Apex OIM Integration
Apex OIM Integration
Apex OIM Integration
Administration
Activity Guide
D63114GC10
Edition 1.0
July 2011
D71612
Authors
Vishal Parashar, David Goldsmith
Technical Contributors and Reviewers
Amjad Afanah, Jeremy Banford, Abhijit Bhatode, Rama Bollu, Vikas Pooven Chathoth, Toby
Close, Jui Deshpande , Steve Doinidis, Sunil Gupta , Beomsuk Kim, Ashish Kolli, Vadim
Lander, Derick Leo, Mayank Maria, Madhu Martin, Vamsi Motukuru, Rey Ong, Vimal Patel,
Peter Povinec, Deepak Ramakrishnan, Shankar Raman, Chitra Sabapathy, Narasimhaiah
Sreehari, Ramya Subramanya, Ramana Turlapati, Venkat Venkatnarayan, Weifang Xie
This book was published using:
Oracle Tutor
Table of Contents
Practices for Lesson 1 ........................................................................................................................................ 1-1
Overview of Practices for Lesson 1 ................................................................................................................... 1-2
Practices for Lesson 2 ........................................................................................................................................ 2-1
Practices for Lesson 2 (Optional) ...................................................................................................................... 2-2
Practice 2-1: Explore Salient New Features of OAM 11g .................................................................................. 2-3
Practices for Lesson 3 ........................................................................................................................................ 3-1
Practices for Lesson 3....................................................................................................................................... 3-2
Practice 3-1: Run Repository Creation Utility .................................................................................................... 3-5
Practice 3-2: Install Oracle WebLogic Server 10.3.3 ......................................................................................... 3-7
Practice 3-3: Install Oracle Identity Management 11g ....................................................................................... 3-8
Practice 3-4: Create a New Domain and Configure the OAM Server ................................................................ 3-9
Practice 3-5: Start the Administration and Managed Server ............................................................................. 3-14
Practice 3-6: Sanity Checks and Walkthrough of Management Interfaces........................................................ 3-16
Practices for Lesson 4 ........................................................................................................................................ 4-1
Practices for Lesson 4....................................................................................................................................... 4-2
Practice 4-1: Remove SSO Policies for EM and WLS Console ........................................................................ 4-3
Practice 4-2: Install and Configure OHS 11g Instances .................................................................................... 4-4
Practice 4-3: Install OAM 11g WebGate ........................................................................................................... 4-9
Practice 4-4: Create an OAM 11g WebGate Instance....................................................................................... 4-10
Practice 4-5: Configure OAM 11g WebGate ..................................................................................................... 4-11
Practice 4-6: Register OAM 11g WebGate with OAM 11g Server..................................................................... 4-12
Practice 4-7: Restart OHS and Validate the results .......................................................................................... 4-15
Practice 4-8: View the Agent Details by Using OAM Admin Console ................................................................ 4-16
Practice 4-9: Register OAM 10g WebGate by Using OAM Admin Console ...................................................... 4-17
Practice 4-10: Install OAM 10g WebGate ......................................................................................................... 4-18
Practice 4-11: Restart OHS and Validate the Results ....................................................................................... 4-20
Practice 4-12: Register OSSO10g Agent (mod_osso) with OAM 11g Server ................................................... 4-21
Practice 4-13: Restart OHS and Validate the Results ....................................................................................... 4-27
Practice 4-14: View the Agent Details by Using OAM Admin Console .............................................................. 4-28
Practice 4-15: Explore WLS Embedded LDAP Directory and Default OAM User Identity Store ....................... 4-29
Practice 4-16: Create a New User in WLS Embedded LDAP as OAM Admin and WLS Admin User ............... 4-31
Practice 4-17: Configure OID as the New Identity Store for OAM ..................................................................... 4-32
Practice 4-18: Verify the Need to Configure OID Authenticator ........................................................................ 4-34
Practice 4-19: Create OID Authenticator ........................................................................................................... 4-35
Practice 4-20: Verify the Use of OID as the User Store for OAM Authentication .............................................. 4-36
Practice 4-21: Working with WLS Agent ........................................................................................................... 4-37
Practice 4-22: Mode of Communication: WebGate and OAM 11g Server - Setting Server Mode to Simple ..... 4-39
Practice 4-23: Mode of Communication: WebGate and OAM 11g Server - Setting OAM 11g WebGate
Mode to Simple ............................................................................................................................................... 4-41
Practice 4-24: Restart the OHS Instance and Verify the Results ...................................................................... 4-42
Practice 4-25: Change Server Mode to Open and Test WebGate Communication........................................... 4-43
Practices for Lesson 5 ........................................................................................................................................ 5-1
Practices for Lesson 5....................................................................................................................................... 5-2
Practice 5-1: Deploy the My Bank Application .................................................................................................. 5-4
Practice 5-2: Configure Single Sign-On for mybank Application ....................................................................... 5-6
Practice 5-3: Managing Resources ................................................................................................................... 5-7
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
Assumptions
N/A
Task
Note: You can either play these clips at this point, or you can play them before starting the
practices for the respective lessons where the concepts are covered.
1.
In these practices, you install and configure OAM 11g (and all the supporting products that have
to be installed as prerequisite). You perform post install/configure checks. You also learn how to
start and stop the servers and, finally, take a walkthrough of the various consoles (OAM admin
console, FMW Control, WLS admin console).
Assumptions
Make sure you are running the commands as the oracle user. To ascertain this, enter whoami
on the terminal window.
For this practice, you work on your Linux machine, which has a pre-installed and
configured Oracle Database
1.
2.
From the terminal window, navigate to the /modules/stage/rcu/bin directory and run
rcu.
cd /modules/stage/rcu/bin
./rcu
Use the table as a guide to populate the fields:
Step
Window/Page Description
Choices or Values
a.
Welcome
Next
b.
Create Repository
Create
c.
d.
OK
e.
Select Components
f.
OK
g.
Schema Passwords
h.
Map Tablespaces
Next
i.
OK
j.
Creating Tablespaces
OK
k.
Summary
Create
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
Step
l.
Window/Page Description
Completion Summary
Choices or Values
Close
Tasks
Switch to the Windows machine for this lab.
(Note: From here on, unless explicitly stated, all the practices should be, by default, completed
on the Windows machine.)
1. Open a command prompt and navigate to the D:\Program
Files\Java\jdk1.6.0_17\bin directory.
cd D:\Program Files\Java\jdk1.6.0_17\bin
2. Enter the following command to launch the WLS installer:
java jar d:\stage\wls_1033\wls1033_generic.jar
3. Use the table as a guide to populate the fields:
Step
Window/Page Description
Choices or Values
a.
Welcome
Next
b.
c.
d.
Yes
e.
Typical
f.
JDK Selection
g.
WebLogic Server:
d:\middleware\wls_home
Oracle Coherence:
d:\middleware\coherence_home
h.
i.
Installation Summary
Next
j.
Installation Complete
Assumptions
Make sure Oracle WebLogic Server is installed before you start this practice.
Tasks
1.
2.
Window/Page Description
Choices or Values
a.
b.
Welcome
Next
c.
Prerequisite Checks
Next
d.
e.
Installation Summary
Install
f.
Installation Progress
Next
g.
Installation Complete
Finish
h.
Next
i.
Finish
Practice 3-4: Create a New Domain and Configure the OAM Server
Overview
In this practice, you run the Configuration Wizard to create a new WLS domain and configure
the OAM server as part of the domain.
Assumptions
The previous three practices must be completed to successfully complete this practice.
Tasks
1.
2.
Window/Page Description
Choices or Values
a.
Welcome
b.
c.
d.
Configure Administrator
Username and Password
Name: weblogic
Password: Welcome1
Confirm user password: Welcome1
e.
Production Mode
Available JDKs: Sun SDK 1.6.0_17
f.
g.
Next
Step
Window/Page Description
Choices or Values
h.
i.
Next
j.
Next
k.
Configure Clusters
Next
l.
Configure Machines
Click Add
Name: Windows_Machine
m.
n.
Configuration Summary
Create
o.
Creating Domain
Done
3.
Now you apply BP01 (Bundled PatchSet 1) 11.1.1.3.1. This step is required to fix base
bug 10094106. Open a command line window and set the ORACLE_HOME environment
variable to d:\middleware\idm_home, and set the PATH environment variable to include
d:\middleware\idm_home\bin and d:\middleware\idm_home\OPatch directories.
Now execute the OPatch command and retrieve the OPatch version number. The OPatch
version number should be 11.1.0.8.0 or higher to successfully apply this patch (as detailed
in Readme.txt file for the BP01 patch).
4.
Verify the OUI (Oracle Universal Installer) Inventory. OPatch needs access to a valid OUI
inventory to apply patches.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
5.
Create a location for storing the unzipped patch. This location is sometimes referred to as
PATCH_TOP. Unzip the patch zip file (d:\stage\p10094106_111130_Generic.zip)
under d:\stage\bp01. Hence bp01 under d:\stage directory is our PATCH_TOP.
6.
7.
Once the patch has been successfully applied, you can query the inventory to see the bugs
fixed as part of this patch:
OPatch lsinventory
Note: ORACLE_HOME and PATH must be set on the MS DOS window where you execute the
above command or you have to navigate to d:\middleware\idm_home\OPatch directory to
issue this command.
Assumptions
Practice 3-4 must be successfully completed before you start this practice.
Tasks
Following are the steps to start the admin and managed servers by using the WLS admin
console:
1. Double-click the setNMProps.cmd file located in
D:\middleware\oracle_common\common\bin
2.
3.
4.
5.
6.
7.
That is, remove all the class files under the _pages directory.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
Note: In your lab environment you may not see jsp_servlet\_pages\* directory. Hence,
ignore this step.
8. Restart the admin and managed servers.
Alternative ways to start and stop admin and managed servers:
To start and stop the admin and managed servers by using command-line options, you can use
the following:
Start admin server: Double-click
d:\middleware\user_projects\domains\oam_domain\startWebLogic.cmd
Start managed server: From the command prompt, navigate to
d:\middleware\user_projects\domains\oam_domain\bin. Run the following
command:
startManagedWebLogic.cmd oam_server1
You will be challenged with username and password (use weblogic and Welcome1) in both
cases. Watch out for the RUNNING message on the window, which indicates the servers are
up and running.
To stop the admin and managed servers, type Ctrl + C on the MS-DOS command line windows
from where they are running.
You can also use the Windows menu option - Start > Programs > Oracle WebLogic > User
Projects > oam_domain > Start Admin Server for Weblogic Domain and Stop Admin Server to
start and stop the admin server.
You can use the Windows menu option Start > Programs > Oracle WebLogic > WebLogic
Server 11gR1 > Tools > Node Manager to start the node manager.
Assumptions
Make sure the admin and managed servers are up and running before you start the practice.
Tasks
1.
Launch Firefox and enter the URL for the WLS admin console:
http://<your_host>.us.oracle.com:7001/console. (Add this page to the Bookmark Toolbar.)
Important: Only add http://<your_host>.us.oracle.com:7001/console to the bookmark;
remove the rest of the string.
Log in by using weblogic and Welcome1 as username and password.
2. To check the status of the admin and managed servers, navigate by using the left pane,
Domain Structure > oam_domain > Environment > Servers. You should be able to see the
state of both the servers as RUNNING.
3. To check the status of EM FMW Control (application deployed on the admin server), click
AdminServer (admin) > click the Deployments tab. Notice the state of the em application
is Active. Click the em application, which shows you more detailed Properties pages.
4. To check the status of the OAM admin console application (application deployed on the
admin server), click the AdminServer hyperlink (by using the locator link at the top of the
page) > click the Deployments tab. Notice that the state of oam_admin (11.1.1.3.0) is
Active. Click the oam_admin (11.1.1.3.0) application, which shows you more detailed
Properties pages.
5. To check the status of the OAM server (deployed on the oam_server1 managed server),
navigate by using the left pane to the Servers home page (click the Servers node). Click the
oam_server1 managed server. Click the Deployments tab. Notice that the state of
oam_server application is Active. Click the oam_server application, which shows you
more detailed Properties pages.
6. If you want to start or stop individual applications (such as EM FMW Control or OAM admin
console), you could achieve that by navigating to the Domain Structure > oam_domain >
Deployments page. From here, you can individually select the application you want to start
or stop by using the check boxes next to them and then clicking the Start or Stop buttons.
Note: Do not start/stop any application at this point.
7. To check the default users and groups in the WLS embedded LDAP server, navigate to
Domain Structure > oam_domain > Security Realms by using the left pane. Notice the
default security realm, myrealm. Click myrealm and then click the Users and Groups tab.
Notice the weblogic user which, is the default WLS administrator. Click the weblogic
user and then click the Groups tab. Notice that the user weblogic is a member of
Administrators group.
8.
Tasks
1. Log in to the OAM admin console by using weblogic and Welcome1. Navigate to Policy
Configuration > Application Domains > IDMDomainAgent > Authentication Policies >
Protected Higher Level Policy
2. Open the policy and the list of resources for the policy is displayed on the right panel.
3. Remove the following resources from the authentication policy (click to the right of the dropdown list for the resource and click the Delete icon):
a) IDMDomain:/console
b) IDMDomain:/console/.../*
c) IDMDomain:/em
d) IDMDomain:/em/.../*
4. Click Apply.
5. Navigate to Policy Configuration > Application Domains > IDMDomainAgent >
Authorization Policies > Protected Resource Policy.
6. Open the policy and the list of resources for the policy is displayed on the right panel.
7. Remove the following resources from the authorization policy (click to the right of the dropdown list for the resource and click the Delete icon):
a) IDMDomain:/console
b) IDMDomain:/console/.../*
c) IDMDomain:/em
d) IDMDomain:/em/.../*
8. Click Apply.
Assumptions
N/A
Tasks
1.
Start OSSO 10g and OID 10g instances (These have been pre-installed and configured on
the Windows machine.) Double-click the start_osso10g.bat icon on the desktop. Make
sure the database and processes are up and running as shown below:
Note: dcm-daemon may show Down status sometimes. Please ignore it.
2.
3.
Window/Page
Description
Choices or Values
a.
Welcome
Next
b.
Select Installation
Type
c.
Prerequisite Checks
Next
d.
Specify Installation
Location
e.
Configure
Components
f.
Specify WebLogic
Domain
Password: Welcome1
g.
Specify Component
Details
4.
h.
Configure Ports
i.
Specify Security
Updates
j.
Installation Summary
Install
k.
Configuration
Progress
Next
l.
Installation Complete
Finish
m.
Windows After
Installation Screen
Next
n.
Finish
Navigate to
D:\middleware\ohs_home\instances\ohs_webgate11g\config\OHS\ohs1\htd
ocs. Rename the welcome-index.html as welcome-index.html.bak. Copy
welcome-index.ohs_webgate11g.html from d:\labs\lesson04 to
D:\middleware\ohs_home\instances\ohs_webgate11g\config\OHS\ohs1\htd
ocs. Rename welcome-index.ohs_webgate11g.html as welcome-index.html.
Launch the browser and enter the URL http://<your_host>.us.oracle.com:7778. You should
see the OHS Welcome page with the message WELCOME TO THE OHS_WEBGATE11G
INSTANCE RUNNING ON PORT 7778.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
5.
6.
Now you configure two more instances of OHS: ohs_webgate10g and ohs_osso10g.
Navigate to d:\middleware\ohs_home\bin and double-click config.bat.
Use the following table as a guide to populate the fields:
Step
Window/Page
Description
Choices or Values
a.
Welcome
Next
b.
Configure
Components
c.
Specify WebLogic
Domain
d.
Specify Component
Details
7.
e.
Configure Ports
f.
Specify Security
Updates
g.
Installation Summary
Configure
h.
Configuration
Progress
Next
i.
Installation Complete
Finish
Navigate to
D:\middleware\ohs_home\instances\ohs_webgate10g\config\OHS\ohs1\htd
ocs. Rename the welcome-index.html as welcome-index.html.bak. Copy
welcome-index.ohs_webgate10g.html from d:\labs\lesson04 to
D:\middleware\ohs_home\instances\ohs_webgate10g\config\OHS\ohs1\htd
ocs. Rename welcome-index.ohs_webgate10g.html as welcome-index.html.
Launch the browser and enter the URL http://<your_host>.us.oracle.com:7779. You should
see the OHS Welcome page with the message WELCOME TO THE OHS_WEBGATE10G
INSTANCE RUNNING ON PORT 7779.
8.
9.
Navigate to
D:\middleware\ohs_home\instances\ohs_osso10g\config\OHS\ohs1\htdocs
. Rename the welcome-index.html as welcome-index.html.bak. Copy welcomeindex.ohs_osso10g.html from d:\labs\lesson04 to
D:\middleware\ohs_home\instances\ohs_osso10g\config\OHS\ohs1\htdocs.
Rename welcome-index.ohs_osso10g.html as welcome-index.html. Launch the
browser and enter the URL http://<your_host>.us.oracle.com:7780. You should see the
OHS Welcome page with the message WELCOME TO THE OHS_OSSO10G INSTANCE
RUNNING ON PORT 7780.
Assumptions
OHS server instance (11.1.1.2.0) should be installed and running in the same Middleware home
where you intend to install the OAM 11g WebGate.
1. Check if OHS is running by executing opmnctl status from
d:\middleware\ohs_home\instances\ohs_webgate11g\bin.
2. If the status indicates "Not running" then enter opmnctl startall.
4. On the browser window, enter the URL: http://<your_host>:7778/ and press Enter
5. The Welcome page of OHS is displayed
Task
1.
2.
Window/Page Description
Choices or Values
a.
b.
Welcome
Next
c.
Prerequisite Checks
Next
d.
e.
Install Summary
Install
f.
Installation Progress
Next
g.
Installation Complete
Finish
h.
Next
i.
Finish
Assumptions
A WebGate home must exist before attempting this practice.
Task
1.
2.
The -w flag indicates the OHS instance folder and the -oh indicates the WebGate Oracle
home.
This command will create a WebGate folder under
d:\middleware\ohs_home\instances\ohs_webgate11g\config\OHS\ohs1 and
copy the configuration files (shown below) necessary for the WebGate process under
d:\middleware\ohs_home\instances\ohs_webgate11g\config\OHS\ohs1\web
gate\tools\openssl\simpleCA (cacert.pem and cakey.pem) and
d:\middleware\ohs_home\instances\ohs_webgate11g\config\OHS\ohs1\web
gate\config (oblog_config_wg.xml) directories.
The output of the above command should looks something like this:
copying files
d:\middleware\webgate11g_home\webgate\ohs\config\oblog_config_wg
.xml 1 File(s) copied
copying files
d:\middleware\webgate11g_home\webgate\ohs\tools\openssl\simpleCA
\cacert.pem 1 File(s) copied
copying files
d:\middleware\webgate11g_home\webgate\ohs\tools\openssl\simpleCA
\cakey.pem 1 File(s) copied
Assumptions
Make sure a WebGate instance is created before you start this practice.
Tasks
1.
Set the PATH environment variable. Right Click on My Computer (<your_host>) icon on
your desktop, select Properties, click the Advanced tab, and click the Environment
Variables button. Under System Variables, edit the path environment variable. At the end of
the variable value string, add the following:
;D:\middleware\ohs_home\lib
Click the OK button three times to save and close the windows.
2. Open a new command line window (so that the PATH environment variable has taken
effect) and navigate to the
d:\middleware\webgate11g_home\webgate\ohs\tools\EditHttpConf directory.
3. Run the following command:
EditHttpConf.exe -w
d:\middleware\ohs_home\instances\ohs_webgate11g\config\OHS\ohs1
-oh D:\middleware\WebGate11g_home -o webgate.conf
It should show the following message:
The web server configuration file was successfully updated
d:\middleware\ohs_home\instances\ohs_webgate11g\config\OHS\ohs1/
httpd.conf has been backed up as
d:\middleware\ohs_home\instances\ohs_webgate11g\config\OHS\ohs1/
httpd.conf.ORIG
Verify that
D:\middleware\ohs_home\instances\ohs_webgate11g\config\OHS\ohs1 has
the webgate.conf, httpd.conf.ORIG (backup file) and httpd.conf files. The last
line in httpd.conf should be:
include
"D:\middleware\ohs_home\instances\ohs_webgate11g\config\OHS\ohs1/webga
te.conf"
Practice 4-6: Register OAM 11g WebGate with OAM 11g Server
Overview
In this practice, you run the rreg registration tool, which will register the OAM 11g WebGate.
