Oracle Identity And Access Management Architect/administrator Resume
San Francisco, CA
SUMMARY
- Around 8 years of IT experience and nearly six years of experience in Identity Management specific to implementation and customization of Oracle Suite of Fusion Middleware Identity and Access Management products
- Experienced in implementation, development of customizations for Oracle Identity Manager (OIM) and Oracle Access Manager (OAM)
- Experience in configuring and deploying connectors for various directory services like Oracle Internet Directory (OID), Oracle Directory Server Enterprise Edition (ODSEE), Oracle Virtual Directory (OVD), and Microsoft Active Directory.s
- Experience in troubleshooting problems encountered in the integration and upgrading processes for Oracle Identity Management suite components.
- Experience with virtualization tools used for supporting and hosting Oracle Identity Manager Components, such as VMware Workstation, Oracle Virtual Box, VMware vSphere and Oracle VM Server.
- Worked on development of OIM customizations such as Schedule Jobs, Event Handlers, Plugins, and Approval Workflows according to business needs.
- Worked on development of OAM customizations related to login pages, error pages and page flow, authentication and authorization plugins, setting up OAM policies, installing components.
- Experience with building custom connectors from ground up based on requirements.
- Experience in working on databases such as Oracle and MS SQL Server, developing PL/SQL packages, Stored Procedures, Functions and Triggers.
- Experience in designing and implementing Oracle Internet Directory (OID), Oracle Virtual Directory (OVD) and Active Directory (AD)
- Extensive experience working in Linux - based OIM implementations.
- Elegant Communication, Documentation, Strong organizational and multitasking skills. Willing to relocate: Anywhere
TECHNICAL SKILLS
Programming Languages: Java, PHP, C, C#, .Net
Scripting Languages: UNIX shell scripting, JavaScript, Perl.
Security Management: Oracle Access Manager, Oracle Identity Manager, Oracle Identity Analytics/Sun role manager,, Oracle SOA Suite, BI publisher, Oracle Enterprise Single Sign-On (esso), Oracle web service manager (OWSM)
LDAP Directories: Sun One Directory server (iPlanet), Oracle Internet Directory (OID), Microsoft Active Directory, Oracle Virtual Directory (OVD)
Internet Technologies: JSP, Servlets, JNDI, JMS, JDBC, SOAP, WSDL, UDDI, RMI, J2EE, Struts, HTML, DHTML, CSS, XML, DOM, AJAX.
Databases: Oracle, MySQL
Web Servers: Apache-Tomcat, JBOSS, Web-Logic, Glassfish.
IDEs: Eclipse, NetBeans, JDeveloper
PROFESSIONAL EXPERIENCE
Confidential - San Francisco, CA
Oracle Identity and Access Management Architect/Administrator
Responsibilities:
- Implemented cross-domain SSO by providing an end-to- end federation solution using OIF 10g.
- Implemented Oracle Entitlement Server (OES) to create and manage profiles and permissions.
- Installed and Maintained Oracle Application Server IAS 10g application servers to host SSO solutions
- Performed Password management tasks and some party of identity tasks using OAM
- Performed Identity provisioning into OID and EBS using OIM 10.1.4.5
- Worked as a team to implement custom developed OIM API s for workflow solutions
- Developed Process definitions within OIM to match the clients workflow requirements
- Integrated Infra, SSO and Portal with Release 12 EBIZ Installed and configured OIM 11.1.1.5 and SOA Suite on Oracle RHEL 5 with Oracle Weblogic server 10.3.5
- Installed and configured connectors for MS Active Directory, MS Active Directory Password
- Synchronization, and Oracle E-Business suite, BMC Remedy and MS Exchange 2007 and MS
- Exchange 2010.
- Upgraded current OIM 9102 Implementation to OIM 11g and also migrated customizations to 11g.
- Designed and developed Custom Flat File connector and configured Trusted Reconciliation from ADP HR System.
- Designed and developed Custom connectors for UNIX systems and Oracle Internet Directory.
- Designed and Developed Custom Approval process in both OIM 9102 and OIM 11g. The Approval process supports multiple levels of Approval and other functionality that is not supported by OOTB.
- Designed and enabled various provisioning and de-provisioning of user accounts across various internal and external systems in OIM.
- Supported Operations and maintenance of OIM 9102 and OIM 11g and provided supported manuals and other documentation.
- Implemented identity mapping in SailPoint.
- Configured SailPoint connectors for a lot of users and also worked on custom workflows.
- Customized User registration and access forms and developed self-service password reset and password synchronization process.
