Sample Policy Domain and AccessGate Profile Created with OAMCfgTool
16.4.1 Establishing Trust with Oracle WebLogic Server
The following topics explain the tasks you must perform to set up the application for single sign-on with the Oracle Access Manager Identity Asserter: ■ Setting Up the Application Authentication Method for SSO ■ Confirming mod_weblogic for Oracle Access Manager Identity Asserter ■ Establishing Trust between Oracle WebLogic Server and Other Entities16.4.1.1 Setting Up the Application Authentication Method for SSO
This topic describes how to create the application authentication method for Oracle Access Manager Identity Assertion. When you use the Oracle Access Manager Identity Asserter, all web.xml files in the application EAR file must specify CLIENT-CERT in the element auth-method for the appropriate realm. The auth-method can use BASIC, FORM, or CLIENT-CERT values. While these look like similar values in Oracle Access Manager, the auth-method specified in web.xml files are used by Oracle WebLogic Server not Oracle Access Manager. To specify authentication in web.xml for the Identity Asserter and OAM 10g 1. Locate the web.xml file in the application EAR file: your_app WEB-INFweb.xml 2. Locate the auth-method in login-config and enter CLIENT-CERT. login-config auth-methodCLIENT-CERTauth-method login-config 3. Save the file. 4. Redeploy and restart the application. 5. Repeat for each web.xml file in the application EAR file. 6. Proceed to Confirming mod_weblogic for Oracle Access Manager Identity Asserter . Note: This task is the same for both OAM 11g and OAM 10g. See Also: Oracle Fusion Middleware Deploying Applications to Oracle WebLogic Server Note: You can specify CLIENT-CERT, FORM if you are also planning to access the applications directly over WebLogic and want the WebLogic authentication scheme to be invoked. 16-36 Oracle Fusion Middleware Application Security Guide16.4.1.2 Confirming mod_weblogic for Oracle Access Manager Identity Asserter
Oracle HTTP Server includes the mod_weblogic plug-in module mod_wl_ohs.so in 11g which is already enabled. You can perform the following procedure to confirm this or skip this procedure. With Oracle HTTP Server 11g, the mod_weblogic configuration is present in mod_wl_ ohs.conf by default, and the path of this file is included in httpd.conf. If the mod_ weblogic configuration is not present then you must edit httpd.conf. To configure mod_weblogic for the Identity Asserter and OAM 10g 1. Locate httpd.conf. For example: ORACLE_INSTANCEconfigOHSohs_namehttpd.conf 2. Confirm that the following statement is in the file with appropriate values for your deployment add or uncomment this, if needed: IfModule mod_weblogic.c WebLogicHost yourHost.yourDomain.com WebLogicPort yourWlsPortNumber IfModule Location http:request-uri-pattern SetHandler weblogic-handler Location 3. Save the file. 4. Proceed to Establishing Trust between Oracle WebLogic Server and Other Entities .16.4.1.3 Establishing Trust between Oracle WebLogic Server and Other Entities
The Oracle WebLogic Connection Filtering mechanism must be configured for creating access control lists and for accepting requests from only the hosts where Oracle HTTP Server and the front-end Web server are running. A network connection filter is a component that controls the access to network level resources. It can be used to protect resources of individual servers, server clusters, or an entire internal network. For example, a filter can deny non-SSL connections originating outside of a corporate network. A network connection filter functions like a firewall since it can be configured to filter protocols, IP addresses, or DNS node names. It is typically used to establish trust between Oracle WebLogic Server and foreign entities. To configure a connection filter to allow requests from only mod_weblogic and