Validating Oracle Adaptive Access Manager
2. From the Navigation window expand: Application Domains IAM Suite.
3. Click Resources.
4. Click Open on the tool bar below the Browse tab.
5. Click New Resource.
Enter the following information: ■ Type : http ■ Host Identifier : IAMSuiteAgent ■ Resource URL : oaam_sso.html ■ Protection Level : Protected ■ Authentication Policy : OAAM Protected Resources ■ Authorization Policy : Protected Resource Policy6. Click Apply.
18.2.8.3 Moving TAP Resource to TAP Policy
1. Log in to the OAM console at: http:admin.mycompany.comoamconsole
using the oamadmin account created previously.2. From the Navigation window expand: Application Domains IAM Suite
Authentication Policies .3. Click Protected Higher Level Policy.
4. Click Open on the tool bar below the Browse tab.
5. In the Resources window click oamTAPAuthenticate.
6. Click Delete.
7. Click Apply.
8. From the Navigation window expand: Application Domains IAM Suite
Authentication Policies .9. Click TAP Scheme.
10. Click Open on the tool bar below the Browse tab.
11. In the Resources window, click Add.
12. Select the resource oamTAPAuthenticate.
13. Click Apply.
18.2.8.4 Validating Oracle Adaptive Access Manager
Install Oracle WebGate as described in Section 19.5, Installing and Configuring WebGate. Access your protected resource using the URL: https:sso.mycompany.com:443oaam_sso.html. The OAAM Protected Resource is displayed. Log in using an authorized Oracle Access Manager user such as oamadmin. Once you are logged in, the oaam protected resource is displayed. 18-24 Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Identity Management18.3 Integrating Oracle Adaptive Access Manager 11g with Oracle Identity Manager 11g
OAAM provides a comprehensive set of challenge questions. Its functionality includes: ■ Challenging the user before and after authentication, as required, with a series of questions. ■ Presenting the questions as images and seeking answers through various input devices. ■ Asking questions one after another, revealing subsequent questions only if correct answers are provided. Oracle Identity Manager also has basic challenge question functionality. It enables users to answer a set of configurable questions and reset their password if they forgot the password. Unlike OAAM, Oracle Identity Manager also has a rich set of password validation capabilities, and it enables policies to be set based on the accounts owned, in addition to simple attributes. In an Identity Management deployment, best practice is to register only a single set of challenge questions, and to use a single set of password policies. OAAM can be integrated with Oracle Identity Manager so that OAAM provides the challenge questions and Oracle Identity Manager provides password validation, storage and propagation. This enables you to use OAAM fraud prevention at the same time you use Oracle Identity Manager for password validation. When OAAM is integrated with Oracle Identity Manager, Oracle Identity Manager is used to help users who have forgotten their username or password. This section contains the following topics: ■ Section 18.3.1, Prerequisites ■ Section 18.3.2, Configuring Oracle Identity Manager Encryption Keys in CSF ■ Section 18.3.3, Setting OAAM properties for Oracle Identity Manager ■ Section 18.3.4, Setting Oracle Identity Manager properties for OAAM ■ Section 18.3.5, Changing Domain to TAP Scheme Protection ■ Section 18.3.6, Restarting Oracle Adaptive Access Manager and Oracle Identity Manager ■ Section 18.3.7, Validating Oracle Identity Manager-OAAM Integration18.3.1 Prerequisites
Before starting this association, ensure that the following tasks have been performed: 1. Install and configure Oracle Identity Management. 2. Install Oracle Adaptive Access Manager. 3. Install and configure Oracle Access Manager. 4. Integrate Oracle Identity Manager with Oracle Access Manager, as described in Section 18.1, Integrating Oracle Identity Manager and Oracle Access Manager 11g. 5. Integrate Oracle Access Manager with Oracle Adaptive Access Manager as described in Section 18.2, Integrating Oracle Adaptive Access Manager with Oracle Access Manager 11g.Parts
» Oracle Fusion Middleware Online Documentation Library
» What is an Enterprise Deployment? Terminology
» Understanding the Directory Tier
» Architecture Notes Understanding the Application Tier
» Architecture Notes Security Provisions
» Using This Guide Oracle Fusion Middleware Online Documentation Library
» Hardware Resource Planning Oracle Fusion Middleware Online Documentation Library
» Load Balancers Network Prerequisites
» Configuring Virtual Server Names and Ports on the Load Balancer
» Virtual IP Addresses Managing Oracle Fusion Middleware Component Connections
» Firewall and Port Configuration
» Directory Structure Terminology and Environment Variables
» Recommended Locations for the Different Directories
» WebLogic Domain Considerations Real Application Clusters
