12Trends gartner iam-amit12-4-12
Trends gartner iam-amit12-4-12
 
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
ISACA Webcast Featuring SuperValu - Tackling Security and Compliance Barri…
 
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) PolicyDevelop and Enforce a Bring-Your-Own-Device (BYOD) Policy
Develop and Enforce a Bring-Your-Own-Device (BYOD) Policy
 
How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2How oracle-uses-idm-chirag-v2
How oracle-uses-idm-chirag-v2
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Recently uploaded (20)

E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

API Management for Secure Mobile and Cloud Use

  • 1. 1 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 2. API Management: Enable Your Infrastructure for Secure Mobile and Cloud Use Sid Mishra Sr. Principal Product Manager
  • 3. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 3 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 4. Program Agenda  API Security and Management Challenges  Access Control for SOA & Cloud Services 4 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 5. Market Trend: New Challenges of a Modern Enterprise  Rebirth and Proliferation of APIs has introduced a new dimension.  Publishing Internet APIs reliably is more important than ever.  Socializing and monetizing internal information  Mobile, Social and Cloud Access 5 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 6. API Security Challenges Security Inside-Out Control & Assurance Cloud Security Secure the Enterprise from external threats at the perimeter. Perimeter Security Broad & Deep integration Application Security Protect from internal threats, reduce security burden on applications. Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Security for hybrid infrastructure on-premise as well as in the Cloud. Consistency & Manageability Provide end-point security in heterogeneous environments. Middleware Security 6 Flexibility & Agility
  • 7. Oracle Web Services and API Security First Line Of Defense OWSM Agent Shared Services Layer HTTP, SOAP, REST, XML, JMS HTTP, SOAP, REST, XML, JMS OES PDP OWSM Agent WS-Security, Basic Auth, Digest, X509, UNT, SAML, Kerberos Sign & Encrypt OAG Extranet Counter External Threat 7 End Point Security Copyright © 2012, Oracle and/or its affiliates. All rights reserved. DMZ OWSM Agent Service Bus WS-Security, Basic Auth, Digest, X509, UNT, SAML, Kerberos Sign & Encrypt Intranet Counter Internal Threats * - Planned Capabilities
  • 8. Externalized Access Control Corporate DMZ OES PDP Corporate Network Oracle Access Manager OAM Agent Directory Services OES PDP Mobile and Social Oracle Adaptive Access Manager OES PDP Oracle API Gateway Web Services Manager Service Bus HTTP/REST/SOAP/OAuth Clients 8 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. SOAP/REST and Legacy Web Services
  • 9. Identity Context Service Enterprise / Work Social / Life Mobile / Presence Web Tier Smartphone WEB SSO Application Tablet Identity Federation Portal Laptop 1. Collect Claims Device Tier Application Tier Risk / Adaptive Authentication SOA Service Tier Web Services EJBs Databases Directories Server Context 9 Service Bus 2. Publish, Propagate & Evaluate claims across Oracle Fusion Middleware stack Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 10. Oracle API Gateway What’s New OAUTH 2.0 Client & Server 11gR2 Certification 10 Improved REST support with native JSON Simplified Administration & Unified Admin Console Copyright © 2012, Oracle and/or its affiliates. All rights reserved. API Key Management Parameterized Policies Oracle Business Transaction Monitor Oracle Mobile & Social Access Management
