Reassociating the Domain Policy Store

Integration With Oracle Identity Management 10-7 configuration, refer to the OPSS Authorization and the Policy Store chapter in the Oracle Fusion Middleware Security Guide. Oracle Fusion Middleware Security Guide.

10.1.3.1 Prerequisites to Using an LDAP-Based Policy Store

In order to ensure the proper access to an LDAP server directory Oracle Internet Directory used as a policy store, you must set a node in the server directory. An Oracle Internet Directory administrator must follow these steps to create the appropriate node in an Oracle Internet Directory Server:

1. Create an LDIF file assumed to be jpstestnode.ldif in this example

specifying the following DN and CN entries: dn: cn=jpsroot_wc cn: jpsroot_wc objectclass: top objectclass: OrclContainer The distinguished name of the root node illustrated by the string jpsroot_wc above must be distinct from any other distinguished name. One root node can be shared by multiple WebLogic domains. It is not required that this node be created at the top level, as long as read and write access to the subtree is granted to the Oracle Internet Directory administrator. 2. Import this data into Oracle Internet Directory server using the command ldapadd, as illustrated in the following example the command is shown as two lines in the example below for readability purposes, but you should enter the command on a single line: OIDHOST1 ORACLE_HOMEbinldapadd -h ldap_host -p ldap_port -D cn=orcladmin -w password -c -v -f jpstestnode.ldif 3. Verify that the node has been successfully inserted using the command ldapsearch, as illustrated in the following example the command is shown as two lines in the example below for readability purposes, but you should enter the command on a single line: OIDHOST1 ORACLE_HOMEbinldapsearch -h ldap_host -p ldap_port -D cn=orcladmin -w password -b cn=jpsroot_wc objectclass=orclContainer 4. When using Oracle internet Directory as the LDAP-Based Policy Store run the utility oidstats.sql in the INFRADBHOSTs to generate database statistics for optimal database performance: ORACLE_HOMEbinsqlplus Enter ODS as a user name. You will be prompted for credentials for the ODS user. Inside sqlplus, enter the command to gather the statistics info: SQLPLUS ORACLE_HOMEldapadminoidstats.sql The oidstats.sql utility must be run just once after the initial provisioning. For details about this utility, consult the Oracle Fusion Middleware User Reference for Oracle Identity Management.

10.1.3.2 Reassociating the Domain Policy Store

Reassociating the policy store consists in migrating policy data from a file- or LDAP-based repository to an LDAP-based repository, that is, reassociation changes the repository preserving the integrity of the data stored. For each policy in the source 10-8 Oracle Fusion Middleware Enterprise Deployment Guide for Oracle WebCenter policy store, reassociation searches the target LDAP directory and, if it finds a match, it updates the matching policy as appropriate. If none is found, it simply migrates the policy as is. At any time, after a domain policy store has been instantiated, a file- or LDAP-based policy store can be reassociated into an LDAP-based policy store storing the same data. To support it, the domain has to be configured, as appropriate, to use an LDAP policy store. The reassociation of both the credential and the policy stores is accomplished as a unit using Enterprise Manager or the WLST command reassociateSecurityStore. See Section 10.1.4, Reassociation of Credentials and Policies for detailed steps.

10.1.4 Reassociation of Credentials and Policies

To reassociate the policy and credential store with Oracle Internet Directory, use the WLST reassociateSecurityStore command. Follow these steps: 1. From SOAHOST1, start the wlst shell: SOAHOST1cd ORACLE_COMMONHOMEcommonbin SOAHOST1.wlst.sh 2. Connect to the WebLogic Administration Server using the wlst connect command shown below: Syntax: connectAdminUser,AdminUserPassword,t3:hostname:port For example: connectweblogic,welcome1,t3:ADMINVHN:7001 3. Run the reassociateSecurityStore command as shown below: Syntax: reassociateSecurityStoredomain=domainName,admin=cn=orcladmin, password=orclPassword,ldapurl=ldap:LDAPHOST:LDAPPORT,servertype=OID, jpsroot=cn=jpsroot_wc For example: wls:WCEDGDomainserverConfigreassociateSecurityStoredomain=soaedg_domain, admin=cn=orcladmin,password=welcome1,ldapurl=ldap:oid.mycompany.com:389 ,servertype=OID,jpsroot=cn=jpsroot_wc The output for the command is shown below: {servertype=OID,jpsroot=cn=jpsroot_wc_idm_idmhost1,admin=cn=orcladmin, domain=IDMDomain,ldapurl=ldap:oid.mycompany.com:389,password=welcome1} Location changed to domainRuntime tree. This is a read-only tree with DomainMBean as the root. For more help, use helpdomainRuntime Starting Policy Store reassociation. LDAP server and ServiceConfigurator setup done. Schema is seeded into LDAP server Data is migrated to LDAP server Service in LDAP server after migration has been tested to be available