Access Client Architecture Introduction to Access Clients
Introduction to the Access SDK and API 2-13
5.
The OAM Server responds.
6.
The application uses a form or some other means to ask for user credentials. In some cases, the user credentials may already have been submitted as part of:
■
A valid session token
■
Input from a web browser
■
Arguments to the command-line script or keyboard input that launched the Access Client application
7.
The user responds to the application.
8.
The Access Client constructs an UserSession structure, which presents the user credentials to the OAM Server, which maps them to a user profile in the Oracle
Access Manager user directory.
9.
If the credentials prove valid, the Access Client creates a session token for the user, then it sends a request for authorization to the OAM Server. This request contains
the user identity, the name of the target resource, and the requested operation.
10.
The Access Client grants the user access to the resource, providing that the user is authorized for the requested operation on the particular resource.
11.
Not pictured. A well-behaved Access Client deallocates the memory used by the objects it has created, then shuts down the Access Manager API.
The steps detailed in Process Overview: Handling a resource request
on page 2-12 represent only the main path of the authorization process. Typically, additional code
sections within the servlet or application handle branch situations where:
■
The requested resource is not protected.
■
The authentication challenge method associated with the protected resource is not supported by the application.
■
The user has a valid single sign-on cookie ObSSOCookie, which enables the user to access to the resource without again presenting her credentials for as long as the
session token embedded in the cookie remains valid. For details about ObSSOCookies and single sign-on, see the Oracle Fusion Middleware
Administrators Guide for Oracle Access Manager with Oracle Security Token Service.
■
The user fails to supply valid credentials under the specified conditions.
■
Some other error condition arises.
■
The developer has built additional custom code into the Access Client to handle special situations or functionality.