  • 11. REST API Reference Architecture 1 API Portal 3 Repository Protocols HTTP, SOAP, REST, XML JMS FTP 4 Service Bus Developers REST API Clients JWT OAM, SM Basic Auth, X.509 11 External developer portal, sits on top of API repository & API gateway - provides: •Self service registration, onboarding •“API marketplace” •API documentation, forums, blogs, support •API Key delivery •API testing tools •Visualization of runtime usage metrics / monitoring •Billing Security WS-Security, Basic Auth, Digest, X509, UNT, SAML, Kerberos Sign & Encrypt 2 API Gateway Repository API Gateway API Portal 1 2 Exposes API’s to the external world, provides: •API Key generation/validation •Access enforcement •OAUTH Server •Rate Limiting / Client Throttling •Response caching •API virtualization in the DMZ •Security token & protocol mediation •Firewalling, method/parameter whitelisting •API aggregation & mash-up •API usage measurement & reporting Copyright © 2012, Oracle and/or its affiliates. All rights reserved. SOAP/REST and Legacy Web Services 3 Provides: • API catalog • API dependency analysis • API lifecycle management 4 Service Bus Directly accessed by internal clients, provides: • Routing, mediation, versioning - abstracts backend services from internal clients • Heavy duty payload transformations • Protocol translation for legacy apps
  • 12. To Summarize: The enterprise web consists of APIs - driven by cloud and mobility The security problems remain the same • It’s still about DMZ Security, Access Control, Insider Threat • Names have changed Service Protection has a history of proprietary challenges • Service abstraction and a standards based layer enables better security. Entitlements based access control helps you respond to changes much quicker. When you build APIs • Build secure and managed APIs 12 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 13. Join the Oracle IDM Community Twitter twitter.com/OracleIDM Facebook facebook.com/OracleIDM Blog blogs.oracle.com/OracleIDM oracle.com/identity 13 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 14. Questions? 14 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 15. Don’t Miss These IDM Sessions GM Thursday, 09/26 2:00PM Marriot Marquis – Golden Gate C3 Developing Secure Mobile Applications Mark Wilcox, Oracle Thursday, 09/26, 3:30PM Zero Capital Investment by leveraging Identity Management as a Service Mike Neuenschwander, Oracle Wednesday 09/25, 11:45AM Moscone West, Room 2018 CON8823 Wednesday 09/25, 5:00PM Moscone West, Room 2018 CON8836 Thursday 09/26, 11:00AM Moscone West, Room 2018 CON 4342 Thursday 09/26, 12:30PM Moscone West, Room 2018 CON8902 CON8826 15 Roger Wigenstam, Oracle Leverage Authorization to Monetize Content and Media Subscriptions Access Management for the Internet of Things Leveraging the Cloud to simplify your Identity Management implementation Identity Services in the New GM IT CON8837 Moscone West, Room 2018 Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Kanishk Mahajan, Oracle Guru Shashikumar, Oracle
  • 16. Oracle Fusion Middleware Business Innovation Platform for the Enterprise and Cloud  Complete and Integrated Web Social Mobile  Best-in-class User Engagement Business Process Management  Open standards Content Management Service Integration Business Intelligence Data Integration Identity Management Development Tools 16 Cloud Application Foundation Copyright © 2012, Oracle and/or its affiliates. All rights reserved. Enterprise Management  On-premise and Cloud  Foundation for Oracle Fusion Applications and Oracle Cloud
  • 17. 17 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.
  • 18. 18 Copyright © 2012, Oracle and/or its affiliates. All rights reserved.