This exercise uses the in-band mode for the registration. The registration can also be done via
the OAM admin console UI.
Assumptions
The previous three practices must be completed to successfully complete this practice.
Tasks
1.
Replace With
<serverAddress>http://{oam_ad
min_server_host}:{oam_admi
n_server_port}</serverAddr
ess>
<serverAddress>http://<your_host>.us.o
racle.com:7001</serverAddress>
<hostIdentifier>RREG_HostId11
G</hostIdentifier>
<hostIdentifier>OAM11gHostId</hostIden
tifier>
<agentName>RREG_OAM11G</agent
Name>
<agentName>OAM11g_WebGate</agentName>
<agentBaseUrl>http://{web_ser
ver_host}:{web_server_port
}</agentBaseUrl>
<agentBaseUrl>http://<your_host>.us.or
acle.com:7778</agentBaseUrl>
<applicationDomain>RREG_OAM11
G</applicationDomain>
<applicationDomain>OAM11g_WebGate</app
licationDomain>
Window/Page Description
Choices or Values
a.
set
OAM_REG_HOME="D:\Remote
Registration\RREG client
kit\rreg"
set
OAM_REG_HOME=D:\middleware\idm_home\oa
m\server\rreg
Note: No quotes.
b.
set JDK_HOME=%JAVA_HOME%
set JDK_HOME=%JAVA_HOME%
Note: With quotes
3.
cwallet.sso (storing the agent key) files must be copied to the webgate instance
config folder. cwallet.sso contains the SSKPWG (Shared Secret Key Per WebGate).
5.
Assumptions
All previous practices for Lesson 4 must be successfully completed before you start this
practice.
Tasks
1.
2.
3.
4.
5.
Practice 4-8: View the Agent Details by Using OAM Admin Console
Overview
In this practice, you log in to the OAM admin console and explore the OAM 11g WebGate agent
that was registered with the OAM 11g server in Practice 4-5. You can also monitor the agent
and view informational and operational details about the agent.
Assumptions
OAM 11g WebGate agent must be registered with the OAM 11g server.
Tasks
1.
2.
3.
4.
4.
5.
Assumptions
An OHS instanceohs_webgate10gmust be up and running before you start this practice.
On the command line window, navigate to
d:\middleware\ohs_home\instances\ohs_webgate10g\bin and enter opmnctl
status.
Tasks
1.
2.
Property Name
Value
a.
Name
oam10g_webgate
b.
Base URL
http://<your_host>.us.oracle.com:7779
c.
Host Identifier
oam10gHostID
d.
/public/index.html
Note: Click the plus sign (+) in the Public
Resource List table and enter
/public/index.html
Tasks
1.
Name
Value
a.
Destination
Name
D:\middleware\webgate10g_home
Note: Click Next on the Confirmation dialog box.
b.
Replace
Existing
File
c.
Transport
Security
Mode
Open
d.
WebGate
ID
oam10g_webgate
Note: This ID must match the agent name and case specified in Practice
4-9
e.
Password
for
WebGate
f.
Access
Server ID
AAA
Note: This ID could be any string of your choice.
g.
Host name
where an
Access
Server is
installed
<your_host>.us.oracle.com
h.
Port
Number
the Access
Server
Listens to
This port number can be confirmed by looking at the OAM admin console
> System Configuration > oam10g_webgate > Server Lists > Host Port
i.
Proceed
with
This is the OAP port. The OAM proxy receives requests sent over this
port.
5575
Note: If you see an error: Preparing to connect to Access Server. Please
wait. Client authentication failed, please verify your WebGate I, make
sure the WebGate information is correct, and if you still get the error, try
restarting the admin and managed servers.
Yes
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
Step
Name
Automatic
Update of
httpd.co
nf?
Value
j.
Enter the
absolute
path of
httpd.co
nf file in
your
webserve
r config
directory
D:\middleware\ohs_home\instances\ohs_webgate10g\config
\OHS\ohs1\httpd.conf
k.
Configure
WebServer
Next
l.
Assumptions
Practices 4-7 and 4-8 must be successfully completed before you start this practice.
Tasks
1.
2.
Now you will verify the WebGate configuration by accessing the protected URL
http://<your_host>.us.oracle.com:7779. Close all browsers gracefully (File > Close Window).
Open a new browser window, enter URL http://<your_host>.us.oracle.com:7779 and press
Enter.
You should be redirected to the OAM SSO login page.
Note: In case you get to the Welcome page without challenge, clear all the cookies from
your browser and try again. To clear cookies, go to Tools > Options > Privacy > Remove
Individual Cookies > Remove all cookies. Press the Close button followed by OK.
Enter weblogic and Welcome1 for user ID and password.
Click Login. The OHS Welcome page should be displayed.
3.
4.
5.
Assumptions
The OHS instance ohs_osso10g must be up and running. On the command line window,
navigate to d:\middleware\ohs_home\instances\ohs_osso10g\bin and enter
opmnctl status.
Tasks
1.
2.
Pretend that you are the application administrator. As an application administrator, navigate
to D:\middleware\idm_home\oam\server\rreg\input and, by using WordPad, edit
OSSORequest.xml as follows:
Original Value
Replace With
<serverAddress>http://{oam_adm
in_server_host}:{oam_admin_
server_port}</serverAddress
>
<serverAddress>http://<your_host>.us.
oracle.com:7001</serverAddress>
<hostIdentifier>RREG_HostId</h
ostIdentifier>
<hostIdentifier>OSSO10gHostid</hostId
entifier>
<agentName>RREG_OSSO</agentNam
e>
<agentName>OSSO10g_agent</agentName>
<agentBaseUrl>http://{web_serv
er_host}:{web_server_port}<
/agentBaseUrl>
<agentBaseUrl>http://<your_host>.us.o
racle.com:7780</agentBaseUrl>
<applicationDomain>RREG_OSSO</
applicationDomain>
<applicationDomain>OSSO10g_agent</app
licationDomain>
Save and Close the file. The application administrator provides the metadata details in the
request.xml file and emails this file to security admin.
Now pretend that you are security admin (who has access to OAM admin console or
privileges to run rreg; that is, be a member of Role Mapping, the OAM Administrators
Role). Navigate to D:\middleware\idm_home\oam\server\rreg\bin. Edit
oamreg.bat by using WordPad and make sure OAM_REG_HOME has been set correctly
(this has already been set correctly in Practice 4-5):
Step
a.
Window/Page Description
Choices or Values
OAM_REG_HOME="D:\Remote
Registration\RREG
client kit\rreg"
OAM_REG_HOME=D:\middleware\idm_home\oam
\server\rreg
4.
Make sure the environment variable JAVA_HOME is set correctly (this has already been set
correctly in Practice 4-5). Right-click My Computer(<your_host>) icon on your desktop.
Select Properties, click the Advanced tab, and click the Environment Variable button. Under
System Variables, locate JAVA_HOME and make sure the value is set to D:\Program
Files\Java\jdk1.6.0_17. Click the OK button three times to save and close the
windows.
Edit the httpd.conf file under
d:\middleware\ohs_home\instances\ohs_osso10g\config\OHS\ohs1. Search
for ServerName <your_host>.us.oracle.com. Replace the value with the following in lower
case:
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
5.
ServerName <your_host>.us.oracle.com:7780
Make sure <your_host>.us.oracle.com is in lower case.
As security admin, open a new command line window and navigate to
D:\middleware\idm_home\oam\server\rreg and run the following command:
bin\oamreg.bat outofband input\OSSORequest.xml
Enter weblogic for agent username and Welcome1 for agent password (here security
admin is the weblogic user).
You should get this message after a successful run:
6.
7.
8.
Notice that this time, when you ran oamreg.bat, it did not prompt you for agent username
or password. Hence, this can be run local by the application administrator with no
connection to the WLS admin server. Explore the output\osso10g_agent folder under
D:\middleware\idm_home\oam\server\rreg to see the artifact file osso.conf
created by the utility
Copy the osso.conf from
D:\middleware\idm_home\oam\server\rreg\output\OSSO10g_agent to the
OHS location at
D:\middleware\ohs_home\instances\ohs_osso10g\config\OHS\ohs1
Copy the mod_osso.conf file from
D:\middleware\ohs_home\instances\ohs_osso10g\config\OHS\ohs1\disabl
ed to
D:\middleware\ohs_home\instances\ohs_osso10g\config\OHS\ohs1\module
conf folder.
9.
Edit mod_osso.conf in
D:\middleware\ohs_home\instances\ohs_osso10g\config\OHS\ohs1\module
conf folder to resemble the following text (changes highlighted in bold text):
LoadModule osso_module "${ORACLE_HOME}/ohs/modules/mod_osso.so"
<IfModule mod_osso.c>
OssoIpCheck off
OssoIdleTimeout off
OssoConfigFile
d:\middleware\ohs_home\instances\ohs_osso10g\config\OHS\ohs1\osso.c
onf
OssoSecureCookies off
OssoHttpOnly off
#
# Insert Protected Resources: (see Notes below for
# how to protect resources)
#
#____#
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
# Notes
#
#______#
# 1. Here's what you need to add to protect a resource,
#
e.g. <ApacheServerRoot>/htdocs/private:
#
<Location />
require valid-user
AuthType Osso
</Location>
</IfModule>
#
# If you would like to have short hostnames redirected to
# fully qualified hostnames to allow clients that need
# authentication via mod_osso to be able to enter short
# hostnames into their browsers uncomment out the following
# lines
#
#PerlModule Apache::ShortHostnameRedirect
#PerlHeaderParserHandler Apache::ShortHostnameRedirect
10. Make sure the line:
include "moduleconf/*.conf"
is uncommented from the
d:\middleware\ohs_home\instances\ohs_osso10g\config\OHS\ohs1\httpd.
conf file.
Tasks
1.
2.
Now you verify the WebGate configuration by accessing the protected URL
http://<your_host>.us.oracle.com:7780. Close all browsers gracefully (File > Close Window).
Open a new browser window, enter URL http://<your_host>.us.oracle.com:7780 and press
Enter
You should be redirected to the OAM SSO login page
Note: In case you get to the Welcome page without challenge, clear all the cookies from
your browser and try again. To clear cookies, go to Tools > Clear Recent History. Click the
Clear Now button.
Enter weblogic and Welcome1 for user ID and password.
Click Login. The OHS Welcome page should be displayed.
3.
4.
5.
Practice 4-14: View the Agent Details by Using OAM Admin Console
Overview
In this practice, you log in to the OAM admin console and explore the OAM 10g agent that was
registered with the OAM 11g server in practice 4-11. You can also monitor the agent and view
informational and operational details about the agent.
Assumptions
The OSSO10g agent must be registered with the OAM 11g server.
Tasks
1.
2.
3.
4.
Log in to http://<your_host>.us.oracle.com:7001/oamconsole
Go to the System Configuration tab.
Select Agents > OSSO Agents > osso10g_agent
Edit (by using the pencil icon or double-click) to view the detailed properties.
Audit data is stored within audit files and can be stored in a separate Oracle Database
(not the policy store).
Tasks
1.
2.
Click myrealm. Click the Providers tab and notice the three providers:
DefaultAuthenticator, DefaultIdentityAsserter and IDMDomainAgent. More specifically,
notice the DefaultAuthenticator, which is WLS authentication provider. WLS embedded
LDAP store is used to authenticate users to WLS such as the weblogic user. If you want
to change the WLS authentication to a different LDAP store, this is where you create a new
LDAP provider (say for OID or ODSEE, formerly Sun LDAP). If you want to learn more
about this, review the OBE http://www.oracle.com/technology/obe/fusion_middleware/wls103/InstallConfig/wls_authn_s
unds/wls_authn_sunds.htm
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
3.
4.
Click the Users and Groups tab. Notice the weblogic seeded user. Click the weblogic
user and notice that it is member of the Administrators group (under the Groups tab). If you
want to create a new user to be a WLS admin, then that user must be a member of the
Administrators group.
Launch the OAM admin consolehttp://<your_host>.us.oracle.com:7001/oamconsole
and log in by using weblogic and Welcome1. Navigate to System Configuration > Data
Sources > User Identity Stores > UserIdentityStore1. Double-click the
UserIdentityStore1 node. Notice on the right pane, the primary identity store for OAM
authentication is set to WLS Embedded LDAP. Since WLS Embedded LDAP is the primary
identity store (select the Primary checkbox), OAM is going to authenticate users against the
WLS embedded LDAP store.
Also, notice that in the Role Mapping section, OAM Administrators role is set to the
Administrators group. This means any user who is a member of the Administrators group in
WLS embedded LDAP would be an OAM admin; that is, able to log in to OAM admin
console. This is the reason why the weblogic user in WLS embedded LDAP can log in to
the OAM admin console.
Tasks
1.
2.
3.
4.
5.
6.
Practice 4-17: Configure OID as the New Identity Store for OAM
Overview
In this practice, you add a set of users to OID 10g (10.1.4.0.1) and create a new group,
oam_admin. Assign a userVishal Parasharas a member of oam_admin group. Log in to the
OAM admin console by using Vishal; it should succeed. Log in to the OAM admin console as
David Goldsmith; it should fail because David is not a member of the oam_admin group.
However, both Vishal and David should be able to log in to access
http://<your_host>.us.oracle.com:7778 because they are OAM authenticated users.
Tasks
1.
2.
3.
4.
5.
Window/Page Description
Choices or Values
Name
OID_UserStore
LDAP URL
ldap://<your_host>.us.oracle.com:13060
Principal
cn=orcladmin
Credential
Welcome1
cn=users,dc=us,dc=oracle,dc=com
Step
Window/Page Description
Choices or Values
cn=groups,dc=us,dc=oracle,dc=com
uid
oam_admin
Click Test Connection. Click OK on the Connection Status window with the message,
Connection to the User Identity Store successful. Click Apply to save the definition. On the left
pane, you should now see OID_UserStore along with the primary UserIdentityStore1
(WLS embedded LDAP).
Note: Sometimes you may have to refresh the screen to see the update; use the Refresh icon
on the left pane menu bar.
Close the active tab (OID_UserStore) using x (close single tab) icon on the top right corner.
6. Change OID_UserStore to the primary user identity store. Double-click the
OID_UserStore node on the left pane to see the properties of the definition displayed on
the right pane. Click the Set as Primary button on the right pane. Click Apply. A disabled
Primary check box should now appear on the Properties page. Edit the properties of
UserIdentityStore1 (either by double-clicking or using the pencil icon) and notice the
Primary check box is now deselected. Click Sign out to exit the OAM Admin console.
Tasks
1.
Log in to the OAM admin console by using Vishal.Parashar and Welcome1. The
IDMDomain agent that protects all the identity management consoles including the OAM
admin console is unable to authenticate the user Vishal.Parashar in WLS embedded
LDAP (Default Authenticator). Hence, authentication fails and there is a hand-off to the
native OAM admin console Sign on page:
http://<your_host>.us.oracle.com:7001/oamconsole/faces/login.jspx (unlike the Single SignOn login page: http://<your_host>.us.oracle.com:14100/oam/server/obrareq.cgi). You have
configured the user identity store definition in the OAM admin console in the previous
practice for OID and set it as the primary identity store; hence when you sign in by using
Vishal.Parashar and Welcome1 on the native login page, you are successfully
authenticated and able to log in to the OAM admin console.
In the next practice, you create a new OID authenticator by using the WLS admin console
to make the single sign-on to the OAM admin console successfully work again.
Tasks
1.
2.
3.
Log in to the WLS console with weblogic and Welcome1. Navigate to oam_domain >
Security Realm > myrealm > Providers. Click Lock and Edit on the Change Center section
(top left).
Click the New button. Specify Name and Type as OIDAuthenticator and
OracleInternetDirectoryAuthenticator respectively. Click OK
Click the OIDAuthenticator link. Set the following properties:
Step
4.
5.
6.
7.
Window/Page Description
Choices or Values
a.
Sufficient.
Click Save.
b.
<your_windows_host>.us.oracle.com
c.
13060
d.
cn=orcladmin
e.
Welcome1
f.
cn=users,dc=us,dc=oracle,dc=com
g.
(&(uid=*)(objectclass=person))
h.
(&(uid=%u)(objectclass=person))
i.
uid
j.
cn=groups, dc=us,dc=oracle,dc=com
Click Save
Navigate back to the Providers Page (by using the locator link at the top). Click the Reorder
button and move OIDAuthenticator above DefaultAuthenticator by using the Up arrow. Click
OK.
Click the DefaultAuthenticator link. Change the control flag to Sufficient. Click Save.
Click on Activate Changes on the top left Change Control section.
Restart the admin and managed servers (by using the command line or the WLS admin
console).
Practice 4-20: Verify the Use of OID as the User Store for OAM
Authentication
Overview
In this practice, you log in to the OAM admin console as a user in OID who is member of the
oam_admin group, Vishal. You try to log in to the WLS admin console as the same user without
success (because WLS embedded LDAP is the default authenticator and Vishal is not in the
embedded LDAP). Next, you try to log in to http:<your_host>.us.oracle.com:7778 as Vishal and
as David with success, because both the users are in the OID even though David is not a
member of the oam_admin group.
Also, try to log in to the OAM admin console as the original user, weblogic. This should fail
because the weblogic user is not in the OID.
Tasks
1.
Launch the OAM admin console. Log in to the console by using Vishal.Parashar and
Welcome1. You should have success and be able to see Signed in as
Vishal.Parashar on the top right-hand corner.
Note: You should not see the Redirect to Native Login screen as you saw in the previous
practice.
Click Sign out.
2. Try to log in to the OAM admin console with weblogic and Welcome1. You should be
unsuccessful because the weblogic user is not in the OID.
3.
4.
5.
6.
Try to log in to the OAM admin console with David.Goldsmith and Welcome1. You
should see Access Denied page. The AuthZ was unsuccessful even though David is in the
OID (AuthN user). This is because David is not a member of the oam_admin group.
Try to log in to the WLS admin console with Vishal.Parashar and Welcome1. You
should see the Authentication Denied message because Vishal is not in embedded LDAP
and WLSs default authenticator is set to WLS embedded LDAP. For Vishal to be
successfully able to log in to the WLS admin console, he should not only be in the WLS
embedded LDAP store but also be a member of the Administrators group.
Clear all cookies and launch http://<your_host>.us.oracle.com:7778 (the welcomeindex.html protected via a WebGate 11g). You are redirected to the OAM Login page.
Enter Vishal.Parashar and Welcome1. You should have success and be able to see
the Oracle Fusion Middleware 11g R1 Welcome page. Close the browser
(Note: Always remember to close the browser gracefully or explicitly clear all the cookies).
Launch http://<your_host>.us.oracle.com:7778 again. You are redirected to the OAM Login
page. Enter David.Goldsmith and Welcome1. You should have success and be able to
see the Oracle Fusion Middleware 11g R1 Welcome page. Even though David is not a
member of the oam_admin group, David is a valid authenticated user in OID.
Note: The OAM admin console requires a user to be a member of the oam_admin group to
gain access, and we have not set up any restrictions for the welcome-index.htmlprotected resource on ohs_webgate11g.
Note: From here on, you should log in to the OAM admin console as Vishal.Parashar
and Welcome1.
Tasks
Review WLSAgent provider and bootstrap configuration:
1. Make sure the admin server is up and running.
2. In your browser, clean cookies. Using Firefox, go to menu > Tools > Clear Recent History.
3. On the browser window explicitly enter:
http://<your_host>.us.oracle.com:7001/oamconsole.
Note: If using the bookmark, make sure the bookmark URL is
http://<your_host>.us.oracle.com:7001/oamconsole with no string after that. Observe the
redirect URL for the OAM server (port 14100) and notice that the login text says Sign SignOn. Log in to the OAM admin console as vishal.parashar and Welcome1.
