We provide IT Staff Augmentation Services!

Independent Idm Consultant Resume

3.00/5 (Submit Your Rating)

SUMMARY

  • Installed and configured OIM/OAM 11g R2.
  • Configured AD and LDAP connectors in OIM.
  • Configured password policies Confidential schedulers in OIM.
  • Has experience Installing and configuring OpenSSO and Sun IDM.
  • Configured OpenSSO J2EE agent and Web agents.
  • Integrated Sun IDM with OpenSSO to use OpenSSO Authentication.
  • Integrated PeopleSoft HR Express and Retail Time & Labor with OpenSSO.
  • Configured authentication chaining in OpenSSO.
  • Experience in writing rules and scripts in Xpress.
  • Worked on designing and developing custom Workflows Confidential Forms Confidential Rules Confidential Templates.
  • Configures Resource Reconciliations and ActiveSync policies for various resources.
  • Experience in configuring provisioning Adapters for PeopleSoft Confidential LDAP & Active Directory Adapters and configuring Database Adapters for Oracle Confidential DB2 Confidential and SQL Server.
  • Worked on configuring Admin Roles and Roles in IDM
  • Developed custom task to write and read messages to Websphere MQ for ServiceNow integration with Sun IDM.
  • Worked on Customized User and Resource Reporting.
  • Well versed in Windows NT Confidential UNIX Confidential Linux and client - server environments.
  • Actively involved in the Complete Project Life Cycle from user requirements Confidential analysis Confidential design Confidential development and implementation.

TECHNICAL SKILLS

IDM Technologies: Oracle IDM 11g R2 Confidential Sun IDM Confidential OpenAM Confidential AWS IAM

Operating Systems: Unix Confidential Linux Confidential Windows

Programming Languages: Java Confidential JavaScript Confidential Perl Confidential C Confidential C++

Databases: Oracle Confidential DB2 Confidential MS-SQL Server Confidential MySQL

Application Servers: WebLogic Confidential Websphere Confidential Sun Application Server

Web Servers: OHS Confidential Apache Confidential Tomcat Confidential IHS 6.1 Confidential 7.0

IDE’s: Eclipse Confidential Netbeans Confidential JDeveloper

Configuration Management: CVS and Visual Source Safe

Misc: MS-Project Confidential Visio Confidential ANT

PROFESSIONAL EXPERIENCE

Independent IDM Consultant

Confidential

Responsibilities:

  • Performed a wide range of tasks on the OIM/OAM framework that involved developint EventHandler code Confidential OAM plugin code Confidential through JDeveloper Confidential NetBeans and Eclipse
  • Involved in all phases of project development from requirements gathering Confidential high/low level design Confidential use case definition Confidential pilot/PoC Confidential implementation Confidential pre/post go-live checks Confidential production monitoring and maintenance
  • Involved in user acceptance testing (UAT), load testing Confidential unit testing of designed framework and actively monitoring Oracle stack using Oracle Enterprise Manager OEM 12c Cloud Control
  • Sizing and Performance tuning of the Oracle IDM stack consisting of Weblogic security providers Confidential data sources Confidential connection pools Confidential OID parameters Confidential cache allocations Confidential OS level network and file handler specifications
  • OIM specific tasks - UI Customization Confidential Sandbox configuration Confidential LDAP Sync setup Confidential User Migration Confidential Reconciliation Confidential Organization Scoping and Design Confidential Role Definition Confidential UDF definition Confidential Form Design Confidential Performance Tuning Confidential Scheduled Task Setup/Config Confidential OIM MDS import/export edits Confidential IAM-Features-LDAP-Sync components config
  • OAM specific tasks - Access management using Application Domains Confidential Resources Confidential Authentication/Authorization Policies Confidential Authentication Modules Confidential Identity Store setup Confidential Webgate integration Confidential Rules definition for web resource protection Confidential Password and Account lockout rules config using oam-config.xml
  • OID specific tasks - OID DIT design Confidential User import/modifications Confidential Custom objectClass/Attributes definitions Confidential Sizing Confidential Directory Integration Platform (DIP) Config with Microsoft AD Confidential OID-AD password plug-in for internal users
  • Troubleshooting problems related to the Oracle stack Confidential user provisioning/reconciliation issues Confidential access issues Confidential performance issues

Environment: s: OIM/OAM 11g R2 Confidential OUD Confidential Weblogic Confidential Java Confidential Glassfish Confidential Windows Confidential Solaris Confidential XML Confidential Active Directory Confidential LDAP Confidential Oracle

IDM Consultant

Confidential

Responsibilities:

  • Worked on gathering requirements for application on-boarding Confidential reporting sub-system and writing use cases for OIM migration project from Sun environment to Oracle
  • Reviewed and modified codebase that comprised of Oracle ADF taskflows Confidential OIM provisioning services Confidential Sun IDM SPML services to fix defects found during functional testing
  • Troubleshooting of data sync issues between Oracle IDM and Sun IDM and reviewed data migration plan from Sun IDM to Oracle IDM system for successful migration of user and role information
  • Set up Oracle Virtual Directory (OVD) join adapter to go against Oracle Unified Directory (OUD) and Oracle Database for consolidating user attributes/entitlements
  • Performed load tests on the OIM/OAM framework Confidential monitored/gathered metrics for various components and analyzed test results
  • Analyzed Oracle Enterprise Monitoring (OEM) data for the JRockit JVM for various servers and tuned the garbage collection parameters for young gen collection
  • Tuned component and system parameters on the IDM framework based on load test results
  • Produced a wide range of artifacts and deliverables from design documents Confidential build books Confidential test cases Confidential use cases Confidential tuning/metrics spreadsheets Confidential infrastructure diagrams
  • Designed and integrated Business Intelligence (BI) Publisher sub-system with the OIM/OAM framework leveraging security provider based SSO
  • Configured BI Publisher reports to generate data against OIM USR Confidential OAM audit tables and user management databases
  • Set up audit for OAM server to go against external database and pulled audit data in BI Publisher reports
  • Tested Sandbox functionality in OIM 11g R2 by running functions on sandbox such as Create Confidential Activate Confidential Publish Confidential Deactivate

Environment: s: OIM/OAM 11g R2 Confidential OUD Confidential Weblogic Confidential Java Confidential Glassfish Confidential Windows Confidential Solaris Confidential XML Confidential Active Directory Confidential LDAP Confidential Oracle LDAP Confidential Oracle Confidential IBM HTTP Server 6.0,6.1,7.0

We'd love your feedback!