Editor's Notes

  1. So far we have discussed the authentication and device registration related aspects of our Oracle Mobile Access Management solution. Organizations build Mobile Applications to enable anywhere, anytime access for business transactions and information stored in databases, content management systems, and even mainframes somewhere in the corporate network. This information and the types of transactions that users should be able to perform from mobile devices have often only up to this point been available to internal users and applications through client devices issued by the organization – as such these systems often have little, if any, security and compliance controls built in and instead relied on an implied level of trust. Now that we need to expose the corpoate systems to devices running outside the corporate network, used by internal and external users, from unknown locations, and over potentially unsecure networks it is critical we do so in a secure way and ensure that we can control what kind of business transactions can be performed and what information leaves our corporate network under what circumstances.Mobile applications typically access corporate information through lightweight REST based API’s as the devices lack support for the more full fledged application, web services, and SOA based infrastructures based on SOAP, JMS, MQ, or even FTP based technologies that existing corporate systems often are be based on.Oracle’s complete Access Management solution has been designed to help address all these challenges. With the Oracle Enterprise Gateway we can take existing internal systems and corporate data built on the technologies we discussed and expose these as fully secure REST based API’s (using JSON based payloads) without the need for any coding (by virtualizing the existing backend SOAP, JMS etc services as REST API’s). We can transform not only the transportation protocols used but also the security tokens required for authentication, identity propagation, and user claims (attribute assertions). For example : in our REST API’s we only want to accept JWT tokens issued by Oracle’s Mobile Access Management solution but once authenticated we can convert these to SAML, Kerberos, or other tokens that are required by the backend systems. With OEG we get a large number of additional capabilities for our REST API’s – we can monitor and audit all the API access, business transactions, and the data requested. We ensure that the requests from mobile clients (or business partners, cloud applications etc) are properly formed, are free from any malicious content and threats such as SQL injection attacks, denial of service attacks (even based on message payload content), viruses, and a large number of other xml, crypto, and other types of attacks. We can also define throttling policies to ensure that certain types of clients – perhaps based on their subscription (gold, silver, bronze) – can only perform a given number of transactions per day (or other time interval), charge per usage, and ensure that a rogue client doesn’t overload the system with a large number of requests. Perhaps most importantly we have integrated the gateway with all our other Access Management technologies – Oracle’s Mobile & Social solution for authentication,and validation of user tokens , fraud detection, and Identity Context propagation, Oracle Entitlements Server for authorization and audit of REST API access and selective data redaction of the response payload, Oracle STS for centralized security token management, and also our LDAP directories for user lookup and enrichment of the message payload (adding additional user information from LDAP to the payload).NOTE to the presenter, some FAQ’s :- Is Oracle Access Manager, Entitlements Server, Mobile/Social, STS, Directory required or does OEG work with 3rd party IDM infrastructure?Oracle’s Mobile Access Management solution is pre-integrated and tested to provide a complete, end to end, highly performant and scalable solution for all your Mobile needs. None of the various components are necessarily required but are engineered to work together out of the box. OEG also provides heterogeneous support and integrations with a large number of 3rd party systems such as Siteminder, various LDAP servers, SOA and web services infrastructures etc. but none of these other technologies provide an end to end solution for all your needs. - Is OEG required to use Oracle’s Mobile / Social Access solution? Oracle’s Mobile Access Management solution is pre-integrated and tested to provide a complete, end to end, highly performant and scalable solution for all your Mobile needs. None of the various components are necessarily required but are engineered to work together out of the box. There are other gateway vendors but none of them provide the complete set of OOTB integrations with Oracle’s Access Management solutions, and when they do provide integrations these are often not as good as what we offer and cannot show support for the same set of usecases. As an example there are 3rd party gateway vendors that offer integrations with Oracle Entitlements Server but this is based on network / XACML based requests as opposed to OEG / OES where we embed the OES PDP (Policy Decision Point – the authorization engine) in the gateway itself for superfast (microsecond) response times. No other gateway vendors provide an OOTB integration with Oracle Mobile / Social, and even integrations with something like Oracle Access Manager may require a fair amount of custom work.What is the difference between OEG and Vordel’s product?Both products offer the same set of capabilities. OEG releases are generally in sync with Vordel’s but undergo rebranding and additional testing before made available. Certain roadmap items are planned to be Oracle only IP. Do we offer a hardware based appliance / form factor of OEG?OEG is tested and certified on the same set of hardware as Exalogic, and we can offer low cost hardware (4170M3) if of interest. Hardware appliances were fairly popular even two-three years ago but these days most major organizations have a virtualization strategy (you can’t virtualize an applicance). OEG and virtualization technologies can run and take advantage of the latest advances in processor technologies whereas appliances such as Datapower are based on proprietary custom ASIC chips only produced in low volumes and cannot keep up. Appliances also come with some other limitations :- Cannot be deployed in the cloud whereas OEG can be deployed– for example in Amazon EC2 - when you buy an appliance (such as IBM Datapower) it has a 3-5 year expiry date on it, and you are then forced to buy a new appliance at the same price. - Do you really want to buy and deploy expensive appliances for your dev/test/qa environments?What virtualization technologies does OEG work with?OEG works with Oracle VM, Virtual Box, VMWare (standard corporate disclaimer), EC2, and othersDoesn’t my IPS (intrusion prevention system) provide sufficent support for denial of service attacks and threats?OEG provides protection by inspecting individual elements of the message packets and request/response payload wheras an IPS generally doesn’t have any understanding of the message formats and content other than looking for certain types of general signatures (assuming it even has access to the payload) or help protect against DDOS attacks etc. OEG for example can help protect against content retrieval attacks where it monitors typical access (perhaps someone normally looks at 10 documents per day of a given type) but suddenly we see 100’s or even 1000’s of documents being requested.
  2. With Fusion Middleware, you can extend and maximize your existing technology investment with the same technologies used in Fusion Applications, including embedded analytics and social collaboration, and mobile and cloud computing. Oracle’s complete SOA platform lets your IT organization rapidly design, assemble, deploy, and manage adaptable business applications and—with Oracle’s business process management tools—even bring the task of modeling business processes directly to the business analysts. Oracle Business Intelligence foundation brings together all your enterprise data sources in a single, easy-to-use solution, delivering consistent insights whether it’s through ad hoc queries and analysis, interactive dashboards, scorecards, OLAP, or reporting. And, your existing enterprise applications can leverage the rich social networking capabilities and content sharing that users have come to expect in consumer software. Oracle Fusion Middleware is based on 100 percent open standards, so you aren’t locked into one deployment model when your business requirements change.