To Enable Microsoft Exchange User Synchronization From the Command Line

19-2 Oracle Fusion Middleware Administrators Guide for Oracle Directory Integration Platform ■ How Do I Deploy the Oracle Password Filter for Microsoft Active Directory? 19.1.1 What is the Oracle Password Filter for Microsoft Active Directory? Oracle Directory Integration Platform enables synchronization between Oracle Internet Directory and Microsoft Active Directory. The Oracle Directory Integration Platform can retrieve all Microsoft Active Directory attributes with the exception of user passwords. Oracle Application Server Single Sign-On uses an external authentication plug-in to verify user credentials in Microsoft Active Directory and automatically store the updated password in Oracle Internet Directory. Applications such as Oracle Database Enterprise User Security that do not use Oracle Application Server Single Sign-On can use the Oracle Password Filter for Microsoft Active Directory to retrieve passwords from Microsoft Active Directory into Oracle Internet Directory. When users change their passwords from their desktops, the updated password is automatically synchronized with Oracle Internet Directory. More specifically, the Oracle Password Filter for Microsoft Active Directory monitors Microsoft Active Directory for password changes, which it then stores in Oracle Internet Directory. This allows Oracle Internet Directory users to be authenticated with their Microsoft Active Directory credentials and authorized to access resources by using information stored in Oracle Internet Directory. Storing Microsoft Active Directory user credentials in Oracle Internet Directory also provides a high availability solution in the event that the Microsoft Active Directory server is down. The Oracle Password Filter is installed on each Microsoft Active Directory server and automatically forwards password changes to Oracle Internet Directory. The Oracle Password Filter for Microsoft Active Directory does not require the Oracle Directory Integration Platform to synchronize passwords from Microsoft Active Directory to Oracle Internet Directory. The only requirement is that users synchronized from Microsoft Active Directory to Oracle Internet Directory must include the ObjectGUID attribute value to identify the user in both directories. The Oracle Password Filter for Microsoft Active Directory does not enforce password policies, or differences in password policies, between Microsoft Active Directory and Oracle Internet Directory. Instead, the system administrator must ensure that the password policies are consistent in both directories. Password change requests occur when an account is created, an administrator resets a user’s password, or when a user changes his or her own password. In order for the Oracle Password Filter for Microsoft Active Directory to capture Microsoft Active Directory passwords, one of these events must occur. Passwords that were set prior to installing the Oracle Password Filter for Microsoft Active Directory cannot be captured unless a system administrator forces a global password change request to all users. Note: Enterprise User Security can only verify user credentials that are stored in Oracle Internet Directory. For this reason, to verify user credentials in Microsoft Active Directory with Enterprise User Security, you must use the Oracle Password Filter to retrieve passwords from Microsoft Active Directory into Oracle Internet Directory. Note: The Oracle Password Filter for Microsoft Active Directory only captures password changes for 32-bit or higher Windows systems that have been integrated with Microsoft Active Directory. Deploying the Oracle Password Filter for Microsoft Active Directory 19-3 19.1.2 How Does the Oracle Password Filter for Microsoft Active Directory Work? This section describes how the Oracle Password Filter for Microsoft Active Directory works. It contains these topics: ■ How Clear Text Password Changes are Captured ■ Password Changes are Stored when Oracle Internet Directory is Unavailable ■ Password Synchronization is Delayed Until Microsoft Active Directory Users are Synchronized with Oracle Identity Management ■ Password Bootstrapping

19.1.2.1 How Clear Text Password Changes are Captured

When a password change request is made, the Local Security Authority LSA of the Windows operating system calls the Oracle Password Filter for Microsoft Active Directory package that is registered on the system. When the LSA calls the Oracle Password Filter for Microsoft Active Directory package, it passes to it the user name and changed password. The Oracle Password Filter for Microsoft Active Directory then performs the synchronization.