» Creating Database Services for 11.2.x Databases Database Tuning
» RCU Example Executing the Repository Creation Utility
» Introduction Using this Guide Software Installation Summary
» Installation Installing Oracle HTTP Server
» Installing Oracle Fusion Middleware Components Installing Oracle Fusion Middleware Home
» Installing JRockit Installing Oracle Identity Management
» Upgrading the Oracle Homes for Oracle Identity Management from 11.1.1.2 to 11.1.1.5
» Installing the Oracle SOA Suite
» Installing Oracle Identity and Access Management
» Validating the Installation Backing up the Web Tier Configuration
» Enabling ADMINVHN on IDMHOST1 Running the Configuration Wizard on IDMHOST1 to Create a Domain
» Failing over the Administration Server to IDMHOST2
» Failing the Administration Server Back to IDMHOST1
» Configuring the First Oracle Internet Directory Instance
» Configuring an Additional Oracle Internet Directory Instance
» Registering Oracle Internet Directory with the WebLogic Server Domain
» Extending the Oracle WebLogic Domain with Oracle Directory Integration Platform and ODSM
» Installing and Configuring Oracle Directory Integration Platform and ODSM on IDMHOST2
» Provisioning the Managed Servers in the Managed Server Directory
» Validating Oracle Directory Services Manager Validating Oracle Directory Integration Platform
» Backing Up the Application Tier Configuration
» Configuring the First Oracle Virtual Directory Instance
» Configuring an Additional Oracle Virtual Directory
» Registering Oracle Virtual Directory with the Oracle WebLogic Server Domain
» Creating Policy Store Users and the Policy Container
» Reassociating the Policy and Credential Store
» Extending Directory Schema for Oracle Access Manager
» Creating Users and Groups for Oracle Access Manager
» Creating Users and Groups for Oracle Adaptive Access Manager
» Creating Users and Groups for Oracle Identity Manager
» Creating Users and Groups for Oracle WebLogic Server
» Creating Access Control Lists in Non-Oracle Internet Directory Directories
» Extending Domain with Oracle Access Manager
» Removing IDM Domain Agent Propagating the Domain Changes to the Managed Server Domain Directory
» Changing Oracle Access Manager Security Model
» Configuring Oracle Access Manager by Using the IDM Automation Tool
» Adding the oamadmin Account to Access System Administrators Validating Oracle Access Manager
» Setting up Keystore with the SSL Certificate and Private Key file of the Access Client
» Extending Domain for Oracle Adaptive Access Manager
» Prerequisites Loading Oracle Adaptive Access Manager Seed Data
» Backing Up the Application Tier Configuration Backing Up the Application Tier Configuration
» Prerequisites Enabling Virtual IP Addresses on OIMHOST1 and OIMHOST2
» Extending the Domain to Configure Oracle Identity Manager and Oracle SOA Suite on IDMHOST1
» Propagating the Oracle Identity Manager and SOA Managed Servers to OIMHOST1 and OIMHOST2
» Prerequisites Configuring Oracle Identity Manager to Work with the Oracle Web Tier
» Configuring an IT Resource Instance for Email
» Creating and Importing New Rules
» Tuning Oracle Platform Security Backing Up the Application Tier Configuration
» Prerequisites Oracle Fusion Middleware Online Documentation Library
» Configuring Oracle Identity Federation on OIFHOST1
» Configuring Oracle Identity Federation on OIFHOST2
» Provisioning the Managed Servers on the Local Disk
» Validating Oracle Identity Federation Backing Up the Application Tier Configuration
» Generating Self-Signed Certificates Using the utils.CertGen Utility
» Configuring Node Manager to Use the Custom Keystores
» Starting Node Manager Configuring Managed WebLogic Servers to Use the Custom Keystores
» Configuring Server Migration Targets Click the Migration tab.
» Updating Existing LDAP Users with Required Object Classes
» Integrating Oracle Access Manager with Oracle Identity Manager by Using idmConfigTool
» Updating Oracle Virtual Directory Authenticator Manually Creating CSF Keys
» Managing the Password of the xelsysadm User Validating Integration
» Validating Oracle Adaptive Access Manager
» Prerequisites Creating Oracle Directory Authenticator
» On the Configure Web Server screen, click Yes to automatically update the web
» Validating WebGate Validating the Oracle Access Manager Single Sign-On Setup
» Monitoring Oracle Virtual Directory
» Monitoring Oracle Directory Integration Platform
» Scaling Up the Directory Tier
» Click the SSL tab. Click Advanced. Set Hostname Verification to None. Click Save.
» Click Save. Oracle Fusion Middleware Online Documentation Library
» Patching an Oracle Fusion Middleware Source File Patching Identity Management Components
» Troubleshooting Oracle Internet Directory
» Troubleshooting Oracle Virtual Directory
» Troubleshooting Oracle Directory Integration Platform
» Troubleshooting Oracle Directory Services Manager
Show more