Oracle IAM supported features
This table lists the features and functionality that are available with a Oracle Identity Management (IAM) integration.
| Feature | Description |
|---|---|
| Push new users | Users created in Okta are also created in Oracle IAM. If you don't assign a role to a user, they're assigned a default role that conforms to your org policies. You can use custom role mappings to tailor users' access right. |
| Push profile updates | Updates to the Okta user profile, including custom and extended attributes, are pushed to Oracle IAM. All updates are tracked for auditing purposes. |
| Push user deactivation | When a user is deactivated in Okta, they're also deactivated or suspended in Oracle IAM. Their active sessions are terminated and their security tokens are revoked. |
| Push password updates | Changes made to a user's password in Okta are pushed to Oracle IAM. |
| Push groups | Groups and their members can be pushed to integrated apps. See Manage Group Push. |
| Import new users | Users created in Oracle IAM can be imported into Okta. |
| Import profile updates | Updates made to a user's profile in Oracle IAM are downloaded and applied to the profile fields in Okta. |
| Reactivate users | Reactivating a user in Okta also reactivates the user in Oracle IAM. |
| Import user schema | Imports more user attributes from Oracle IAM. This is also known as schema discovery. |
| Entitlement Management | You can manage app entitlements for Oracle IAM in Okta. If the app supports Okta Identity Governance, then you need to enable it to manage entitlements. |