19.1.2.2 Password Changes are Stored when Oracle Internet Directory is Unavailable

When Oracle Internet Directory is unavailable, the password change events are archived securely and the encrypted passwords are stored in the Microsoft Active Directory. The Oracle Password Filter for Microsoft Active Directory attempts to synchronize these entries until it reaches the specified maximum number of retries. 19.1.2.3 Password Synchronization is Delayed Until Microsoft Active Directory Users are Synchronized with Oracle Identity Management The Oracle Password Filter for Microsoft Active Directory is notified immediately when a new user is created in Microsoft Active Directory. However, Oracle Directory Integration Platform will not synchronize entries until the next scheduled synchronization interval. For this reason, passwords for new user entries are stored in encrypted format in Microsoft Active Directory until the next synchronization. The Oracle Password Filter for Microsoft Active Directory then attempts to synchronize these entries until it reaches the specified maximum number of retries.

19.1.2.4 Password Bootstrapping

Because the original clear text form of a password is not retrievable by the Oracle Password Filter for Microsoft Active Directory, you cannot perform initial bootstrapping to synchronize passwords from Microsoft Active Directory to Oracle Internet Directory. However, you can instruct users to change their passwords or force a password change for all users in Microsoft Active Directory by changing the password expiration policy. 19.1.3 How Do I Deploy the Oracle Password Filter for Microsoft Active Directory? The general procedures for installing and configuring the Oracle Password Filter for Microsoft Active Directory are as follows; 1. Enable synchronization between Oracle Internet Directory and Microsoft Active Directory by following the instructions described in Chapter 18, Integrating with Microsoft Active Directory . 19-4 Oracle Fusion Middleware Administrators Guide for Oracle Directory Integration Platform 2. Configure and test Oracle Internet Directory in SSL server authentication mode by following the instructions in Configuring and Testing Oracle Internet Directory with SSL Server-Side Authentication on page 19-4. 3. Import the Oracle Internet Directory trusted server certificate into the Microsoft Active Directory domain controller by following the instructions in Importing a Trusted Certificate into a Microsoft Active Directory Domain Controller on page 19-5. 4. Verify that Oracle Internet Directory and Microsoft Active Directory can communicate with SSL server authentication by following the instructions in Testing SSL Communication Between Oracle Internet Directory and Microsoft Active Directory on page 19-6. 5. Install the Oracle Password Filter for Microsoft Active Directory by following the instructions in Installing the Oracle Password Filter for Microsoft Active Directory on page 19-8. 6. Configure the Oracle Password Filter for Microsoft Active Directory by following the instructions in Reconfiguring the Oracle Password Filter for Microsoft Active Directory on page 19-15.

19.2 Configuring and Testing Oracle Internet Directory with SSL Server-Side Authentication

The Oracle Password Filter communicates password changes from Microsoft Active Directory to Oracle Internet Directory using the Secure Socket Layer SSL protocol, which provides data encryption and message integrity for a TCPIP connection. More specifically, to synchronize password changes between Oracle Internet Directory and Microsoft Active Directory, you must use SSL server authentication mode, which allows a client to confirm a server’s identity. When combined with digital certificates, SSL also provides both server authentication and client authentication. Server authentication with SSL requires that you install a digital certificate on the server side of the communications link. When an SSL transaction is initiated by a client, the server sends its digital certificate to the client. The client examines the certificate to validate that the server has properly identified itself, including verifying that the certificate was issued by a trusted Certificate Authority CA. The subject attribute of the Oracle Internet Directory server certificate must match the Oracle Internet Directory server hostname. For example, if the Oracle Internet Directory server hostname is oid.oracle.com, then the subject attribute of the Oracle Internet Directory server certificate must also be oid.oracle.com. If the subject attribute of the Oracle Internet Directory server certificate does not match the Oracle Internet Directory server hostname, the Microsoft Active Directory password filter API will not accept the Oracle Internet Directory server certificate as being valid, despite the ldapbind -U 2 commands success. Oracle Internet Directory configured for Server authentication is also referred to as SSL type 2. In the case of Oracle Internet Directory and Microsoft Active Directory integration, Oracle Internet Directory is the server and Microsoft Active Directory is the client. The Oracle Password Filter for Microsoft Active Directory uses SSL to protect the password during transmission between the Microsoft Active Directory domain controller and the Oracle Internet Directory server. Deploying the Oracle Password Filter for Microsoft Active Directory 19-5 To configure and test Oracle Internet Directory with SSL server-side authentication, refer to Oracle Fusion Middleware Administrators Guide for Oracle Internet Directory.

