Installation and Configuration 11g 11.1.1

2-2 Oracle Fusion Middleware Administrators Guide for Oracle Adaptive Access Manager ■ Importing the OAAM Snapshot ■ Importing IP Location Data ■ Importing Transaction Definitions ■ Enabling Components and Features ■ Setting the Time Zone Used for All Time Stamps in the Administration Console

2.3 Setting Up CLI Environment

The Oracle Adaptive Access Manager Command-Line Interface CLI scripts enable users to perform various tasks instead of using the Oracle Adaptive Access Manager Administration Console. For information on setting up the CLI environment, see Section 29.2, Setting Up the CLI Environment.

2.4 Setting Up Encryption and Database Credentials for Oracle Adaptive Access Manager

Encryption is used to protect data within Oracle Adaptive Access Manager from unauthorized access. The process uses methods and a key or keys to encode plain text into a non-readable form. A key is required to decrypt the encrypted information and make it readable again. Authorized persons who possess the key can decrypt information that is encrypted with the same key. This section provides instructions to set up encryption and database credentials for Oracle Adaptive Access Manager.

2.4.1 Overview of the Process

An overview for setting up encryption and database credentials is provided in this section.

2.4.1.1 Setting up Encryption

Setting up encryption involves the following steps: ■ Ensure the secret keys a.k.a symmetric keys for both the configuration value and database are available. If you do not have a secret key, generate an encoded symmetric key using the genEncodedKey command. ■ Encode the key using the base64encode option of the encodeKey command. This step is not required if the genEncodedKey command was used to generate the key. ■ Use the Fusion Middleware Control to add the encoded secret key to an alias in the Credential Store Framework in the domain where Oracle Adaptive Access Manager is installed. A credential store is a repository to store user namepassword or generic credentials a certificate. The value of using a credential store is that the application does not store passwords in clear text and does not have to invent its own solutions for protecting passwords, allowing administrators and developers alike to work with a consistent credential repository.