Integrating Components 18-5
■
OAM11G_IDSTORE_NAME is the name of the Identity Store. If you already have an Identity Store in place which is different from the default created by
this tool, set this parameter to the name of that Identity Store.
■
OAM11G_OIM_OHS_URL is the URL used to access OIM when accessing through the load balancer.
3.
Configure Oracle Access Manager using the command idmConfigTool, which is located at IAM_ORACLE_HOMEidmtoolsbin.
The syntax of the command on Linux is: idmConfigTool.sh -configOAM input_file=configfile
The syntax on Windows is: idmConfigTool.bat -configOAM input_file=configfile
For example: idmConfigTool.sh -configOAM input_file=config_oam2.props
When the command runs, you are prompted to enter the password of the account you are connecting to the Identity Store with. You are also asked to specify the
passwords you want to assign to the accounts:
■
IDSTORE_PWD_OAMSOFTWAREUSER
■
IDSTORE_PWD_OAMADMINUSER Sample command output:
Enter ID Store Bind DN password: Enter User Password for IDSTORE_PWD_OAMSOFTWAREUSER:
Confirm User Password for IDSTORE_PWD_OAMSOFTWAREUSER: Enter User Password for IDSTORE_PWD_OAMADMINUSER:
Confirm User Password for IDSTORE_PWD_OAMADMINUSER: The tool has completed its operation. Details have been logged to
automation.log
4.
Check the log file for any errors or warnings and correct them
5.
Restart WebLogic Administration Server, as described in Section 20.1, Starting
and Stopping Oracle Identity Management Components.
18.1.4 Updating Existing LDAP Users with Required Object Classes
You must update existing LDAP users with the object classes OblixPersonPwdPolicy, OIMPersonPwdPolicy, and OblixOrgPerson.
Note: When you run the idmConfigTool, it creates or appends to
the file idmDomainConfig.param. This file is generated in the same directory that the idmConfigTool is run from. To ensure that each
time the tool is run, the same file is appended to, always run the idmConfigTool from the directory:
IAM_ORACLE_HOME idmtoolsbin
Note:
This is not required in the case of a fresh setup where you do not have any existing users.
18-6 Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Identity Management
On IDMHOST1, create a properties file for the integration called user.props, with the following contents:
IDSTORE_HOST: idstore.mycompany.com IDSTORE_PORT: 389
IDSTORE_ADMIN_USER: cn=orcladmin IDSTORE_USERSEARCHBASE: cn=Users,dc=mycompany,dc=com
IDSTORE_GROUPSEARCHBASE: cn=Groups,dc=mycompany,dc=com PASSWORD_EXPIRY_PERIOD: 7300
Set the environment variables: MW_HOME, JAVA_HOME, IDM_HOME and ORACLE_HOME. Set IDM_HOME to IDM_ORACLE_HOME.
Set ORACLE_HOME to IAM_ORACLE_HOME. Upgrade existing LDAP, using the command idmConfigTool, which is located at:
IAM_ORACLE_HOME idmtoolsbin
The syntax of the command is: idmConfigTool.sh - upgradeLDAPUsersForSSO input_file=configfile
on Linux and UNIX-based operating systems and idmConfigTool.bat -upgradeLDAPUsersForSSO input_file=configfile
on Windows. For example:
idmConfigTool.sh -upgradeLDAPUsersForSSO input_file=user.props When prompted, enter the following information:
■
The password of the user you are using to connect to your Identity Store.