4. Using Firefox, go to menu > Tools > Options > Privacy > Show Cookies > Expand the Site
nodes. Check generated cookies. OAMAuthnCookie (domain cookie) and OAM_ID (server
cookie) should exist (besides OAMSESSIONID cookie). An OAM_ID cookie is produced by
the OAM 11g server and OAMAuthnCookie is a WLSAgent cookie. Click Close followed by
OK.
5. Click Sign out and close the browser gracefully.
6. Open a new browser and log in to the WLS console by using
http://<your_host>.us.oracle.com:7001/console as weblogic/Welcome1. Access the
Security Realm on the left pane > myrealm > Providers tab
7. Verify IDMDomainAgent provider exists, and access it to see its configuration. Notice that
the WLS agent uses an OAMAuthnCookie (on the Common tab)
8. Access the Provider Specific tab, notice the Agent Name (IDMDomainAgent: seeded agent
which you can view via the OAM admin console) and Primary Access Server
(localhost:5575). 5575 is the proxy server port for the OAM Server (the OAM server port is
14100).
Note: If you change any of these parameters on the Provider definition, it requires a domain
restart (restart admin and managed servers).
9. Close your browser.
Review the default IDMDomainAgent policies:
1. Log in to the OAM admin console.
2. Click Policy Configuration > Application Domains and review the existing policies under the
IDMDomainAgent application domain. Under Resources, notice that
IDMDomainAgent:/oamconsole is one of the resources. Under Authentication Policies >
Protected HigherLevel Policy, you should see IDMDomainAgent:/oamconsole as one of the
resources in the list.
3. Log out of the OAM admin console
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
Disable WLSAgent:
By default, WLSAgent is enabled; therefore providing seamless SSO authentication by
using OAM 11g for all IDM deployed applications (Oracle Identity Navigator, Oracle
Adaptive Access Manager, Oracle Identity Manager, Oracle Access Manger and so on). In
this practice, you disable WLSAgent and observe the native login page (rather than the
SSO page) appear when you try to log in to the OAM admin console.
1. Stop AdminServer by using WLS Admin Console > oam_domain > Environment >
Servers > Control Tab > Select the check box next to AdminServer > Shutdown > Force
Shutdown now or just close the command line window from where you started
AdminServer.
2. Right-click My Computer (your_hostname) > Properties > Advanced > Environment
Variables. Under System Variables, click New. Specify WLSAGENT_DISABLED as the
variable name and true as the variable value.
3. Open a new command line window. Make sure the environment variable
WLSAGENT_DISABLED is set to true on the window by entering the following command:
echo %WLSAGENT_DISABLED%
4. Start the admin server by navigating to the directory
d:\middleware\user_projects\domains\oam_domain and then enter the
startWeblogic.cmd
5. When the admin server startups, clear the cookies and access OAM Admin Console
(http://<your_host>.us.oracle.com:7001/oamconsole)
6. Notice the login page doesnt have Sign Sign-On in the text and notice the native login
page in the URL (unlike the SSO URL you observed in earlier practices).
7. Provide credentials (vishal.parashar and Welcome1) and log in.
8.
A copy of the certificate holder's public key, which is used to encrypt messages and
digital signatures
The digital signature of the certificate-issuing authority is provided so that a recipient can
verify that the certificate is real
Digital certificates can be stored in a registry from which authenticating users can look up the
public keys of other users.
For Simple mode encryption, Oracle Access Manager ships a certificate authority with its own
private key, which is installed across all WebGates and OAM servers. For each public key, there
is a corresponding private key that Oracle Access Manager stores in the aaa_key.pem file.
A program named openSSL in the \tools subdirectory automatically generates the key pair
and the following files for Simple mode security:
password.xml contains the random global passphrase that was designated during
installation, in obfuscated format. This is used to prevent other customers from using the
same CA. Oracle Access Manager performs an additional password check during the
initial handshake between the OAM agent and OAM server.
Tasks
1.
2.
3.
Log in to the OAM admin console with vishal.parashar and Welcome1. Navigate to
System Configuration > Agents > 11g WebGates > OAM11g_Webgate. Edit
OAM11g_webgate and notice the mode of communication (security) is set to Open.
The mode of communication at install time was set to Open; hence you need to edit the
agent registration through the OAM admin console and change the security mode (you will
perform this in the next practice).
Expand the Server Instances node and edit the properties of oam_server1. On the Proxy
tab, change the mode from Open to Simple for the OAM Server oam_server1. Click Apply
and then click Yes on the Confirm Edit window.
On the browser window, open a new tab. Enter http://<your_host>.us.oracle.com:7778.
Notice the error Oracle Access Manager Operation Error. Check out the oam_server1diagnostic.log file under
d:\middleware\user_projects\domains\oam_domain\servers\oam_server1\
logs. Notice the log message (near the end of the file):
Channel unsecure. Details: Channel Mode: open Minimum Server
Mode: simple Agent Id: OAM11G_webgate] Channel security mode is
different as specified in configuration Channel unsecure.
Double-click the Server Instances node and OAM Common Server Properties pane appears on
the right. Click the OAM Proxy tab.
Under Simple Mode Configuration there is the property, Global passphrase.
The installer generates a random global passphrase initially, and this can be edited as required
by you later. However, please note that changing the global passphrase requires reregistration
of all existing agents running in Simple mode.
Tasks
1.
2.
3.
Choices or Values
Simple
Click Apply.
4. Observe the extra files (compared to when you registered WebGate 11g agent in Open
mode) aaa_cert.pem, aaa_key.pem and password.xml that are created along with
cwallet.sso and ObAccessClient.xml in the
d:\middleware\user_projects\domains\oam_domain\output\oam11g_webgat
e folder.
5.
6.
Practice 4-24: Restart the OHS Instance and Verify the Results
Overview
In this practice, you restart the Web server (OHS) for the changes you made in Step 5 of the
previous practice to take effect. Then you validate the result of changing the mode of
communication between the WebGate and the OAM 11g server by trying to get to the Welcome
page for the OHS server: http://<your_host>.us.oracle.com:7778
(Note: In practice 4-22, Step 3, you received an error due to mode incompatibility).
Tasks
1.
2.
3.
4.
5.
Tasks
1.
2.
3.
4.
5.
6.
7.
Log in to the OAM admin console. Notice, you will see the OAM native authentication page
(as opposed to the SSO page). This is due to known limitation of WLS agent (Bug 9467206:
WLS agent does not support Simple or Cert mode**). Navigate to System Configuration >
Server Instances > oam_server1. Edit the properties and change the Mode to Open on
the Proxy tab. Click Apply. On the On Confirm Edit window, click Yes.
Restart the admin and managed servers.
Open a new browser (clear cookies and cache - Go to Tools > Clear Recent History) and
verify if with WebGate running in Simple mode of communication and the server running on
Open, you are successfully able to access the protected URL
http://<your_host>.us.oracle.com:7778. Enter URL http://<your_host>.us.oracle.com:7778 and
press Enter.
You should be redirected to the OAM SSO login page.
Enter vishal.parashar and Welcome1 for user ID and password.
Click Login. The OHS Welcome page should be displayed.
Also, validate that the login page for the OAM admin console is now the SSO login page (as
opposed to the native login page) by launching your browser and entering
http://<your_host>.us.oracle.com:7001/oamconsole.
Note: At the end of all the labs for this course, there is a lab exercise on enabling CERT mode
communication between a WebGate and an OAM 11g server. This is a key requirement in a
production environment. You will perform Practice 4 (Advanced), on Friday. This practice covers
how to secure WebGate and OAM server traffic by using SSL certificates.
b)
Protect the OAM console by using WebGate 11g (the port for oamconsole will change
from 7001 to OHS port where the WebGate is deployed; for example, 7778 for WebGate
11g). However, the only concern here is that the availability of the OAM console now
becomes dependent on the availability of the WebGate.
the resource by using a particular protocol (HTTP or HTTPS, for example) that is defined by
an existing resource type.
Authentication is the process of proving that a user is who he or she claims to be. To
authenticate a user, Oracle Access Manager presents the user's browser with a request for
authentication credentials in the form of a challenge. The challenge is referred to as a
challenge method.
Authorization is the process of determining if a user has a right to access a requested
resource. Administrators can create one or more authorization policies to specify the
conditions under which a subject or identity has access to a resource. A user might want to
see data or run an application program protected by a policy. The requested resource must
belong to an application domain and be covered within that domain by a specific
authorization policy.
Responses: Administrator-defined policy responses declare optional actions to be taken in
addition to the above. Policy responses provide the ability to insert information into a
session and pull it back out at any later point. This is more robust and flexible than OAM
10g, which provided data passage to (and between) applications by redirecting to URLs in a
specific sequence.
Constraints: An authorization constraint is a rule that grants or denies access to a particular
resource based on the context of the request for that resource. Authorization constraints
define the obligations (requirements) that must be fulfilled before responding to a client's
request. Evaluation of constraints determines if the authorization policy applies to the
incoming request. The appropriate obligations take affect after successful authentication.
Tasks
1.
2.
3.
4.
Note: Here, you are deploying an exploded WAR file rather than .war. This allows you to
update the files deployed dynamically without having to redeploy manually to WLS.
5. Ensure Install this deployment as an application is selected. Click Next.
6. Select the admin server as the deployment target for the mybank application. Click
Next.
7. Ensure mybank is the name of the application
(Note: Lowercase). Scroll down. Select I will make the deployment accessible from the
following location. Click Next.
8. Click Finish.
9. Click the Activate Changes button, under the Change Center section.
10. On the deployments page (oam_domain > Deployments), find the mybank application
(Click Next to get to the next page). Note that the State of the application is Prepared.
Select the check box next to the mybank application and click Start > Servicing all
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
requests. On the Start Application Assistant page, click Yes. Now the state of the
application should change from Prepared to Active.
11. Now, with another instance of Firefox browser, enter
http://<your_host>.us.oracle.com:7001/mybank The login page is displayed.
Note: Observe the web.xml under the mybank/WEB-INF folder. You will observe that the
main_page.jsp is set as the Welcome page. The main_page.jsp includes a
header.jsp from the includes folder. This JSP, along with other functions, checks for
the OAM_REMOTE_USER being null. If null, it redirects to the login.jsp page.
Navigate to the
D:\middleware\ohs_home\instances\ohs_webgate11g\config\OHS\ohs1
directory and edit and update the mod_wl_ohs.conf file as shown below:
<IfModule weblogic_module>
WebLogicHost <your_host>.us.oracle.com
WebLogicPort 7001
#Debug ON
#WLLogFile /tmp/weblogic/log
MatchExpression *.jsp
</IfModule>
<Location /mybank>
SetHandler weblogic-handler
#PathTrim /weblogic
#ErrorPage http:/WEBLOGIC_HOME:WEBLOGIC_PORT/
</Location>
4.
Task
1. Using the Firefox browser, go to the http://<your_host>.us.oracle.com:7001/oamconsole.
Log in by using the credentials vishal.parashar and Welcome1.
2.
3.
Navigate to Application Domains > OAM11g_WebGate > Resources. Click the Create icon.
Enter the following values:
Step
4.
Window/Page Description
Choices or Values
a.
Type
HTTP
b.
Host Identifier
OAM11gHostId
c.
Resource URL
/mybank/testheaders.jsp
Click Apply.
Tasks
1. Navigate to Application Domains > OAM11g_WebGate > Authentication Policies >
Protected Resource Policy. Click the Edit icon.
2.
3.
Note: Observe the authentication scheme is set to LDAPScheme. You can add a new
authentication policy, but for now, use an existing policy and add the new resource.
On the right pane, under the Resources tab, click the + (add) icon. From the drop-down
menu, select OAM11gHostId:/mybank/testheaders.jsp
Click Apply.
Tasks
1. Navigate to Application Domains > OAM11g_WebGate > Authorization Policies. Click the
2.
Create icon.
Enter the following values:
Original
Value
Replace With
Name
Admin_Resource_Policy
Resources
OAM11gHostId:/mybank/testheaders.jsp
Click Apply.
Tasks
1. Navigate to Application Domains > OAM11g_WebGate > Authorization Policies >
2.
Admin_Resource_Policy. Click the Edit icon. Click the Responses tab. Click the + (add)
icon.
Enter the following values:
Name
Type
Value
OAM_Cookie_Simple
Cookie
SimpleCookie
OAM_Header_Simple
Header
SimpleHeader
Click Apply.
3. Using the Firefox browser, enter http://<your_host>.us.oracle.com:7778/mybank. Log in
by using the credentials vishal.parashar and Welcome1 (if not already logged in or if
the session has expired). Now type in the URL:
http://<your_host>.us.oracle.com:7778/mybank/testheaders.jsp. Observe the
OAM_HEADER_SIMPLE and the value SimpleHeader.
4. To view the cookie, refresh the page, because the cookie will be displayed only after being
set in the browser. The first time the cookie is sent as an HTTP header by a Web server to
a Web browser and then sent back unchanged by the browser each time it accesses that
server, therefore the second refresh would display the cookie: OAM_Cookie_Simple with
the value of SimpleCookie.
5.
6.
Log in to the OAM admin console by using vishal.parashar and Welcome1 and
navigate to Application Domains > OAM11g_WebGate > Authorization Policies >
Admin_Resource_Policy. Click the Edit icon. Click the Responses tab. Click the + (add)
icon.
Enter the following values:
Name
Type
OAM_Header_Advanced
Header
Value
User $user.attr.uid from
$request.client_ip used agent
$request.agent_id
$user.attr.uid is a keyword that retrieves the UID for the user from the primary identity
store (OID) that is configured for this domain.
$request.client_ip is a keyword that retrieved the requested client's IP address.
$request.agent_id is a keyword that retrieves the agent_id protecting this domain.
7. Click Apply.
8. Refresh the browser with the testheaders.jsp page
http://<your_host>.us.oracle.com:7778/ mybank/testheaders.jsp (you may have to reauthenticate if the session has timed out).
Tasks
1.
2.
3.
4.
5.
From the OAM admin console window, click Policy Configuration > Application Domains
> OAM11g_WebGate > Authentication Policies > Protected Resource Policy.
Click the Responses Tab (you will create a session response in the authentication policy
and use this session variable in the authorization policies)
Click Add (+) Record icon. Enter the following values:
Name
Type
Value
OAM_SESSION
Session
Click Apply.
6. Navigate to Application Domains > OAM11g_WebGate > Authorization Policies >
Admin_Resource_Policy. Click the Edit (pencil) icon.
7. Click the Responses tab. Click Add Record (+) iIcon. Enter the following values:
Name
Type
Value
OAM_HEADER_WITH_SESSION
Header
Click Apply.
9.
Refresh the testheaders.jsp page to check the headers (you may have to reauthenticate with vishal.parashar and Welcome1 if the session has timed out).
Observe OAM_HEADER_WITH_SESSION (if you are not getting the value for
OAM_HEADER_WITH_SESSION or getting a NOT_FOUND value, close all browsers
gracefully. Launch a new Firefox browser window; enter
http://<your_host>.us.oracle.com:7778/mybank. Log in by using vishal.parashar and
Welcome1. Then type in http://<your_host>.us.oracle.com:7778/mybank/testheaders.jsp.
Now observe the OAM_HEADER_WITH_SESSION value).
Tasks
1.
2.
Class
Identity
Type
Allow
4.
Click Save button on the Constraint Details section. Click Apply on the top section.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
5.
6.
7.
Note: Close the current tab. Reopen the Admin_Resource_Policy (AuthZ policy). Make
sure you can view the constraint. If you cannot, recreate the constraint. Add a dummy
response in the responses tab Click Apply. Close the tab. Reopen the AuthZ policy
Admin_Resource_Policy. Make sure you can view the constraint. Delete the dummy
response. Click Apply.
Close all browser windows gracefully. Re-open a Firefox browser and enter
http://<your_host>.us.oracle.com:7778/mybank.
Tasks
1.
2.
3.
4.
5.
Tasks
1.
2.
Log in to the OAM admin console by using vishal.parashar and Welcome1. Navigate
to Policy Configuration > Application Domains > OAM11g_WebGate > Resources.
Click the Create icon to create two resources one after the other.
Step
Name
Value
a.
Type
Http
b.
Description
c.
Host Identifier
OAM11gHostId
d.
Resource URL
/example
Click Apply.
Step
Name
Value
e.
Type
Http
f.
Description
Bakery app
g.
Host Identifier
OAM11gHostId
h.
Resource URL
/example//*
Click Apply.
3. Navigate to Application Domains > OAM11g_WebGate > Authentication Policies > Public
Resource Policy. Click the Edit icon. On the Resources tab, Click the Create (+) icon to add
the two resources created above (select OAM11gHostId:/example and
OAM11gHostId:/example//* from drop-down menu) to be protected by using the
Anonymous Scheme (public access). Click Apply when done.
4.
5.
Tasks
1.
Log in to the OAM admin console by using vishal.parashar and Welcome1. Navigate
to Application Domains > OAM11g_WebGate > Resources. Click the Create icon to create
a new resource as shown below:
Step
Name
Value
a.
Type
http
b.
Description
c.
Host Identifier
OAM11gHostId
d.
Resource URL
/example/internal//*
Click Apply.
2.
3.
Click the Responses tab. Click the Add icon and provide the following details:
Name
Type
AuthN_Cookie Cookie
Value
$user.attr.uid has been successfully authenticated as an
employee. This is the AuthN response.
Click Apply.
4.
5.
Remove all the cookies. Open LiveHTTPHeader by using Tools > LiveHTTPHeader and
minimize the window. Enter http://<your_host>.us.oracle.com:7778/example. You should
see the unprotected main page of the Example Bakery application. Now, click the
Employees link. You should get challenged for SSO credentials. Enter Vishal.Parashar
and Welcome1. You should now see employeeHome.html page; that is, the employees
home page. Vishal Parashar is an authenticated employee in OID.
From the browsers menu options, navigate to Tools > Options > Privacy > Show Cookies.
Expand the Site node and notice the AuthN_Cookie cookie. Click the cookie name to see
the value in the bottom pane. (You can also view the cookie and its value by using
LiveHTTPHeader).
Tasks
1.
Log in to the OAM admin console with vishal.parashar and Welcome1. On the Policy
Configuration tab, navigate to Application Domains > OAM11g_WebGate > Resources.
Click the Create icon to create a new resource as shown below:
Step
2.
3.
4.
5.
6.
7.
Name
Value
a.
Type
http
b.
Description
HR page
c.
Host Identifier
OAM11gHostId
d.
Resource URL
/example/internal/hr
Click Apply.
Navigate to Application Domains > OAM11g_WebGate > Resources > OAM11gHostId:
/example/internal/hr. Click the Duplicate icon from the toolbar and change the
Resource URL from copy of /example/internal/hr to
/example/internal/hr//*
Click Apply.
Click the Duplicate icon from the toolbar and change the Resource URL from copy of
/example/internal/hr to /example/internal/finance.
Change the Description from HR page to Finance page.
Click Apply.
Click the Duplicate icon from the toolbar and change the Resource URL from copy of
/example/internal/hr to /example/internal/finance//*
Change the Description from HR page to Finance page.
Click Apply.
Click the Duplicate icon from the toolbar and change the Resource URL from copy of
/example/internal/hr to /example/internal/eng.
Change the Description from HR page to Engineering page.
Click Apply.
Click the Duplicate icon from the toolbar and change the Resource URL from copy of
/example/internal/hr to /example/internal/eng//*
Change the Description from HR page to Engineering page.
Click Apply.
Navigate to Application Domains > OAM11g_WebGate > Authorization Policies. Click the
Create icon to create a new authorization policy as shown below:
Step
a.
Name
Name
Value
ExampleBakery_HR
Step
Name
Value
b.
Description
c.
Resources tab:
Resource URLs
OAM11gHostId:/example/internal/hr
OAM11gHostId:/example/internal/hr//*
Click Apply. Close the confirmation message by clicking the Hide (x) icon to the right.
Click on the Constraints tab and fill the information as shown below:
Step
Name
Value
a.
Name
HR_Employees_Only
b.
Class
Identity
c.
Type
Allow
Click Add Selected. Click the HR_Employee_Only constraint line. Click the Collapse Pane
icon at the top-right corner of the Constraint Details pane and fill the constraint details as
shown below:
Step
a.
b.
