Starting Administration Server on IDMHOST1 Creating OAAM Administration User in WebLogic Console Configuring Oracle Adaptive Access Manager on OAAMHOST1

12-6 Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Identity Management

12.2.2 Starting Administration Server on IDMHOST1

Restart WebLogic Administration Server on IDM Host 1. See Section 20.1, Starting and Stopping Oracle Identity Management Components.

12.2.3 Creating OAAM Administration User in WebLogic Console

Before you can access the OAAM administration console, you must create an administration user. Creating this user here enables you to use the OAAM administration console at this point. If you wire OAAM to Oracle Access Manager or you configure the Default Authenticator as described in chapter 19 then this user becomes redundant and if desired can be removed. You create an administration user as follows: 1. Log in to Oracle WebLogic console at the URL: http:idmhost1.mycompany.com:7001console as the weblogic user.

2. From the domain structure menu, select Security Realms

3. Click myrealm.

4. Click the Users and Groups tab.

5. Click New.

6. Enter the following information: ■ Name : oaamadmin ■ Description : OAAM Administrative user. ■ Provider : DefaultAuthenticator ■ Password Confirmation: The password you want to assign to the user.

7. Click OK.

8. Click the newly created user oaamadmin.

9. Click the Groups tab.

10. Assign all groups with the OAAM prefix to the user. Do this by selecting each group and clicking to move it to the chosen group. The groups are: ■ OAAMCSRGroup ■ OAAMCSRInvestigatorGroup ■ OAAMCSRManagerGroup ■ OAAMEnvAdminGroup ■ OAAMInvestigationManagerGroup ■ OAAMRuleAdministratorGroup Note: Note: If you receive a warning that says: CFGFWK: Server listen ports in your domain configuration conflict with ports in use by active processes on this host Click OK. This warning appears if Managed Servers have been defined as part of previous installs and can safely be ignored. Extending the Domain with Oracle Adaptive Access Manager 12-7 ■ OAAMSOAPServicesGroup 11. Click Save.

12.2.4 Configuring Oracle Adaptive Access Manager on OAAMHOST1

Once the configuration has succeeded on IDMHOST1, you can propagate it to OAAMHOST1. You do this by packing the domain on IDMHOST1, using the pack script, and unpacking it on OAAMHOST1 using the unpack script. Both scripts reside in ORACLE_COMMON_HOME commonbin. On IDMHOST1, type: pack.sh -domain=ORACLE_BASEadminIDMDomainaserverIDMDomain -template=tmpIDMDomain.jar -template_name=OAAM Domain -managed=true This creates a file called IDMDomain.jar in the tmp directory. Copy this file to OAAMHOST1. On OAAMHOST1, type: unpack.sh -domain=ORACLE_BASEadminIDMDomainmserverIDMDomain -template=tmpIDMDomain.jar -app_dir=ORACLE_ BASEadminIDMDomainmserverapplications

12.3 Starting and Validating OAAMHOST1