Oracle Identity/ Access Management Resume
Boston, MA
SUMMARY
- Over 8+ years of experience in OIAM, SOA/OIM, WebLogic Application Server Administration, Provisioning & Reconciliation, Access Management, Database Design, Identity Workflows, Web Services, SSO, RBAC, LDAP Directories, Java Programming and full life cycle of projects with specialization in Banking industry.
- Experience in developing custom connectors, tasks, provisioning, approval processes and other custom components to meet product requirements
- Performed administrative tasks like Installation, Configuration, Patching, Migration and Performance tuning for OIM, OAM, OUD.
- Hands on experience on OOTB connectors like Active Directory (AD), LDAP and Database Application Tables (DBAT) connectors to facilitate User Provisioning and Reconciliation between target and OIM systems with Work Flow management for Approvals, Re - Certification and Audit Trials
- Architecture, design, development, testing, integration and implementation expertise in Identity and Access Management, J2EE-based web applications
- Supporting traditional authentication and risk based authentication while managing users in LDAP and Active Directory (AD)
- Implementation experience with afeezOracle Identity and Access Management till the most recent versions
- Strong Knowledge of MS SQL Server, DB2, MS SQL and Oracle
- Developed Web-Services module for integration using REST. NoSQL database experience on HBase
- Have knowledge on WebLogic application server, WebSphere, OHS, JBoss and apache servers
- Flexible with Unix/Linux and Windows Environments working with Operating Systems like Ubuntu, Cosmos
- Strong programming skills in designing and implementation of applications using Core Java, J2EE, JDBC, JSP, HTML, Spring Framework, Struts, JavaScript
- Assisted in designing and development of provisioning and de-provisioning processes for all systems.
- Implemented procedures for development and deployment of password management processes.
- Provided technical assistance for configuration and development of adapters and connectors with various systems.
- Suggested techniques for account provisioning, de-provisioning and updating of user accounts
- Implemented procedures for development and configuration of adaptors and connectors with multiple systems.
- Coordinated with technical teams for preparation of custom interfaces utilizing ADF and API technologies.
- Executed processes for development of OIM adaptors, rules, plug-ins and adaptors.
TECHNICAL SKILLS
Identity and Access Management: Oracle Identity Manager (OIM) 11g R2, PS2/PS3, Oracle Access
Design/Build/IDE Tools: Eclipse, JDeveloper, NetBeans, Apache Ant, Maven
Database Technologies: Oracle, JDBC, SQL, SQL-PLUS, PL-SQL, MS Access, MySQL, SQL Server
Virtualization: VMware Workstation, Oracle Virtual box, VMware vSphere, Oracle VM Server, VMware Horizon Client.
Testing Tools: HP QC, HP ALM (v 11.0, 12.0), JIRA
PROFESSIONAL EXPERIENCE
Confidential, Boston, MA
Oracle Identity/ Access Management
Environment: UNIX, Oracle Access Manager (OAM), Oracle Identity Manager (OIM/Xellerate), Oracle Virtual Directory (OVD), Microsoft Active Directory, Oracle9i, Java, OUD.
Responsibilities:
- Implemented Oracle Identity Management (OIM) and Oracle Access Management (OAM) through Development, Staging, and Production.
- Responsible for all development and implementation of OIM, OAM, OVD, OID, and some Oracle databases.
- Determining roles and responsibilities of users, classifying like users into groups to ease maintenance and rule implementations controlling access to resources appropriate to user and group classifications.
- Provisioning from OIM was configured for Oracle Internet Directory (OID) and Oracle Virtual Directory (OVD).
- Analyze and document (both existing and potential) solutions for the following: User account provisioning/ de-provisioning, Enterprise Directory Services, Password Management, Role-Based access control, Strong Authentication.
- Developing custom workflows and Generic Technology Connectors (GTC) for manual user dumps.
- Developed a custom file connector to reconcile data received from the target source SVP and load it into OIM as well as Provisioning functions.
- Worked on maintenance, support by solving OIM related tickets which arise day to day from client administrators on priority level basis.
- Collaborates with other teams such as Engineering and Network or Security Operations to resolve issues.
- Hands on experience Granting and revoking user permissions for server access.
- Plugin development to provide customization.
- Protected resources at different authentication levels.
- Monitor Individual queue for tickets assigned, troubleshooting and repair of all aspects of operating systems and hardware
- Configured multiple versions of connector to provision multiple AD domains with varying requirements
- Build Custom connectors to reconcile data from LDAP.
- Integration OIM and OAM with Active Directory, Exchange, OID, OVD and other business applications.
- Maintain full Identity Management systems.
- Configured PeopleSoft application and Integration broker for Full and Incremental Reconciliation.
- Implemented customized solution for managing high risk role using Oracle Identity Manager.
- Knowledge in using ticketing tools like Viper and Request IT.
Confidential, SFO, CA
OIM Developer
Environment: UNIX, Oracle Access Manager (OAM), Oracle Identity Manager (OIM/Xellerate), Oracle Virtual Directory (OVD), Microsoft Active Directory, Oracle9i, Java, OUD.
Responsibilities:
- Installed OIM in development in all the environments
- Implementation and customization of OIM and Oracle Access Manager (OAM) as per the client infrastructure requirements.
- Configuring Pre-populate adapter and Process Task Adapter which are used for user management during provisioning to target systems.
- As a front-end LDAP proxy server using MS Active Directory (AD) and Oracle Internet Directory (OID), installed and configured OVD.
- Integrated OIM Application using Disconnected Approach and customizing Reconciliation using Flat File Connector.
- Developed and arranged the Roles with access strategies to procurement the clients into the LDAP Group in OID.
- Connected patches to enhance functionality of the system.
- Involved in migrating the data from the old system
- Monitored OIM server log files to check any error for user, resource related errors.
- Worked on new configurations for criteria based Provisioning, Membership rules and Access Policies.
- Performed tuning of LDAP, OAM and OIM components.
- Involved in analysis with consumers and gathering new user requirements for the system
- To improve the performance, fine-tuned Web Logic configuration and OIM & OIM configuration.
- Monitor Individual queue for tickets assigned, troubleshooting and repair of all aspects of operating systems and hardware.
- Granted administrative rights to users
- Installed the connectors for AD, Exchange and Database.
- Wrote custom connector classes to attain functionality, which was not available OOTB.
- Implement Request and approval process.
- Customized UI as per CEC Web standards.
- Create the auto group memberships and access policies to provision users into target systems as per user job code and job role.
- Setup the change based reconciliation on PeopleSoft, which would create accounts in Open IDM and target systems as users are created in PeopleSoft
- Performed functional and unit testing of all the target systems.