■
The directory type: OVD if you are using Oracle Virtual Directory, otherwise OID Sample output:
Enter LDAP admin user password: Upgrading LDAP Users With OAM ObjectClasses
Enter Directory Type[OID]: OVD Completed loading user inputs for - LDAP connection info
Completed loading user inputs for - LDAP Upgrade Upgrading ldap users at - cn=Users,dc=us,dc=oracle,dc=com
Parsing - cn=readOnlyUser,cn=Users,dc=us,dc=oracle,dc=com
Note: When you run the idmConfigTool, it creates or appends to
the file idmDomainConfig.param. This file is generated in the same directory that the idmConfigTool is run from. To ensure that each
time the tool is run, the same file is appended to, always run the idmConfigTool from the directory:
IAM_ORACLE_HOME idmtoolsbin
Integrating Components 18-7
objectclass OIMPersonPwdPolicy not present in cn=readOnlyUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
objectclass OblixOrgPerson not present in cn=readOnlyUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
objectclass OblixPersonPwdPolicy not present in cn=readOnlyUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
obpasswordexpirydate added in cn=readOnlyUser,cn=Users,dc=us,dc=oracle,dc=com Parsing - cn=readWriteUser,cn=Users,dc=us,dc=oracle,dc=com
objectclass OIMPersonPwdPolicy not present in cn=readWriteUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
objectclass OblixOrgPerson not present in cn=readWriteUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
objectclass OblixPersonPwdPolicy not present in cn=readWriteUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
obpasswordexpirydate added in cn=readWriteUser,cn=Users,dc=us,dc=oracle,dc=com Parsing - cn=weblogic,cn=Users,dc=us,dc=oracle,dc=com
objectclass OIMPersonPwdPolicy not present in cn=weblogic,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
objectclass OblixOrgPerson not present in cn=weblogic,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
objectclass OblixPersonPwdPolicy not present in cn=weblogic,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
obpasswordexpirydate added in cn=weblogic,cn=Users,dc=us,dc=oracle,dc=com Parsing - cn=oamMasterAdminUser,cn=Users,dc=us,dc=oracle,dc=com
objectclass OIMPersonPwdPolicy not present in cn=oamMasterAdminUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
objectclass OblixPersonPwdPolicy not present in cn=oamMasterAdminUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
obpasswordexpirydate added in cn=oamMasterAdminUser,cn=Users,dc=us,dc=oracle,dc=com
Parsing - cn=oamSoftwareUser,cn=Users,dc=us,dc=oracle,dc=com objectclass OIMPersonPwdPolicy not present in
cn=oamSoftwareUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it objectclass OblixOrgPerson not present in
cn=oamSoftwareUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it objectclass OblixPersonPwdPolicy not present in
cn=oamSoftwareUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
18-8 Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Identity Management
obpasswordexpirydate added in cn=oamSoftwareUser,cn=Users,dc=us,dc=oracle,dc=com Parsing - cn=PolStoreROUser,cn=Users,dc=us,dc=oracle,dc=com
objectclass OIMPersonPwdPolicy not present in cn=PolStoreROUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
objectclass OblixOrgPerson not present in cn=PolStoreROUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
objectclass OblixPersonPwdPolicy not present in cn=PolStoreROUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
obpasswordexpirydate added in cn=PolStoreROUser,cn=Users,dc=us,dc=oracle,dc=com Parsing - cn=PolStoreRWUser,cn=Users,dc=us,dc=oracle,dc=com
objectclass OIMPersonPwdPolicy not present in cn=PolStoreRWUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
objectclass OblixOrgPerson not present in cn=PolStoreRWUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
objectclass OblixPersonPwdPolicy not present in cn=PolStoreRWUser,cn=Users,dc=us,dc=oracle,dc=com. Seeding it
obpasswordexpirydate added in cn=PolStoreRWUser,cn=Users,dc=us,dc=oracle,dc=com Parsing - cn=PUBLIC, cn=Users, dc=us,dc=oracle,dc=com
objectclass OIMPersonPwdPolicy not present in cn=PUBLIC, cn=Users, dc=us,dc=oracle,dc=com. Seeding it
objectclass OblixOrgPerson not present in cn=PUBLIC, cn=Users, dc=us,dc=oracle,dc=com. Seeding it
objectclass OblixPersonPwdPolicy not present in cn=PUBLIC, cn=Users, dc=us,dc=oracle,dc=com. Seeding it
obpasswordexpirydate added in cn=PUBLIC, cn=Users, dc=us,dc=oracle,dc=com Parsing - cn=orcladmin, cn=Users, dc=us,dc=oracle,dc=com
objectclass OIMPersonPwdPolicy not present in cn=orcladmin, cn=Users, dc=us,dc=oracle,dc=com. Seeding it
obpasswordexpirydate added in cn=orcladmin, cn=Users, dc=us,dc=oracle,dc=com Parsing - cn=xelsysadm,cn=Users,dc=us,dc=oracle,dc=com
Parsing - cn=xelsysadmin,cn=Users,dc=us,dc=oracle,dc=com Finished parsing LDAP
LDAP Users Upgraded.
Integrating Components 18-9
18.1.5 Integrating Oracle Access Manager 11g with Oracle Identity Manager 11g