19.3 Importing a Trusted Certificate into a Microsoft Active Directory Domain Controller

Server-authenticated SSL communication between a Microsoft Active Directory domain controller and Oracle Internet Directory will fail if the domain controller does not recognize the Oracle Internet Directory SSL certificate as valid. In order for a domain controller to accept an Oracle Internet Directory SSL certificate, you must use the Microsoft Management Console to import the certificate authority’s trusted certificate into the domain controller. To use the Microsoft Management Console to import the certificate authority’s trusted certificate into the domain controller:

1. Select Run from the Windows Start menu. The Run dialog box displays. In the

Run dialog box, type mmc, and then click OK. The Microsoft Management Console window displays.

2. Select AddRemove Snap-in from the File menu. The AddRemove Snap-in

dialog box displays.

3. In the AddRemove Snap-in dialog box, click Add. The Add Standalone Snap-in

dialog box displays.

4. In the Add Standalone Snap-in dialog box, select Certificates, and then click Add.

The Certificates snap-in dialog box displays, prompting you to select an option for which the snap-in will manage certificates.

5. In the Certificates snap-in dialog box, select Computer Account, and then click

Next . The Select Computer dialog box displays.

6. In the Select Computer dialog box, select Local Computer, and then click Finish.

7. Click Close in the Add Standalone Snap-in dialog box, and then click OK in the

AddRemove Snap-in dialog box. The new console displays Certificates Local Computer in the console tree.

8. In the console tree, expand Certificates Local Computer, and then click Trusted

Root Certification Authority .

9. Point to All Tasks on the Action menu, and then select Import. The Welcome page

of the Certificate Import Wizard displays. Click Next to display the File to Import page.

10. On the File to Import page, enter the path and file name of the certificate

authority’s trusted root certificate, or click Browse to search for a file, and then click Next. The Certificate Store page displays.

11. On the Certificate Store page, select Place all certificates in the following store. If

Trusted Root Certification Authorities is not already selected as the certificate Note: The certificate you use with the Oracle Password Filter for Microsoft Active Directory can be generated by any X.509-compliant certificate authority capable of accepting PKCS10 standard certificate requests and producing certificates compliant with the X.509, Version 3, ISO standard and with RFC 2459. 19-6 Oracle Fusion Middleware Administrators Guide for Oracle Directory Integration Platform store, click Browse and select it. Click Next. The Completing the Certificate Import page displays.

12. On the Completing the Certificate Import page, click Finish. A dialog box displays

indicating that the import was successful. Click OK. 13. Click Save from the File menu. The Save As dialog box displays. Enter a name for the new console, and then click Save.

14. Close Microsoft Management Console.

19.4 Testing SSL Communication Between Oracle Internet Directory and Microsoft Active Directory

The Oracle Password Filter for Microsoft Active Directory installs a command named ldapbindssl on the domain controller that you can use to test SSL communication between Oracle Internet Directory and Microsoft Active Directory. The syntax for the ldapbindssl is as follows: ldapbindssl -h oid_hostname -p ssl_port -D binddn -w password To test SSL connectivity from Microsoft Active Directory to Oracle Internet Directory: 1. Open a command prompt window on the domain controller and navigate to the folder where you installed the Oracle Password Filter for Microsoft Active Directory. 2. Enter the ldapbindssl command to test SSL communication with Oracle Internet Directory. For example, the following command attempts to bind to an Oracle Internet Directory host named oraas.mycompany.com on SSL port 3133: ldapbindssl -h oraas.mycompany.com -p 3133 -D binddn -w password If the ldapbindssl command is successful, the following response is returned: bind successful If the ldapbindssl command is not successful, the following response is returned: Cannot connect to the LDAP server If you cannot connect from Microsoft Active Directory to Oracle Internet Directory in SSL mode, verify that you successfully imported a trusted certificate into your Microsoft Active Directory domain controller, as described in Importing a Trusted Certificate into a Microsoft Active Directory Domain Controller on page 19-5. Note: For help on importing a trusted certificate with Microsoft Management Console, refer to your Windows product documentation or visit Microsoft Help and Support at http:support.microsoft.com . Note: The ldapbindssl binary is included in the Oracle Password Filter for Microsoft Active Directory installation. You cannot execute the ldapbindssl command without first installing the Oracle Password Filter for Microsoft Active Directory.