About Writing a Custom Authentication Plug-in Writing a Custom Authentication Plug-in JARs Required for Compiling a Custom Authentication Plug-in

3-18 Developers Guide for Oracle Access Manager and Oracle Security Token Service These JAR files are located in the following path: DOMAIN_HOME serversMANAGED_INSTANCE_NAMEtmp_WL_useroam_serverRANDOM_STRING APP-INFlib

3.5 Adding Custom Plug-ins

This section provides the following topics: ■ About Managing Custom Plug-ins ■ Adding Custom Plug-ins ■ Deleting Custom Authentication Plug-ins

3.5.1 About Managing Custom Plug-ins

Custom authentication plug-ins can be created and used in custom authentication modules, and, in turn, used in authentication schemes. After development, the plug-in must be deployed on the admin server, as a JAR file, which is validated automatically. After validation, an administrator can configure and distribute the plug-in using the Oracle Access Suite. The server processes the XML configuration file within the plug-in JAR file to extract data about the plug-in. After the plug-in is imported, an administrator can see and modify the various plug-in states based on information available from the AdminServer. Figure 3–14 illustrates the Plug-ins Node under the Common Configuration section of the System Configuration tab, and the Plugins page. This page includes a tool bar with command buttons, most of which operate on the plug-in that is selected in the table. The table provides information about the existing custom plug-ins and their state. The Plugin Details section at the bottom of the page reflects configuration details for the selected plug-in the table. Creating Custom Authentication Plug-ins 3-19 Figure 3–14 Plug-ins Node Under Common Configuration and the Plugins Page Administrators control plug-in states using the command buttons across the table at the top of the Plugins page, as described in Table 3–4 . 3-20 Developers Guide for Oracle Access Manager and Oracle Security Token Service Table 3–4 Managing Custom Plug-ins Actions Action Description Import Plugin... Adds the plug-in JAR file to the AdminServer DOMAIN_HOMEoamplugins and begins plug-in validation. ■ Same JAR Name : If the new plug-in JAR name in DOMAIN_ HOMEoamplugins matches an existing plug-in JAR name in DOMAIN_ HOMEconfigfmwconfigoamplugins, Oracle Access Manager extracts new configuration metadata from the XML file in the JAR in DOMAIN_ HOMEoamplugins and checks the version of the new plug-in. ■ XML Version : If the new plug-in XML version in DOMAIN_ HOMEoamplugins is greater than the existing XML version in DOMAIN_ HOMEconfigfmwconfigoamplugins, validation is successful. Otherwise, invalid plugin name with invalid version is returned and the new plug-in JAR is removed from DOMAIN_HOMEoamplugins. ■ Different JAR Name : If the new plug-in JAR name in DOMAIN_ HOMEoamplugins is different then existing plug-in JAR names in DOMAIN_ HOMEconfigfmwconfigoamplugins, the new plug-in JAR is uploaded and validation is successful. On Success : Status is reported as Uploaded even if an OAM Server is down. If all registered OAM Servers report Uploaded, then the status on AdminServer is also Uploaded. On Failure : Status is reported as Upload Failed See Also: About the Custom Plug-in Life Cycle in the Oracle Fusion Middleware Developers Guide for Oracle Access Manager and Oracle Security Token Service Distribute Selected ... ■ Propagates the plug-in to all registered OAM Servers. ■ Sets the plug-in flag in oam-config.xml to Distribute=true. ■ Starts the distribution listener and notification mechanism between AdminServer and OAM Servers ■ Distributes the plug-in JAR from AdminServer node to each OAM Server node under DOMAIN_HOMEconfigfmwconfigoamplugins On Success : Status is reported as Distributed even if an OAM Server is down. If all registered OAM Servers report Distributed, then the status on AdminServer is also Distributed. On Failure : Status is reported as Distribution Failed