Skip Headers
Oracle® Access Manager Integration Guide
10g (10.1.4.0.1)

Part Number B25347-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
View PDF

Index

A  C  D  F  H  I  L  M  N  O  P  S  T  U  V  W 

A

Access Manager SDK
formerly named Access Server SDK, Preface
Access Server SDK
now named Access Manager SDK, Preface
AccessGate, 9.2
actions
in federated authorization, 5.2
Anonymous authentication scheme
use in federated authorization, 5.4.2
Apache, Preface, 2, 4.1.5
Apache WebGate, Preface
attribute sharing
plug-in, 5.2, 5.2
authentication
scheme
default schemes, Preface
authentication scheme
for attribute sharing, 5.4
for federated single sign-on, 5.4
authorization
schemes for attribute sharing, 5.5
schemes, for federated single sign-on, 5.5
Authorization Manager Services
see AzMan
authorization plug-in
cache, 5.3.1, 5.5
AzMan
about the integration, 17
authentication rules and schemes for, 17.3.1
authorization process overview, 17.2
Oracle Access Manager requirements, 17.3

C

cache
authorization plug-in, 5.3.1, 5.5
session token, 5.3.4
config.xml, 5.2, 5.3.1
COREid
now named Oracle Access Manager, Preface

D

Delegated Administration Service (DAS), 4.2.2

F

features
new, Preface
federation, Preface
about, 5.1
form-based authentication
for Oracle AS SSO, 4.6
forms90.conf, 4.2.4

H

httpd.conf, 4.1.5

I

Identity Provider, 5.2
impersonation
attacks, 5.3.1

L

login
form-based, 4.2.4
login semantic type, 4.2.9
login URL, protecting, 4.2.9
OracleAS SSO login page, 4.6
logout
from OracleAS SSO and the Access Server, 4.2.7
logout URL, 4.2.7
logout.jsp for OracleAS SSO, 4.5.2

M

MediumSecurity_AuthPlugin, 4.2.1.1

N

name changes, Preface
names, new, Preface
NetPoint
now named Oracle Access Manager, Preface
NetPoint SAML Services
now named Oracle Identity Federation, Preface

O

OC4J_BI_FORMS, 4.2.4
OC4J_SECURITY, 4.2.1.1
OHS, Preface, 2, 4.1.5
OHS WebGate, Preface
OID
see Oracle Internet Directory
Oracle Access Manager
formerly NetPoint or COREid, Preface
Oracle Application Server, Preface, 2, 4.1.5
Oracle Application Server Portal, 4.2.3
Oracle HTTP Server, Preface, 2, 4.1.5
Oracle HTTP Server (OHS), 4.1.2
Oracle Identity Federation, Preface, 5.2
formerly SHAREid, Preface
Oracle Identity Manager
about, 8.1
integration
about, 8.1
Oracle Internet Directory, 4.1.2, 4.1.2, 4.1.5, 4.2.2, 4.2.2
Oracle SSO Server, 4.1.2
OracleAS 10g, 4.1.2
OracleAS Single Sign-On, Preface, 2, 4.1.5