the host where OHS 11g is running, perform the procedure here. Note: This topic is the same whether you are using OSSO or Oracle Access Manager. Note: This chapter uses the generic name of the WebLogic Server plug-in for Apache: mod_weblogic. For Oracle HTTP Server 11g, the name of this plug-in is mod_wl_ohs; the actual binary name is mod_ wl_ohs.so. Examples show exact syntax for implementation. Configuring Single Sign-On Using Oracle Access Manager 10g 16-37 WebLogic Server provides a default connection filter: weblogic.security.net.ConnectionFilterImpl. This filter accepts all incoming connections and also provides static factory methods that allow the server to obtain the current connection filter. To configure this connection filter to deny access, simply enter the connection filters rules in the WebLogic Server Administration Console. You can also use a custom connection filter by implementing the classes in the weblogic.security.net package. Like the default connection filter, custom connection filters are configured in the WebLogic Server Administration Console. Connection Filter Rules: The format of filter rules differ depending on whether you are using a filter file to enter the filter rules or you enter the filter rules in the Administration Console. When entering the filter rules on the Administration Console, enter them in the following format: targetAddress localAddress localPort action protocols Table 16–10 provides a description of each parameter in a connection filter. The Connection Logger Enabled attribute logs successful connections and connection data in the server. This information can be used to debug problems relating to server connections. To configure a connection filter to allow requests from the host of the 11g Oracle HTTP Server 1. Log in to the Oracle WebLogic Administration Console. 2. Click Domain under Domain Configurations. 3. Click the Security tab, click the Filter tab. 4. Click the Connection Logger Enabled attribute to enable the logging of accepted messages for use when debugging problems relating to server connections. 5. Specify the connection filter to be used in the domain: ■ Default Connection Filter: In the Connection Filter attribute field, specify weblogic.security.net.ConnectionFilterImpl. ■ Custom Connection Filter: In the Connection Filter attribute field, specify the class that implements the network connection filter, which should also be specified in the CLASSPATH for Oracle WebLogic Server. Table 16–10 Connection Filter Rules Parameter Description target Specifies one or more systems to filter localAddress Defines the host address of the WebLogic Server instance. If you specify an asterisk , the match returns all local IP addresses. localPort Defines the port on which the WebLogic Server instance is listening. If you specify an asterisk, the match returns all available ports on the server. action Specifies the action to perform. This value must be allow or deny protocols Is the list of protocol names to match. The following protocols may be specified: http, https, t3, t3s, giop, giops, dcom, ftp, ldap. If no protocol is defined, all protocols match a rule. See Also: Configuring Security in a WebLogic Domain in Oracle Fusion Middleware Securing Oracle WebLogic Server 16-38 Oracle Fusion Middleware Application Security Guide 6. Enter the appropriate syntax for the connection filter rules. 7. Click Save. 8. Restart the Oracle WebLogic Server. 9. Proceed to Configuring the Authentication Scheme for the Identity Asserter .16.4.2 Configuring the Authentication Scheme for the Identity Asserter
