Oracle Identity Analytics, the Oracle's tool for role mining and management, a product previously known as Sun Role Manager, provides by default a set of reports to help us know and study the status of our Identity Management platform. This set of reports is based on JasperReports, the opensource tool to generate reports.
Of course, it is not possible to create beforehand all kind of reports any customer may need, as every customer has a different need, so it is quite useful to be able to create new reports based on the specific requirements of each customer. As the reports used in OIA are based on JasperReports, you can use iReport to create new reports, although I'd say it is more useful to know the data model of OIA than the use of iReports. This is a question for another different article nevertheless.
In any case, most of Oracle customers already have BI Publisher in one way or another, so we have to underline that OIA also allows the use of any external report engine, as BI Publisher, so to generate custom reports with an external report engine only requires a proper access to the database where OIA stores all the data analyzed.
In any case, it is possible to extend OIA with new reports, and this is what my friend René Klomp is going to talk about. In fact, what I'm going to do is just add the proper link to the articles where René explains quite clearly the way of creating and importing a new report into OIA. As you will see, the most important question here is to understand the query to be performed in the database. The rest is more or less simple, and if it is true that Jasper is quite easy to use, it is also true that BI Publisher templates are very easy to customize and easier to understand than the Jasper ones (in my opinion).
The second article is a follow up of the first one, referred to a certain type of report, one we were working a couple of months ago for one of our customers: how to report which entitlements (or policies for OIA) are not associated to any role (after a mining process). In this way, you can see if the mining process was a good one, if all the entitlements were used and associated to roles, or if there is a problem in the entitlements definition, in the role definition or maybe in the way permissions and entitlements are applied to users in the company.
Thanks René, you have done a great job in your blog.