P

performance
encryption parameters, impact, 5.3.1
session token cache, impact, 5.3.4
plug-ins
attribute sharing, 5.2, 5.2
Plumtree
about the integration, 11.1
anonymous access, 11.5.1
benefits of the integration, 11.1
configuration file modifications for single sign-on, 11.3.3
configuring anonymous access, 11.5.1
creating a single sign-on authentication source, 11.3.1
creating an LDAP authentication source, 11.3.2
guest pages, 11.5.1
integration architecture, 11.1
Knowledge Directory, 11.5.2
logout, 11.3.5
password management, 11.5.3
policy domain for, 11.4.2
protecting with the Access System, 11.4
self-registration, 11.5.4
single sign-on logout, 11.3.5
supported versions, 11.2
synchronizing LDAP data, 11.3.4
task overview of integration, 11.1
WebGate configuration for, 11.4.3
policy domain
default, Preface
Policy Manager API, Preface
Procedure
AzMan
To add access policies, 17.6.4
To add default rules and the authentication rule, 17.6.4
To add the authorization scheme to the authorization rule, 17.6.4
To create a custom authorization scheme, 17.6.2
To create a policy domain and add a resource, 17.6.3
Oracle applications
To access the protected reports page, 4.2.5
To code a JAVA class to look for a Oracle Access Manager HeaderVar, 4.2.1.1
To configure a rule expression in an attribute sharing access policy, 5.5.2
To configure an authorization rule for local users in an attribute sharing access policy, 5.5.2
To configure an authorization rule for remote users in an attribute sharing access policy, 5.5.2
To configure basic characteristics of the attribute sharing authorization scheme, 5.5.1
To configure the basic characteristics of the attribute sharing authentication scheme, 5.4.1
To configure the config.xml file, 5.3.1
To configure the plug-ins for the attribute sharing authentication scheme, 5.4.2
To configure the protected resources in an attribute sharing access policy, 5.5.1
To configure the steps for the attribute sharing authentication scheme, 5.4.2
To create a default RAD, 4.6
To create a user-specific RAD, 4.6
To enable single sign-on for forms, 4.2.4
To find these database schema passwords, 4.6
To implement global logout from OracleAS Single Sign-On, 4.2.7
To set up client certificate authentication, 5.3.3
To set up HTTPS, 5.3.3
To test Oracle Access Manager SSO for OracleAS, 4.4
To verify that this directive is set to false, 4.6
Plumtree
To automatically synchronize data, 11.3.4
To create a Knowledge Directory folder, 11.5.2.2
To create a policy domain for guest access, 11.5.1
To create a single sign-on authentication source on Plumtree, 11.3.1
To create a single sign-on password, 11.3.1
To create the policy domain, 11.4.2
To lock the NetPointAnonymous account, 11.5.1
To manually synchronize data, 11.3.4
To set Knowledge Directory preferences, 11.5.2.1
To set up the WebGate for Apache, 11.4.3
To upload a document, 11.5.2.3
To view the updated Plumtree database, 11.3.4.1
RSA
RSA ACE/Server Platform Support, 13.2.2
To add a resource to your policy domain, 13.4.5.2
To configure a CGI directory on the iPlanet Enterprise Server, 13.4.3.3
To configure Apache Web servers for the SecurID CGI script, 13.4.3.3
To configure the CGI script on IIS Web servers, 13.4.3.3
To create a policy domain to protect the SecurID script, 13.4.5.1
To define the path to Perl, 13.4.3.2
To define the SecurID authentication scheme, 13.4.4.2
To define who has access, 13.4.5.3
To enable logging and testing, 13.4.6
To install the ACE/Agent on each Windows-based Access Server, 13.4.2.2.2
To integrate SecurID authentication, 13.6.2
To prepare a Unix-based Oracle SecurID Access Server, 13.4.2.2.1
To prepare a Windows-based Oracle SecurID Access Server, 13.4.2.2.2
To prepare an Active Directory Forest, 13.4.1
To prepare your environment for SecurID integration, 13.4.1
To register an Access Server as an ACE/Agent Host, 13.4.2.1
To relocate the Oracle-provided SecurID directories, 13.4.3.1
To set up the Access Server log, 13.7.6
To verify the ACE/Agent installation on the Unix-based host (optional), 13.4.2.2.1
To verify the ACE/Server log configuration, 13.7.8
To verify the status of each Windows-based Access Server, 13.7.1
SAP
To configure Oracle Access Manager for SAP Enterprise Portal 6.0, 12.6.6
To configure SAP Enterprise Portal 6.0 for external authentication, 12.6.8
To prepare for the integration with SAP, 12.4
To set up Oracle Access Manager for integration with SAP, 12.5.2
To set up SAP for integration with Oracle Access Manager, 12.5.1
To set up SAP PAS for integration with Oracle Access Manager, 12.5.1
To test Access System authentication, 12.5.3
To test Oracle Access Manager single sign-on, 12.5.3
To test SAP R/3 instance installation, 12.5.1
To test the ADM instance installation, 12.5.1
To test the integration, 12.6.9
SharePoint Portal
To add an impersonation action to your policy domain, 15.5.4
To add the impersonation dll to your IIS configuration, 15.5.5
To bind your trusted user to your WebGate, 15.5.3
To compile audiences, 15.4.1
To configure IIS Security for the SPPS integration, 15.6.1
To configure importing user profiles in SharePoint Portal Server, 15.6.4
To configure the wildcard extension for SPPS virtual servers, 15.6.2
To create a portal, 15.4.1
To create a trusted user account, 15.5.1
To create an IIS virtual site not protected by SPPS, 15.5.6.1
To create audiences, 15.4.1
To define managed paths in SharePoint, 15.4.2.1
To edit audiences, 15.4.1
To edit web.config for the SPPS integration, 15.6.3