This topic focuses on using OAMCfgTool for OAM 10g. If you are using OAM 11g, skip this topic and instead perform tasks in Provisioning an OAM Agent with Oracle Access Manager 11g . After setting up your application, you must protect it with Oracle Access Manager. To help automate this task, Oracle provides the command-line tool: OAMCfgTool in the Fusion Middleware application-provided oamcfgtool.jar file for OAM 10g. While you can perform steps manually in the Access System Console and Policy Manager, you can optionally use OAMCfgTool to setup and validate a form-based authentication scheme, a policy domain for the application, and Oracle Access Manager access policies required for Identity Assertion for single sign-on. Additionally, you can create a new WebGate profile in a fresh Web Tier or modify a WebGate profile in an existing Web Tier. For more information, see Creating an Authentication Scheme, Policy Domain, and a WebGate Profile .16.4.2.1 Creating an Authentication Scheme, Policy Domain, and a WebGate Profile
This topic provides a procedure that you can use as a model when you run OAMCfgTool. This example presumes a fresh Web Tier that requires a new WebGate profile. Therefore, the web_domain= parameter is omitted. A new profile is created and named with the app_domain value appended with _AG. The following procedure is only an example to illustrate how to use the tool. Values for your environment will be different. To create a form authentication scheme, policy domain, and access polices with OAMCfgTool1. No Oracle Fusion Middleware Application
: Obtain the OAMCfgTool if you have no Oracle Fusion Middleware application. a. Log in to Oracle Technology Network at: http:www.oracle.comtechnologysoftwareproductsmiddlewareht docs111110_fmw.html b. Locate the OAMCfgTool ZIP file with Access Manager Core Components 10.1.4.3.0: oamcfgtoolversion.zip See Also: Introduction to OAMCfgTool on page 16-15 Note: If you have an Oracle Fusion Middleware application installed you already have the OAMCfgTool. In this case, skip Step 1. Configuring Single Sign-On Using Oracle Access Manager 10g 16-39 c. Extract and copy oamcfgtool.jar to the computer hosting WebGate. 2. Confirm that JDK 1.6 or the latest version is installed and configured. 3. Log in to the computer that is hosting the application to protect, change to the file system directory containing OAMCfgTool. 4. Create a WebGate Profile, Authentication Scheme, and Policy Domain: Run the following command using values for your environment as described in Table 16–5 . For example: echo ldappwd | java -jar oamcfgtool.jar mode=CREATE app_domain=IASSO_App1 protected_uris=myapplogin cookie_domain=preferred_http_cookie_domain ldap_host=wxyz ldap_port=6633 ldap_userdn=orcladmin oam_aaa_host=abcd oam_aaa_port=7789 oam_aaa_mode=cert log_file=OAMCfg_date.log log_level=INFO output_ldif_file=LDIF_filename -noprompt 5. Review the information provided by the tool. For example, the parameters and values in Step 3 would provide the following information: Processed input parameters Initialized Global Configuration Successfully completed the Create operation. Operation Summary: Policy Domain : IASSO_App1 Host Identifier: IASSO_App1 Access Gate ID : IASSO_App1_AG6. Output LDIF Created
: Import the LDIF to write information to the directory server. Otherwise, skip this step.7. Validate
: Run OAMCfgTool to validate the policy domain that was created see Table 16–7 . For example: echo ldappwd | java -jar oamcfgtool.jar mode=VALIDATE app_domain=IASSO_App1 protected_uris=myapplogin ldap_host=wxyz ldap_port=6633 ldap_userdn=orcladmin oam_aaa_host=abcd oam_aaa_port=7789 log_file=OAMCfg_date.log log_level=INFO test_username=gcf Note: ■ Fresh Web Tier: Omit web_domain parameter to create and associate a new a profile. Include the cookie_domain parameter. ■ Existing Web Tier: Include web_domain parameter with the value of an existing host identifier.Parts
» Oracle Fusion Middleware Online Documentation Library
» OPSS Main Features What is Oracle Platform Security Services?
» Supported Server Platforms What is Oracle Platform Security Services?
