Oracle Privileged Account Manager (OPAM) provides a versatile and integrated solution that allows organizations to manage their privileged account passwords.
OPAM can operate as a standalone solution, but delivers more value when used in conjunction with other Oracle Identity Management components.
OPAM is a Fusion application running in Oracle WebLogic Server and leveraging the Oracle Platform Security Services (OPSS) framework including the credential store, policy store, wallet, authentication, authorization, and audit application programming interfaces (APIs).
Oracle Privileged Account Manager (OPAM) is a server-based password repository designed to generate, provision, and manage passwords for privileged users accessing specific resources.
OPAM is part of Oracle’s integrated Identity Governance platform including Oracle Identity Manager (OIM) and Oracle Identity Analytics (OIA).
OPAM leverages the Oracle Integrated Connector Framework (ICF) to provide connectors that link OPAM with the external stores of target enterprise applications, user directories, database servers, and operating systems.
OPAM ships with a full set of connectors: Generic Unix and any Unix / Linux server using Secure Shell (SSH), generic database, Oracle Database (from Oracle DB 9 to Oracle DB 11g), Microsoft SQL Server, generic LDAP directories, and Microsoft Active Directory.
Passwords managed by OPAM are encrypted and persisted in an OPSS credential store. When passwords are stored in an Oracle database, customers can leverage Oracle Database Vault and Transparent Data Encryption (TDE) for additional security.
OPAM logs all the user transactions and provides its own built-in audit reports.
Take a look to the full Oracle White Paper for Protecting Access to Sensitive Resources with Oracle Privileged Account Manager