Configuring an Additional Oracle Internet Directory Instance
7.3.2 Configuring an Additional Oracle Internet Directory Instance
The schema database must be running before you perform this task. Follow these steps to install Oracle Internet Directory on OIDHOST2:1. Ensure that ports 389 and 636 are not in use by any service on the computer by
issuing these commands for the operating system you are using. If a port is not in use, no output is returned from the command. On UNIX: netstat -an | grep 389 netstat -an | grep 636 If the ports are in use that is, if the command returns output identifying either port, you must free them. On UNIX: Remove the entries for ports 389 and 636 in the etcservices file and restart the services, as described in Section 20.1, Starting and Stopping Oracle Identity Management Components, or restart the computer.2. Copy the staticports.ini file from the Disk1stageResponse directory
to a temporary directory.3. Edit the staticports.ini file that you copied to the temporary directory to
assign the following custom ports:4. Start the Oracle Identity Management 11g Configuration Assistant by running
IDM_ORACLE_HOME binconfig.sh.5. On the Welcome screen, click Next.
Note: Ensure that the following environment variables are set before using ldapbind: ■ ORACLE_HOME set to IDM_ORACLE_HOME ■ ORACLE_INSTANCE ■ PATH - The following directory locations should be in your PATH: ■ ORACLE_HOME bin ■ ORACLE_HOME ldapbin ■ ORACLE_HOME ldapadmin Port Value Non-SSL Port for Oracle Internet Directory 389 SSL Port for Oracle Internet Directory 636 7-6 Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Identity Management6. On the Select Domain screen, select Configure without a Domain.
Click Next. 7. On the Specify Installation Location screen, specify the following values: Oracle Instance Location: u01apporacleadminoid_inst2 Oracle Instance Name: oid_inst2 Click Next. 8. On the Specify Email for Security Updates screen, specify these values: ■ Email Address: Provide the email address for your My Oracle Support account. ■ Oracle Support Password: Provide the password for your My Oracle Support account. ■ Check the check box next to the I wish to receive security updates via My Oracle Support field. Click Next. 9. On the Configure Components screen, select Oracle Internet Directory, deselect all the other components, and click Next.10. On the Configure Ports screen, select Specify Ports Using Configuration File and
enter the full path name to the staticports.ini file that you edited in the temporary directory. Click Next. 11. On the Specify Schema Database screen, select Use Existing Schema and specify the following values: ■ Connect String: oiddbhost1-vip.mycompany.com:1521:idmdb1oiddbhost2-vip.my company.com:1521:idmdb2oidedg.mycompany.com ■ User Name: ODS Notes: ■ The Oracle RAC database connect string information must be provided in the format: host1 :port1:instance1host2:port2:instance2servi cename ■ During this installation, it is not required that all the Oracle RAC instances to be up. If one Oracle RAC instance is up, the installation can proceed. ■ You must provide complete and accurate information. Specifically, you must provide the correct host, port, and instance name for each Oracle RAC instance, and the service name you provide must be configured for all the specified Oracle RAC instances. Any incorrect information entered in the Oracle RAC database connect string must be corrected manually after the installation. Extending the Domain with Oracle Internet Directory 7-7 ■ Password: enter the password Click Next. 12. The ODS Schema in use message appears. The ODS schema chosen is already being used by the existing Oracle Internet Directory instance. Therefore, the new Oracle Internet Directory instance being configured would reuse the same schema. Choose Yes to continue. A popup window with this message appears: Please ensure that the system time on this Identity Management Node is in sync with the time on other Identity management Nodes that are part of the Oracle Application Server Cluster Identity Management configuration. Failure to ensure this may result in unwanted instance failovers, inconsistent operational attributes in directory entries and potential inconsistent behavior of password state policies. Ensure that the system time between IDMHOST1 and IDMHOST2 is synchronized. Click OK to continue. 13. On the Specify OID Admin Password screen, specify the Oracle Internet Directory administration password. Click Next. 14. On the Installation Summary screen, review the selections to ensure that they are correct. If they are not, click Back to modify selections on previous screens. When they are correct, click Configure. 15. On Linux and UNIX systems, a dialog box appears that prompts you to run the oracleRoot.sh script. Edit the oracleRoot.sh script, changing the line: fi This command path is not already provided in the existing root.sh to two lines, like this: fi This command path is not already provided in the existing root.sh Save the file, then open a window and run the oracleRoot.sh script, as the root user. When prompted: Do you want to run oidRoot.sh to configure OID for privileged ports? yesno enter yes. 16. On the Configuration screen, multiple configuration assistants are launched in succession. This process can be lengthy. Wait for the configuration process to finish.17. On the Installation Complete screen, click Finish to confirm your choice to exit.