» Scenario 3: Securing a Java SE Application
» Oracle ADF Security Overview OPSS for Administrators Terminology
» Permission Inheritance and the Role Hierarchy
» The Authenticated Role Oracle Fusion Middleware Online Documentation Library
» Administrative Users and Roles Managing User Accounts The Role Category
» Supported LDAP Identity Store Types
» Oracle WebLogic Authenticators Authentication Basics
» Policy Store Basics Oracle Fusion Middleware Online Documentation Library
» Credential Store Basics Oracle Fusion Middleware Online Documentation Library
» Supported LDAP-, DB-, and File-Based Services
» Management Tools Oracle Fusion Middleware Online Documentation Library
» Packaging Requirements Example Scenarios
» Other Scenarios Oracle Fusion Middleware Online Documentation Library
» Choosing the Administration Tool According to Technology
» Setting Up a Brand New Production Environment
» Typical Security Practices with Typical Security Practices with the Administration Console
» Overview Oracle Fusion Middleware Online Documentation Library
» Deploying Java EE and Oracle ADF Applications with Fusion Middleware Control
» Deploying to a Test Environment
» Deploying Standard Java EE Applications
» Migrating Providers other than Policy and Credential Providers
» Migrating Large Volume Policy and Credential Stores
» Migrating Audit Policies Migrating from a Test to a Production Environment
» About the Identity Store Service
» Service Architecture Introduction to the Identity Store Service
» Configuring the Identity Store Provider
» What is Configured? Configuring the Identity Store Service
» Configuring the Service for Multiple LDAP using WLST Configuring Other Parameters
» Configuring Split Profiles Configuration in Other Application Servers
» Java SE Environments Configuring the Identity Store Service
» Querying the Identity Store Programmatically
» Introduction to the OPSS Security Store
» Multiple-Node Server Environments Using an LDAP-Based OPSS Security Store
» Prerequisites to Using an LDAP-Based Security Store
» Dropping the OPSS Schema in an Oracle Database
» In that dialog, select the prefix and, in the Component hierarchy, check AS
» Creating a Data Source Instance
» Maintaining a DB-Based Security Store
» Connecting to a DB Server with sqlplus or JDBC OCI Driver This task involves
» Navigate to Data Sources YourDataSourceName Custom Properties.
» Configuring the OPSS Security Store
» Log in to Fusion Middleware Control and navigate to Domain Security
» Click the button Change Association to display the Set Security Provider page,
» If you have selected Database, enter the name of the data source in the Datasource
» Optionally, check the box Use SSL to Connect to establish an anonymous SSL
» In the text box Connect DN, enter the full distinguished name, a string
» In the box Password, enter the user password, also a string containing
» In the Root Node Details area, enter the root DN in the box Root DN, which
» Optionally, in the Policy Store Properties and Credential Store Properties areas,
» Setting Up a One- Way SSL Connection
» Securing Access to Oracle Internet Directory Nodes
» Reassociating with the Script reassociateSecurityStore
» Migrating with Fusion Middleware Control
» Migrating with the Script migrateSecurityStore
» Use the button Delete to remove a selected item from any table. When finished
» Cataloging Oracle Internet Directory Attributes
» To display roles in an application, expand the Search area, choose the application
» To create an application role, click Create to display the Create Application Role
» Click Add Application Role, to display the Add Application Role dialog.
» Select roles from the box Available Roles, as appropriate, and use the buttons
» Click Add Group, to display the Add Group dialog.
» Select groups from the box Available Groups, as appropriate, and use the
» Click Add User, to display the Add User dialog.
» Select users from the box Available Users, as appropriate, and use the buttons
» Click Create Like, to display the Create Application Role Like page. Notice
» Modify the list of roles and users, as appropriate, and then click OK.
» Log in to Fusion Middleware Control and navigate to Domain Security System
» listAppStripes Managing Application Policies with OPSS Scripts
» createAppRole Managing Application Policies with OPSS Scripts
» deleteAppRole grantAppRole Managing Application Policies with OPSS Scripts
» revokeAppRole listAppRoles Managing Application Policies with OPSS Scripts
» listAppRolesMembers grantPermission Managing Application Policies with OPSS Scripts
» revokePermission Managing Application Policies with OPSS Scripts
» listPermissions Managing Application Policies with OPSS Scripts
» deleteAppPolicies createResourceType Managing Application Policies with OPSS Scripts
» getResourceType deleteResourceType Managing Application Policies with OPSS Scripts
» createResource Managing Application Policies with OPSS Scripts
» deleteResource listResources Managing Application Policies with OPSS Scripts
» listResourceActions createEntitlement Managing Application Policies with OPSS Scripts
» getEntitlement Managing Application Policies with OPSS Scripts
» deleteEntitlement Managing Application Policies with OPSS Scripts
» addResourceToEntitlement Managing Application Policies with OPSS Scripts
» revokeResourceFromEntitlement Managing Application Policies with OPSS Scripts
» listEntitlements Managing Application Policies with OPSS Scripts
» grantEntitlement Managing Application Policies with OPSS Scripts
» listResourceTypes reassociateSecurityStore Managing Application Policies with OPSS Scripts
» The user accesses the functionality secured by the application role.
