Integrating Oracle Virtual Directory with External Directories

Configuring Oracle Virtual Directory for Integrated Directory Solutions 19-7 5. Create an LDAP Adapter for Enterprise User Security using the following settings and by entering the Active Directory host information, including the appropriate Remote Base and Mapped Namespace. Refer to Creating LDAP Adapters on page 12-3 for information on creating LDAP Adapters. ■ Use the EUS_ActiveDirectory template for the adapter. ■ Enable the Use SSLTLS option. ■ Set SSL Authentication Mode to Server Only Authentication Mutual Authentication. 6. Configure the Enterprise User Security plug-ins by performing the following steps:

a. Click the Advanced tab, click the EUS_ActiveDirectory entry under

Mapping Templates, and then click the Apply to deploy the mapping. b. Access the LDAP Adapter for Enterprise User Security and click the Plug-ins tab.

c. Select the ObjectclassMapper plug-in, click the Edit button, click the Create

Namespace button, enter cn=OracleContext,YOUR Mapped DOMAIN DN in Oracle Virtual Directory in the Namespace field, and then click the OK button. d. Select the ActiveDirectory Password plug-in, click the Edit button, click the Create Namespace button, and enter cn=OracleContext,YOUR Mapped DOMAIN DN in Oracle Virtual Directory in the Namespace field. Click the Create Namespace button again, enter cn=users,YOUR Mapped DOMAIN DN in Oracle Virtual Directory in the Namespace field, and then click the OK button. e. Click the Create Mapping button, then select EUSActiveDirectory.py, then enter a unique mapping name, then click the Create Namespace button, then enter cn=users,YOUR Mapped DOMAIN DN in Oracle Virtual Directory in the Namespace field, and then click the OK button. f. Click the Apply button. 7. Configure the Access Control Lists ACLs for the integration. Refer to Configuring Access Control Lists for the Enterprise User Security Integration on page 19-21 for details about each ACL. After you configure the ACLs, continue the integration by proceeding to step 8. 8. Create an LDAP Adapter for the Enterprise User Security administrative group using the following settings and by entering the Active Directory host information. Refer to Creating LDAP Adapters on page 12-3 for information on creating LDAP Adapters. ■ Use the Active_Directory template for the adapter. ■ Use cn=OracleContextAdmins,cn=users, YOUR Active_ Directory_Domain_DN as the Remote Base. ■ Use the following for the Mapped Namespace: cn=OracleContextAdmins,cn=Groups,cn=OracleContext,YOUR Mapped DOMAIN DN in Oracle Virtual Directory 9. Configure the mappings and plug-ins for the Enterprise User Security administrative group adapter by performing the following steps: 19-8 Oracle Fusion Middleware Administrators Guide for Oracle Virtual Directory

a. Click the Advanced tab, click Active_Directory_to_inetOrg, and then click the

Apply button to deploy the mapping.

b. Click the Adapter tab, click the adapter for the Enterprise User Security

administrative group, click the Plug-ins tab, click the Create Mapping button, select ActiveDirectorytoinetOrg.py, enter a unique mapping name, and then click OK.

c. Click the Create Plugin button, click the Select button, select the

EUSMemberDNMapping plug-in, click OK, enter a unique plug-in name, create the localDomainDN and remoteDomainDN parameters, and then click OK . Where localDomainDN is the domain DN that you see from Oracle Virtual Directory and remoteDomainDN is the domain DN in your back-end directory. Note that the localDomainDN and remoteDomainDN may be different if you have DN mapping configured.

d. Click the Apply button.

10. Update the realm information with Root Oracle Context by performing the following steps: a. Edit the modifyRealm.ldif file to use your Active Directory domain name. If you use DN mappings between Oracle Virtual Directory and Active Directory, use the mapped DN in Oracle Virtual Directory. b. Update the realm information using the following command: ORACLE_HOME binldapmodify –h Oracle_Virtual_Directory_Host –p port \ -D bindDN -q –v –f modifyRealm.ldif The steps to configure Oracle Virtual Directory for integration with Enterprise Security and for use with Microsoft Active Directory are complete. Continue the integration process and configure Enterprise User Security by referring to the Oracle Database Enterprise User Administrators Guide.

19.2.2.2 User Identities in Microsoft Active Directory and Metadata in Oracle Internet Directory

Perform the following steps to integrate Oracle Virtual Directory with Enterprise User Security when user identities are stored in Active Directory and to store metadata in Oracle Internet Directory: Note: You may not see the group membership changes immediately after your changes in Active Directory. This is because of Active Directory’s group membership refresh interval configuration. Note: To update the Active Directory-Oracle Virtual Directory configuration, edit the modifyRealm.ldif file and execute ldapmodify with the updated modifyRealm.ldif file. Note: If you are using Kerberos authentication in the integration, do not perform steps 6 and 7 in the following procedure.