No results found

Your search did not match any results.

We suggest you try the following to help find what you're looking for:

  • Check the spelling of your keyword search.
  • Use synonyms for the keyword you typed, for example, try “application” instead of “software.”
  • Try one of the popular searches shown below.
  • Start a new search.
Trending Questions

Oracle Identity Cloud Service: Secure, On-demand Identity

The next generation comprehensive security and identity platform that is cloud-native and designed to be an integral part of the enterprise security fabric, providing modern identity for modern applications.

See It In Action

Product Features

Open all Close all

Hybrid Identity Management

    Manage Users and Groups

  • Administer users and groups using standard SCIM interface.
  • Self-service Profile Management

  • Self-service based password and profile management.
  • Federate Using On-premises Identity Providers

  • Federate user authentication using Oracle Access Manager or 3rd party SAML Identity Provider.
  • Manage Identities in the Cloud or On-premises, or Both

  • Synchronize user identities with on-premises OIM Connector, or directly with AD.

Open and Standards-based Integration

    Open and Standards-based Integration 100% API coverage

  • Leverage compartments to organize resources according to your departmental hierarchies.
  • Leverage Existing Identity Systems

  • Integrate Identity Management into your custom applications using open APIs.
  • Single Sign On Between Applications

  • Administer users and groups using standard SCIM interface.
  • Access, Certification and Governance using OIM

  • Governance Integration with centralized Oracle Identity Manager workflows for cloud applications.
  • Compliance to Open Standards

  • Integrate with any application using open standards - OpenID Connect, SAML, OAuth and SCIM.

Secure Defense In-depth

    Minimize Risks of Cloud Data Breaches

  • Minimize risks of identity data breaches using strong Oracle database security.
  • Integration Readiness with External Vendors

  • Augment application security using context and risk-aware business logic from 3rd party vendor integrations.