To give appropriate rights to the trusted user, 15.5.2
To install Oracle Access Manager components for SPPS integration, 15.4.2
To test impersonation through a Web page that displays server variables, 15.5.6.3
To test impersonation through the Event Viewer, 15.5.6.2
To test SSO for your SPPS integration, 15.6.5.2
To test your SPPS integration, 15.6.5.1
To upload a document to the portal, 15.4.1
Siebel
To configure Apache Web server 1.3.x or 2.0.1, 12.6.5
To set the Siebel Name Server Configuration Parameters, 6.5.1
To set up Oracle Access Manager for the integration, 6.5.2
To setup Siebel 7 for integration with Oracle Access Manager, 6.5.1
To test Oracle Access Manager session timeout, 6.5.3
To test Oracle Access Manager single sign-on, 6.5.3
Smart Card
To complete Smart Card certificate enrollment, 14.5.2
To configure the authentication scheme for Smart Card, 14.5.5
To configure the cert_authn.dll, 14.5.6
To prepare a certification authority, 14.5.2
To prepare Active Directory, 14.5.1
To prepare Oracle Access Manager for Smart Card authentication, 14.5.4
To prepare the IIS Web server for certification authentication, 14.5.3
To protect resources, 14.5.5
WebLogic
To add authorization and authentication rules to the domain, 9.5.7
To add filter-related nodes, 9.6.1
To add resources to the domain in Oracle Access Manager, 9.5.7
To complete setup, 9.6.5
To configure multiple WebPass instances, 9.5.11
To configure the Identity Server, 9.5.10
To configure the login jsp for the Login Portlets, 9.6.3
To configure the Security Provider for an Active Directory forest, 9.12.1
To configure the WebLogic resource types, 9.5.5
To create a policy domain in Oracle Access Manager, 9.5.7
To create authentication schemes for WebLogic, 9.5.5
To create policies for the domain, 9.5.7
To enable the listing of all groups in the Admin Console, 9.13.1
To finish a typical installation, 9.5.3
To finish an advanced installation, 9.5.4
To implement an example, 9.7
To install the Security Provider for WebLogic, 9.5.2
To map WebLogic resources to Oracle Access Manager resources, 9.5.8
To map Weblogic resources to Oracle Access Manager resources, 9.5.9
To prepare for running the Policy Deployer Tool, 9.5.6
To Prepare the BEA WebLogic Server 8.1.x, 9.12.2
To prepare the environment, 9.5.9
To run the Policy Deployer after the first time, 9.5.6
To run the Policy Deployer Tool for the first time, 9.5.6
To test single sign-on for the Portal Server, 9.6.6
To use other names, 9.6.4
WebSphere
To build a WebSphere secure application, 10.8.3.1
To complete WebGate configuration details, 10.6.4
To configure multiple WebPass instances for the Connector for WebSphere, 10.6.7
To configure single sign-on for the WebSphere Portal v5, 10.9.8
To configure single sign-on logout, 10.9.8
To configure the AccessGate for the NetPointWASRegistry, 10.5.3.1
To configure the Connector for an Active Directory forest, 10.13.1
To configure the Identity Server after installation, 10.5.2.2
To create a policy domain for the WebSphere Administration Console, 10.5.5
To create a policy domain for WebSphere, 10.5.4.3
To define a resource type for WebSphere, 10.5.4.1
To define an authentication scheme for WebSphere, 10.5.4.2
To define the installation directory, 10.6.2
To enable logging for TAI for WAS 5, 10.8.3.2
To enable logging for TAI for WAS 6, 10.10.5
To enable the NetPointWASRegistry in WAS 5, 10.8.1
To enable the NetPointWASRegistry in WAS 6, 10.10.1
To install and configure TAI for WAS 5, 10.8.3
To install and configure TAI for WAS 6, 10.10.3
To install the SimpleSessionSecure application, 10.8.3.1
To integrate the WebSphere Portal with Oracle Access Manager, 10.9.2, 10.9.3
To launch installation, 10.6.1
To prepare your environment for integration, 10.5.1
To regenerate the plug-in configuration, 10.8.3.1
To run the registryTester program, 10.7.2
To set up the Connector for WebSphere, 10.7.1
To specify AccessGate details, 10.6.5
To specify Connector for WebSphere details, 10.6.3
To supply the paths to the certificate files, 10.6.6
To test Access System authentication and single sign-on, 10.8.3.1
To test single sign-on for Access System-protected WebSphere resources, 10.8.3.1, 10.10.4, 10.10.4
To test the NetPointWASRegistry configuration, 10.8.2, 10.10.2
To test the TAI, 10.10.4
Process overview
Access Manager API operation with the AzMan Plug-In, 17.2
Attribute sharing used for federated authorization, 5.2
Authentication with the integration, 6.2
Authorization with the CMR, 10.3, 10.9.1
AzMan authorization after a user is authenticated, 17.5.3
Integration of Oracle Access Manager with Oracle Application Server, 4.1.3
Integration with SAP ITS, 12.2.3
Integration with SAP ITS and SAP Enterprise Portal 6.0 SP2, 12.6.1
Login using the WAS with Access System single sign-on, 10.2.2
Login using WAS with the NetPointWASRegistry, 10.2.1
Request processing with the SPPS integration, 15.3
Single sign-on between Oracle Access Manager-protected non-WebLogic resources to WebLogic resources, 9.2.3
Smart Card authentication, 14.3
SSO between WebLogic resources to Oracle Access Manager-protected non-WebLogic resources, 9.2.3
User authentication for the Portal, 9.2.3
User authentication, mixed resource types, 9.2.1
User authentication, Web-only applications, 9.2.2
WebGate operation with the AzMan Plug-in, 17.2
When New PIN mode is On, 13.3.3
When Next Tokencode is On, 13.3.2
When the user chooses to define a new PIN, 13.3.3
When the user requests a resource, 13.3.1
When the user requests a system-generated PIN, 13.3.3

