Select the General tab. Add the users distinguished name to User DN. This adds the users DN to the
Monitoring Oracle Internet Directory 24-9
The attributes orcloptrackmaxtotalsize and orcloptracknumelemcontainers enable you to tune memory used for tracking
statistics and events. See the Oracle Internet Directory chapter in Oracle Fusion Middleware Performance and Tuning Guide.
Configuring User Statistics Collection from the Command Line
To enable user statistics, set the orclstatslevel attribute to 1. The orclStatsPeriodicity attribute must also be set for user statistics collection to occur.
To configure users for statistics collection, see Configuring a User for Statistics
Collection by Using the Command Line on page 24-10.
Configuring Event Levels from the Command Line
The orclstatsflag attribute must be set to 1 for event level tracking to occur. To configure event levels, use ldapmodify to set the orcleventlevel attribute to one
or more of the event levels listed in Table 24–5
. The attribute orcleventlevel is in the instance-specific configuration entry, as described in
Chapter 9, Managing System Configuration Attributes.
Table 24–4 Metrics Recorded by Each orcloptracklevel Value
Configuration Metrics Recorded
DN only Date and time stamp
EID of DN performing the operation Success counts
Failure counts DN and IP address
All metrics listed under DN only Source IP Address
DN, IP address and failure details
All metrics listed under DN and IP address Distinct success counts
Distinct failure counts Failure details for each DN performing password compare from
an IP Address:
■
Date and time stamp
■
Source IP Address
■
EID of DN whose password is compared
■
Failure counts
Note: When you are collecting statistics for Oracle Enterprise
Manager Fusion Middleware Control, set orclStatsPeriodicity to be the same as the collection periodicity of the Enterprise Manager agent,
which is 10 minutes by default.
Table 24–5 Event Levels
Level Value Critical Event
Information It Provides
1 SuperUser login
Super uses bind successes or failures
24-10 Oracle Fusion Middleware Administrators Guide for Oracle Internet Directory
Configuring a User for Statistics Collection by Using the Command Line
To configure a user by using the command line, add the users DN to the DSA Configset entrys multivalued attribute orclstatsdn DN:
cn=dsaconfig,cn=configsets,cn=oracle internet directory by using the ldapmodify command line tool. For example, this LDIF file adds Mary Lee to orclstatsdn:
dn: cn=dsaconfig,cn=configsets,cn=oracle internet directory changetype:modify
add: orclstatsdn orclstatsdn: cn=Mary Lee, ou=Product Testing, c=us
Use a command line such as: ldapmodify -h host -p port -f ldifFile -D cn=orcladmin -q
Viewing Information with the OIDDIAG Tool
Reports for all the statistics can be viewed using the oiddiag tool, as follows:
Security Events oiddiag audit_report=true [outfile=file_name]
2 Proxy user login
Proxy user bind failures 4
Replication login Replication bind failures
8 Add access
Add access violation 16
Delete access Delete access violation
32 Write access
Write access violation 64
ORA 3113 error Loss of connection to database
128 ORA 3114 error
Loss of connection to database 256
ORA 28 error ORA-28 Error
512 ORA error
ORA errors other an expected 1, 100, or 1403 1024
Oracle Internet Directory server
termination count 2047
All critical events
Note: If you have configured orclldapconntimeout so that idle
LDAP connections are closed after a period of time, as described in the Oracle Internet Directory chapter of Oracle Fusion Middleware
Performance and Tuning Guide, be aware that connections do not time out as per this setting for users who are configured for statistics
collection.
Table 24–5 Cont. Event Levels
Level Value Critical Event
Information It Provides
Monitoring Oracle Internet Directory 24-11
All Statistics and Events oiddiag collect_all=true, [outfile=file_name]
Subset of Statistics and Events oiddiag collect_sub=true [infile=input_file_name, outfile=file_name ]
where input_file_name is created by taking the output from oiddiag listdiags=true
and removing unwanted statistics classes.
Note: On Windows, the filename of the oiddiag command is
oiddiag.bat.
See Also:
■
The oiddiag command tool reference in Oracle Fusion Middleware Reference for Oracle Identity Management.
■
The chapter about administration tools in the Oracle Fusion Middleware Administrators Guide
24-12 Oracle Fusion Middleware Administrators Guide for Oracle Internet Directory
25
Backing Up and Restoring Oracle Internet Directory 25-1
25
Backing Up and Restoring Oracle Internet Directory
This chapter tells how to backup and restore both small and large directories. It contains these topics:
■
Introduction to Backing Up and Restoring Oracle Internet Directory
■
Backing Up and Restoring a Small Directory or Specific Naming Context
■
Backing Up and Restoring a Large Directory
Introduction to Backing Up and Restoring Oracle Internet Directory
You can back up a small directory or a specific naming context by using ldifwrite. For larger directories, perform an Oracle Fusion Middleware backup. See the chapters
on backup and recovery in Oracle Fusion Middleware Administrators Guide.
