Secure Password Collection and Management Scenarios

Migrating Native Applications to OAAM 11g 17-3

17.4.2 Copy the OAAM 11g Property Files

All updated property files and libraries are located in the ORACLE_ HOMEoaamcli folder. The confbharosa_properties folder contains the updated properties, and the lib folder contains the updated libraries. To upgrade your existing natively integrated application, you can start by removing the contents of your existing bharosa_properties folder, and replacing them with the contents of the ORACLE_HOMEoaamcliconfbharosa_properties directory.

17.4.3 Specify the Configurable Properties in the bharosa_server.properties File

In 10g all client specific configuration overrides were created in the bharosa_ client.properties file, now those overrides need to be created in the bharosa_ server.properties file. This was typically the file modified on the server side for the same purpose. A bharosa_server.properties file that contains the contents of your old bharosa_client.properties with the addition of the following new properties needs to be created in your applications bharosa_properties folder that contains the following information: New Properties vcrypt.tracker.soap.useSOAPServer=true vcrypt.soap.disable=false bharosa.config.impl.classname=com.bharosa.common.util.BharosaCon figPropsImpl bharosa.config.load.impl.classname=com.bharosa.common.util.Bharo saConfigLoadPropsImpl These new properties will tell the new libraries to use the Generic SOAP implementation classes for communicating with the OAAM Server component, and instead of looking to the OAAM database to read the properties typically retrieved from the BharosaConfig class to retrieve them from the local property files. It is noted above that these properties are to be used in addition to the existing contents of your bharosa_client.properties file which should include your soap user name, and soap keystore information. Note: If you did not have SOAP authentication setup in 10g, you will need to refer to Setting Up Encryption in the 10.1.4.5 Oracle Adaptive Access Manager Installation and Configuration Guide for creating a SOAP keystore for use with the new 11g environment. 17-4 Oracle Fusion Middleware Developers Guide for Oracle Adaptive Access Manager 18 Handling Lifecycle Management Changes 18-1 18 Handling Lifecycle Management Changes Because of integrated deployment of Oracle Adaptive Access Manager with other applications, Oracle Virtual Directory, Oracle Identity Manager, Oracle Access Manager, Oracle Internet Directory, and configuration changes in those applications, various configuration changes might be required in Oracle Adaptive Access Manager. Instructions for handling such types of configuration changes are described in this chapter: ■ Oracle Virtual Directory OVD Host, Port, and SSL Enablement Changes ■ Oracle Identity Manager OIM URL Changes ■ Oracle Access Manager OAM Host and Port Changes ■ Oracle Internet Directory OID Host and Port Changes and SSL Enablement ■ Database Host and Port Changes References are also provided for moving Oracle Adaptive Access Manager from a test environment to a production environment: ■ Moving Oracle Adaptive Access Manager to a New Production Environment ■ Moving Oracle Adaptive Access Manager to an Existing Production Environment

18.1 Oracle Virtual Directory OVD Host, Port, and SSL Enablement Changes

To change the Oracle Virtual Directory host, port, and SSL enablement: 1. Start the Oracle Adaptive Access Manager server-related managed server. 2. Go to OAAM Admin at http:OAAM Managed Server Host:OAAM Admin Managed Server Portoaam_admin. 3. Log in as a user with access to the Properties Editor. 4. Open the Oracle Adaptive Access Manager Property Editor to modify parameters to: ■ Change the password authentication provider to LDAP ■ Rewire existing Oracle Adaptive Access Manager for Oracle Virtual Directory hostname ■ Rewire existing Oracle Adaptive Access Manager for Oracle Virtual Directory port changes 18-2 Oracle Fusion Middleware Developers Guide for Oracle Adaptive Access Manager ■ Rewire existing Oracle Adaptive Access Manager for SSL Enablement of Oracle Virtual Directory Change Plain Text Communication to SSL for wiring between Oracle Adaptive Access Manager and Oracle Virtual Directory For information on setting properties in Oracle Adaptive Access Manager, see Using the Property Editor in Oracle Fusion Middleware Administrators Guide for Oracle Adaptive Access Manager.

5. Restart the Oracle Adaptive Access Manager server-related managed server.

18.2 Oracle Identity Manager OIM URL Changes

Follow these steps to rewire an existing deployment of Oracle Adaptive Access Manager with Oracle Identity Manager: 1. Start the Oracle Adaptive Access Manager server-related managed server. 2. Go to OAAM Admin at http:OAAM Managed Server Host:OAAM Admin Managed Server Portoaam_admin. 3. Log in as a user with access to the Properties Editor.

4. Open the Oracle Adaptive Access Manager Property Editor to modify parameters

to: ■ Rewire existing Oracle Adaptive Access Manager for password flow ■ Rewire existing Oracle Adaptive Access Manager for other redirection Table 18–1 Configuring Oracle Directory Manager Property Values Property Name Property Values bharosa.uio.default.password.auth.provider.class name com.bharosa.vcrypt.services.LDAPOAAMAuthProvider oaam.uio.ldap.host OVD host For example, host.oracle.com oaam.uio.ldap.port OVD port oaam.uio.ldap.userdn.template User Search DN For example, uid= {USER_ID}, cn=user,dc=us,dc=oracle,dc=com. oaam.uio.ldap.isSSL false