Skip Headers
Oracle® Access Manager Access Administration Guide
10g (10.1.4.0.1)

Part Number B25990-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
View PDF

8 Access System Configuration and Management

This chapter discusses several additional Access System configuration and management functions available within the Access System Console. Topics include:

For more information about managing the Access System, see:

8.1 Prerequisites

Oracle Access Manager should be installed and set up, as described in the Oracle Access Manager Installation Guide. Read the Oracle Access Manager Introduction, which provides an overview of Oracle Access Manager not found in other manuals. Also, familiarize yourself with the Oracle Access Manager Identity and Common Administration Guide, which provides a brief review of Access System applications and installation; introduces Access System configuration and administration; and includes common functions, configuration, and administration.

8.2 About Access System Configuration and Management

Earlier chapters in this manual describe configuring administrators and viewing server settings through the Access System Console, System Configuration functions. That information is not repeated here.

The rest of this section discusses the following topics:

8.2.1 Access System Configuration

Numerous functions are available in the Access System Console, Access System Configuration tab, as shown in the following list. Unless indicated, other chapters in this manual describe Access System Configuration functions:

  • Access Server Clusters: View existing Access Server Clusters, add new and modify existing Access Server Clusters, configure and delete Access Server Clusters.

  • AccessGate Configuration: View existing AccessGates, add new and modify existing AccessGates, configure and delete AccessGates.

  • Access Server Configuration: View existing Access Servers, add new and modify existing Access Servers, configure cache and audit settings.

  • Authentication Management: Configure Authentication Rules.

  • Authorization Management: Configure Authorization Rules.

  • User Access Configuration: List revoked users, flush the user cache, as described in this chapter under"Configuring User Access" .

  • Common Information Configuration: Generate a cryptographic key to encrypt cookies (covered here), configure a master auditing rule, manage resource type definitions, flush the Password Policy Cache (covered here), handle duplicate action headers. For more information on items covered here, see:

  • Host Identifiers: Configure host identifiers.

8.2.2 System Management

There are a number of options available in the Access System Console to perform system management operations, which are described in this chapter:

For information about diagnostics, auditing, reports, and logging, see the Oracle Access Manager Identity and Common Administration Guide.

8.3 Configuring User Access

You use the User Access Configuration function available through the Access System Console, Access System Configuration tab, to manage revoked users and flush user data from the cache. This section covers the following topics:


Note:

You must be a Master Access Administrator or a Delegated Access Administrator with appropriate permissions to configure user access.

For more information on caches, see "Automatic Access System Cache Flush". See also the Oracle Access Manager Deployment Guide.

8.3.1 Revoking Users

You can create and modify a list of users who are prohibited from accessing any of your resources. This list supersedes any other policies controlling user access to your resources. Once a user has been revoked, if the user tries to refresh the browser, or go to another protected resource, they are denied access. If a revoked user tries to log in, he or she is presented with the following error:

The user corresponding to the credentials credentials used in the login has been revoked. . .

To create the revoked user list

  1. In the Access System Console, click Access System Configuration, then click User Access Configuration.

    The User Access Configuration screen appears.

  2. Click Revoked Users.

    The Modify User Revocation List screen appears, displaying the names of revoked users. If no revoked users exist, the Configure User Revocation List screen appears. If any exist, their names appear beneath the Revoked Users link.

  3. Click Select User, then use the Selector feature (Select User button) to add or remove revoked users.

    See the Oracle Access Manager Identity and Common Administration Guide for instructions on using the Selector.

  4. Click Save to save your changes (or click Cancel to exit without saving.

8.3.2 Flushing Users from the Cache

This feature lets you delete information about certain users from the AccessGate and Access Server caches. For example, you might want to flush a user's information after that user's rights to view or modify an attribute have changed.

To flush user information from the cache

  1. With any screen within the User Access Configuration feature displayed, click the Flush User Cache tab.

    For example:

    Access System Console, select Access System Configuration, select User Access Configuration, then click Flush User Cache

    The Flush all cached information for specified users screen appears.

  2. Use the Selector feature (Select User button) to create a list of users whose information is flushed from all caches.

    See the Oracle Access Manager Identity and Common Administration Guide for instructions on using the Selector.

    The names of people that you have selected appear.

  3. Click Flush Cache.

    You are prompted to confirm your decision. If you click OK the names are cleared from the screen, and information about these users is flushed from AccessGate and Access Server caches.

8.4 Creating a Shared Secret Key

You use the Shared Secret function available through the Access System Configuration, Common Information Configuration tab, to generate a key that encrypts single sign-on cookies sent from an AccessGate to a browser.


Note:

You must be a Master Access Administrator to create a shared secret key. You should generate a cryptographic key as soon as possible after installing Oracle Access Manager, otherwise a less secure default is used.

AES is a new encryption scheme introduced in Oracle Access Manager 7.0. If you have a new installation of Oracle Access Manager 10.1.4, AES is the default encryption scheme. RC6 encryption is deprecated in Oracle Access Manager 10.1.4, and its support will be removed in future releases.

If you have upgraded to Oracle Access Manager 10.1.4 from an older version, the older encryption scheme will be retained. Older WebGates may co-exist with newer WebGates as described in the:

You should use AES encryption only when all the WebGates and Access Servers are upgraded to Oracle Access Manager version 7.0 and higher.