» Granting Policies to Anonymous and Authenticated Roles with WLST Scripts
» Guidelines for Configuring the Policy Store
» Credential Types Managing the Credential Store
» Managing Credentials with Fusion Middleware Control
» listCred Managing Credentials with OPSS Scripts
» updateCred Managing Credentials with OPSS Scripts
» createCred Managing Credentials with OPSS Scripts
» deleteCred Managing Credentials with OPSS Scripts
» modifyBootStrapCredential Managing Credentials with OPSS Scripts
» addBootStrapCredential Managing Credentials with OPSS Scripts
» Objectives of Auditing Benefits and Features of the Oracle Fusion Middleware Audit Framework
» Oracle Fusion Middleware Audit Framework in 11g
» Audit Architecture Oracle Fusion Middleware Audit Framework Concepts
» Key Technical Concepts Oracle Fusion Middleware Audit Framework Concepts
» Audit Record Storage Analytics
» Audit Administration Tasks Oracle Fusion Middleware Online Documentation Library
» Choose Create at the starting screen. Click Next.
» Multiple Data Sources Enter the following details for the new data source:
» Open the opmn.xml file, which resides in
» Configuring the Stand-alone Audit Loader
» If you made any policy changes, click Apply to save the changes. For Java
» Click Select Failures Only to select only failed events in the policy - for example,
» ImportExport - These buttons enable you to save and re-use a policy
» Optionally, under “Users to Always Audit”, a comma-separated list of users can
» Manage Audit Policies Manually
» Audit Log Timestamps Audit Logs
» Schema Overview Advanced Management of Database Store
» Table Attributes Indexing Scheme Backup and Recovery
» Importing and Exporting Data Partitioning
» About Oracle Business Intelligence Publisher
» Install Oracle Business Intelligence Publisher
» Set Up Oracle Reports in Oracle Business Intelligence Publisher
» Configure Scheduler in Oracle Business Intelligence Publisher
» Organization of Audit Reports
» View Audit Reports Oracle Fusion Middleware Online Documentation Library
» Example of Oracle Business Intelligence Publisher Reports
» List of Audit Reports in Oracle Business Intelligence Publisher
» The condition is now included in the report. Be sure to click Save again on the
» Choosing the Right SSO Solution for Your Deployment
» About Using the Identity Asserter Function with Oracle Access Manager
» Choosing Applications for Oracle Access Manager SSO Scenarios and Solutions
» Implementation: Using the Provider with OAM 11g versus OAM 10g
» Requirements for the Provider with Oracle Access Manager
» Setting Up Debugging in the WebLogic Administration Console
» Previewing Pre-Seeded OAM 11g Policies for Use by the OAM 10g AccessGate
» Install and set up Oracle Internet Directory for Oracle Access Manager.
» Optional Installing the Authentication Provider with Oracle Access Manager 11g
» WebGate for Identity Asserter for Single Sign-On
» AccessGate for the Authenticator or for Oracle Web Services Manager
» Provision the agent. For example:
» Locate the remote registration script.
» No Oracle Fusion Middleware Application
» With Oracle Fusion Middleware Application Installed
» Click Security Realms, Default Realm Name, and click Providers.
» OAM Identity Asserter Configuring Identity Assertion for SSO with Oracle Access Manager 11g
» Click Lock Edit, if desired.
» OAM Authenticator Configuring the Authenticator Function for Oracle Access Manager 11g
» Click Security Realms and select the realm you want to configure.
