Normal
0
false
false
false
EN-US
X-NONE
X-NONE
MicrosoftInternetExplorer4
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-qformat:yes;
mso-style-parent:"";
mso-padding-alt:0in 5.4pt 0in 5.4pt;
mso-para-margin-top:0in;
mso-para-margin-right:0in;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0in;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-fareast-font-family:"Times New Roman";
mso-fareast-theme-font:minor-fareast;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-bidi-font-family:"Times New Roman";
mso-bidi-theme-font:minor-bidi;}
Having a centralized
Identity & Access Management Solutions in any environment can reduce costs,
time and errors drastically. For many Organizations today implementing a robust
and reliable I&AM solution is a challenge. As more and more an organization
grows, new IT applications are used. This in turn leads to complex identity and
access management process which is time consuming and subject to errors. Most
of these challenges can be addressed by leveraging Oracle OIM11gR2.
Contributions
to this blog are made by ATS GSD-Security team. This weblog brings to you
various articles on Oracle I&AM 11g R2. The articles include OIM11gR2 new
features, Various ‘How To’ with examples, Solutions/ workarounds for frequently
occurring issues, APIs, code samples, Installations, patches etc…