S

SAML, 5.2
SAP
about, 12.1
Enterprise Portal
external authentication confguration, 12.6.8
Oracle Access Manager configuration, 12.6.6
Oracle Access Manager prerequisites, 12.6.4
prerequisites, 12.6.3
proxy configuration, 12.6.5
testing the integration, 12.6.9
troubleshooting, 12.6.10
WebGate configuration, 12.6.7
Enterprise Portal integration, 12.6
architecture, 12.6.1
supported platforms, 12.6.2
integration architecture, 12.2.3, 12.6.1
Internet Transaction Server (ITS), 12.2.1
mySAP
about, 12.1
Oracle Access Manager setup, 12.5, 12.5.2
Pluggable Authentication Service (PAS), 12.2.2
preparing for the integration, 12.4
setup for the integration, 12.5.1
supported platforms, 12.3
testing the integration, 12.5.3
Service Provider, 5.2
session token cache, 5.3.4
SHAREid
now named Oracle Identity Federation, Preface
SharePoint Portal Server
about, 15
and single sign-on, 15.1
completing the integration, 15.6
creating a portal, 15.4.1
creating audiences, 15.4.1
IIS security, 15.6.1
impersonation
adding an impersonation action to a policy domain, 15.5.4
adding an impersonation DLL to IIS, 15.5.5
setup, 15.5
testing, 15.5.6
Microsoft components, 15.4.1
Oracle Access Manager components
installing, 15.4.2
Oracle Access manager components, 15.2.3
request processing overview, 15.3
supported platforms, 15.2
synchronizing user profiles, 15.6.4
task overview of impersonation setup, 15.5
task overview of the integration, 15.4
testing the integration, 15.6.5
trusted user
assigning rights, 15.5.2
binding to the WebGate, 15.5.3
trusted user accounts, 15.5.1
uploading a document, 15.4.1
user profile synchronization, 15.6.4
web.config, 15.6.3
wildcard extension, 15.6.2
Windows Impersonation, using with, 15.1.1
Siebel
about, 6.1
eapps.cfg parameters, 6.5.1
integration
about, 6.1
integration architecture, 6.2
diagram, 6.2
Oracle Access Manager setup, 6.5.2
preparing for the integration, 6.4
session timeout, 6.5.3
Siebel application parameter file, 6.5.1
single sign-on setup, 6.5
supported versions, 6.3, 7.4
testing the integration, 6.5.3
Siebel 7, Preface
single sign-on
between Oracle Access Manager and OracleAS, Preface
Smart Card
about the integration, 14
authentication plug-ins, 14.7.2
cert_decode plug-in, 14.7.2.1
challenge method, 14.7.1
client certificate authentication schemes for, 14.7
credential_mapping plug-in, 14.7.2.2
IIS Manager setup, 14.5.6
integration architecture, 14.3
policy domains for, 14.6
preparing Active Directory, 14.5.1
preparing Oracle Access Manager, 14.5.4
preparing the CA, 14.5.2
preparing the Web servers, 14.5.3
protecting resources with Oracle Access Manager, 14.5.5
supported platforms, 14.4
task overview of setting up authentication, 14.5
troubleshooting, 14.8
SSOOblixAuth.class, 4.2.1.1