» Select Providers, Authentication, and click New to display the Create a New
» Logout for 11g WebGate and OAM 11g
» Optional Logout for 10g WebGate with Oracle Access Manager 11g
» Synchronizing the User and SSO Sessions: SSO Synchronization Filter
» Troubleshooting Tips Oracle Fusion Middleware Online Documentation Library
» An Oracle Internet Directory or Oracle Sun One LDAP directory server configured
» Alternative Process for Configuring Logout
» Oracle Access Manager Authentication Provider Parameter List
» OAMCfgTool Parameters and Values
» Sample Policy Domain and AccessGate Profile Created with OAMCfgTool
» Known Issues: JAR Files and OAMCfgTool
» Establishing Trust with Oracle WebLogic Server
» Output LDIF Created Validate
» Fresh WebGate ProfileWebGate Not Installed Fresh WebGate Profile with Installed WebGate
» Setting Up the Login Form for the Identity Asserter and OAM 10g
» Testing Identity Assertion for SSO with OAM 10g
» Creating an Authentication Scheme for the Authenticator
» Authentication Rule Oracle Fusion Middleware Online Documentation Library
» OAM Authenticator Configuring Providers for the Authenticator in a WebLogic Domain
» Ensure that the parameter Control Flag is set to OPTIONAL initially.
» From the WebLogic Administration Console, go to Security Realms, myrealm,
» Configuring the Application Authentication Method for the Authenticator
» Mapping the Authenticated User to a Group in LDAP
» Testing the Oracle Access Manager Authenticator Implementation
» General Tab Creating an Policy Domain for Use with Oracle Web Services Manager
» Resources Tab Creating an Policy Domain for Use with Oracle Web Services Manager
» Authorization Rules Tab Creating an Policy Domain for Use with Oracle Web Services Manager
» General Tab Oracle Fusion Middleware Online Documentation Library
» Timing Conditions Oracle Fusion Middleware Online Documentation Library
» Actions Oracle Fusion Middleware Online Documentation Library
» Allow Access Oracle Fusion Middleware Online Documentation Library
» Configuring Oracle Web Services Manager Policies for Web Services
» OAM Identity Asserter Configuring Providers in a WebLogic Domain for Oracle Web Services Manager
» Click the Provider Specific tab and specify the following required settings
» About Using IPv6 Troubleshooting Tips for OAM Provider Deployments
» Apache Bridge Failure: Timed Out
» Authenticated User with Access Denied
» Browser Back Button Results in Error
» Client in Cluster with Load-Balanced WebGates
» Log in to Oracle Technology Network at:
» Locate the OAMCfgTool ZIP file with Access Manager Core Components
» Extract and copy oamcfgtool.jar to the computer hosting WebGate:
» Error 401: Unable to Access the Application Error 403: Unable to Access the Application
» JAAS Control Flag Click Access System Configuration, and then click AccessGate
» Oracle WebLogic Server Fails to Start
» Oracle ADF Integration and Cert Mode
» About Protected_JSessionId_Policy
» Consumption of Headers with OSSO Identity Asserter
» New Users of the OSSO Identity Asserter
» Oracle WebLogic Server 10.3.1+ Oracle Fusion Middleware Online Documentation Library
» Click Security Realms, Default Realm Name, Providers.
