Click the Create OAM Database Adapter button. The Preparing OVD for

Configuring Oracle Virtual Directory for Integrated Directory Solutions 19-5 1. Make a back-up copy of your Active Directory image. The schema extensions inside of Active Directory are permanent and cannot be canceled. The back-up image enables you to restore all your changes if required. 2. Load the Enterprise User Security required schema, extendAD, into Active Directory using the Java classes included in Oracle Virtual Directory by executing the following command. The extendAD file is located in the ORACLE_ HOME ovdeus directory. You can use the java executable in the ORACLE_ HOME jdkbin directory. java extendAD -h Active_Directory_Host_Name -p Active_Directory_Port -D Active_Directory_Admin_DN -w Active_Directory_Admin_Password –AD Active_Directory_Domain_DN 3. Install the Oracle Internet Directory Password Change Notification plug-in, oidpwdcn.dll, by performing the following steps: a. Copy the ORACLE_HOMEovdeusoidpwdcn.dll file to the Active Directory WINDOWS\system32 directory. b. Use regedt32 to edit the registry and enable the oidpwdcn.dll. Start regedt32 by entering regedt32 at the command prompt.

c. Add oidpwdcn to the end of the Notification Packages entry in the HKEY_

LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\ registry, for example: RASSFM KDCSVC WDIGEST scecli oidpwdcn d. Restart the Active Directory system after making these changes. 4. Verify the Oracle Internet Directory Password Change Notification plug-in by performing the following steps: a. Change the password of an Active Directory user. b. Search Active Directory for the user you changed the password for. Verify the orclCommonAttribute attribute contains the generated hash password value. This value adds the orclCommonAttribute attribute definition in Active Directory. c. Reset the password for all the Active Directory users, allowing the plug-in to acquire the password changes and generate and store password verifiers. 5. If you are using Kerberos authentication on Windows 2000 or Windows 2003 with Oracle Database Advanced Security, you must configure it now by referring to the Oracle Database Advanced Security Administrators Guide. After you configure the Kerberos authentication, make sure you can log in to the database using your Active Directory user credential before proceeding to the next steps. Note: An example of a valid Active Directory domain DN is: dc=oracle,dc=com