- IIQ tasks were implemented using Java.
- Scheduled tasks, correlation and ID refresh were configured as per requirement in SailPoint.
- Designed and developed a custom resource and connector for other access related legacy resources.
- Implemented request workflow for all AD, OID with E-Business connector and other systems managed within the IDM system.
- Installed and configured OVD as a front end LDAP proxy server using Oracle Internet Directory (OID) • Developed a custom file connector to reconcile data received from the target source and load it into OIM as well as provisioning functions.
- Fine-tuned WebLogic configuration and OIM configuration for optimal performance.
- Part of the team involved in installation and configuration of Enterprise SOA Suite on Weblogic stack, and Portal Servers, Oracle Service Bus Domains and Clusters.
- Involved in the evaluation of various proof of concept functionalities such as User Provisioning, Reconciliation, and Orphan Accounts Cleanup, WorkFlow management for Approvals, Re-Certification and Audit Trials.
- Created complex SQL queries in Oracle including stored procedures and triggers.
- Developed and configured the Roles with access policies to provision the users into the LDAP Group in OID.
- Provided production support for IDM stack and SecureAuth.
- Documented standards, best practices and Operating procedures.
Environment: OIM 11gR2, WebLogic, SOA, JDEVELOPER, JXPLORER, XML, Putty, Oracle Internet Directory (11 g, Oracle Virtual Directory (OVD) 11g, Oracle Unified Directory (OUD) 11g, Windows 7, SOA
Confidential - New York, NY
Sr. Oracle Identity and Access Management Engineer
Responsibilities:
- Experience in the domain of Identity and Access Management with expertise in Oracle Access Management (OAM).
- Installing, Upgrading, Troubleshooting, of all the Identity Management components in customer environments
- Testing the IDM application from End to End after integration and provisioning is set up
- Installed mandatory patches and upgraded OIM 11gR2 PS1 to OIM 11gR2 PS3
- Upgraded the OIM and OAM with migrated customizations and implementation to 11gR2 PS3 from previous versions
- Performance Tuning of various WebLogic Servers, SOA, IDM, WebCenter and related resources (Memory parameters, JDBC Connection Pools)
- Implemented Provisioning and De-Provisioning of user accounts and entitlements across various target systems
- Understanding the requirements and generating business use-case documents.
- Involved in Implementation of on board process and off board Automation in OIM. .
- Creation and activation of sandboxes multiple times and involved in revert sandbox
- Involved in attribute and challenged question customizations
- Integration of Applications with Oracle Identity Manager.
- Involved in implementation Web application protection and SSO using OAM 11g
- Involved in URL protection using Oracle Access Manager.
- Defined IT resources to establish a connection between OAM and target applications..
- Installed and configured Oracle WebLogic 11g with Webserver and provided support for ongoing releases and migrations
- Involved in the Integration of Oracle Identity and Access manager.
Environment: OIM 11g R2 (11.1.2.3.0 ), OID 11g, OVD, OAM11gR2, WebLogic, WebCenter Portal, Oracle EBS, Linux, Java, SOA12c
Confidential - Chicago, IL
Oracle Identity and Access Management Engineer
Responsibilities:
- Installed and configured Oracle Access Manager 11g R1, Identity manager 11g R2 and BI publisher 11.1.1.6
- Configured Access management software on a web logic platform to enable Single-Sign On solution protecting multiple EBS Instances
- Configured EBS auth schemes; protected policy resources, public and excluded policy resources within the OAM console for authentication and authorization purposes
- Configured User identity stores within the OAM console
- Extensive cloning and patching of the fusion middleware products involved in single-sign on and identity solutions
- Registered web gates in the OAM server using the remote registration tool (RREG)
- Installed and configured multiple webgates to protect multiple EBS instances
- Deployed multiple Access gate s to provide context root for multiple EBS instances
- Installed and configured connectors for Active Directory and RACF.
- Designed and developed custom web service connectors for HR system integration.
- Designed and developed custom approval workflows to support 2 level approvals.
- Using deprecated method integration integrated OIA and OIM 9102.
- Upgraded OIA integration to preferred method as part of OIM 11g migration.
- Configured OIA for monthly user entitlement certifications.
- Customized OIA certification summary to fit the business requirement.
- Developed custom data sync utility to sync data from OIM.
- Helped in migration of all the OIM custom reports to BI publishers.
Environment: OIM 11g R2 (11.1.2.1), OID 11g, OAM11gR2, Oracle EBS, OBIEE, Linux, Java, SOA11g