» Check whether the server is being hit without first going through authentication
» URL Rewriting and JSESSIONID
» About mod_osso, OSSO Cookies, and Directives
» About Using IPv6 Troubleshooting for an OSSO Identity Asserter Deployment
» Introduction Oracle Fusion Middleware Online Documentation Library
» Terminology Oracle Fusion Middleware Online Documentation Library
» OID for Identity and Policy Stores
» OAM and OSSO for User Authentication and Web SSO
» OIM for User and Role Provisioning
» OPSS for User and Role Profiling
» OAPM for Application Policy Management
» OPSS for Cryptography Oracle Identity and Access Management Suite
» Development Phase Security Life Cycle of an Application
» Summary of Tasks per Participant per Phase
» Oracle Platform Security Services
» Use Case 1 - Java EE Application
» Credentials Required Security Features
» Authentication Required Security Features
» Authorization Required Security Features
» Container-Based Authentication Integrating Authentication
» Oracle WebLogic Server Authentication Providers
» Functional Security Integrating Authorization
» Functional Security with ADF
» Cryptography Integrating the Credential Store
» The Development Cycle OPSS for Developers
» Challenges of Securing Java Applications
» Meeting the Challenges with Oracle Platform Security Services OPSS Architecture
» The LoginService API OPSS APIs
» The User and Role API JAAS Authorization and the JpsAuth.checkPermission API
» Java EE Application using OPSS APIs Authenticating with OPSS APIs
» Programmatic Authorization Credential Store Framework
» User and Role Common Uses of OPSS
» Oracle ADF Authorization Common Uses of OPSS
» About Oracle ADF Using OPSS with Oracle Application Development Framework
» The Oracle ADF Development Life Cycle
» Using the Oracle Security Developer Tools
» Using OPSS Outside Oracle JDeveloperOracle ADF
» Introduction to Authorization Authorization Overview
» The Resource Catalog The JAASOPSS Authorization Model
» Managing Policies The JAASOPSS Authorization Model
» The Class ResourcePermission The JAASOPSS Authorization Model
» Interceptor Configuration Syntax Configuring the Servlet Filter and the EJB Interceptor
» Summary of Filter and Interceptor Parameters
» Configuring the Application Stripe for Application MBeans
» The Security Policy Model Choosing the Appropriate Class for Enterprise Groups and Users
» Packaging Policies with Application
» Packaging Credentials with Application
» Parameters Controlling Policy Migration
» Policy Parameter Configuration According to Behavior
» Using a Wallet-Based Credential Store
» Parameters Controlling Credential Migration
» Credential Parameter Configuration According to Behavior
» Supported Permission Classes Configuring Applications to Use OPSS
» Specifying Bootstrap Credentials Manually
» Migrating Identities with migrateSecurityStore
» Example of Configuration File jps-config.xml
» Links to Authentication Topics for Java EE Applications
» The Identity Store Authentication for Java SE Applications
» Configuring an LDAP Identity Store in Java SE Applications
» Supported Login Modules for Java SE Applications
» Using the OPSS API LoginService in Java SE Applications
» Supported Services The OPSS Java SE Client
» Configuration Examples The OPSS Java SE Client
» Configuring File-Based Policy and Credential Stores
» Configuring LDAP-Based Policy and Credential Stores
» Configuring DB-Based OPSS Security Stores
» Unsupported Methods for File-Based Policy Stores
» About the Credential Store Framework API
» Guidelines for Granting Permissions Permissions Grant Example 1
» Overview of Application Development with CSF Guidelines for the Map Name
» Code for CSF Operations Example 1: Java SE Application with Wallet Store
» Example 2: Java EE Application with Wallet Store
» Example 3: Java EE Application with LDAP Store
» Configuring the Credential Store Best Practices
» User and Role API and the Oracle WebLogic Server Authenticators
» Summary of Roles and Classes
» Understanding Service Providers Working with Service Providers
» Selecting the Provider Working with Service Providers
» Creating the Provider Instance
» Properties for Provider Configuration
» Configuring the Provider when Creating a Factory Instance
» Configuring the Provider when Creating a Store Instance
» Runtime Configuration Working with Service Providers
» Specifying Search Parameters Searching the Repository
» Using Search Filters Searching the Repository
» Handling Special Characters when Creating Identities Creating an Identity
» Example 1: Searching for Users
» Example 2: User Management in an Oracle Internet Directory Store
» Example 3: User Management in a Microsoft Active Directory Store
» Out-of-the-box Support for SSL
» Customizing SSL Support for the User and Role API
» User Authentication The User and Role API Reference
» SPI Overview Types of User and Role Providers
» Developing a Read-Only Provider
» Policy-Related Scripts Oracle Fusion Middleware Online Documentation Library
» Credential-Related Scripts Oracle Fusion Middleware Online Documentation Library
Show more