Within jps-config .xml, add the following propertySet name=props.auth.uri.0 Within jps-config .xml, add the following serviceProviders element and values: Within jps-config .xml, add the following serviceInstances element and values:

Managing OAM Identity Assertion on IBM WebSphere 7-23 4. Proceed to Configuring OPSS for SSO Logout with Oracle Access Manager .

7.10.2.2 Configuring OPSS for SSO Logout with Oracle Access Manager

Application configuration for logout depends on whether you have an ADF-coded application integrated with OPSS versus not integrated with OPSS. This topic focuses on ADF-coded applications that are integrated with OPSS. The following procedure is similar to configuring logout for 10g WebGates, with a specific step for ADF-coded applications, which must send the end_url value to identify where to redirect the user after logout processing. However, with ADF-coded applications, logout occurs when the application causes the following URI to be invoked: app context rootadfAuthentication?logout=trueend_url=any uri To configure OPSS for SSO Logout with OAM 1. Locate and open the jps-config .xml file in the following path: was_profile_dirconfigcellscell_namefmwconfigjps-config.xml

2. Within jps-config .xml, add the following propertySet name=props.auth.uri.0

element and values: ?xml version=1.0 encoding=UTF-8 standalone=yes? jpsConfig xmlns=http:xmlns.oracle.comoracleasschema11jps-config-11_ 1.xsd xmlns:xsi=http:www.w3.org2001XMLSchema-instance xsi:schemaLocation=http:xmlns.oracle.comoracleasschema11jps-config-11_ 1.xsd property value=off name=oracle.security.jps.jaas.mode propertySets . propertySet name=props.auth.uri.0 property value=oamssologout.html name=logout.url property value={app.context}adfAuthentication name=login.url.BASIC property value={app.context}adfAuthentication name=login.url.ANONYMOUS property value={app.context}adfAuthentication name=login.url.FORM propertySet propertySet name=props.auth.level.0 property value=0 name=type-level:ANONYMOUS property value=1 name=type-level:BASIC property value=2 name=type-level:FORM . propertySets

3. Within jps-config .xml, add the following serviceProviders element and values:

... propertySets serviceProviders serviceProvider class=oracle.security.jps.internal.sso.SsoService Provider name=sso.provider.0 type=SSO serviceProviders

4. Within jps-config .xml, add the following serviceInstances element and values:

?xml version=1.0 encoding=UTF-8 standalone=yes? ... serviceProviders serviceInstances 7-24 Oracle Fusion Middleware Third-Party Application Server Guide . . serviceInstance provider=sso.provider.0 name=sso.inst.0 property value=oracle.security.jps.wls.internal.sso.WlsToken Provider name=token.provider.class property value=2 name=default.auth.level property value=oracle.security.wls.oam.providers.sso.OAMSSO ServiceProviderImpl name=sso.provider.class property value=OAMSSOToken name=token.type propertySetRef ref=props.auth.uri.0 propertySetRef ref=props.auth.level.0 serviceInstance . . serviceInstances 5. Within jpsContexts, add the highlighted serviceInstanceRef ref=sso.inst.0 element and value: ?xml version=1.0 encoding=UTF-8 standalone=yes? ... serviceInstances jpsContexts default=default jpsContext name=default serviceInstanceRef ref=credstore serviceInstanceRef ref=keystore serviceInstanceRef ref=policystore.xml serviceInstanceRef ref=audit serviceInstanceRef ref=idstore.ldap serviceInstanceRef ref=sso.inst.0 jpsContext jpsContexts jpsConfig 6. In the Oracle Access Manager policy, protect oamssologout.html with the Anonymous Authentication scheme, as described in theOracle Fusion Middleware Administrators Guide for Oracle Access Manager. 7. Proceed to Configuring oamAuthenProvider.jar in the IBM WebSphere classpath