Name
Value
HR
Group
Type
Allow
Click on the Responses tab and fill the information as shown below:
Step
Name
Value
a.
Name
AuthZ_Cookie
b.
Type
Cookie
c.
Value
Click Apply
8.
Navigate to Application Domains > OAM11g_WebGate > Authorization Policies. Click the
Create icon to create a new authorization policy as shown below:
Step
Name
Value
a.
Name
ExampleBakery_Finance
b.
Description
c.
Resources tab:
Resource URLs
OAM11gHostId:/example/internal/finance
OAM11gHostId:/example/internal/finance//*
Click Apply. Close the confirmation message by clicking the Hide (x) icon to the right.
Click the Constraints tab and fill the information as shown below:
Step
Name
Value
a.
Name
Finance_Employees_Only
b.
Class
Identity
c.
Type
Allow
b.
Name
Value
Finance
Group
Type
Allow
Click the Responses tab and fill the information as shown below:
Step
Name
Value
a.
Name
AuthZ_Cookie
b.
Type
Cookie
c.
Value
Click Apply.
9.
Navigate to Application Domains > OAM11g_WebGate > Authorization Policies. Click the
Create icon to create a new authorization policy as shown below:
Step
Name
Value
a.
Name
ExampleBakery_Engineering
b.
Description
c.
Resources tab:
Resource URLs
OAM11gHostId:/example/internal/eng
OAM11gHostId:/example/internal/eng//*
Click Apply. Close the confirmation message by clicking the Hide (x) icon to the right.
Click the Constraints tab and fill the information as shown below:
Step
Name
Value
a.
Name
Engineering_Employees_Only
b.
Class
Identity
c.
Type
Allow
Click Add Selected. Click the Engineering_Employee_Only constraint line. Click the
Collapse Pane icon and fill the constraint details as shown below:
Step
a.
b.
Name
Value
Engineering
Group
Type
Allow
Click the Responses tab and fill the information as shown below:
Step
Name
Value
a.
Name
AuthZ_Cookie
b.
Type
Cookie
c.
Value
Click Apply.
Tasks
1.
Create the following three new resources under Application Domains > OAM11g_WebGate
> Resources:
Name
Value
Type
http
Description
Host Identifier
OAM11gHostId
Resource URL
/cgi-bin/protected1
Click Apply.
Use the Duplicate icon to create the next two resources. Navigate to OAM11g_WebGate >
Resources > /cgi-bin/protected1. Click the Duplicate icon.
Name
Value
Type
http
Description
Host Identifier
OAM11gHostId
Resource URL
/cgi-bin/protected2
Value
Type
http
Description
Host Identifier
OAM11gHostId
Resource URL
/cgi-bin/protected3
Click Apply.
2.
Create three new authorization policies (under Application Domains > OAM11g_WebGate >
Authorization Policies) to allow access to the above created resources and set the following
responses in each resource :
Note: For the rest of the fields, take the default values.
Name
Name
Value
AuthZ_Protected1_App
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
Name
Value
Description
Resources
OAM11gHostId: /cgi-bin/protected1
Responses tab:
Name
OAM_RESP_LITERALC
Type
Cookie
Value
Name
OAM_RESP_LITERALH
Type
Header
Value
Click Apply.
Name
Value
Name
AuthZ_Protected2_App
Description
Resources
OAM11gHostId: /cgi-bin/protected2
Responses tab:
Name
OAM_RESP_HSIMPLE
Type
Header
Value
Name
response_test
Type
Session
Value
Click Apply.
Name
Value
Name
AuthZ_Protected3_App
Description
Resources
OAM11gHostId: /cgi-bin/protected3
Responses tab:
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
Name
Value
Name
OAM_RESP_HADVANCED1
Type
Header
Value
Name
OAM_RESP_HADVANCED2
Type
Header
Value
Click Apply.
3.
4.
Copy the CGI Perl scripts and accompanying CSS/JS from D:\labs\lesson05\oamresponse-demo to the following location in the OHS instance:
d:\middleware\ohs_home\instances\ohs_webgate11g\config\OHS\ohs1\cgi
-bin.
Remove all browser cookies. Access each CGI in turn (you will need to log in with
Vishal.Parashar and Welcome1 before seeing the first one:
http://<your_host>.us.oracle.com:7778/cgi-bin/protected1) and examine the results.
Note: The header variables are visible instantly, but the cookie should be visible on the
second access of the resource; this is because the first time you access the application, the
WebGate requests the browser to set a cookie when the response is coming back from the
application.
Tasks
1.
2.
Launch the admin console. Navigate to Policy Configuration > Application Domains >
OAM11g_WebGate > Resources. Add a resource /favicon.ico.
Click Apply.
Navigate to Policy Configuration > Application Domains > OAM11g_WebGate >
Authentication Policy > Public Resource Policy. Edit the Public Resource Policy and add
the /favicon.ico resource.
Click Apply.
Assumptions
Tasks
1.
Verify that when you access the Example Bakery Web site on the OHS instance protected
by the 11g WebGate, Oracle Access Manager uses its standard login page:
a. If it is not already running, start the Firefox browser. Use the Firefox browsernot
Internet Explorerfor this set of practices unless explicitly directed.
b. Enter the following URL to navigate to the Example Bakery home page:
http://your_host.us.oracle.com:7778/example.
c. Click Employees. The standard Oracle Access Manager login page appears.
d.
2.
3.
a.
b.
c.
d.
4.
5.
6.
The form statement that submits back to the required end point
/oam/server/auth_cred_submit on the Oracle Access Manager server. To
locate this statement, search for the string, form.
The Java and HTML code that retrieves the request ID from the HTTP header and
stores the request ID in a hidden field, so that it is returned to the Oracle Access
Manager server as required. To locate this code, search for the string,
GetParameter. Review this line of Java code, and the HTML input statement
that follows.
Deploy the exploded WAR file that contains the customized login page to the WebLogic
server running the Oracle Access Manager server:
a. Navigate to the following URL to start the WebLogic console:
http://your_host.us.oracle.com:7001/console. Log in as the weblogic user. The
password is Welcome1.
7.
b.
c.
8.
Choices or Values
Challenge URL
/examplelogin.jsp
Context Type
customWAR
Context Value
/login
e. Click Apply.
10. Verify that when you access the Example Bakery Web site on the OHS instance protected
by the 11g WebGate, Oracle Access Manager now uses the Example Bakery custombranded login page:
a. Clear cookies and cache, close your browser, and restart the browser.
b. Enter the following URL to navigate to the Example Bakery home page:
http://your_host.us.oracle.com:7778/example.
c.
Click Employees. The Example Bakery login page appears. This is the custom login
page specified:
d.
Practice 6-2: Deploying and Protecting the Example Bakery Web Site
on the Two Other OHS Instances
Overview
In your current deployment, the Example Bakery Web site is deployed on the OHS instance
running on port 7778, which is protected by an Oracle Access Manager 11g WebGate.
In this practice, you deploy the same Web site to the other two OHS instances:
The OHS instance running on port 7779, which is protected by an Oracle Access
Manager 10g WebGate
The OHS instance running on port 7780, which is protected by the mod_osso filter
After you install the Example Bakery Web site on these two servers, you protect the employee
pages on the sites by configuring appropriate policy in Oracle Access Manager.
In subsequent practices, you will demonstrate single sign-on by authenticating at one of the
three Web sites, then accessing the other two Web sites without having to authenticate again.
Assumptions
Tasks
1.
Deploy the Example Bakery Web site to the OHS instances running on ports 7779 and
7780:
a. Copy the D:\Labs\Lesson05\example folder to the
D:\Middleware\ohs_home\instances\ohs_webgate10g\config\OHS\
ohs1\htdocs folder.
b. Verify that you can view the Example Bakery Web site running on the OHS instance
running on port 7779 by navigating to the URL,
http://your_host.us.oracle.com:7779/example. Notice that you will have to log in (with
Vishal.Parashar and Welcome1) on the SSO login page because you have not
unprotected the Example Bakery launch page under oam10g_webgate or
OSSO10g_agent application domains.
c.
2.
Screen/Page Description
Choices or Values
Type
HTTP
Description
Host Identifier
OAM10gHostId
Resource URL
/example
g.
h.
Click Apply.
Click the Create icon again to create the OAM10gHostId:/example//* resource.
Fill in values in the Resources page as follows:
Screen/Page Description
Choices or Values
Type
HTTP
Description
Host Identifier
OAM10gHostId
Resource URL
/example//*
i.
j.
Click Apply.
Click the Create icon to create the OAM10gHostId:/internal resource. The
Resource page appears. Fill in values in the Resources page as follows:
Screen/Page Description
Choices or Values
Type
HTTP
Description
Host Identifier
OAM10gHostId
Resource URL
/example/internal
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
k.
l.
Click Apply.
Click the Create icon again to create the OAM10gHostId:/internal//* resource.
Fill in values in the Resources page as follows:
Screen/Page Description
3.
Choices or Values
Type
HTTP
Description
Host Identifier
OAM10gHostId
Resource URL
/example/internal//*
m. Click Apply.
Configure Oracle Access Manager to provide public access to the public portions of the
Web site deployed to the OHS instance running on port 7779. The public portion of the Web
site comprises all of the Web site except for the employee portal and department pages.
a. Navigate to Application Domains > oam10g_webgate > Authentication Policies > Public
Resource Policy.
b. Click the Edit icon. The Authentication Policy page appears on the right side of the
console.
c. In the Resources tab, click the Add icon. A blank line appears in the Resources list.
Select the OAM10gHostId:/example resource from the drop-down list.
d.
e.
In the Resources tab, click the Add icon. A blank line appears in the Resources list.
Select the OAM10gHostId:/example//* resource from the drop-down list.
Click Apply.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
4.
5.
6.
Configure Oracle Access Manager to protect the private portions of the Web site deployed
to the OHS instance running on port 7779. The private portion of the Web site comprises
the employee portal and department pages, which are located in the sites internal
directory.
a. Navigate to Application Domains > oam10g_webgate > Authentication Policies >
Protected Resource Policy.
b. Click the Edit icon. The Authentication Policy page appears on the right side of the
console.
c. In the Resources tab, click the Add icon. A blank line appears in the Resources list.
Select the OAM10gHostId:/example/internal resource from the drop-down list.
d. In the Resources tab, click the Add icon again. A blank line appears in the Resources
list. Select the OAM10gHostId:/example/internal//* resource from the dropdown list.
e. Select the ExampleLDAPScheme authentication scheme so that the site uses the
Example Bakery custom-branded login page.
f. Click Apply.
Test the policy configuration:
a. Clear cookies and cache, close your browser, and restart the browser.
b. Navigate to the home page for the Example Bakery Web site,
http://your_host.us.oracle.com:7779/example. You should be able to see the page
without authenticating.
c. Click all the links except the Employees link. You should be able to access these links
without authenticating.
d. Click the Employees link. The Example Bakery custom-branded login page should
appear.
Define resources required to protect the Example Bakery Web site running on the OHS
instance running on port 7780:
a. Log in to the Oracle Access Manager console as user Vishal.Parashar with
password Welcome1.
b. Navigate to Policy Configuration > Application Domains > osso10g_agent >
Resources.
c. Click the Create icon to create the OSSO10gHostId:/example/internal resource.
The Resources page appears. Fill in values in the Resources page as follows:
Screen/Page Description
Choices or Values
Type
HTTP
Description
Host Identifier
OSSO10gHostId
Resource URL
/example/internal
d.
e.
Click Apply.
Click the Create icon again to create the
OSSO10gHostId:/example/internal//* resource. Fill in values in the
Resources page as follows:
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
Screen/Page Description
Choices or Values
Type
HTTP
Description
Host Identifier
OSSO10gHostId
Resource URL
/example/internal//*
f.
7.
Click Apply.
Note: Since the mod_osso filter forwards only requests for protected resources; there
is no need to create policies for public resources.
Configure the mod_osso.conf file to filter requests for protected resources on the
Example Bakery site:
a. Open the D:\Middleware\ohs_home\instances\ohs_osso10g\config\
OHS\ohs1\moduleconf\mod_osso.conf file.
b.
c.
8.
9.
b.
Navigate to the home page for the Example Bakery Web site,
http://your_host.us.oracle.com:7780/example. You should be able to see the page
without authenticating.
c. Click all the links except the Employees link. You should be able to access these links
without authenticating.
10. Click the Employees link. The Example Bakery custom-branded login page should appear.
The site running on port 7778, which is protected by an Oracle Access Manager 11g
WebGate
The site running on port 7779, which is protected by an Oracle Access Manager 10g
WebGate
The site running on port 7780, which is protected by the mod_osso filter
Assumptions
Tasks
1.
2.
3.
Assumptions
Tasks
1.
2.
The site running on port 7778, which is protected by an Oracle Access Manager 11g
WebGate
The site running on port 7779, which is protected by an Oracle Access Manager 10g
WebGate
The site running on port 7780, which is protected by the mod_osso filter
You attempt to access each of the three sites and are prompted to authenticate to Oracle
Access Manager server. You examine cookies before and after authentication.
Then you execute the same single sign-on scenario that you executed in the previous practice.
At various points in this single sign-on scenario, you examine browser cookies.
Finally, you log out of the single sign-on session and examine the effect on the browser cookies.
Assumptions
Tasks
1.
2.
3.
c.
4.
g.
5.
Locate the Set-Cookie statement for the OAM_ID cookie in the Live HTTP Headers
window.
Review mod_osso agent cookie usage:
a. Clear cookies and cache and restart the browser.
b. Clear the contents of the Live HTTP Headers add-on by clicking the clear button.
c. Attempt to access a protected page on the Web site protected by the Oracle Access
Manager 10g WebGate by typing the following URL in your browsers address bar:
http://your_host:7780/example/internal/employeeHome.html. The Example Bakery
login page should appear.
d. Look through the Live HTTP Headers output. You should not find any Set-Cookie
statements for Oracle Access Manager server cookies. Remember that the
JSESSIONID cookie is an OHS cookie.
e.
6.
e.
f.
g.
h.
i.
j.
k.
Note: The JSESSIONID cookie is set by OHS and is not pertinent to Oracle Access
Manager.
Clear the Live HTTP Headers window.
Authenticate as user David.Goldsmith with password Welcome1. The Example
Bakery employee portal appears.
Locate the Set-Cookie statement for the OAM_ID cookie in the Live HTTP Headers
window.
Locate the most recent Set-Cookie statement for the OAMAuthnCookie cookie in
the Live HTTP Headers window. Note that the value of the OAMAuthnCookie cookie
has changed. This cookie now contains a reference to the Oracle Access Manager
session.
Locate the most recent Set-Cookie statement for the OAMRequestContext cookie
in the Live HTTP Headers window. This transient cookie should now be expired.
Clear the Live HTTP Headers window.
Attempt to access a protected page on the Web site protected by the Oracle Access
Manager 10g WebGate by typing the following URL in your browsers address bar:
http://your_host:7779/example/internal/employeeHome.html. This time, you are not
prompted to authenticate. The Example Bakery employee portal appears.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
l.
7.
Locate the Set-Cookie statements for the ObSSOCookie cookie in the Live HTTP
Headers window. Note that the value of the ObSSOCookie cookie is initially set to the
value loggedoutcontinue, and then is set to contain a reference to the Oracle
Access Manager session.
Note: Close examination of the Live HTTP Headers output reveals that a second SetCookie statement for the OAM_ID cookie appears, and that the OAM_ID cookie value
is not the same as the original cookie value. The cookie is set each time some details
are changed in the session on the Oracle Access Manager server.
m. Clear the Live HTTP Headers window.
n. Attempt to access a protected page on the Web site protected by the mod_osso filter
by typing the following URL in your browsers address bar:
http://your_host:7780/example/internal/employeeHome.html. Once again, you are not
prompted to authenticate. The Example Bakery employee portal appears.
o. Locate the Set-Cookie statement for the OHS-host-7780 cookie in the Live HTTP
Headers window.
Note: You can see all four cookies: obSSOCookie, OAM_ID, OHS-host-port,
OAMAuthnCookie_host:port.
Review cookie usage during a logout:
a. Clear the Live HTTP Headers window.
b. Access the logout URL, http://your_host:7778/logout1.html.
c. Locate the Set-Cookie statements in the Live HTTP Headers output. You should be
able to locate Set-Cookie statements that cause the OAMAuthnCookie, OAM_ID,
and OHS-host-7780 cookies to expire. Notice that as discussed in the lesson, there
is no Set-Cookie statement that causes the ObSSOCookie to expire.
d. In Firefox, select Tools > Options. The Options dialog box appears. Click Privacy. Click
Show Cookies. The list of cookies active in your browser session appears.
e. Locate the ObSSOCookie cookie. This cookie has a value that references the session
you had with the Oracle Access Manager server.
f. Prove that the value in this cookie no longer references an active Oracle Access
Manager session by typing the following URL in your browsers address bar:
http://your_host:7779/example/internal/employeeHome.html. You are prompted to
authenticate to the Oracle Access Manager server. If the session was still active, you
would not be prompted to authenticate, but would be granted access to the employee
portal page without authenticating.
Assumptions
Tasks
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
Multiple sessions might exist for the David.Goldsmith user because some sessions
were created earlier that were not logged out. If multiple sessions exist, use the Creation
Time field to locate the most recently created session.
Highlight the most recently created session for the David.Goldsmith user and click the
Delete (X icon). Click Yes in the Confirm Delete dialog box.
Return to the Internet Explorer browser window and click Employees. You are prompted to
authenticate because your session was terminated by administrative action.
Close the Internet Explorer browser.
Return to the Session Management page displayed in the Firefox browser. Type
Vishal.Parashar in the Username field and click the arrow to the right of the Username
field. Details of the session for the Vishal.Parashar user appear in the session list.
14. Highlight the session for the Vishal.Parashar user and click Delete. Click Yes in the
Confirm Delete dialog box. The login screen appears because you just terminated the
Vishal.Parashar users console login session.
Assumptions
Tasks
1.
2.
3.
Assumptions
Tasks
1.
2.
3.
4.
5.
6.
7.
9.
10.
11.
12.
13.
14.
maximum number of sessions per users has been set to 1. Session constraint only applies
to newly created sessions.
Click Delete All User Sessions, then click Yes to respond to the confirmation dialog box.
Because you just deleted your Oracle Access Manager console login session, you are
automatically logged out of the console.
Clear cookies and cache and restart the Firefox browser.
Restart the Internet Explorer browser.
In the Internet Explorer browser, navigate to the Example Bakery home page,
http://your_host.us.oracle.com:7778/example. Click Employees. The Example Bakery login
page appears. Log in as user David.Goldsmith with password Welcome1. Be sure to
log in as user David.Goldsmith and not as user Vishal.Parashar. The employee
portal appears.
In the Firefox browser, navigate to the Example Bakery home page, http://your_
host.us.oracle.com:7778/example. Click Employees. The Example Bakery login page
appears.
Authenticate as user David.Goldsmith. Again, be sure to log in as user
David.Goldsmith and not as user Vishal.Parashar. The message, The user has
already reached maximum allowed number of sessions appears because of the session
constraint you set.
Start the Oracle Access Manager console in the Firefox browser by navigating to the
following URL: http://your_host:7001/oamconsole. Log in as user Vishal.Parashar with
password Welcome1.
Restore the Maximum Number of Sessions per User to the value 8. Do not forget to click
Apply after you have changed the value in the Maximum Number of Sessions per User
field.
Note: It is extremely important that you complete the preceding step correctly. Subsequent
practices depend on the availability of multiple sessions per user. If you are not sure that
you have performed this step correctly, ask your instructor.
The Oracle Access Manager server collects users credentials and authenticates users.
The Oracle Access Manager identity assertion provider makes the username available
to the application.
Assumptions
Tasks
1.
Log in to the WebLogic Server administration console as the weblogic user. The
password is Welcome1.
2.
3.
4.
5.
The println method writes text to a dynamically-generated HTML page. It writes the text,
The servlet has received a GET. This is the reply for, followed by a variable.