Backing Up and Restoring a Small Directory or Specific Naming Context
To backup and restore a small directory or specific naming context in directory, do the following:
1.
Back up the node, as follows:
a.
Ensure that the environment variable ORACLE_INSTANCE is set correctly.
b.
Ensure all Oracle Internet Directory servers, both LDAP and replication, are stopped on the node.
c.
Enter this command: ldifwrite connect=connect_string basedn=naming_context \
ldiffile=backup.ldif
2.
Start the directory server on the new node by entering this command: opmnctl startproc process-type=OID
3.
Load data into the new node by using the bulkload utility. Enter this command: bulkload connect=connect_string check=TRUE generate=TRUE \
load=TRUE restore=TRUE append=TRUE file=complete_pathbackup.ldif
25-2 Oracle Fusion Middleware Administrators Guide for Oracle Internet Directory
Backing Up and Restoring a Large Directory
For instructions on backing up and restoring a large directory, see the backup and recovery chapter in Oracle Fusion Middleware Administrators Guide.
Note: If you back up data from an earlier version of Oracle Internet
Directory, such as 10g Release 2 10.1.2.0.2, then restore it on a node running 10g 10.1.4.0.1 or later, you must update the password policy
entries as described in Password Policy and Fan-out Replication on page 30-32.
Part III
Part III
Advanced Administration: Security
This part explains how to:
■
Secure data within the directory
■
Establish access controls for administering applications in enterprises and hosted environments
■
Establish and manage policies governing passwords
■
Manage password verifiers used to authenticate users to other Oracle components
■
Store data for users, groups, and services in one repository, and delegate the administration of that data to various administrators
It contains these chapters:
■
Chapter 26, Configuring Secure Sockets Layer SSL
■
Chapter 27, Configuring Data Privacy
■
Chapter 28, Managing Password Policies
■
Chapter 29, Managing Directory Access Control
■
Chapter 30, Managing Password Verifiers
■
Chapter 31, Delegating Privileges for Oracle Identity Management
■
Chapter 32, Managing Authentication
26
Configuring Secure Sockets Layer SSL 26-1
26
Configuring Secure Sockets Layer SSL
This chapter explains how to configure Secure Sockets Layer SSL for use with Oracle Internet Directory. If you use Secure Sockets Layer SSL, you may also configure
strong authentication, data integrity, and data privacy.
This chapter contains these topics:
■
Introduction to Configuring Secure Sockets Layer SSL
■
Configuring SSL by Using Fusion Middleware Control
■
Configuring SSL by Using WLST
■
Configuring SSL by Using LDAP Commands
■
Testing SSL Connections by Using Oracle Directory Services Manager
■
Testing SSL Connections From the Command Line
■
Configuring SSL Interoperability Mode
Introduction to Configuring Secure Sockets Layer SSL
Oracle Internet Directory ensures that data has not been modified, deleted, or replayed during transmission by using Secure Sockets Layer SSL. SSL generates a
cryptographically secure message digest—through cryptographic checksums using either the MD5 algorithm or the Secure Hash Algorithm SHA—and includes it with
each packet sent across the network. SSL provides authentication, encryption, and data integrity using message digest.
This introduction contains the following topics:
■
Supported Cipher Suites
■
Supported Protocol Versions
See Also:
■
Security on page 3-14 for a conceptual overview of SSL in
relation to Oracle Internet Directory
■
Chapter 32, Managing Authentication .
■
The SSL Configuration Service chapter in Oracle Fusion Middleware Administrators Guide.
■
The SSL Automation Tool chapter in Oracle Fusion Middleware Administrators Guide. The SSL Automation Tool enables you to
configure SSL for multiple components using a domain-specific CA.
26-2 Oracle Fusion Middleware Administrators Guide for Oracle Internet Directory
■
SSL Authentication Modes
■
Limitations of the Use of SSL in11g Release 1 11.1.1
■
Other Components and SSL
■
SSL Interoperability Mode
■
StartTLS Oracle Internet Directory ensures that data is not disclosed during transmission by
using public key encryption available with SSL. In public-key encryption, the sender of a message encrypts the message with the public key of the recipient. Upon delivery,
the recipient decrypts the message using the recipients private key.
