Authentication Rule Oracle Fusion Middleware Online Documentation Library

16-58 Oracle Fusion Middleware Application Security Guide descriptionAuthenticated Usersdescription role-nameauth-usersrole-name security-role 3. Save the file. 4. Redeploy and restart the application. 5. Repeat for each web.xml file in the application EAR file. 6. Proceed with Mapping the Authenticated User to a Group in LDAP .

16.5.5 Mapping the Authenticated User to a Group in LDAP

This topic describes how to map the authenticated user to a group in LDAP. To do this, you must edit the weblogic.xml file. For example, you might need to map your role-name auth-users to a group named managers in LDAP. To map the authenticated user to a group in LDAP for the Oracle Access Manager Authenticator 1. Go to the application’s weblogic.xml file. 2. Add the following information for your environment anywhere in the file: weblogic-web-app xmlns:xsi=http:www.w3.org2001XMLSchema-instance xsi:schemaLocation=http:www.bea.comnsweblogicweblogic-web-app http:www.bea.comnsweblogicweblogic-web-app1.0weblogic-web-app.xsd xmlns=http:www.bea.comnsweblogicweblogic-web-app security-role-assignment principal-namemanagersprincipal-name role-nameauth-usersrole-name security-role-assignment weblogic-web-app 3. Save the file. 4. Restart the WebLogic Server. 5. Proceed to: ■ Configuring Global Logout for Oracle Access Manager 10g and 10g WebGates ■ Testing the Oracle Access Manager Authenticator Implementation

16.5.6 Testing the Oracle Access Manager Authenticator Implementation

After performing all tasks to implement the Authenticator, you can test it by attempting to log in to the application using valid credentials. If the configuration is incorrect, a valid user is denied access. The following procedure describes how to test your Authenticator setup. Alternatively, you can run Access Tester in Oracle Access Manager to test your policy domain, as described in the Oracle Access Manager Access Administration Guide. To validate the Oracle Access Manager Authenticator implementation 1. Enter the URL to access the protected resource in your environment. For example: http:yourdomain.com:port 2. Provide appropriate credentials when the login form appears. ■ Successful: The implementation works.