The value of the variable is generated by the getRemoteUser method, which is a method
in the HttpServletRequest class. The getRemoteUser method returns the username
of the user who has authenticated to the system.
When you run the sample application, a line with the above text, followed by the username
with which you authenticated, appears on the screen.
Close the D:\Labs\Lesson07\jee\WEB-INF\source\Servlet1.java file.
6.
a.
e.
f.
g.
h.
i.
j.
k.
l.
Assumptions
Tasks
1.
2.
3.
<security-role> section The only role used by the Web application is the allauthenticated-users role.
Note: The weblogic.xml file maps the all-authenticated-users role named in the
web.xml file to the users group in the WebLogic Server security domain. The users
group is a default WebLogic Server group containing all users who have been
authenticated. The users group does not appear in the WebLogic console.
4.
5.
6.
7.
The getRemoteUser method returned the name of the user who has authenticated to the
system: the weblogic user.
8. Review browser cookies:
a. In Firefox, select Tools > Options. The Options dialog box appears.
b. Click Privacy.
c. Click Show Cookies. The Cookies dialog box appears.
d. Expand the Site node in the Cookies dialog box. Verify that no cookies associated with
Oracle Access Manager single sign-on are present.
Note: You should see only the JSESSIONID cookie.
e. Close the Cookies and Options dialog boxes.
9. Clear cookies, cache, and active logins; then close your browser, and restart the browser.
10. Run the jee sample application again by entering the URL,
http://your_host.us.oracle.com:7001/jee/servlet1.
11. Log in as user David.Goldsmith with password Welcome1.
The following message appears on the screen: The servlet has received a GET. This is the
reply for David.Goldsmith.
The David.Goldsmith user is present in the Oracle Internet Directory database.
Therefore, WebLogic Server uses the OIDAuthenticator provider for authentication.
The getRemoteUser method returned the name of the user who has authenticated to the
system: the David.Goldsmith user.
12. Review browser cookies. Verify that no cookies associated with Oracle Access Manager
single sign-on are present (you should see only the JSESSIONID cookie).
Assumptions
Tasks
1.
b.
c.
d.
e.
The section starting with the <security-constraint> tag and ending with the
</security-constraint> tag
The section starting with the <security-role> tag and ending with the
</security-role> tag
Change the authentication method. Modify the line with the <auth-method> tag to
have the following content: <auth-method>CLIENT-CERT</auth-method>.
Specifying the value, CLIENT-CERT, in the <auth-method> tag triggers WebLogic
Server to use an external authentication method determined by the WebLogic Server
security domain.
Verify that the D:\Labs\Lesson07\jee\WEB-INF\web.xml file has the following
content:
<?xml version = '1.0' encoding = 'UTF-8'?>
<web-app xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance"
xsi:schemaLocation="http://java.sun.com/xml/ns/javaee
http://java.sun.com/xml/ns/javaee/web-app_2_5.xsd"
version="2.5" xmlns="http://java.sun.com/xml/ns/javaee">
<servlet>
<servlet-name>Servlet1</servlet-name>
<servlet-class>jee.Servlet1</servlet-class>
</servlet>
<servlet-mapping>
<servlet-name>Servlet1</servlet-name>
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
<url-pattern>/servlet1</url-pattern>
</servlet-mapping>
<login-config>
<auth-method>CLIENT-CERT</auth-method>
<realm-name>myrealm</realm-name>
</login-config>
</web-app>
f.
2.
3.
Log in to the WebLogic Server administration console as the weblogic user. The
password is Welcome1.
4.
Select the check box to the left of the entry for the jee application.
Click Update. The Update Application Assistant appears.
Click Finish.
Click Activate Changes in the Change Center pane.
The status of jee application should be Active.
Assumptions
Tasks
1.
2.
3.
4.
5.
6.
Clear cookies, cache, and active logins; then close your browser, and restart the browser.
Run the jee sample application deployed to the administration server, but protected by the
Oracle Access Manager 11g WebGate. Enter the following URL in a browser:
http://your_host.us.oracle.com:7778/jee/servlet1.
The Example Bakery login page appears, demonstrating that the sample application is now
being protected by the 11g WebGate.
7.
8.
Assumptions
Tasks
1.
2.
3.
4.
5.
Log in to the WebLogic Server administration console as the weblogic user. The
password is Welcome1.
Click Lock and Edit in the Change Center pane. Note: If Lock and Edit is disabled, click
Release Configuration before you click Lock and Edit.
Select oam_domain > Security Realms from the Domain Structure pane. The Summary of
Security Realms page appears on the right side of the console window.
Select the myrealm security realm. The Settings for the My Realm page appear.
Add an OAM identity assertion provider as an authentication provider:
a. Click the Providers tab. The Authentication Providers page appears.
b. Click New. The Create a New Authentication Provider page appears. Fill in the fields in
the Create a New Authentication Provider page as follows:
Field
Choices or Values
Name
Type
OAMIdentityAsserter
c.
6.
Click OK. The Authentication Providers page reappears. The OAM Identity Assertion
Provider authentication provider appears in the list of authentication providers.
Configure the OAM identity assertion provider to recognize the OAM_REMOTE_USER HTTP
header variable:
a. Select the OAM Identity Assertion Provider authentication provider. The
Settings for OAM Identity Assertion Provider page appears.
b. Locate the OAM_REMOTE_USER entry under Active Types > Available.
c.
d.
Click the arrow to move the OAM_REMOTE_USER entry from the Available column to the
Chosen column.
Verify that the OAM_REMOTE_USER and ObSSOCookie entries are in the Chosen
column.
Click Save. The message, Settings updated successfully, appears at the top of the
Settings for OAM Identity Assertion Provider page.
e.
f.
g.
7.
8.
Click Activate Changes in the Change Center pane. The message, All changes have
been activated. However 2 items must be restarted for the changes to take effect
appears at the top of the Settings for OAM Identity Assertion Provider page.
h. In the Change Center pane, click View Changes and Restarts. The Changes and
Restarts page appears on the right side of the console window.
i. Select the Restart Checklist tab. The AdminServer and oam_server1 servers are
listed.
Shut down the oam_server1 and AdminServer:
a. Select oam_domain > Environment > Servers in the Domain Structure pane. The
Summary of Servers page appears on the right side of the console window.
b. Select the Control tab.
c. Select the check box for the oam_server1 and AdminServer.
d. Click Shutdown > Force Shutdown Now.
e. Click Yes in response to the confirmation page.
Start the administration server:
a. Open a Windows Explorer window to the
d:\Middleware\user_projects\domains\oam_domain directory.
b.
9.
Assumptions
Tasks
1.
2.
Remove the OAM Identity Assertion Provider authentication provider from the
WebLogic Server configuration:
a. Start the WebLogic console and log in as the weblogic user.
b. Click Lock and Edit in the Change Center pane.
c. Select oam_domain > Security Realms from the Domain Structure pane. The Summary
of Security Realms page appears in the right side of the console window.
d. Select the myrealm security realm. The Settings for the My Realm page appear.
e. Select the Providers tab. The Authentication Providers page appears.
f. Select the check box for the OAM Identity Assertion Provider authentication
provider.
g. Click Delete then click Yes to confirm deletion. The message, Selected Authentication
Providers have been deleted appears at the top of the page.
h. Click Activate Changes in the Change Center pane. The message, All changes have
been activated. However 2 items must be restarted for the changes to take effect
appears at the top of the Settings for the My Realm page.
Restart the AdminServer and oam_server1 servers. If you are not certain how to restart
the servers, refer to the tasks in the previous practices.
Assumptions
Tasks
1.
Verify that the Oracle Access Manager auditing system is capturing only very high-level
system events:
a. Open the D:\Middleware\user_projects\domains\oam_domain\
servers\oam_server1\logs\auditlogs\OAM\audit.log file with any text
editor and examine the output. By default, the Oracle Access Manager server writes
audit records to this file.
b. Review the audit records in the audit.log file. You should see only records with the
ServerStartup and ServerShutDown event types.
2.
3.
4.
5.
h. Click Apply.
i. Log out of the Oracle Access Manager console.
After you change the auditing configuration, you must restart both the WebLogic
administration server and the managed server instance that runs the Oracle Access
Manager server before the changes take effect. Restart the server instances on your lab
system.
Generate an audit record by accessing the Example Bakery employee portal, which
requires user authentication:
a. Clear cookies and cache and restart the browser.
b. Navigate to the Example Bakery home page,
http://your_host.us.oracle.com:7778/example.
c. Click Employees. The Example Bakery login page appears.
d. Log in as user David.Goldsmith with password Welcome1. The employee portal
appears.
Verify that the Oracle Access Manager server auditing system captures more information
after you change the audit filter preset:
a. Open the D:\Middleware\user_projects\domains\oam_domain\
servers\oam_server1\logs\auditlogs\OAM\audit.log file with any text
editor and examine the output.
b. Review the audit records in the audit.log file. The file should now contain records
with event types other than the ServerStartup and ServerShutDown event types;
for example, the Authentication, CredentialValidation, SessionCreation,
and Login event types.
c. Navigate to the central logout page, http://your_host.us.oracle.com:7778/logout1.html.
d. Verify that SessionDestroy and Logout events were written to the audit.log file.
Assumptions
Tasks
1.
Verify that the Oracle Database tables that are used to hold Oracle Access Manager server
audit records are empty. Perform the following steps on your Linux lab system as the
oracle user:
a. If necessary, open a terminal window on the system.
b. Set environment variables required to run the sqlplus utility:
ORACLE_HOME=/u01/app/oracle/product/11.2.0.1/db_1
export ORACLE_HOME
ORACLE_SID=orcl
export ORACLE_SID
c.
d.
e.
Log in to the sqlplus utility as the DEV_IAU user with password Welcome1. When
you ran the Repository Creation Utility (RCU) to initialize tables used by Oracle Fusion
Middleware, the RCU created the DEV_IAU user and the schema for the tables used
by audit logging.
Execute the select command to display a list of tables created by the RCU:
SQL> select TABLE_NAME from USER_TABLES;
The list of tables created when you ran RCU in a previous practice appears in the
terminal window:
TABLE_NAME
-----------------------------IAU_BASE
WEBCACHECOMPONENT
OVDCOMPONENT
OIDCOMPONENT
OWSM_PM_EJB
OWSM_AGENT
DIP
OHSCOMPONENT
JPS
ADMINSERVER
REPORTSSERVERCOMPONENT
TABLE_NAME
-----------------------------WEBSERVICES
WS_POLICYATTACHMENT
OIF
OAAM
OAM
IAU_DISP_NAMES_TL
IAU_LOCALE_MAP_TL
18 rows selected.
f.
The IAU_BASE table is the table to which the audit framework writes audit records.
Execute the describe command to show the names of the IAU_BASE tables
columns:
SQL> describe IAU_BASE;
The column names and their data types appear in the terminal window:
Name
Null?
------------------------ -------IAU_ID
IAU_ORGID
IAU_COMPONENTID
IAU_COMPONENTTYPE
IAU_INSTANCEID
IAU_HOSTINGCLIENTID
Type
---------------------------NUMBER
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
IAU_HOSTID
IAU_HOSTNWADDR
IAU_MODULEID
IAU_PROCESSID
IAU_ORACLEHOME
IAU_HOMEINSTANCE
IAU_UPSTREAMCOMPONENTID
IAU_DOWNSTREAMCOMPONENTID
IAU_ECID
IAU_RID
IAU_CONTEXTFIELDS
IAU_SESSIONID
IAU_SECONDARYSESSIONID
IAU_APPLICATIONNAME
IAU_TARGETCOMPONENTTYPE
IAU_EVENTTYPE
IAU_EVENTCATEGORY
IAU_EVENTSTATUS
IAU_TSTZORIGINATING
IAU_THREADID
IAU_COMPONENTNAME
IAU_INITIATOR
IAU_MESSAGETEXT
IAU_FAILURECODE
IAU_REMOTEIP
IAU_TARGET
IAU_RESOURCE
IAU_ROLES
IAU_AUTHENTICATIONMETHOD
IAU_TRANSACTIONID
IAU_DOMAINNAME
g.
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(2000)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
NUMBER
TIMESTAMP(6)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(2000)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
VARCHAR2(255)
Execute the select command to display the content in the IAU_BASE table:
SQL> select * from IAU_BASE;
2.
The No rows selected message appears, indicating that the table is empty.
Configure a JDBC data source for the audit database in WebLogic Server. Perform the
following steps on your Windows lab system:
a. Navigate to the following URL to start the WebLogic console:
http://your_host.us.oracle.com:7001/console. Log in as the weblogic user. The
password is Welcome1.
b. Click Lock and Edit in the Change Center pane.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
c.
d.
Select oam_domain > Services > JDBC > Data Sources in the Domain Structure pane.
The Summary of JDBC Data Sources page appears on the right side of the console
window.
Click New. The Create a New JDBC Data Source wizard starts. The first page that
appears is the JDBC Data Source Properties page. Fill in the fields in the JDBC Data
Source Properties page as follows:
Field
Choices or Values
Name
AuditDB
JNDI Name
jdbc/AuditDB
Database Type
Oracle
e.
f.
g.
Click Next.
A second JDBC Data Source Properties page appears. Click Next to accept the default
database driver.
The Transaction Options page appears. Click Next.
The Connection Properties page appears. Fill in the fields in the Transaction Properties
page as follows:
Field
Choices or Values
Database Name
orcl
Host Name
your_Linux_host
Port
1521
DEV_IAU
Password
Welcome1
Confirm Password
Welcome1
h.
Click Next.
The Test Database Connection form appears. Click Test Configuration. If you
configured the AuditDB data source correctly, the message Connection test
succeeded appears in the WebLogic console:
3.
Click Next.
a. The Select Targets form appears. Select the check boxes for the AdminServer and
oam_server1 servers.
Note: Other Oracle Fusion Middleware components besides Oracle Access Manager
can use the database audit logging capability. If you do not deploy the AuditDB data
source definition to the administration server, multiple IAU-5048 messages appear in
the administration server logs when you start recording audit records in the database.
b. Click Finish.
c. Click Activate Changes in the Change Center pane.
d. Log out of the WebLogic console.
Use FMW Control to configure the audit subsystem to write records to the Oracle Database.
Perform the following steps on your Windows lab system:
a. Navigate to the following URL to start FMW Control:
http://your_host.us.oracle.com:7001/em. Log in as the weblogic user. The password
is Welcome1.
b. In the left window pane, navigate to Farm_oam_domain > WebLogic Domain >
oam_domain
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
c.
4.
5.
6.
Click oam_domain. The oam_domain page appears in the right window pane. A menu
with options to view configuration objects appears below the oam_domain label.
d. Select WebLogic Domain > Security > Audit Store from the menu.
e. The Audit Store page appears. A message appears indicating that auditing is still
configured to write records to a flat file: The default audit store is file-based. Data
Source JNDI name is empty when the audit store is file-based.
f. Click the Search icon to the right of the empty Data Source JNDI Name field.
g. The Select Data Source dialog box appears. Click the jdbc/AuditDB entry; then click
OK.
h. The Audit Store page appears again, with the configuration details for the AuditDB
JDBC data source listed. Click Apply. Notice the information message, All changes
made in this page require a server restart to take effect.
i. Log out of FMW Control.
After you change the audit repository type, you must restart both the WebLogic
administration server and the managed server instance(s) that run the Oracle Access
Manager server before the changes take effect. Restart the server instances on your
Windows lab system:
a. Stop the AdminServer and oam_server1 servers.
Note: If you have forgotten how to stop and start the WebLogic Server instances on
your lab system, refer to the procedure detailed previously in these practices.
b. Delete the D:\Middleware\user_projects\domains\oam_domain\
servers\oam_server1\logs\auditlogs\OAM\audit.log file. By deleting the
flat file to which the auditing subsystem previously logged audit records, you can easily
see whether the file is changed after the audit subsystem starts recording log records
to Oracle Database.
Note: You cannot delete the audit.log file until the WebLogic administration server
has shut down completely. If you are unable to delete the audit.log file, wait several
seconds, and then try deleting the file again.
c. Restart the AdminServer and oam_server1 servers.
Access the Example Bakery application so that several audit records are recorded. Perform
the following steps on your Windows lab system:
a. Clear cookies and cache and restart the browser.
b. Navigate to the Example Bakery home page,
http://your_host.us.oracle.com:7778/example.
c. Click Employees. The Example Bakery login page appears.
d. Log in as user David.Goldsmith with password Welcome1. The employee portal
appears.
e. Navigate to the central logout page, http://your_host.us.oracle.com:7778/logout1.html,
to log out of the Oracle Access Manager session.
Open the D:\Middleware\user_projects\domains\oam_domain\
servers\oam_server1\logs\auditlogs\OAM\audit.log file on your Windows lab
system and review the content in the file.
Notice that records are still being recorded in the audit.log file. The auditing subsystem
uses this file as a bus stop: an intermediate cache for audit records before the records are
written to the audit database.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
7.
Review the content in the IAU_BASE table in the Oracle Database. The table should no
longer be empty. Perform the following steps on your Linux lab system as the oracle user:
a.
Verify that sqlplus session is still active in the terminal window you opened during a
previous task. If the sqlplus is not active, restart sqlplus and log in as the
DEV_IAU user with password Welcome1.
b.
Execute the select command to display the number and values of recorded event
types in the IAU_BASE table:
SQL> select count(*) from IAU_BASE;
SQL> select distinct IAU_EVENTTYPE from IAU_BASE order by 1;
c.
d.
Review the output from the select command. The output should contain records with
event types such as the Authorization, CredentialValidation,
SessionValidation, and Login event types. The presence of these values in the
database indicates that audit records are now being recorded in the Oracle Database.
Exit sqlplus :
SQL> exit;
Assumptions
Tasks
1.
2.
Start Oracle BI Publisher and verify that no reports specific to Oracle Fusion Middleware or
Oracle Access Manager have been installed:
a. Start OC4J in which the Oracle BI Publisher runs. Select Start > Programs > Oracle BIPHome1 > Start BI Publisher.
A command prompt window appears, and startup messages appear in the window.
Oracle BI Publisher startup is complete when the message, Oracle Containers for
J2EE 10g (10.1.3.1.0) initialized appears.
b. Start a browser and navigate to the Oracle BI Publisher application at the following
URL: http://your_host.us.oracle.com:9704/xmlpserver. Log in to Oracle BI Publisher as
the Administrator user with password Administrator.
c. Click Shared Folders. No reports specific to Oracle Fusion Middleware or Oracle
Access Manager appear among the available reports.
Install Oracle Fusion Middleware reports in Oracle BI Publisher:
a. Copy the file containing the Oracle Fusion Middleware reports
D:\Middleware\oracle_common\modules\oracle.iau_11.1.1\reports\
AuditReportTemplates.jar to the Oracle BI Publisher reports folder
D:\Middleware\bipub\xmlp\XMLP\Reports\.
b. Unjar the Oracle Fusion Middleware reports. Open an MS-DOS terminal window and
enter the following commands:
c.
cd D:\Middleware\bipub\xmlp\XMLP\Reports
PATH=%PATH%;"D:\Program Files\Java\jdk1.6.0_17\bin"
jar.exe xvf AuditReportTemplates.jar
Note: This command takes a few minutes to run.
Run the dir command in the terminal window. You should see the
Oracle_Fusion_Middleware_Audit directory listed among the other report
directories.
Leave the terminal window open for the next task.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
d.
3.
On the browser, refresh the Shared Folders page in Oracle BI Publisher. A new folder,
Oracle_Fusion_Middleware_Audit, appears in the set of available reports.
Install Oracle Access Manager reports in Oracle BI Publisher:
a. Copy the file containing the Oracle Access Manager reports
D:\Middleware\idm_home\oam\server\reports\
oam_audit_reports_11_1_1_3_0.zip to the Oracle Fusion Middleware
component-specific reports folderD:\Middleware\bipub\xmlp\XMLP\
Reports\Oracle_Fusion_Middleware_Audit\Component_Specific.
b. Unzip the Oracle Access Manager reports. Open an MS-DOS terminal window which
you used in Step 2 and enter the following commands:
cd Oracle_Fusion_Middleware_Audit\Component_Specific
unzip oam_audit_reports_11_1_1_3_0.zip
c.
