Your customer wants to use the information available in the Identity Context in their application to determine a user's journey through various screens and functions.
One of the attributes they want to use is the Oracle Adaptive Access Manager (OAAM) risk score. They have deployed OAAM and think they have integrated it correctly into the Oracle Access Management platform. However, when their application interrogates Identity Context, none of the OAAM attributes are present.
Which three configuration settings should you check as part of troubleshooting the problem? (Choose three.)
A. The OAAM propertyoracle.oaam.idcontext.enabledhas been set totrue.
B. Oracle Access Manager is using the "OAAM Advanced" authentication scheme.
C. The TAP token version is set to 2.1 in OAAM properties.
D. The application has been given proper source code grants to access the Identity Context runtime.
E. A configurable action has been defined in OAAM to generate the Identity Context attributes.
F. Oracle Security Token Service has been configured to generate the Identity Contextassertion.
View the Exhibits. Exhibit 1
Exhibit 2
You have created a set of hierarchical resources in Oracle Entitlements Server and an associated set of authorization policies as shown in the Exhibits. You execute a newQueryPepRequest in order to evaluate exactly which resources the weblogic user has access to.
Which three hierarchical resources can user access? (Choose three.)
A. /Hier1
B. /Hier1/a
C. /Hier1/b
D. /Hier1/a/i
E. /Hier1/b/i
Which authentication scheme is the preferred option for integrating OAM with OAAM in 11gR2?
A. OAAMBasic authentication scheme
B. TAPScheme authentication scheme
C. OAAMAdvanced authentication scheme
D. LDAPScheme authentication scheme
Your customer requires Oracle Adaptive Access Manager (OAAM) to perform risk analysis of the money transfer transactions in their eBanking application.
They have already deployed OAAM and OAM using the out-of-the-box Advanced integration.
What must they do to capture and process their application transactions in OAAM?
A. Configure the OAAM Server application with the definition of the new transaction data to be captured.
B. Deploy the UIO proxy and configure it to capture the money transfer transaction data and submitit to OAAM.
C. Change their eBanking application to use OAAM native integration.
D. Deploy the OAAM sample application and configure it to collect the money transfer transactions.
Identify three attributes that are a part of mobile device fingerprinting by default when Oracle Adaptive Access Manager is used.
A. Operating System Type
B. Hardware IMEI Number
C. Hardware MAC address
D. Hardware IP Address
What would you need to configure to use Oracle Adaptive Access Manager (OAAM) along with Mobile Single Sign-On, by using Oracle Access Management Mobile services?
A. An appropriate security handler plug-in name needs to be configured for the Mobile Service domain to use OAAM.
B. An authentication scheme needs to be configured for the Mobile Service domain to reflect OAAM use.
C. A separate application profile needs to be created for OAAM.
D. The Mobile Service domain needs to specify a configuration for OAAM.
Identify two settings in the Authentication Scheme definition of Oracle Access Manager 11g.
A. Authentication Password
B. Challenge Method
C. Authentication Level
D. Error Message
E. Authentication Id
Identify the mandatory attribute that is used when creating an application profile for a mobile application in Single Sign-On with Oracle Access Management Mobile and Social services. Select 1
A. userIdBasicAuth
B. Mobile.clientRegHandle.baseSecret
C. sharedSecret4BasicAuth
D. baseSecret4BasicAuth
Which component acts as the certified WS-Trust client that can be used to communicate with Security Token Service?
A. Token Consumer
B. Token Administrator
C. OWSM Agent
D. OPSS Security Keystore
E. User Name Token (UTN)
F. WS Policy
In a Security Token Service deployment for Identity Propagation with the Access Manager token, which component must be registered with Oracle Access Manager 11g to create a communication channel?
A. WS-Trust Validation Template
B. WebGate
C. Oracle Adaptive Access Manager
D. Oracle Identity Federation
E. Request Security Token (RST)