Supported Cipher Suites
A cipher suite is a set of authentication, encryption, and data integrity algorithms used for exchanging messages between network nodes. During an SSL handshake, the two
nodes negotiate to determine which cipher suite they will use when transmitting messages back and forth.
Table 26–1 lists the SSL cipher suites supported by Oracle Internet Directory and their
corresponding authentication, encryption, and data integrity mechanisms. These are stored in the attribute orclsslciphersuite in the instance-specific configuration
entry.
Supported Protocol Versions
Oracle Internet Directory supports the following TLSSSL protocols:
■
SSLv3
■
TLSv1
■
SSLv3 with SSLv2 Hello Oracle Internet Directory does not support SSLv2.
TLSv1 can use all of the cipher suites listed in Table 26–1
. SSLv3 and SSLv3 with SSLv2 Hello can use the first 10 cipher suites listed in
Table 26–1 . They cannot use the AES
Table 26–1 SSL Cipher Suites Supported in Oracle Internet Directory
Cipher Suite Authentication
Encryption Data
Integrity SSL_RSA_WITH_3DES_EDE_CBC_SHA
RSA 3DES
SHA SSL_RSA_WITH_RC4_128_SHA
RSA RC4
SHA SSL_RSA_WITH_RC4_128_MD5
RSA RC4
MD5 SSL_RSA_WITH_DES_CBC_SHA
RSA DES
SHA SSL_RSA_EXPORT_WITH_RC4_40_MD5
RSA RC4_40
MD5 SSL_RSA_EXPORT_WITH_DES40_CBC_SHA
RSA DES40
SHA SSL_DH_anon_WITH_3DES_EDE_CBC_SHA
None 3DES
SHA SSL_DH_anon_WITH_RC4_128_MD5
None RC4
MD5 SSL_DH_anon_WITH_DES_CBC_SHA
None DES
SHA SSL_RSA_WITH_AES_128_CBC_SHA
RSA AES
SHA SSL_RSA_WITH_AES_256_CBC_SHA
RSA AES
SHA
Configuring Secure Sockets Layer SSL 26-3
ciphers.SL_RSA_WITH_AES_128_CBC_SHA or SSL_RSA_WITH_AES_256_CBC_ SHA.
SSL Authentication Modes
The SSL protocol provides transport layer security with authenticity, integrity, and confidentiality, for a connection between a client and server. Three authentication
modes are supported, as described in Table 26–2
. The SSL authentication mode is controlled by the attribute orclsslauthentication in the instance-specific
configuration entry.
By default, Oracle Internet Directory uses SSL No Authentication Mode orclsslauthentication=1.
When both a client and server authenticate themselves with each other, SSL derives the identity information it requires from the X509v3 digital certificates.
During start-up of a directory server instance, the directory reads a set of configuration parameters, including the parameters for the SSL profile.
To run a server instance in secure mode, configure a single listening endpoint to communicate using LDAPS. To allow the same instance to run non-secure connections
concurrently, configure a second listening endpoint to communicate using LDAP.
During installation of Oracle Internet Directory, Oracle Identity Management 11g Installer follows specific steps in assigning the SSL and non-SSL port. First, it attempts
to use 3060 as the non-SSL port. If that port is unavailable, it tries ports in the range
Table 26–2 SSL Authentication Modes
SSL Authentication Method
Value of orclsslauthentication Authentication Behavior
SSL No Authentication Mode,
Confidentiality mode 1
Neither the client nor the server authenticates itself to the other. No certificates are sent or exchanged.
Only SSL encryption and decryption is used. SSL Server
Authentication Only Mode
32 The directory server authenticates itself to the client.
The directory server sends the client a certificate asserting the servers identity.
SSL Client and Server Authentication Mode
64 The client and server authenticate themselves with
each other and send certificates to each other.
See Also: Chapter 32, Managing Authentication
.
Notes:
■
By default, the SSL authentication mode is set to authentication mode 1 encryption only, no authentication. Be sure at least one
Oracle Internet Directory server instance has this default authentication mode. Otherwise, you break Oracle Delegated
Administration Services and other applications that expect to communicate with Oracle Internet Directory on the encrypted SSL
port.
■
Replication does not work with SSL Server Authentication or SSL Client and Server Authentication.
26-4 Oracle Fusion Middleware Administrators Guide for Oracle Internet Directory
3061 to 3070, then 13060 to 13070. Similarly, it attempts to use 3131 as its SSL port, then ports in the range 3132 to 3141, then 13131 to 13141.