4.
Run the dir command in the terminal window. You should see the
Oracle_Access_Manager directory listed among the other report directories.
d. In Oracle BI Publisher, click the Component_Specific link under
Oracle_Fusion_Middleware_Audit. You should see the Oracle_Access_Manager report
folder listed among the other report folders.
Configure the data source that Oracle BI Publisher uses to access the audit database:
a. Select the Admin tab in Oracle BI Publisher.
b. Click JDBC Connection under Data Sources.
c. The Data Sources page appears. Verify that the JDBC tab is selected. If the JDBC tab
is not selected, select it.
d. Click Add Data Source.
e. The Add Data Source page appears. Fill in fields in the Add Data Source page as
follows:
Field
Choices or Values
Audit
Driver Type
Oracle 11g
oracle.jdbc.OracleDriver
Connection String
jdbc:oracle:thin:
@your_Linux_host:1521:orcl
Username
DEV_IAU
Password
Welcome1
f.
5.
c.
d.
e.
f.
Click Oracle_Fusion_Middleware_Audit.
Click Component_Specific.
Click Oracle_Access_Manager.
Click Authentication_History under User_Activities. The Authentication History report
appears.
Review the data in the Authentication History report. The report should list recent
authentications to the Oracle Access Manager server. The report includes console
logins, because the Oracle Access Manager console is protected by the IDM Domain
Agent.
g. Click the Details link for any of the authentications. A new page appears with details
about the authentication event.
6. Access the Example Bakery application and click the Employees link. Specify an invalid
user ID and password when you are prompted to authenticate. Click Login. You are not
granted access to the Example Bakery employee portal.
7. Rerun the Authentication History report. Details about the unsuccessful authentication
event should appear in the Authentication History report.
Note: You can use the locator link at the top to navigate to Home > Shared Folders >
Oracle_Fusion_Middleware_Audit > Component_Specific > Oracle_Access_Manager.
8. Run the following Oracle Access Manager reports in Oracle BI Publisher:
Assumptions
Tasks
1.
Stop the WebLogic administration server and the managed server instance that runs the
Oracle Access Manager server, delete the log files, and then restart the server instances:
a. Stop the AdminServer and oam_server1 servers.
Note: If you have forgotten how to stop and start the WebLogic Server instances on
your lab system, refer to the procedure detailed previously in these practices.
b. Open a Windows Explorer window and navigate to the D:\Middleware\
user_projects\domains\oam_domain\servers\oam_server1\logs directory.
Delete all files that have names starting with the string, oam_server1-diagnostic.
2.
3.
4.
If you are not able to delete the oam_server1-diagnostic.log file, wait several
seconds and try again. The servers must be completely shut down before you can
delete this file.
Note: The oam_server1-diagnostic.log file is the active Oracle Access Manager
server log file. Files with the name oam_server1-diagnostic-xx.log, where xx is
a number, are archived log files. You configure the max file size and max directory size
of archived log files in the Audit Configuration tab page of the Server Common
Properties page in the Oracle Access Manager console.
c. Start the AdminServer and oam_server1 servers.
Navigate to the following URL to start FMW Control:
http://your_host.us.oracle.com:7001/em. Log in as the weblogic user. The password is
Welcome1.
Navigate to the logging configuration:
a. In the left window pane, navigate to Farm_oam_domain > WebLogic Domain >
oam_domain > oam_server1.
b. Click oam_server1. The oam_server1 page appears in the right window pane. A
menu with options to view configuration objects appears below the oam_server1
label.
c. Select WebLogic Server > Logs > Log Configuration from the menu. The Log
Configuration page appears in FMW Control.
Examine the default log levels in the logging configuration:
a. Select the Log Levels tab.
b.
Expand the Root Logger > oracle > oracle.oam node in the navigator that appears in
the Logger Name column. Loggers in the oracle.oam node should now be visible:
c.
Locate the log level for the oracle logger: the parent logger for all Oracle Fusion
Middleware loggers. The oracle loggers log level is set to the NOTIFICATION:1
level.
Locate the log level for the oracle.oam logger. The oracle.oam loggers level is set
to the NOTIFICATION:1 level and is inherited from its parent logger.
d.
e.
5.
Browse the list of child loggers of the oracle.oam logger. Each child loggers log level
is set to the NOTIFICATION:1 level and is inherited from its parent logger.
Examine the log file settings in the logging configuration:
a. Review the log file column for the Oracle Fusion Middleware loggers. The odlhandler log file is listed for all Oracle Fusion Middleware loggers.
b. Select the Log Files tab.
c. Select the entry for the odl-handler log file and click Edit Configuration.
d.
The Edit Log File dialog box appears, displaying the logging configuration for the odlhandler log file. Note the value of the Log Path: D:\Middleware\
user_projects\domains\oam_domain\servers\oam_server1\logs\
oam_server1-diagnostic.log. This path is the default location of the Oracle
Access Manager server log file.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
e.
6.
Click Cancel to close the Edit Log File dialog box without changing the log file
configuration.
f. Log out of FMW Control.
Review the logging files current size and content:
a. Open a Windows Explorer window and navigate to the D:\Middleware\
user_projects\domains\oam_domain\servers\oam_server1\logs directory.
b.
c.
7.
Open the oam_server1-diagnostic.log file and browse the log messages in the
file. The third column of the log file contains the message log level. Verify that only
messages with the log levels NOTIFICATION, WARNING, and ERROR should be in the
log file.
Examine the impact of an invalid login on the log file when the default logging configuration
is in effect:
a. Clear cache and cookies for the browser.
b. Access the Example Bakery application and click the Employees link. Specify an
invalid user ID and password when you are prompted to authenticate. Click Login. You
are not granted access to the Example Bakery employee portal.
c. Open a Windows Explorer window and navigate to the D:\Middleware\
user_projects\domains\oam_domain\servers\oam_server1\logs directory.
d.
8.
Note the oam_server1-diagnostic.log files size. Compare the file size to the file
size you noted in a previous step. The difference in the file size should be relatively
small (under 100 KB) if you performed the previous two steps relatively quickly. Note
the new file size for use in a subsequent practice.
(Optional): Open the oam_server1-diagnostic.log file and see if you can locate
messages that diagnose why the attempt to authenticate to the Oracle Access Manager
server failed.
(Note: Search for the word Error).
Assumptions
Tasks
1.
2.
3.
4.
5.
Select the OAMSSA-20023 error message so that it is highlighted. Details about the error
appear in the window pane below the message list:
6.
Review messages in the execution context that produced the authentication failure:
a. Click the ECID link in the message details. Log messages pertaining to the execution
event that caused the failed login to appear in the message list. Observe that
messages with the NOTIFICATION log level are now present in the message list.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
b.
7.
c.
d.
Click Search. NOTIFICATION level messages now appear in the Log Messages page.
Further constrain the search by typing employeeHome.html in the Message field and
click Search.
e.
Select one of the messages that log an isResourceProtected() call. Review the
details that appear in the window pane below the message list.
Click the ECID in the message detail pane. All the messages in the execution context
appear in the messages list.
f.
Assumptions
Tasks
1.
2.
3.
4.
5.
Practice 8-7: Resetting the Log Level Back to the Default Level
Overview
In this practice, you reset the oracle.oam loggers log level back to the NOTIFICATION level.
Reducing log level reduces the amount of log output and improves Oracle Access Manager
server performance for subsequent practices.
Assumptions
Tasks
1.
2.
3.
Set the log level for the oracle.oam logger to the NOTIFICATION:1 (INFO) log
level.
f. Click Apply.
g. Click Close to close the Confirmation dialog box.
Perform several access management operations so that the Oracle Access Manager server
generates log records:
a. Access the Example Bakery application and click the Employees link. Specify an
invalid user ID and password when you are prompted to authenticate. Click Login. You
are not granted access to the Example Bakery employee portal.
b. Authenticate successful to the Example Bakery employee portal as user
David.Goldsmith.
c. Log out of the Example Bakery application by navigating to the central logout page,
http://your_host.us.oracle.com:7778/logout1.html.
Verify that the NOTIFICATION log level is now in effect:
a.
b.
c.
Open the oam_server1-diagnostic.log file. (or oam_server1-diagnosticX.log in case of log file rollover)
Scroll to the bottom of the file.
Verify that the most recently generated log messages are all NOTIFICATION level
messages.
A load balancer is front-ending both SSO 10g and OAM 11g servers. A partner OHS, which is
registered with the 10g SSO server, and the 10g SSO partners are migrated to the 11g OAM
server.
Without coexistence: If the user is authenticated by using the 10g SSO server, an SSO_ID
cookie is created and set. If the user tries to access the resource again, and if the LBR routes
the request to the 11g OAM server, the 11g OAM server checks for an OAM_ID cookie and
shows a login page for user authentication because it is unable to read the SSO_ID cookie and
recognize the session.
With coexistence: If the user is authenticated by using the 10g SSO server, an SSO_ID cookie
is created and set. If the user tries to access the resource again, and if the LBR routes the
request to the 11g OAM server, the 11g OAM server has the in-built capability to read and
understand the SSO_ID cookie, thereby validating the user without asking the user to enter
credentials again.
Key Lab Steps:
1. Install an OHS 11g server named Partner OHS in this lab.
(Note: OSSO 10g along with 10g OHS has been pre-installed.)
2. Install a partner application on this OHS. This can be a simple HTML page (or you can
protect the index.html welcome page as well).
3. Register this partner application with the OSSO 10g server. Here, note that since the load
balancer is front-ending the OSSO 10g servers, partner registration must be done with the
load balancer URL. Copy the generated configuration file to the OHS server.
4. Access the partner application. Now this partner application should be protected by the
OSSO 10g server.
5. Front-end the OAM 11g server with the same load balancer that frond-ends the OSSO 10g
server.
6. Upgrade the existing OSSO 10g servers to OAM 11g server (run the Upgrade Assistant).
(Back end upgrade.)
7. View the partner application migration to the OAM 11g server by using the OAM admin
console.
8. Verify coexistence:
Now that the OAM and OSSO 10g servers are working in coexistence mode, try to access the
partner applications and verify that single sign-on works. Also, verify that a user does not have
to log in if the user is already authenticated by either the OAM 11g or OSSO 10g servers.
Shut down one of the OSSO servers and make sure that the partner application is still
protected.
9. After a successful upgrade, you now upgrade the mod_osso agent to a WebGate agent.
WebGate agents are more popular than mod_osso because of the extra authorization
capabilities available at run time as well as the centralized session management capabilities,
for instance, an administrator can delete sessions from the OAM admin UI console, so that the
user in question is forced to re-authenticate.
10. Configure WebGate 11g on the new OHS (created in Step 1).
11. Remove mod_osso.
12. Restart OHS and verify the successful upgrade from mod_osso to WebGate 11g. (Front
end upgrade.)
Pictorial representation of the use case to show upgrade and test-to-production (horizontal
migration) is as follows:
Practice 9-1: Verify OSSO 10g Server and Configure New OHS
Instance
Overview
In this practice, you validate that the pre-installed OSSO 10g server (including infrastructure)
instance is up and running. Next, you configure a new OHS instance: ohs_partner.
Tasks
1.
2.
3.
4.
5.
6.
7.
8.
9.
Window/Page
Description
Choices or Values
a.
Welcome
Next
b.
Configure
Components
c.
Specify
Component
Details
Instance Home
Location:d:\middleware\ohs_home\instances\ohs_partner
Instance Name: ohs_partner
OHS Component Name: ohs1
d.
Configure
Ports
e.
Specify
Security
Updates
f.
Installation
Summary
Configure
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
Step
Window/Page
Description
Choices or Values
g.
Configuration
Progress
Next
h.
Installation
Complete
Finish
10. Navigate to
D:\middleware\ohs_home\instances\ohs_partner\config\OHS\ohs1\htdocs.
Rename welcome-index.html as welcome-index.html.bak. Copy welcomeindex.ohs_partner.html from d:\labs\lesson09 to
D:\middleware\ohs_home\instances\ohs_partner\config\OHS\ohs1\htdocs
. Rename welcome-index.ohs_partner.html as welcome-index.html
11. On the command line, navigate to
d:\middleware\ohs_home\instances\ohs_partner\bin and issue the following
command:
opmnctl status l
Notice the HTTP listen port of 7781.
12. On the browser window, type http://<your_host>.us.oracle.com:7781 to get to the Welcome
page of Oracle Fusion Middleware. Notice the message, Welcome to the OHS_Partner
Instance Running on Port 7781.
Tasks
1.
3.
Note: You may see a warning stating, logformat ignored for proxy oam-ha since it has
no log address. Ignore this warning.
Keep this terminal window open.
Note: If you have to stop the HAProxy load balancer at any point, enter Ctrl + C on this
terminal window. OR open a new terminal window and navigate to
/home/oracle/haproxy-1.4.8 and issue the command: killall haproxy.
4.
Move back to the Windows machine. Open the httpd.conf file for the OHS front-ending
the OSSO 10g server under d:\osso10g\Apache\Apache\conf and find and replace
the following entries:
Change the ServerName entry to the LBR host name (<your_linux_host>.us.oracle.com), that
is,
ServerName <your_linux_host>.us.oracle.com
Change the Port entry to point to the LBR port number (8888). That is,
Port 8888
Click Save.
5. For the above changes to take effect, you need to restart the OHS. Navigate to
d:\osso10g\opmn\bin on the command line window, and enter:
opmnctl stopproc ias-component=HTTP_Server
opmnctl startproc ias-component=HTTP_Server
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
6.
7.
8.
Bring down oam_server1 by using either Ctrl + C on the command line window from
where it was started, or by using the WLS admin console.
Verify that the LBR setup is working correctly. Close all browsers. Open a new browser
window, and try accessing the OSSO 10g home page using LBR by entering:
http://<your_linux_host>.us.oracle.com:8888/sso. This should bring up the OSSO home
page.
Also, try accessing the OSSO home page by using the original URL:
http://<your_windows_host>.us.oracle.com:7777/sso. This should bring up the OSSO 10g
servers home page. Notice the URL. It should look like this:
http://<your_linux_host>.us.oracle.com:8888/sso/pages/index.jsp
Tasks
1.
Open a new command line window, and set the ORACLE_HOME environment variable as
follows:
Set ORACLE_HOME=d:\osso10g
Make sure the environment variable is set by issuing the following command:
echo %ORACLE_HOME%
2.
3.
4.
5.
6.
#______#
# Notes
#
#______#
# 1. Here's what you need to add to protect a resource,
#
e.g. <ApacheServerRoot>/htdocs/private:
#
<Location />
require valid-user
AuthType Osso
</Location>
</IfModule>
#
# If you would like to have short hostnames redirected to
# fully qualified hostnames to allow clients that need
# authentication via mod_osso to be able to enter short
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
7.
Note: The mod_osso.conf file contains all the configurations for enabling OSSO, such as
where the <your_windows_host>_7781_osso.conf file is located, what URLs to
protect, whether ObOssoCookie is secured and so on. The
<your_windows_host>_7781_osso.conf file contains the configurations on how to
connect to the OSSO server (host:port and so on). You copy the mod_osso.conf file to
the moduleconf directory because the path to this folder is configured in the httpd.conf
directory.
Edit the
d:\middleware\ohs_home\instances\ohs_partner\config\OHS\ohs1\httpd.
conf file, search on ServerName directive, and replace the value as shown below (in all
lowercase):
ServerName <your_windows_host>.us.oracle.com:7781
Note: You make this change so that the OSSO server can perform a correct reverse-lookup
during redirection after authentication.
Practice 9-4: Restart OHS Partner Instance and Verify SSO to Partner
Application
Overview
In this practice, you restart the OHS partner instance for the changes made in the previous
practice to take effect, and then test to make sure the partner application URL
http://<your_windows_host>.us.oracle.com:7781 is protected by using OSSO 10g.
Tasks
1.
2.
Now you verify the configuration by accessing the protected application URL
http://<your_windows_host>.us.oracle.com:7781. Enter URL
http://<your_windows_host>.us.oracle.com:7781 and press Enter.
You should be redirected to the OSSO 10g login page (Also note that the URL contains
<your_linux_host> and 8888 as port).
Enter orcladmin and Welcome1 as the user ID and password.
Click Login. The OHS Welcome page should be displayed.
3.
4.
5.
Tasks
1.
2.
Window/Page
Description
Choices or Values
a.
Welcome
Next
b.
Specify
Operation
c.
Specify
Source Details
d.
Specify OID
Details
e.
Specify
WebLogic
Server
Host: <your_windows_host>.us.oracle.com
Port: 7001
Username: weblogic
Password: Welcome1
f.
Specify
Upgrade
Options
g.
Examining
Components
Next
Step
3.
Window/Page
Description
Choices or Values
h.
Upgrade
Summary
Upgrade
Note: The WebLogic node manager is invoked by the Upgrade
Assistant to start the oam_server1. If you didnt configure the
node manager or if it is not started, you can start the
oam_server1 manually.
i.
Start
Destination
OK
j.
Upgrading
Components
Next
k.
Upgrade
Complete
Before you click Close, read the Upgrade Summary carefully. This
summary is also available at
D:\middleware\idm_home\upgrade\logs\postupgrade.txt.
View the logfile by clicking the
d:\middleware\idm_home\upgrade\logs\ua<timestamp>.log
link.
Practice 9-6: View the Migrated Content and Configure User Identity
Store in OAM Admin Console
Overview
As part of the upgrade process, the Upgrade Assistant not only migrates the partner
applications from OSSO 10g to OAM 11g server, but also migrates the user store definition for
OSSO 10g (OID 10.1.4.0.1). However, after the upgrade, it does not automatically make this
user store the primary user store.
Hence, in your labs, after the upgrade, you need to set the new user identity store as the
primary store. (The new user identity store definition is visible through the OAM admin console.)
Also note that it maps the Administrators group as the OAM administrators role in the new OID
user identity store definition in the OAM admin console.
Before you set the migratedUserIdentityStore as the primary store, you can either create a
group named cn=Administrators,cn=groups,dc=us,dc=oracle,dc=com in OID or you
could change the OAM administrators role value from Administrators to a group already present
in OID, such as, oam_admin (in this case). Finally, you can add users to that group. These
users would be able to log in to the OAM admin console.
In this practice, you view the migrated contents by using the OAM admin console to verify that
the partner migration was successful and is ready for coexistence.
Tasks
1.
2.
3.
4.
Log in to the OAM admin console by using Vishal.Parashar and Welcome1. Navigate
to System Configuration > Agents > OSSO Agents. Explore by editing the two new OSSO
agents [for each mod_osso that was registered with the OSSO server on port 7777 (front
end OHS) and 7781(partner OHS) registered as a result of the migration.]
Navigate to Data Sources > User Identity Stores > Migrated UserIdentityStore. This is the
new identity store definition after the migration. It is for OID 10g (on the SSL port 13130).
Notice the OAM administrators role mapped to Administrators.
Notice: There is a second user identity store definition on port 13060: OID_UserStore. This
is the one you had created in Practice 4.
Change the OAM administrators role from Administrators to oam_admin. Click Apply. Click
Set as Primary. Click Apply.
Navigate to the Policy Configuration tab and view the properties of new host identifier,
migratedSSOPartners. Observe the host names set to this host identifier.
View the properties of new application domain, migratedSSOPartners. Notice that there
are no authorization policies; only an authentication policy. Explore the authentication policy
for migratedSSOPartners.
Notice: The authentication schemeSSOCoexistMigrateSchemeis attached to the
authentication policy. View the properties of this scheme under the Authentication Schemes
node (under Shared Components).
Tasks
1.
2.
3.
4.
5.
6.
7.
8.
Close all existing browsers and delete all cookies by using Tools > Clear Recent History.
Shut down oam_server1 by using either the WLS admin console [Domain (oam_domain)
> Environment > Servers > Control tab > oam_server1 > Shutdown > Force Shutdown
Now] or the command line (stopManagedWebLogic oam_server1).
