Output LDIF Created Validate

Configuring Single Sign-On Using Oracle Access Manager 10g 16-45

2. With Oracle Fusion Middleware Application Installed

: a. Locate oamauthenticationprovider.war in the following path: ORACLE_INSTANCEmodulesoracle.oamprovider_11.1.1oamauthenticationprovi der.war b. Copy oamauthenticationprovider.war to the following location: BEA_HOMEwlserver_10.xserverlibconsole-extautodeployoamauthentication provider.war 3. Log in to the WebLogic Administration Console.

4. Click Security Realms, Default Realm Name, and click Providers.

5. OAM Identity Asserter

: Perform the following steps to add this provider: a. Click Authentication, click New, and then enter a name and select a type: Name: OAM Identity Asserter Type: OAMIdentityAsserter OK b. In the Authentication Providers table, click the newly added authenticator.

c. Click the Common tab, set the Control Flag to REQUIRED, and click Save

6. OID Authenticator:

Perform the following steps to add this provider.

a. Click Security Realms, Default Realm Name, and click Providers

b. Click New, enter a name, and select a type: Name: OID Authenticator Type: OracleInternetDirectoryAuthenticator OK c. In the Authentication Providers table, click the newly added authenticator.

d. On the Settings page, click the Common tab, set the Control Flag to

SUFFICIENT , and then click Save.

e. Click the Provider Specific tab and specify the following required settings

using values for your own environment: Host: Your LDAP host. For example: localhost Port: Your LDAP host listening port. For example: 6050 Principal: LDAP administrative user. For example: cn=orcladmin Credential: LDAP administrative user password. User Base DN: Same searchbase as in Oracle Access Manager. All Users Filter: For example: uid=objectclass=person User Name Attribute: Set as the default attribute for username in the LDAP directory. For example: uid Group Base DN: The group searchbase same as User Base DN Do not set the All Groups filter as the default works fine as is. Save. 16-46 Oracle Fusion Middleware Application Security Guide

7. Default Authenticator

: Perform the following steps to set up the Default Authenticator for use with the Identity Asserter:

a. Go to Security Realms, Default Realm Name, and click Providers.

b. Click Authentication, Click DefaultAuthenticator to see its configuration

page.

c. Click the Common tab and set the Control Flag to SUFFICIENT.

d. Save. 8. Reorder Providers:

a. Click Security Realms, Default Realm Name, Providers.

b. On the Summary page where providers are listed, click the Reorder button

c. On the Reorder Authentication Providers page, select a provider name and

use the arrows beside the list to order the providers as follows: OAM Identity Asserter REQUIRED OID Authenticator SUFFICIENT Default Authenticator SUFFICIENT d. Click OK to save your changes

9. Activate

Changes: In the Change Center, click Activate Changes 10. Reboot Oracle WebLogic Server. 11. Proceed as follows: ■ Successful: Go to Setting Up the Login Form for the Identity Asserter and OAM 10g . ■ Not Successful: Confirm that all providers have the proper specifications for your environment, are in the proper order, and that oamAuthnProvider.jar is in the correct location as described in Installing Components and Files for Authentication Providers and OAM 10g on page 16-4.

16.4.4 Setting Up the Login Form for the Identity Asserter and OAM 10g

This topic introduces the login form provided for the Oracle Access Manager Identity Asserter for single sign-on and provides a procedure that you can use to deploy the form. The form shown in Figure 16–9 is provided with the WebGate installation for Oracle HTTP Server 11g Web server. The form contains two fields UserID and Password and a Login button. The variables in this form are required by the Form Login authentication scheme that was generated by the OAMCfgTool and used in the policy domain protecting resources for Identity Assertion.