Overview
Skills
Job Details
We are seeking a highly experienced Oracle Access Management Architect to design, build, and manage enterpriselevel IAM/SSO solutions. 100% remote working, but must align with East Coast (EST/EDT) business hours. Contract to hire considered; longterm engagement.
Responsibilities
Work with Oracle IAM tools: Oracle Access Manager (OAM) 12c PS4, Oracle HTTP Server, Oracle Advanced Authentication (OAA), Oracle Adaptive Risk Management (OARM) / Oracle Adaptive Access Management, Oracle RADIUS Agent under a complex, highavailability environment (MDC).
Customize and configure SSO capabilities: Header Based auth, SAML / Federation, OAuth, OpenID Connect, MFA, Advanced Authentication. Develop custom auth plugins, SAML profiles, custom login & MFA pages.
Manage Identity Life Cycle Management: design, implement, maintain provisioning/deprovisioning, role management, access reviews etc.
Install, configure, deploy, performance tune Oracle Unified Directory (12c PS4) directory server, proxy server; extend schema; add virtual attributes as necessary.
Use Java, Shell, PowerShell, JavaScript to automate tasks; configure SSL for Oracle Fusion Middleware products; build & use APIs across IAM components.
Integrate with other systems: Active Directory/LDAP, external Federation libraries (SimpleSAMLPHP, Shibboleth, Okta, Ping, etc.). Migrate from LDAPbased authentication where required.
Deploy microservices / containerized services (e.g. Advanced Authentication / Adaptive Risk) in Kubernetes.
Work with WebLogic: deploying applications, configuring providers, debugging application server issues, rolebased access in domain.
Debug internal & external integrations: OS, load balancers, firewalls, app servers etc. Collaborate with Oracle Support, Networking, Systems, DBAs, Application Teams.
Produce custom Oracle BI Publisher reports (e.g. audit / usage / access reports) as required.
Maintain and patch the IAM / SSO environments; document all configurations, issues, fixes, and perform knowledge transfer as needed.
Required Skills & Experience
Minimum 7 years handson experience with the tools listed above (12c PS4 version): OAM, OAA, OARM / Adaptive Access Management, Oracle HTTP Server, Oracle RADIUS Agent; in a large, complex environment with high availability.
7+ years integrating/fixing issues across components including OS, Load Balancers, Firewalls, App Servers; working across multiple teams (Oracle Support, Network, System, DB, Application).
Deep experience with OAM Suite SSO features: SAML / Federation, OAuth / OIDC, MFA, advanced auth, custom plugins, etc.
Directory expertise: Oracle Unified Directory 12c PS4 setup, schema extension, virtual attributes.
Strong programming/scripting skills: Java, Shell, PowerShell, JavaScript. SSL setup & configuration on Oracle FMW.
Experience with external Federation / SSO tools: SimpleSAMLPHP, Shibboleth, Okta, Ping etc.
Container / Kubernetes experience in deploying Oracle microservices (Advanced Auth / Adaptive Risk).
Strong WebLogic application server experience: provider config, RBAC, debugging.
Experience migrating/integrating with Active Directory / LDAP to SSO / IAM.
Oracle BI Publisher report creation experience.
NicetoHave
Experience integrating with Workday or PeopleSoft HR/Finance modules.
Experience with Microservices & container orchestration in enterprise IAM setups.
Strong documentation / knowledge transfer skills.