Make sure the OSSO server and all its components are up and running by navigating to
d:\osso10g\opmn\bin and issuing the following command from the command line:
opmnctl status
Note: DSA and LogLoader should be down as expected. If dcm-daemon is down, you can
start it by using opmnctl startproc ias-component=dcm-daemon
Use the Firefox browser. Open the Live HTTP Headers console (Tools > Live HTTP
Headers) and minimize the console.
Try to access the protected application for the partner OHS
(http://<your_host>.us.oracle.com:7781). You should be redirected to the OSSO 10g Login
page. Enter the credentials orcladmin and Welcome1 and FMW Welcome page should
be displayed.
View the SSO_ID cookie on the Live HTTP Header console. Click Clear and minimize the
console.
On the Firefox browser menu, go to Tools > Options > Privacy > Show Cookies. Expand
the Site nodes and remove only the OHS-<your_host>.us.oracle.com-7781 cookie and not
the SSO_ID cookie. Click Close and then click OK.
Note: Deleting OHS-<your_host>.us.oracle.com-7781 will redirect the request to the backend server.
Now stop the OSSO 10g server by executing:
opmnctl stopproc ias-component=HTTP_Server and
opmnctl stopproc ias-component=OC4J
from d:\osso10g\opmn\bin.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
9.
Now bring up the oam_server1 by either starting it from the WLS admin console or
executing the following command from
d:\middleware\user_projects\domains\oam_domain\bin:
startManagedWebLogic oam_server1.
10. Now, by using the Firefox browser, refresh the browser (where you had initially accessed
http://<your_host>.us.oracle.com:7781). You should see the FMW Welcome page (without
being challenged).
11. View the SSO_ID and OAM_ID cookies on the Live HTTP Header console. You can also
view the same details from Tools > Options > Privacy > Show Cookies. Observe the
SSO_ID cookie (OSSO 10g server cookie) which was recognized by the OAM 11g server.
(Hence, the resource was shown without your being challenged.) Observe also that the
OAM_ID cookie, which is the server side cookie that was generated when accessing the
OAM 11g server.
Tasks
Set the primary data source to the OAM 11g data source: OID_UserStore.
1.
2.
3.
4.
Set the primary data source to the OAM 11g user data source, OID_UserStore. Note: Even
though in your lab the user data sources for both OSSO 10g (migratedUserIdentityStore)
and OAM 11g (OID_UserStore) point to the same OID instance, pretend that they are
different OID instances. In this step, you set the OAM 11g user data source as the primary.
Log in to the OAM admin console with Vishal.Parashar and Welcome1. Navigate to
System Configuration > Data Sources > User Identity Stores > OID_UserStore. Doubleclick the node to view the properties on the right pane. Click the Set as Primary button.
Click Apply.
Click the Policy Configuration tab. Click Application Domains > migratedSSOPartners >
Authentication Policies > Protected Resource Policy. Click the Edit icon. Observe that the
authentication scheme is set to SSOCoexistMigrateScheme.
Click Shared Components > Authentication Schemes > SSOCoexistMigrateScheme. Click
edit icon. Observe the context value is set as /ngam (NGAM stands for Next Generation
Access Manager).
Now click Shared Components > Authentication Schemes > LDAPScheme. Click the Edit
icon. Observe the context value is set to /oam.
Therefore, to replace the mod_osso agent with OAM 11g WebGate, you cannot reuse the
authentication policies of migratedSSOPartners, which is specific to mod_osso agent.
You have to use the authentication scheme, LDAPScheme.
Configure OAM 11g WebGate on OHS Partner Instance (Port 7781) by Using the
OAM Admin Console
5.
6.
7.
8.
9.
Property Name
Value
a.
Name
oam11g_webgate_partner
b.
Base URL
http://<your_host>.us.oracle.com:7781
c.
Security
Open
d.
Host Identifier
oam11gHostID_Partner
e.
/public/index.html
Step
f.
Property Name
Auto Create Policies
Value
Selected
Task
1.
2.
3.
For this practice, change the OAM 11g WebGate to Open mode. Navigate to the OAM
admin console > System Configuration > Agents > OAM Agents > 11g webgates >
OAM11g_WebGate. Edit the properties of the agent and set Security to Open. Click Apply.
Launch Access tester. On the command line window, navigate to D:\Program
Files\Java\jdk1.6.0_17\bin and enter:
java
Dlog.traceconnfile=d:\middleware\idm_home\oam\server\tester\tra
ceconnfile.txt jar
d:\middleware\idm_home\oam\server\tester\oamtest.jar
On the Oracle Access Manager Test Tool window, under the Server Connection section,
type in the following:
Field
4.
5.
Choices or Values
Primary IP Address
<your_win_host>.us.oracle.com
Port
5575
Agent ID
6.
7.
Choices or Values
Host
<your_win_host>.us.oracle.com
Port
7778
Resource
/cgi-bin/protected1
Field
8.
9.
10.
11.
12.
13.
Choices or Values
Username
Vishal.Parashar
Password
Welcome1
14. Open and explore the EmployeeHomeConfig.xml file in WordPad from Desktop.
15. Invoke the Oracle Access Manager Tester Tool again (by using the instructions in Step
2).
16. Open the saved configurationEmployeeHomeConfig.xml by using the File > Open
Configuration option. Select Look in to Desktop and File of type to All files.
17. Click the Connect button followed by the Validate button.
18. Start preparing a test case by using Test > Capture Last validate Request.
19. Click the Authenticate button. Continue building the test case by using Test > Capture Last
authenticate Request.
20. Finally, click the Authorize button. Continue building the test case by using Test > Capture
Last authorize Request.
21. Finish building the test case by using Test > Generate Script option. Specify the file name
as EmployeeHomeScript with the file type set as XML (by default). Save the file to
your Desktop. Click Save.
22. On the Save Warning window, click Yes to clear the captured test case queue.
23. In the Status section, notice the message, Generated Script
d:\winnt\profiles\Administrator\Desktop\EmployeeHomeScript.xml with
three cases.
24. Click the Clear Status Messages icon (bottom-right corner).
25. Run the generated test cases by using the Test > Run Script menu option. Select All Files
for the Files of Type option and select Save in as Desktop. Click on
EmployeeHomeScript and press Save. Read the messages on the Status window.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
26. Close the Oracle Access Manager Tester Tool. Navigate to the d:\program
files\java\jdk1.6.0_17\bin directory. Open and explore the following files by using
WordPad: oamtest_<number>_stats.xml (Statistic log) and
oamtest_<number>_target.xml (Target script). Also, explore
EmployeeHomeScript.xml located on your Desktop.
Note on Access Tester tool:
a) A long URL can be imported into the Resource panel by copying the resource from the
browser's URL field and then clicking the Import button.
b) Also note that if you click the Authentication button a few times and observe the session ID,
it does not change. The tester reuses the same session if the credentials don't change. To
change the session, you need to change the credentials. A regular agent does not do this,
but the Access Tester demonstrates this behavior because it could overload the server with
"test" sessions.
Tasks
1.
2.
Issue the command connect() to get into online mode (that is, connected to the admin
server).
Press Enter to accept the default username as weblogic. Enter Welcome1 for the
password. Press Enter to accept the default for the admin server URL.
Issue the following commands one after the other and observe the output:
3.
4.
Step
Commands
a.
help(oam)
b.
displayWebgate11gAgent(OAM11g_WebGate)
c.
help(displayOAMMetrics)
d.
displayOAMMetrics()
e.
displayTopology()
f.
displayOAMServer(host=<your_host>.us.oracle.com,port=14100)
g.
displayUserIdentityStore(name=UserIdentityStore1)
h.
displayUserIdentityStore(name=OID_UserStore)
i.
displayWebgateAgent(oam10g_webgate)
j.
displayOssoAgent(OSSO10g_agent)
5.
Tasks
1.
2.
3.
4.
5.
In the Value field, specify vishal.parashar and press Invoke. Notice the return value
of true. Now enter weblogic in the Value field and press Invoke; notice the false
return value. Weblogic user exists in WLS embedded LDAP and not in OID.
6. Select the menu option Oracle Access Manager > Performance Summary. Notice the past
15 minutes of metrics. You can change the slider at the top right to see the performance
metrics at a particular point in time. You can also set the time range for the performance
metrics to be displayed by clicking the Enter Time icon next to the slider.
7. Click the Show Metrics Palette button on the top right to select more graphs and tables
showing various metrics on the Performance Summary page. Expand the OAM Client node
on the Metric Palette page. Expand Agent_OAM11g_WebGate and select all the check
boxes below the node. Click the Hide Metrics Palette button. You should now see the new
performance metrics charts and table on the Performance Summary page.
8. Select the menu option Oracle Access Manager > General Information to see the high-level
information on the domain: Host, Oracle Home, Middleware Home, Domain Home, Version,
Target Name.
9. You can also start and shut down oam_server by using the menu option Oracle Access
Manager > Control (Do not perform shutdown at this point).
10. You can also try to explore the following options (from the left navigator pane or from the
Farm home page):
a) WebLogic Domain > oam_domain > AdminServer and oam_server1
b) Web Tier > ohs1 (any one of the OHS instances)
c) Application Deployments > Internal Applications > em (AdminServer)
Application Deployments > My Bank
Task
Install WLS 10.3.3.
Switch to the Linux machine for this lab and perform all tasks on the Linux machine unless
explicitly asked to perform an operation on the Windows machine.
1.
2.
Window/Page
Description
Choices or Values
a.
Welcome
Next
b.
Choose Middleware
Home Directory
c.
Register for
Security Updates
d.
Yes
e.
Typical
f.
JDK Selection
g.
Choose Product
Installation
Directories
WebLogic Server
/u01/app/oracle/product/middleware/wls_home
Oracle Coherence
/u01/app/oracle/product/middleware/coherence_h
ome
h.
Installation
Summary
Next
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
Step
i.
Window/Page
Description
Installation
Complete
Choices or Values
Deselect Run QuickStart
Done
Window/Page Description
Choices or Values
a.
b.
Welcome
Next
c.
Prerequisite Checks
Next
d.
e.
Installation Summary
Install
f.
Installation Progress
Next
g.
Installation Complete
Finish
Create new production schemas for OAM and audit services by using RCU on the
existing 11.2.0.1 database hosted on the Linux machine.
6.
7.
From the terminal window, navigate to the /modules/stage/rcu/bin directory and run
rcu
cd /modules/stage/rcu/bin
./rcu
Use the table as a guide to populate the fields:
Step
Window/Page Description
Choices or Values
a.
Welcome
Next
b.
Create Repository
Create
c.
Step
Window/Page Description
Choices or Values
Username: sys
Password: Welcome1
Role: SYSDBA
d.
OK
e.
Select Components
f.
OK
g.
Schema Passwords
h.
Map Tablespaces
Next
i.
OK
j.
Creating Tablespaces
OK
k.
Summary
Create
l.
Completion Summary
Close
Window/Page
Description
Choices or Values
a.
Welcome
b.
Select Domain
Source
c.
Specify Domain
Domain name: prod_domain
Name and Location Domain location:
/u01/app/oracle/product/middleware/user_projec
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
Step
Window/Page
Description
Choices or Values
ts/domains
Application Location:
/u01/app/oracle/product/middleware/user_
projects/
applications
d.
Configure
Administrator User
Name and
Password
Name: weblogic
e.
Configure Server
Start Mode and
JDK
Production Mode
Available JDKs: Sun SDK 1.6.0_17
f.
Configure JDBC
Component
Schema
g.
Test Component
Schema
Next
h.
Select Optional
Configuration
i.
Configure the
Administration
Server
Next
j.
Configure
Managed Servers
Next
k.
Configure Clusters
Next
l.
Configure
Machines
Next
m.
Configuration
Summary
Create
n.
Creating Domain
Done
Password: Welcome1
Conform Password: Welcome1
10. Start the admin and managed servers by issuing the following commands from terminal
windows:
cd
/u01/app/oracle/product/middleware/user_projects/domains/prod_do
main/bin
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
./startWebLogic.sh
./startManagedWebLogic.sh oam_server1
11. Stop the admin and managed servers by pressing Ctrl + C on the terminal windows from
where the admin and managed servers were started.
12. Every time you start the admin and managed server, you have to enter the weblogic
username and password. If you want to avoid doing that, you can create a
boot.properties file with the username and password values. Now, when you start the
admin and managed servers, it reads the username and password from this file and starts
the servers.
On the terminal window, navigate to
/u01/app/oracle/product/middleware/user_projects/domains/prod_domai
n/servers/AdminServer. Make a new directory named security. Within it, create a
boot.properties file with the contents as:
username=weblogic
password=Welcome1
cd
/u01/app/oracle/product/middleware/user_projects/domains/prod_do
main/servers/AdminServer
mkdir security
cd security
vi boot.properties
[press i]
username=weblogic
password=Welcome1
[Press Esc]
[Enter :wq!]
Note: The first time you start AdminServer, the contents of the boot.properties file get
obfuscated. When you use the boot.properties file, it does not prompt you to enter
username and password.
13. Perform similar steps to create a boot.properties file for oam_server1 (create a
boot.properties file in the security directory under
/u01/app/oracle/product/middleware/user_projects/domains/prod_domain/servers/oam_serv
er1).
14. Start the admin and managed servers.
Notice that you do not get challenged for a username and password.
Configure the identity store for the production environment to point to OID (which was
used on the stage environment).
15. On the Linux machine, log in to the OAM admin console by using weblogic and
Welcome1, and navigate to the User Identity Store definition node: System Configuration >
Data Sources > User Identity Stores. Create a new user identity store definition by using
the Create icon.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
16. Chose the LDAP provider as OID from the pick list. Specify the rest of the values as shown
below:
Step
Window/Page Description
Choices or Values
Name
OID_UserStore
LDAP URL
ldap://<your_windows_host>.us.oracle.com:13
060
Principal
cn=orcladmin
Credential
Welcome1
cn=users,dc=us,dc=oracle,dc=com
cn=groups,dc=us,dc=oracle,dc=com
uid
oam_admin
Click Test Connection. Click OK on the Connection Status window with the message,
Connection to the User Identity Store successful. Click Apply to save the definition. On the left
pane, you should now see OID_UserStore along with the primary UserIdentityStore1 (WLS
Embedded LDAP).
Note: Sometimes, you may have to refresh the screen to see the update; use the Refresh icon
on the left pane menu bar.
Close the active tab (OID_UserStore) by using the X (close single tab) icon on the top-right
corner.
17. Change the OID_UserStore to the primary user identity store. Double-click the
OID_UserStore node on the left pane to see the properties of the definition displayed on the
right pane. Click the Set as Primary button on the right pane. Click Apply. The Primary
check box should now appear as disabled on the properties page. Edit the properties of
UserIdentityStore1 (either by double-clicking or by using the pencil icon) and notice the
Primary check box is now deselected. Do not logout of OAM Admin console.
Remove SSO policies for EM and WLS Console.
18. In OAM Admin console, navigate to Policy Configuration > Application Domains >
IDMDomainAgent > Authentication Policies > Protected Higher Level Policy
19. Open the policy and the list of resources for the policy is displayed on the right panel.
20. Remove the following resources from the authentication policy (click to the right of the dropdown list for the resource and click the Delete icon):
a) IDMDomain:/console
b) IDMDomain:/console/.../*
c) IDMDomain:/em
d) IDMDomain:/em/.../*
21. Click Apply.
22. Navigate to Policy Configuration > Application Domains > IDMDomainAgent >
Authorization Policies > Protected Resource Policy.
23. Open the policy and the list of resources for the policy is displayed on the right panel.
24. Remove the following resources from the authorization policy (click to the right of the dropdown list for the resource and click the Delete icon):
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
a) IDMDomain:/console
b) IDMDomain:/console/.../*
c) IDMDomain:/em
d) IDMDomain:/em/.../*
25. Click Apply.
Create OIDAuthenticator on production WLS domain.
26. Log in to the WLS console on the production Linux machine
(http://<your_linux_host>.us.oracle.com:7001/console) by using weblogic and Welcome1.
Navigate to prod_domain > Security Realm > myrealm > Providers. Click Lock and Edit on
the Change Center section (top left).
27. Click the New button. Specify Name and Type as OIDAuthenticator and
OracleInternetDirectoryAuthenticator respectively. Click OK.
28. Click the OIDAuthenticator link. Set the following properties:
Step
Window/Page Description
Choices or Values
a.
Sufficient.
Click Save.
b.
<your_windows_host>.us.oracle.com
c.
13060
d.
cn=orcladmin
e.
Welcome1
f.
cn=users,dc=us,dc=oracle,dc=com
g.
(&(uid=*)(objectclass=person))
h.
(&(uid=%u)(objectclass=person))
i.
uid
j.
cn=groups,
dc=us,dc=oracle,dc=com
Click Save.
29. Navigate back to the Providers page (by using the locator link at the top). Click the Reorder
button and move OIDAuthenticator above DefaultAuthenticator by using the Up arrow. Click
OK.
30. Click the DefaultAuthenticator link. Change the Control Flag to Sufficient. Click Save.
31. Click Activate Changes on the top-left of the Change Control section.
32. Restart the admin and managed servers on the Linux machine by using the command line
(Ctrl + C to kill the running servers and then startWebLogic.sh and
startManagedWebLogic.sh oam_server1 to start the servers).
Apply BP01 patch (11.1.1.3.1).
33. Open a terminal window and set ORACLE_HOME and PATH environment variables as shown
below:
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
34.
35.
36.
37.
38.
39.
export ORACLE_HOME=/u01/app/oracle/product/middleware/idm_home
export PATH= $PATH:$ORACLE_HOME/bin:$ORACLE_HOME/OPatch
Verify the OUI (Oracle Universal Installer) inventory. OPatch needs access to a valid OUI
inventory to apply patches.
Validate the OUI inventory with the following command:
opatch lsinventory
Notice that there is one product installed in
/u01/app/oracle/product/middleware/idm_home (Oracle home), which is
11.1.1.3.0 Oracle IDM Suite.
Create a location for storing the unzipped patch. This location is sometimes referred to as
PATCH_TOP. Unzip the patch ZIP file
(/modules/stage/p10094106_111130_Generic.zip) under
/modules/stage/bp01. Hence, bp01 under /modules/stage/bp01 directory is your
PATCH_TOP.
Stop the admin and managed servers on the Linux machine by using Ctrl + C to kill the
running servers on the terminal windows where they are running.
On the terminal window, navigate to the /modules/stage/bp01/10094106 directory.
Apply the patch by using opatch apply
Is the local system ready for patching? [y|n]
y
Once the patch has been successfully applied, you can query the inventory to see the bugs
fixed as part of this patch:
opatch lsinventory
Start the admin and managed servers.
Tasks
1.
On your Windows machine, connect to WLST in online mode. On the command line
window, navigate to d:\middleware\idm_home\common\bin and issue the wlst
command:
Connect to AdminServer for oam_domain (test environment) by using the following
values at the prompts:
connect()
Press Enter
Welcome1
Press Enter
Note: If you receive a message that an insecure protocol was used to connect to the server,
you can safely ignore the message.
2.
4.
Navigate to d:\labs to make sure the partners and policy data has been successfully
exported. Note that multiple policy files (myPolicy.<number>@<host
name>.<number>) are created for internal tracking and version control. The myPolicies
file is the main source file which you use to import into the production environment. Open
the myPolicies file in WordPad and review its contents.
Note: The myPartners file is in an unreadable format as it contains sensitive information
about the agents.
Transfer the filesmyPartners and myPoliciesfrom the Windows machine to the
Linux machine by using psftp. On the Windows machine, invoke psftp from
d:\other\putty directory and issue the following commands:
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
open <your_linux_host>.us.oracle.com
login as: oracle
Enter password: oracle
lcd d:\Labs
put myPartners
put myPolicies
5.
Navigate to the Linux machine and make sure you can see the myPartners and
myPolicies files under the /home/oracle directory.
Import the policy and partner datamyPolicies and myPartnersinto the production
environment domain (prod_domain) by using importPartners and importPolicy
commands.
7.
(Note: Clicking the Response tab is required before Clicking Apply due to a bug which
throws a Null Pointer Exception). Click Apply.
Note: The reason you are changing the authentication scheme is because otherwise, you
would have to redeploy the custom login JSP (Practice 6-1 Step 7) on the production
domain. For convenience, you use the standard SSO login page which comes with the
LDAPScheme.