You can create and modify multiple Oracle Internet Directory instances with differing values, using a different SSL parameters. This is a useful way to accommodate clients
with different security needs.
Limitations of the Use of SSL in11g Release 1 11.1.1
The Oracle directory replication server cannot communicate directly with an SSL-enabled LDAP server that supports two way mutual authentication. The
replication server startup fails and hangs if the LDAP server is configured for SSL mutual authentication.
Oracle Wallets
Oracle Wallet is a secure software container that is used to store X509 certificates, Private key, and trusted CA certificates A self-signed certificate can be stored in Oracle
Wallet that can be within an enterprise.
Before removing the reference to the wallet from the instance-specific configuration, you must disable SSL by setting orclsslenable to 0.
Never delete a wallet currently in use, as defined in the attribute orclsslwalleturl, from the file system. Doing so prevents the server from starting
successfully. Remove the reference to the wallet from the instance-specific configuration entry attribute orclsslwalleturl before you delete the file.
In 11g, you do not need to directly manipulate orclsslwalleturl because the SSL configuration service abstracts this out, both in WLST and Oracle Enterprise Manager
Fusion Middleware Control. The SSL configuration service traps any attempts to delete a wallet that is currently in use, provided you do so by using the SSL
configuration service.
Other Components and SSL
At installation, Oracle Internet Directory starts up in dual mode. That is, some components can access Oracle Internet Directory using non-SSL connections, while
others use SSL when connecting to the directory. By default, Oracle Application Server components are configured to run in this dual mode environment when
communicating with Oracle Internet Directory. If you want, you can remove the non-SSL mode and change all middleware instances to use SSL.
Enterprise User Security or a customer application might need an SSL channel with a different configuration from the default. For example, it might need SSL server
authentication mode or SSL mutual authentication mode. In this case, you must create
Note: If you perform an upgrade from an earlier version of Oracle
Internet Directory to 11g Release 1 11.1.1, your port numbers from the earlier version are retained.
See Also: Chapter 8, Managing Oracle Internet Directory
Instances for information about creating a new server instance.
See Also: Oracle Fusion Middleware Administrators Guide for
information on using Oracle wallets with middleware components.
Configuring Secure Sockets Layer SSL 26-5
another Oracle Internet Directory component instance listening on a different SSL mode and port.
For more information about Enterprise User Security SSL configuration, please see the section on enterprise user security configuration in Oracle Database Enterprise User
Administrators Guide.
SSL Interoperability Mode
In no-auth mode, Oracle components developed before 11g Release 1 11.1.1 can only connect with Oracle Internet Directory using an instance that has interoperability
mode enabled orclsslinteropmode = 1. For compatibility with those components, SSL interoperability mode is enabled by default.
New clients using JSSE Java Secure Socket Extensions, and non-Oracle clients, need an SSL instance with the interopmode disabled. Oracle Internet Directory is fully
compliant with the Sun JDKs SSL, provided SSL interoperability mode is disabled orclsslinteropmode = 0.
If Oracle Internet Directory is set to the wrong mode for a client, you might observe rare an non-deterministic failures of client SSL connections to the server.
StartTLS
Beginning with 11g Release 1 11.1.1, Oracle Internet Directory supports startTLS. This feature enables the on-demand negotiation of an SSL session on a non-SSL port. No
special configuration is required for the non-SSL port. If Oracle Internet Directory has an SSL endpoint configured, a client can use startTLS on the non-SSL port to negotiate
an SSL connection on the non-SSL port with the same configuration that is on the SSL port. That is, if the SSL port uses mutual authentication, startTLS tries to negotiate
mutual authentication on the non-SSL port.
Configuring SSL by Using Fusion Middleware Control
Configuring SSL by using Fusion Middleware Control consists of three basic tasks:
1.
Creating a Wallet by Using Fusion Middleware Control
2.
Configuring SSL Parameters by Using Fusion Middleware Control
3.
Restarting Oracle Internet Directory.
See Also: Chapter 8, Managing Oracle Internet Directory
Instances for instructions on how to configure server instances
See Also:
Configuring SSL Interoperability Mode on page 26-13.
See Also:
■
Chapter 8, Managing Oracle Internet Directory Instances for
instructions on how to stop and start the server.
■
Configuring Certificate Authentication Method by Using Fusion Middleware Control
on page 32-6
■
Oracle Fusion Middleware Reference for Oracle Identity Management for descriptions of the SSL parameters
26-6 Oracle Fusion Middleware Administrators Guide for Oracle Internet Directory
Creating a Wallet by Using Fusion Middleware Control
To create a self-signed wallet to use when configuring SSL, perform the following steps: