Testing Identity Assertion for SSO with OAM 10g

Configuring Single Sign-On Using Oracle Access Manager 10g 16-53 c. Click the rule, click the Allow Access tab, click Add, Under Role, select Anyone to allow anyone access to the protected resources. d. Click Save.

8. Policies Tab:

Click the Policies tab, click Add. Fill in and save General details: Name: Default Username Resolution Policy Description: Default Username Policy for Authenticator Resource Type: wl_authen Resource operations: LOGIN Resource: AuthenUsernameAssertion Leave other items as they are. Click Save. Click the Authentication Rule sub tab, click Add, and fill in General details Name, optional Description, Authentication Scheme. Name: Username Resolution Authentication Rule Authentication Scheme: UsernameAssertion Authentication Scheme See Creating an Authentication Scheme for the Authenticator . Click Save. Click the Actions sub tab and add the following details for Authentication Success: ■ Return Type: WL_REALM ■ Return Name: uid ■ Return Attribute: uid Click the Actions sub tab and add the following details for Authentication Success: ■ Return Type: WL_REALM ■ Return Name: obmygroups ■ Return Attribute: obmygroups

9. Delegated Access Admins

: When adding URL prefixes to a policy domain, the Delegated Access Administrator must specify a server hosting the URL prefix. Note: Be sure to enter Return Attribute. uid is the name of the login attribute in the LDAP ObjectClass that helps to identity the user uniquely in the directory server used by Oracle Access Manager. Note: obmygroups returns all groups to which a member belongs. See Also: Oracle Access Manager Access Administration Guide, Delegating Policy Domain Administration 16-54 Oracle Fusion Middleware Application Security Guide 10. Proceed with Configuring Providers for the Authenticator in a WebLogic Domain .

16.5.3 Configuring Providers for the Authenticator in a WebLogic Domain

This topic includes a procedure that you can use to add and configure the appropriate Authentication Providers in a WebLogic domain. The Oracle Access Manager Authenticator must be configured along with the Default Authentication Provider in a WebLogic domain. ■ DefaultAuthenticator: SUFFICIENT ■ OAM Authenticator: OPTIONAL The following procedure describes this task using the WebLogic Administration Console. You can also add these using the Oracle WebLogic Scripting Tool WLST. To configure providers for the Oracle Access Manager Authenticator in a WebLogic domain

1. No Oracle Fusion Middleware Application

: Obtain the Oracle Access Manager provider if you have no Oracle Fusion Middleware application. a. Log in to Oracle Technology Network at: http:www.oracle.comtechnologysoftwareproductsmiddlewareht docs111110_fmw.html b. Locate the oamAuthnProvider ZIP file with Access Manager WebGates 10.1.4.3.0. For example: oamAuthnProviderversion.zip c. Extract and copy the oamAuthnProvider.jar to the following path on the computer hosting Oracle WebLogic Server: BEA_HOMEwlserver_10.xserverlibmbeantypesoamAuthnProvider.jar 2. Go to the Oracle WebLogic Administration Console.

3. With Oracle Fusion Middleware Application Installed

: a. Locate oamauthenticationprovider.war in the following path: ORACLE_INSTANCEmodulesoracle.oamprovider_11.1.1oamauthenticationprovi der.war b. Copy oamauthenticationprovider.war to the following location: See Also: ■ About Oracle WebLogic Server Authentication and Identity Assertion Providers on page 16-41 ■ Oracle Fusion Middleware Oracle WebLogic Scripting Tool ■ Oracle Fusion Middleware WebLogic Scripting Tool Command Reference Note: When a Oracle Fusion Middleware application is installed, you have the required files and can skip Step 1.