Adding Users to the Identity Store Using the WLS Administration Console

28-14 Oracle Fusion Middleware Administrators Guide for Oracle WebCenter Figure 28–14 Settings Pane with Embedded LDAP Settings

4. Enter a new password in the Credential field, and reenter it in the Confirm

Credential field.

5. Click Save to save your settings.

6. Restart the WebLogic server.

After this, you are ready to access the LDAP server with the following values: ■ the DN value for admin access is cn=Admin ■ the password is the value you entered in the Credential field ■ the port is the same as the admin port, which by default is 7001 Create an LDIF File You can create an LDIF file with any text editor, and can include any attributes appropriate for the embedded LDAP directory. The objectclasses that are supported by default in the embedded LDAP server for WebLogic Server are the following: ■ person ■ inetOrgPerson ■ organizationalPerson ■ wlsUser In order to interact successfully with the embedded LDAP server, you should understand the default layout of the directory information tree DIT. The default layout in the embedded LDAP directory is shown in Figure 28–15 . Configuring the Identity Store 28-15 Figure 28–15 Embedded LDAP Directory Information Tree The following example shows an LDIF file with the attributes that are displayed in WebCenter Spaces user profile screens: dn: uid=john.doe,ou=people,ou=myrealm,dc=wc_domain description: John Doe cn: john.doe uid: john.doe sn: Doe objectclass: wlsUser objectclass: organizationalperson objectclass: inetOrgPerson objectclass: person objectclass: top userpassword: welcome1 displayName: John Doe employeeNumber: 12345 employeeType: Regular givenName: John homePhone: 650-555-1212 mail: john.doeexample.com title: Manager manager: uid=mary.jones,ou=people,ou=myrealm,dc=wc_domain preferredLanguage: en departmentNumber: tools facsimiletelephonenumber: 650-555-1200 mobile: 650-500-1200 pager: 650-400-1200 telephoneNumber: 650-506-1212 postaladdress: 200 Oracle Parkway l: Redwood Shores homepostaladdress: 123 Main St., Anytown 12345 To create a file with multiple user entries, just replicate the above lines as many times as required, with a blank line between entries. Note: The naming attribute for the user entry in the embedded LDAP directory tree is uid. This is different from the default configuration for Oracle Internet Directory OID, where the naming attribute is cn. Also, the location of the users in this tree is ou=people,ou=myrealm,dc=wc_domain. 28-16 Oracle Fusion Middleware Administrators Guide for Oracle WebCenter Add the Users The example below uses the ldappadd command, a part of the LDAP command line utilities provided with the Oracle Internet Directory server. For more information about using the ldappadd command, see Oracle Internet Directory Data Management Tools in the Oracle Fusion Middleware User Reference for Oracle Identity Management. ldapadd -h weblogichost.example.com -p 7001 -D cn=Admin -w password -v -f newuser.ldif add description: John Doe add cn: john.doe add uid: john.doe add sn: Doe add objectclass: wlsUser organizationalperson inetOrgPerson person top add userpassword: password add displayname: John Doe add employeenumber: 12345 add employeetype: Regular add givenname: John add homephone: 650-555-1212 add mail: john.doeexample.com add title: Manager add manager: uid=mary.jones,ou=people,ou=myrealm,dc=wc_domain add preferredlanguage: en add departmentnumber: tools add facsimiletelephonenumber: Note: WebCenter Spaces user profiles include some attributes that are only available in Oracle Internet Directory. These include the following attributes from the orclUserV2 objectclass: ■ orclTimeZone ■ orclDateOfBirth ■ maidenName You cannot add these attributes to an embedded LDAP identity store. Configuring the Identity Store 28-17 650-555-1200 add mobile: 650-500-1200 add pager: 650-400-1200 add telephonenumber: 650-506-1212 add postaladdress: 200 Oracle Parkway add l: Redwood Shores add homepostaladdress: 123 Main St., Anytown 12345 adding new entry uid=john.doe,ou=people,ou=myrealm,dc=wc_domain modify complete

28.4 Managing Users and Application Roles

This section describes how you can use Fusion Middleware Control, WLST, and the runtime administration pages in WebCenter Spaces and WebCenter Portal applications to manage users and application roles. This section contains the following subsections: ■ Section 28.4.1, Granting the WebCenter Spaces Administrator Role ■ Section 28.4.2, Granting Application Roles ■ Section 28.4.3, Using the Runtime Administration Pages

28.4.1 Granting the WebCenter Spaces Administrator Role

WebCenter Spaces only recognizes users in the identity store that is mapped by the first authenticator. Since the WebCenter Spaces Administrator account is initially created only in the embedded LDAP server, if an external LDAP such as Oracle Internet Directory is configured as the primary authenticator for WebCenter Spaces, you must also create a user in that LDAP and grant that user the WebCenter Spaces Administrator role. You can grant a user the WebCenter Spaces Administrator role using Fusion Middleware Control or WLST as shown below in the sections on: ■ Section 28.4.1.1, Granting the WebCenter Spaces Administrator Role Using Fusion Middleware Control ■ Section 28.4.1.2, Granting the WebCenter Spaces Administrator Role Using WLST

28.4.1.1 Granting the WebCenter Spaces Administrator Role Using Fusion Middleware Control

This section describes how to grant the WebCenter Spaces administrator role to a user account other than the default weblogic account. To grant the WebCenter Spaces Administrator role using Fusion Middleware Control: 1. Log into Fusion Middleware Control and navigate to the WebCenter Spaces home page. For information on logging into Fusion Middleware Control, see Section 6, Starting Enterprise Manager Fusion Middleware Control.