Mobile and Social Sign On with Oracle Identity Management 11gR2
By B Shashikumar on Jul 24, 2012
The proliferation of mobile devices and competitive reasons are compelling enterprises to offer access to commonly used business applications for customers and employees using personal mobile devices. But many applications don’t have visibility into the security posture of the device making it challenging to enforce audit, compliance, and privacy requirements.
As part of Oracle Identity Management 11gR2, Oracle is now offering a mobile and social sign on solution as part of its Access Management solution stack.With the innovative Mobile and Social Access Management capability, organizations can extend SSO to mobile applications and secure applications and data regardless of which device is being used. Also organizations can consume identities from popular social networks (Facebook, Google, Yahoo, Twitter, and LinkedIn) for signing on users to consumer-facing and other low risk applications, providing a seamless user experience for users without the burden of forcing additional registration and logins.
The solution also comes with an SDK with REST APIs that developers can leverage to integrate custom mobile applications with commonly used identity management functions like authentication, credential management, secondary authentication, device fingerprinting, and session management. The SDK supports OAuth and OpenID, two of the most commonly used user-centric identity frameworks in the industry. So developers can use the SDK to enable applications to consume social identities.
This offers several compelling benefits to organizations:
- Tighter Security for Mobile Enterprise: Organizations can now secure applications and data regardless of which device is being used to access those applications.
- Easier Identity Integration for Mobile Apps: This provides a programmatic and flexible way to integrate native mobile apps and web apps with identity services offered by enterprises such as authentication and SSO.
- Sign On from Social Networks: Organizations can consume internet identities for signing on users to low value applications like blogs, community forums, etc. This capability can also be leveraged by consumer facing applications to provide a seamless user experience for users without the burden of forcing additional registration and logins.
You can get more information about our new Mobile and Social Access Management solution here.