18. To validate the installation of the Oracle Internet Directory instance on OIDHOST2, issue these commands: Note: If you see a message saying that OID is not running, verify that the orcladmin account has not become locked and try again. Do not continue until this message is no longer displayed. 7-8 Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Identity Management ldapbind -h oidhost2.mycompany.com -p 389 -D cn=orcladmin -q ldapbind -h oidhost2.mycompany.com -p 636 -D cn=orcladmin -q -U 17.4 Post-Configuration Steps
Parts
» Oracle Fusion Middleware Online Documentation Library
» What is an Enterprise Deployment? Terminology
» Understanding the Directory Tier
» Architecture Notes Understanding the Application Tier
» Architecture Notes Security Provisions
» Using This Guide Oracle Fusion Middleware Online Documentation Library
» Hardware Resource Planning Oracle Fusion Middleware Online Documentation Library
» Load Balancers Network Prerequisites
» Configuring Virtual Server Names and Ports on the Load Balancer
» Virtual IP Addresses Managing Oracle Fusion Middleware Component Connections
» Firewall and Port Configuration
» Directory Structure Terminology and Environment Variables
» Recommended Locations for the Different Directories
» WebLogic Domain Considerations Real Application Clusters
» Creating Database Services for 11.2.x Databases Database Tuning
» RCU Example Executing the Repository Creation Utility
» Introduction Using this Guide Software Installation Summary
» Installation Installing Oracle HTTP Server
» Installing Oracle Fusion Middleware Components Installing Oracle Fusion Middleware Home
» Installing JRockit Installing Oracle Identity Management
» Upgrading the Oracle Homes for Oracle Identity Management from 11.1.1.2 to 11.1.1.5
» Installing the Oracle SOA Suite
» Installing Oracle Identity and Access Management
» Validating the Installation Backing up the Web Tier Configuration
» Enabling ADMINVHN on IDMHOST1 Running the Configuration Wizard on IDMHOST1 to Create a Domain
» Failing over the Administration Server to IDMHOST2
» Failing the Administration Server Back to IDMHOST1
» Configuring the First Oracle Internet Directory Instance
» Configuring an Additional Oracle Internet Directory Instance
» Registering Oracle Internet Directory with the WebLogic Server Domain
» Extending the Oracle WebLogic Domain with Oracle Directory Integration Platform and ODSM
» Installing and Configuring Oracle Directory Integration Platform and ODSM on IDMHOST2
» Provisioning the Managed Servers in the Managed Server Directory
» Validating Oracle Directory Services Manager Validating Oracle Directory Integration Platform
» Backing Up the Application Tier Configuration
» Configuring the First Oracle Virtual Directory Instance
» Configuring an Additional Oracle Virtual Directory
» Registering Oracle Virtual Directory with the Oracle WebLogic Server Domain
» Creating Policy Store Users and the Policy Container
» Reassociating the Policy and Credential Store
» Extending Directory Schema for Oracle Access Manager
» Creating Users and Groups for Oracle Access Manager
» Creating Users and Groups for Oracle Adaptive Access Manager
» Creating Users and Groups for Oracle Identity Manager
» Creating Users and Groups for Oracle WebLogic Server
» Creating Access Control Lists in Non-Oracle Internet Directory Directories
» Extending Domain with Oracle Access Manager
» Removing IDM Domain Agent Propagating the Domain Changes to the Managed Server Domain Directory
» Changing Oracle Access Manager Security Model
» Configuring Oracle Access Manager by Using the IDM Automation Tool
» Adding the oamadmin Account to Access System Administrators Validating Oracle Access Manager
» Setting up Keystore with the SSL Certificate and Private Key file of the Access Client
» Extending Domain for Oracle Adaptive Access Manager
» Prerequisites Loading Oracle Adaptive Access Manager Seed Data
» Backing Up the Application Tier Configuration Backing Up the Application Tier Configuration
» Prerequisites Enabling Virtual IP Addresses on OIMHOST1 and OIMHOST2
» Extending the Domain to Configure Oracle Identity Manager and Oracle SOA Suite on IDMHOST1
» Propagating the Oracle Identity Manager and SOA Managed Servers to OIMHOST1 and OIMHOST2
» Prerequisites Configuring Oracle Identity Manager to Work with the Oracle Web Tier
» Configuring an IT Resource Instance for Email
» Creating and Importing New Rules
» Tuning Oracle Platform Security Backing Up the Application Tier Configuration
» Prerequisites Oracle Fusion Middleware Online Documentation Library
» Configuring Oracle Identity Federation on OIFHOST1
» Configuring Oracle Identity Federation on OIFHOST2
» Provisioning the Managed Servers on the Local Disk
» Validating Oracle Identity Federation Backing Up the Application Tier Configuration
» Generating Self-Signed Certificates Using the utils.CertGen Utility
» Configuring Node Manager to Use the Custom Keystores
» Starting Node Manager Configuring Managed WebLogic Servers to Use the Custom Keystores
» Configuring Server Migration Targets Click the Migration tab.
» Updating Existing LDAP Users with Required Object Classes
» Integrating Oracle Access Manager with Oracle Identity Manager by Using idmConfigTool
» Updating Oracle Virtual Directory Authenticator Manually Creating CSF Keys
» Managing the Password of the xelsysadm User Validating Integration
» Validating Oracle Adaptive Access Manager
» Prerequisites Creating Oracle Directory Authenticator
» On the Configure Web Server screen, click Yes to automatically update the web
» Validating WebGate Validating the Oracle Access Manager Single Sign-On Setup
» Monitoring Oracle Virtual Directory
» Monitoring Oracle Directory Integration Platform
» Scaling Up the Directory Tier
» Click the SSL tab. Click Advanced. Set Hostname Verification to None. Click Save.
» Click Save. Oracle Fusion Middleware Online Documentation Library
» Patching an Oracle Fusion Middleware Source File Patching Identity Management Components
» Troubleshooting Oracle Internet Directory
» Troubleshooting Oracle Virtual Directory
» Troubleshooting Oracle Directory Integration Platform
» Troubleshooting Oracle Directory Services Manager
Show more