User Interface Threads Disable Reloading of Adapters and Plug-in Configuration Changing the Number of Open File Descriptors for UNIX Optional Tuning the JVM Garbage Collection for Solaris Sparc T3 or T4

Tuning and Managing Application Cache 26-3

26.3 Purging the Cache

If you want to purge the cache, use the PurgeCache utility in the OIM_HOMEserverbin directory. This utility purges all elements in the cache. Before running the PurgeCache utility, you must run the DOMAIN_HOMEbinsetDomainEnv.sh script. To use the PurgeCache utility, run PurgeCache.bat CATEGORY_NAME on Microsoft Windows or PurgeCache.sh CATEGORY_NAME on UNIX. The CATEGORY_NAME argument represents the name of the category that must be purged. For example, the following commands purge all FormDefinition entries from a system and its clusters: PurgeCache.bat FormDefinition PurgeCache.sh FormDefinition To purge all Oracle Identity Manager categories, pass a value of All to the PurgeCache utility. It is recommended to clear all the categories. Note: ■ Purging is required when caching is enabled and if you make any system configuration changes. It is not required if caching is disabled. ■ Before running the PurgeCache utility, navigate to the OIM_HOMEserverbin directory. Note: The wlfullclient.jar file must be in the classpath for the PurgeCache utility to run correctly. 26-4 Oracle Fusion Middleware Administrators Guide for Oracle Identity Manager 27 Securing a Deployment 27-1 27 Securing a Deployment Securing an Oracle Identity Manager deployment is achieved through authorization and hardening. Authorization controls the access to various components. Hardening secures the components from potential security threats. Table 27–1 lists the various topics that you can refer for information about securing an Oracle Identity Manager deployment: Table 27–1 Securing a Deployment Topic Topic Type Information Covered Managing Scheduled Tasks on page 2-1 Hardening Scheduled tasks and scheduled jobs. Ensure that only required scheduled tasks are enabled. System Properties in Oracle Identity Manager on page 4-1 Hardening System properties related to system behavior. Ensure that password policies and challenge questions and answers are defined. Creating the User Account for Installing Connectors on page 6-7 Hardening Specific permissions required to install connectors. Enabling Secure Cookies on page 9-1 Hardening Enabling Oracle Identity Manager to work over SSL. Enabling SSL Between Identity Virtualization Library libOVD and the Directory Server on page 10-5 Hardening Instructions specific to Microsoft Active Directory, iPanet Directory Server, and Oracle Internet Directory for Identity Virtualization Library libOVD Configuring LDAP Authentication When LDAP Synchronization is Enabled on page 10-10 Hardening Enabling LDAP authentication. URL Changes Related to Oracle Identity Manager on page 12-1 Hardening Steps to make the corresponding changes in Oracle Identity Manager and Oracle WebLogic configuration for any change in the integrated and dependent applications Password Changes Related to Oracle Identity Manager on page 12-6 Hardening Steps to make the changes to the password in Oracle Identity Manger and Oracle WebLogic configuration for any change in the dependent or integrated products. Configuring SSL for Oracle Identity Manager on page 12-9 Hardening Securing Oracle Identity Manager by configuring SSL. Managing Password Policies on page 14-1 Hardening Password policy configuration. Adding the Trust Relation on page 21-2 Hardening Remote Manager SSL configuration. 27-2 Oracle Fusion Middleware Administrators Guide for Oracle Identity Manager Configuring the Remote Manager by Using Your Own Certificate on page 21-3 Hardening Remote Manager configuration by using your own certificate instead of the default Oracle Identity Manager certificate. OES Integration on page 1-6 Authorization Reconciliation event access. Check Permissions for Roles on page 5-16 Authorization Permissions for role while importing and exporting roles. Check for any errors in setting data object permissions if data object is missing. User Management Authorization in the Oracle Fusion Middleware Users Guide for Oracle Identity Manager Authorization Authorization of user management operations. Role Membership Inheritance in the Oracle Fusion Middleware Users Guide for Oracle Identity Manager Authorization Inheritance of role by membership. Role Permission Inheritance in the Oracle Fusion Middleware Users Guide for Oracle Identity Manager Authorization Inheritance of role by permissions. Default Roles in the Oracle Fusion Middleware Users Guide for Oracle Identity Manager Authorization Predefined roles in Oracle Identity Manager. Updating Data Object Permissions in the Oracle Fusion Middleware Users Guide for Oracle Identity Manager Authorization Data object permissions at the role level. Managing Authorization for Roles in the Oracle Fusion Middleware Users Guide for Oracle Identity Manager Authorization Authorization for role management operations. Managing Administrative Roles in the Oracle Fusion Middleware Users Guide for Oracle Identity Manager Authorization Organization administration roles. Managing Permitted Resources in the Oracle Fusion Middleware Users Guide for Oracle Identity Manager Authorization Steps to assign and update permitted resources to the users of selected organizations. Organization Management Authorization in the Oracle Fusion Middleware Users Guide for Oracle Identity Manager Authorization Authorization of organization management operations. Managing Authorization Policies in the Oracle Fusion Middleware Users Guide for Oracle Identity Manager Authorization Using authorization policies to secure Oracle Identity Manager deployment. See Also: Oracle Fusion Middleware Installation Guide for Oracle Identity Management and Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Identity Management for information about Oracle Identity Management software integrations and related security aspects Table 27–1 Cont. Securing a Deployment Topic Topic Type Information Covered