Tasks
1.
2.
On the Linux machine, log in to the OAM admin console for the prod_domain
http://<your_linux_host>.us.oracle.com:7001/oamconsoleby using vishal.parashar
and Welcome1.
Navigate to the System Configuration tab and edit each one of the OAM 10g (except
IDMDomainAgent) and OAM 11g WebGate definitions (oam10g_webgate,
OAM11g_WebGate and oam11g_webgate_partner) to change the server name under the
primary server list to oam_server1. After doing so, the host name field should change to
the host name of the Linux machine. Change the Security to Open. Also, for both OAM 11g
WebGates, change the host name in the Logout Redirect URL field to the host name for the
Linux machine. Click Apply.
3.
4.
5.
Move (Ctrl + X > Ctrl + V or Cut and Paste) ObAccessClient.xml and cwallet.sso
from d:\stage directory to
d:\middleware\ohs_home\instances\ohs_webgate11g\config\OHS\ohs1\web
gate\config.
6.
7.
8.
9.
Move (Ctrl + X > Ctrl + V or Cut and Paste) ObAccessClient.xml from the d:\stage
directory to the D:\Middleware\webgate10g_home\access\oblix\lib directory.
Tasks
1.
2.
Switch to the Windows machine and stop administration and managed servers by using the
OAM admin console or enter Ctrl + C on the command line windows from where the two
servers were started.
Verify that you can access example applications by using
http://<your_windows_machine>.us.oracle.com:7778/example. Click the Employees link
and you should see the SSO login page (note that the host name in the URL is pointing to
the production machine). Make sure you can successfully log in by using
vishal.parashar and Welcome1. Click the Engineering link and you should be able to
view the engineering department home page. If you try to access HR or finance department
home pages, it should give you an error message.
Tasks
1.
2.
3.
4.
5.
Assumptions
Tasks
1.
2.
Assumptions
Tasks
1.
2.
Click Finish. The Settings for oam_cluster reappear, with the oam_server1 server
appearing in the server list.
g. Click Activate Changes in the Change Center pane.
h. Notice the following message that appears above the Settings for oam_cluster
heading: All changes have been activated. No restarts are necessary.
Retarget the oam_server applicationa component of Oracle Access Managerso that it
is deployed to the oam_cluster cluster instead of to the oam_server1 server. By doing
so, when you add new servers to the oam_cluster cluster, the oam_server application
will automatically be deployed to the new servers.
a. Click Lock and Edit in the Change Center pane.
b. Select oam_domain > Deployments in the Domain Structure pane. The Summary of
Deployments page appears in the right side of the console window.
c. Click Next to bring up the second page in the deployments list.
d. Locate the oam_server application in the deployments list.
e. Click oam_server. The Settings for oam_server page appears.
f. Select the Targets tab. The Target Assignments list appears. The oam_server1
server is listed in the Current Targets column.
g. Select the check box for the oam_server application.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
h.
i.
j.
k.
3.
4.
The login application, which is the WAR file that contains the custom-branded login page
for the Example Bakery application
The DMS Application, oamsso_logout, and wsil-wls applicationscomponents of
Oracle Access Managerare currently targeted to both the oam_server1 and
AdminServer servers. Reconfigure these three applications so that they are targeted to
the AdminServer server and the oam_cluster cluster.
Note: The AdminServer server is not part of the oam_cluster cluster.
5.
The oamDS data source is currently targeted to both the oam_server1 and AdminServer
servers. Reconfigure the oamDS data source so that it is targeted to the AdminServer
server and the oam_cluster cluster:
a. Click Lock and Edit in the Change Center pane.
b. Select oam_domain > Services > JDBC > Data Sources in the Domain Structure pane.
The Summary of JDBC Data Sources page appears in the right side of the console
window.
c. Click oamDS. The Settings for oamDS page appear.
d. Select the Targets tab. A page with a target assignments list appears. The
AdminServer and oam_server1 servers are listed as targets.
e.
Select All Servers in the Cluster. The AdminServer server and oam_cluster cluster
should both be selected:
6.
f. Click Save.
g. Click Activate Changes in the Change Center pane.
Following steps similar to the steps for retargeting the oamDS data source to the
AdminServer server and the oam_cluster cluster, reconfigure the AuditDB data
source so that it is targeted to the AdminServer server and the oam_cluster cluster.
Assumptions
Tasks
1.
2.
3.
Select oam_domain > Environment > Servers in the Domain Structure pane. The Summary
of Servers page appears in the right side of the console window.
Click Lock and Edit in the Change Center pane.
Clone the oam_server1 server to create the oam_server2 server:
a.
b.
c.
Choices or Values
Server Name
oam_server2
(leave blank)
Server Port
15100
d.
Click OK. The Summary of Servers page reappears, with the oam_server2 server in
the server list. Note the following information in the server list:
e.
4.
Click Activate Changes in the Change Center pane. The status of the oam_server2
server changes to SHUTDOWN.
Review the list of servers in the oam_cluster cluster to verify that the oam_server2
server is a member of the cluster:
a. Select oam_domain > Environment > Clusters.
b. Click oam_cluster.
c. Select the Servers tab. The servers list appears and contains the oam_server1 and
oam_server2 servers.
Leave the WebLogic console open for the next practice.
Assumptions
Tasks
1.
2.
3.
4.
5.
6.
Field
Value
Main Page
Server Name
oam_server2
Main Page
Host
your_host.us.oracle.com
Main Page
Port
15100
Port
6575
Proxy Server ID
OAMServer2Proxy
7.
8.
9.
Field
Value
Mode
OPEN
Log Level
Local Port
9095
Log Limit
4096
Click Apply. The oam_server2 server now appears under Server Instances on the left side
of the console window.
Log out of the Oracle Access Manager console.
Shut down the oam_server1 managed server instance.
Practice 12-5: Changing the Request Cache Type and Restarting the
Oracle Access Manager Servers
Overview
Authentication to Oracle Access Manager requires multiple HTTP messages between the
Oracle Access Manager server and the client. In a high availability configuration, with multiple
Oracle Access Manager servers, it is important that the client communicates with the same
Oracle Access Manager server instance from the beginning to the end of the authentication
process.
One possible way of ensuring same-server communication is to require the use of a sticky
cookie, which would force the load balancer to send the HTTP communication to the same
server. But Oracle Access Manager server does not require the use of sticky cookies. Instead,
Oracle Access Manager server writes login state information to the URL string to ensure sameserver communication.
When configuring Oracle Access Manager server for high-availability deployments, you can
enable an option to write the login state information to a cookie, thereby decreasing the size of
the URL string. This might be necessary in environments in which users browsers enforce a
limited URL size.
Once the authentication process has completed, there is no requirement for client requests to
be processed on the same server instance.
In this practice you change the cache request type from the BASIC type to the COOKIE type.
Support to change the cache request type is not available in the Oracle Access Manager
console; therefore, you make the change by using the WLST utility.
Then you delete the audit.log filethe bus stop to which Oracle Access Manager server
logs audit data before the audit loader writes the data to the Oracle Databasefor the
oam_server1 server. You can safely delete the audit.log files because the Oracle Access
Manager server is down. You delete this file (and the corresponding file for the oam_server2
server) in a subsequent practice when both Oracle Access Manager servers are running in
order to verify that activity is occurring on both servers.
Note: The audit.log file for the oam_server2 server does not exist yet, because you have
not started this server yet.
At the end of this practice, you restart the administration server and both managed server
instances running Oracle Access Manager server. Restarting the administration server is
required after changing the cache request type.
Assumptions
Both managed server instances running Oracle Access Manager server are shut down.
Tasks
1.
2.
After a series of messages that contain settings for the WLST environment are displayed,
the following messages appear in the terminal window:
Initializing WebLogic Scripting Tool (WLST) ...
Welcome to WebLogic Server Administration Scripting Shell
Type help() for help on available commands
wls:/offline>
3.
4.
userid
that
the
or
5.
6.
7.
Run the displayRequestCacheType command again to display the request cache type.
The request cache type should be type COOKIE now.
Terminate the WLST utility:
exit()
8.
9.
Delete the audit bus stop files for the oam_server1 server:
a.
b.
Assumptions
All three servers in the oam_domain domainthe administration server and the
oam_server1 and oam_server2 managed server instancesare started.
Tasks
1.
2.
Double-click the config.bat file. The Oracle Fusion Middleware 11g Web Tier Utilities
Configuration Wizard starts, and the Welcome (Step 1 of 9) dialog box appears.
Fill in fields and values in the Configuration Wizard as follows:
a. Click Next. The Configure Components (Step 2 of 9) dialog box appears.
b. Deselect the check box for Oracle Web Cache and click Next. The Specify WebLogic
Domain (Step 3 of 9) dialog box appears.
c. Fill in values in the Specify WebLogic Domain (Step 3 of 9) dialog box as follows:
3.
Field
Choices or Values
your_host.us.oracle.com
Domain Port No
7001
User Name
weblogic
Password
Welcome1
d.
e.
Click Next. The Specify Component Details (Step 4 of 9) dialog box appears.
Fill in values in the Specify Component Details (Step 4 of 9) dialog box as follows:
Field
Choices or Values
D:\Middleware\ohs_home\instances\
ohs_lb
ohs_lb
ohs1
f.
g.
h.
i.
j.
4.
Click Save. The message, File saved successfully, appears in the Configure Ports
(Step 5 of 9) dialog box.
k. Click Next. The Specify Security Updates (Step 6 of 9) dialog box appears.
l. Deselect the check box for I Wish to Receive Security Updates and click Next.
m. Click Yes to confirm that you do not want to receive security updates. The Installation
Summary (Step 7 of 9) dialog box appears.
n. Click Configure. The Configuration Progress (Step 8 of 9) dialog box appears.
Progress messages inform you about the configuration operations status.
o. When configuration is 100% complete, click Next. The Installation Complete (Step 9 of
9) dialog box appears.
p. Click Finish.
Verify that the new OHS instance is operational by navigating to the URL,
http://your_host.us.oracle.com:7790. The OHS welcome page should appear.
Assumptions
Tasks
1.
2.
In the preceding example, replace the variable your_host_FQHN with your Windows
systems fully qualified host name, for example, your_host.us.oracle.com.
Restart the OHS instance running on port 7790:
a. If necessary, open a terminal window.
b. Execute the following commands to stop and start the OHS instance:
cd d:\Middleware\ohs_home\instances\ohs_lb\bin
opmnctl stopall
opmnctl startall
Assumptions
Tasks
1.
2.
3.
4.
5.
6.
Navigate to the following URL to start the Oracle Access Manager console:
http://your_host.us.oracle.com:7001/oamconsole. Log in as the Vishal.Parashar user.
The password is Welcome1.
Select the System Configuration tab.
Double-click Server Instances on the left side of the console window. The OAM Server
Common Properties page appears in the right side of the console window.
Select the SSO Engine tab in the OAM Server Common Properties page.
Change the value of the OAM Server Port field from 14100 to 7790, the port number of the
OHS instance acting as a load balancer.
Click Apply.
Leave the Oracle Access Manager console open for the next task.
Practice 12-9: Modifying the Definition for the Oracle Access Manager
11g WebGate and Reconfiguring the WebGate
Overview
In this practice, you configure the Oracle Access Manager 11g WebGate definition to include
the new Oracle Access Manager server. The WebGate configuration includes lists of Oracle
Access Manager servers with which the WebGate communicates directly over a back channel
by using the OAP protocol. At this stage of the deployment, the server list in the WebGate
configuration in Oracle Access Manager includes only the original server; the server that uses
port 5575 for back-channel OAP communication.
After you edit and save the WebGate configuration in the Oracle Access Manager console,
Oracle Access Manager generates files that are necessary for the WebGates configuration in
OHS. You copy these files into the WebGates OHS configuration and restart the OHS instance
running the WebGate.
Note: In the interest of time, you do not configure the OHS instances protected by the 10g
WebGate and the mod_osso filter to work with the load-balanced configuration. In a production
deployment, you would configure all agents to work with the load-balanced configuration.
Assumptions
Tasks
1.
b.
c.
2.
3.
You need to verify that the security mode is Open mode because OAM requires
equivalent security modes for WebGates and OAM servers when reconfiguring
WebGates.
e. In the Logout Redirect URL field, change the port number from 14100 to 7790.
f. Locate the Primary Server List on the right side of the console window.
g. Click the Primary Server List Add icon; the plus sign that appears to the right of the
label Primary Server List. A new empty line appears in the primary server list.
h. In the Server Name field in the new line in the Primary Server List, select the value
oam_server2. Other details for the oam_server2 server are filled in the new line
automatically.
i. Change the value in the Max Number of Connections field to 1.
Note: The number of connections impacts the load-balancing algorithm used by the
WebGate to communicate with the Oracle Access Manager server over the OAP port.
For this practice, you keep the number of connections small, in order to more easily
demonstrate load balancing activity. In production environments, the value for this field
would typically be higher.
j. Click Apply.
Review the content in the output\OAM11g_WebGate directory:
a.
4.
5.
6.
Restart the administration server and the two managed server instances running Oracle
Access Manager:
a. Shut down the oam_server1 and oam_server2 WebLogic managed server
instances.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
b.
c.
d.
Assumptions
Tasks
1.
2.
The D:\Middleware\user_projects\domains\oam_domain\
servers\oam_server1\logs\auditlogs\OAM\audit.log file
The D:\Middleware\user_projects\domains\oam_domain\
servers\oam_server2\logs\auditlogs\OAM\audit.log file
Review the records in the audit.log files to verify that both active Oracle Access
Manager servers have received and handled requests.
Demonstrate session recovery after a single Oracle Access Manager server in a cluster
goes down:
a. Using the WebLogic console, shut down the oam_server1 managed server instance.
If you do not remember how to shut down the server, refer to previous practices that
provide the steps for shutting down WebLogic managed server instances.
b. Clear cookies and cache and restart the browser.
c. Navigate to the Example Bakery home page,
http://your_host.us.oracle.com:7778/example.
d. Click Employees. The Example Bakery login page appears.
e. Log in as user David.Goldsmith with password Welcome1. The employee portal
appears.
Copyright 2011, Oracle and/or its affiliates. All rights reserved.
f.
g.
h.
i.
j.
k.
The login session was created by the oam_server2 server, because the
oam_server1 server is shut down.
Start the WebLogic console in a second tab page.
Using the WebLogic console, start up the oam_server1 managed server instance.
Using the WebLogic console, shut down the oam_server2 managed server instance.
Clear your browsers cache but not cookies.
In the next test you perform, you verify that the user can still access protected
resources without re-authenticating, even though the server on which the user
authenticated is not active.
Return to the tab page in which the Example Bakery application appears. Click
Employees. The browser cache is refreshed, and the employee portal appears. You
should not be prompted to authenticate.
Examine the two audit log bus stop files for the oam_server1 and oam_server2
servers as you did in the previous tasks. Time stamps show that session validation for
the David.Goldsmith user occurred after the oam_server1 server was shut down.
Practice 4-1: Generate the Certificate Request and Private Key for
OAM Server
Overview
In this practice, you generate both the certificate request (server_req.pem) and the private
key (server_key.pem). The certificate request will be sent to a CA for issuing the certification
in the next practice.
All the tasks in Lesson 4 (Advanced) labs are to be performed on the Windows machine.
Task
1.
2.
Tasks
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12. Right-click and choose Paste in the Saved Request dialog box. Click Submit. Note the
current time of day.
13. Go to Windows Start > Programs > Administrative Tools > Certification Authority.
14. Expand the <your_host> node and click the Issued Certificates folder.
15. Locate your certificate by its time stamp. Double-click your certificate (in the right pane).
Click the Details tab followed by the Copy to File button.
16. Click Next on Welcome to the Certificate Export Wizard. Make sure the DER option is
selected and click Next. Click the Browse button. On the Save As window, select Desktop
in the Save in option. Select All Files in the Save as Type option and specify file name as
server_cert.der. Click Save. Click Next, followed by Finish. Click OK on the Export
was Successful message window.
17. Navigate to your desktop and make sure you can see both the certificates: ca_cert.pem
and server_cert.der.cer. Rename server_cert.der.cer to
server_cert.der (on the confirmation window to rename the file, click Yes).
Tasks
1.
2.
Tasks
1.
2.
3.
In the WLST shell, enter the command connect(). You will be prompted for the admin
server host, port, and credentials for connection.
Press Enter.
Type Welcome1 and press Enter.
Press Enter.
After successful connection to the admin server, enter the command domainRuntime()
4.
5.
Tasks
1.
Import a trusted certificate chain into the keystore by using keytool. On the command
line window, navigate to d:\middleware\ohs_home\jdk\bin and issue the following
command:
keytool -importcert -file
d:\winnt\Profiles\Administrator\Desktop\ca_cert.pem
-trustcacerts -storepass
{keystorepassword_from_previous_practice} -keystore
d:\middleware\user_projects\domains\oam_domain\config\fmwconfig\
.oamkeystore -storetype JCEKS
When prompted to trust this certificate, enter yes.
2.
Convert the private key to DER format by using openSSL. On the command line window,
navigate to D:\Middleware\Webgate11g_home\webgate\ohs\tools\openssl
Issue the following command:
openssl pkcs8 -topk8 -nocrypt -in server_key.pem -inform PEM
-out server_key.der -outform DER
When prompted to enter the passphrase for server_key.pem, enter Welcome1
(specified in Practice 4-3).
3.
4.
Run the importcert tool to import a private key and CA-signed certificate into the
keystore.
Using Windows Explorer, navigate to
D:\Middleware\idm_home\oam\server\tools\importcert and unzip
importcert.zip (right-click > Winzip > Extract to here).
Using the command line window, navigate to
D:\Middleware\idm_home\oam\server\tools\importcert, set the %PATH%
variable to include the JDK, and run the importcert utility:
set PATH=D:\Program Files\Java\jdk1.6.0_17\bin;%PATH%
5.
Tasks
1.
Launch the OAM admin console and navigate to System Configuration > Server Instances
node. Click the Edit icon. On the right pane, select the OAM Proxy tab and under the Cert
Mode Configuration, specify the PEM Keystore Alias as mycert (specified in previous
practice) and PEM Keystore alias password as Welcome1 (specified in previous practice).
Click Apply.
2.
Change the Server Instance Property mode to Cert. Navigate to System Configuration >
Server Instances > oam_server1. Click the Edit icon. On the Proxy tab, change the Mode to
Cert. Click Apply. On the Confirm window, click Yes. Then perform the same action for
oam_server2.
Note: Your deployment currently contains two clustered OAM servers. You should
configure both OAM servers to user cert mode. When you perform this practice, only
oam_server1 is running, but if you were to start oam_server2 at the end of the practice, the
cert mode deployment should still work.
Practice 4-7: Generate the Certificate Request and Private Key for
WebGate
Overview
In this practice, you generate both the certificate request (aaa_req.pem) and the private key
(aaa_key.pem). A certificate request will be sent to the CA for issuing the certification in the
next practice.
Note: aaa_key.pem and aaa_cert.pem (from aaa_req.pem) are reserved names that have
to be used for a private key and WebGate certificate.
Task
1.
2.
Tasks
1.
2.
3.
4.
5.
6.
7.
8.
9.
10.
11.
12.
13.
14.
15.
16.
17.
Tasks
1.
2.
Tasks
1.
Launch the OAM admin console and navigate to System Configuration > Agents > 11g
WebGates > OAM11g_webgate. Click the Edit icon. Change the security mode to Cert and
specify agent key password as Welcome1. Click Apply.
2.
3.
Tasks
1.
2.
3.
Tasks
Try accessing a protected Web site served through WebGate 11g, such as
http://<your_host>.us.oracle.com:7778/example. Access the Employee link. Sign in by
using Vishal.Parashar and Welcome1. Click the Engineering Department Site link.
Vishal should be able to see the Engineering home page.
Since the Example Bakery Web site is protected by using WebGate 11g and is serving
content using the AuthN and AuthZ policies configured on the OAM server, this goes to
show that the SSL communication between WebGate 11g and OAM 11g server is working
correctly.