T

Task Overview
Creating and setting up a portal, 15.4.1
Task overview
Before installing the Security Provider for WebLogic, 9.5.1
Completing Connector Setup, 10.7
Configuring resource protection in the Access System, 10.5.4
Configuring single sign-on for the Portal Server, 9.6
Configuring the AzMan Plug-in, 17.6
Configuring the Identity System for WAS integration, 10.5.2
Installing Microsoft Components, 15.4.1
Installing the Connector, 10.6
Integrating Oracle Access Manager with OracleAS 10g, 4.2
Integrating SecurID authentication, 13.4
Integrating with Plumtree, 11.1
Integrating with SPPS, 15.4
Integrating with the WebSphere Application Server, 10.1
Integrating with WAS v5, 10.8
Integration prerequisites for Oracle Access Manager integration
Integration prerequisites for SAP Portal 6.0 integration
Manually configuring WebLogic Policies in Oracle Access Manager, 9.5.7
Prepare your environment for integration, 6.4
Preparing to install the Connector for WebSphere, 10.5
Preparing your Environment, 4.1.5
Preparing your environment for AzMan, 17.6.1
Protecting resources with Oracle Access Manager, 4.2.9
Protecting Securid Resources, 13.4.5
Setting up a SecurID WebGate, 13.4.3
Setting up impersonation, 15.5
Setting up Oracle Access Manager for integration with OracleAS 10g includes, 4.2.8
Setting Up Oracle Access Manager single sign-on for mySAP, 12.5
Setting up Smart Card Authentication, 14.5
Setting up the Access Server as an ACE/Agent, 13.4.2
Setting up the SPPS integration, 15.6
Testing the securid-cgi directory, 13.7.3
To prepare your environment, 13.6.1

U

URL
logout URLs, 4.2.7

V

virtual directory, 3

W

WebGate, 9.2
Apache, Preface
OHS, Preface
WebLogic
Active Directory notes, 9.12
advanced installation, 9.5.4
auditing, 9.8
authentication for the Portal Server, 9.2.3
authentication for Web-only resources, 9.2.2
authentication schemes, 9.5.5
authorization data from an external source, 9.7
client certificate authentication overview, 9.2.2
completing setup, 9.6.5
configuration files for the integration, 9.11
configuring policies manually, 9.5.7
debug log, 9.9
Identity Server preparation, 9.5.10
integration architecture, 9.2
integration points with Oracle Access Manager, 9.1.1
J2EE applications, 9.1
login.jsp configuration, 9.6.3
mapping WebLogic resources to Oracle Access Manager resources, 9.5.8
mixed Web and non-Web resources, 9.2.1
NetPointProvidersConfig.properties, 9.11.1
NetPointWeblogicTools.properties, 9.11.2
ObLoginFilter.class, 9.6.4
policies in Oracle Access Manager, 9.5.5
Portal Admin Console changes, 9.13.1
preparing the environment, 9.5.1, 9.5.9
references, 9.14
resource type definitions, 9.5.5
running the Policy Deployer, 9.5.6
Security Provider
about, 9.1
installing, 9.5
single sign-on configuration for the Portal Server, 9.6
single sign-on testing for the Portal Server, 9.6.6
supported platforms, 9.3
user and group creation and deletion, 9.10
user authentication for the portal server, 9.2.3
user authentication process overview, 9.2.1
user authentication, Web-only, process for, 9.2.2
WebPass configuration, 9.5.11
web.xml, 9.6.2
web.xml configuration, 9.6.1
WebSphere
Application Assembly Tool (AAT), 10.1.1
components, 10.1.1
Connector for WebSphere, about, 10.1
Custom Member Repository (CMR), 10.1.2
EJB, 10.1
integration architecture, 10.2
integration process overview, 10.1
JSP, 10.1
NetPointWASRegistry, 10.1.2
servlets, 10.1
Web Trust Association Interceptor (TAI), 10.1.1
what's new in this release
federation, Preface
working with OracleAS SSO, Preface