Note:

If the shared secret is generated more frequently than the session timeout, then the user may have a cookie that was encrypted using a shared secret that is more than two generations old. In this case, the cookie is rejected and the user is forced to re-authenticate.

To generate a cryptographic key

  1. In the Access System Console, click Access System Configuration, click Common Information Configuration.

    The Common Information Configuration screen appears.

  2. Click the Shared Secret tab at the top of the screen.

    The Generate shared secret screen appears.

  3. Click Modify.

    The Generate shared secret page now includes various ciphers from which to choose.

  4. Select the appropriate cipher option for the shared secret (Oracle recommends using the AES cipher).

  5. Click Generate Secret only once.

    Oracle Access Manager generates a new cryptographic key and distributes it to each Access Server on your system. The new key replaces the existing key without disrupting service to end users. Re-authentication only happens when the session times out. This process is called grandfathering. Clicking Generate Secret multiple times can put the shared secret key in Identity out of synch with the key in the Policy Manager.

    A message informs you the operation was successful.

8.4.1 Changes to the Shared Secret Key

If you change the shared secret during a user session, the user does not need to re-authenticate. If a cookie is being decrypted with the old shared secret and the cookie is refreshed, it is encrypted with the new shared secret.

If the shared secret is changed more frequently than one-fourth the setting of the idle session timeout parameter, users may have to re-authenticate during a session. Otherwise, user are not required to re-authenticate during a session if the shared secret is changed.

8.5 Flushing Password Policy Caches

You use Flush Password Policy Cache function, available through the Access System Configuration, select Common Information Configuration tab, to flush all password policies from the Access Server cache. Flushing the password policy cache removes existing password policies and adds newly configured policies.


Note:

You must be a Master Access Administrator to flush password policy caches. You can also automatically update this cache. For more information about updates to the Access Server cache, see the Oracle Access Manager Identity and Common Administration Guide.

To flush all redirect URLs

  1. Click Access System Console, select Access System Configuration, select Common Information Configuration, then click Flush Password Policy Cache.

  2. In the next screen, select the name of the policy you want to flush from the cache.

  3. Click Flush Cache, and click OK to confirm your decision.

  4. Click Flush Redirect URL, if you have configured redirect URLs, and click OK.

8.6 Running Diagnostics

You use the Diagnostics on Access System Console, System Management page to run diagnostics on all the Access Servers in your Oracle Access Manager system or selected servers.

To run diagnostics for Access Servers

  1. From the Access System Console, select System Management, then click Diagnostics.

    You are asked to select the Access Servers on which you would like to run diagnostics

  2. Select the option you want:

    • All Access Servers: Select All Access Servers, then click the Go button.

    • Specific Access: Servers Hold down the Control key, then click the names of the servers whose details you want, then click the Go button.

8.7 Managing User Access Privilege Reports

You use the Manage Reports function on the Access System Console, System Management page to manage user access privilege reports.

Each Access Server can collect audit information about the resource requests it handles. The list of existing reports is visible from the Manage Reports page. In addition, you can perform the following operations:

For more information on auditing and reports, see the Oracle Access Manager Identity and Common Administration Guide.

8.7.1 Adding a Report

You can create user access privilege reports that verify whether specific users have access to specific resources at specific times. Explanations to help you complete these fields appear in the following procedure.

To add a user access privilege report

  1. From the Access System Console, select System Management, then click Manage Reports.

  2. On the Manage User Access Privilege Reports page, click the Add button.

  3. Complete the information as follows:

    Report Name: Choose a self-explanatory name for the audit report.

    Description: If you wish, you may describe the report.

    Access Server: Name of the Access Server that will collect the information for the report.

    Results Storage: Indicate whether the audit data should go to a disk file or a database.

    List of Resources: Click the Add button beside this option to display the Add Resource Rule page, as shown in the following screen shot.

    Image of Add Resource Rule page

    Note:

    You may add multiple resources to a report. Access information on each resource will be returned in the report.

  4. On the Add Resource Rule page, complete the rule by specifying the following, then click Save to return to the Add New Report page:

    • URL: The URL of a target resource you want to add to the report.

    • Resource Type: Supported choices are HTTP and EJB.

    • Resource Operation: Check boxes appear beside operations you can include in the report. Oracle Access Manager will determine which are permitted against the specified resources. for the specified users. at the specified time.

  5. On the Add New Report page, continue specifying the following information:

    From this IP Address: Optional. The IP address of the machine hosting the client browser whose access you want to test. This parameter is optional.

    Date/Time of Access: Select a button to determine when a specific resource will be available to the users specified by the current report:

    • Any: Oracle Access Manager will determine if there is at least some point in time when the resource is available.

    • Specific date and time: Indicates you want to identify a specific point in time so that Oracle Access Manager can determine if access is permitted at that particular moment.

    Check Access for the following users: Specify whether to check the access for all users in the directory or only those you designate.

    • selected users: Enables you to use the Selector page to locate and add specific users. Choose selected users, click the Select User button, specify your search criteria, then add specific users.

    • all users: Indicates you want to check the access of all users in the directory.

  6. Click Save on the Add Reports page to save the specifications for the report and display the name you specified as a link on the Manage User Access Privilege Reports page.

8.7.2 Managing Reports

From the Manage User Access Privilege Reports page (Access System Console, select System Management, then click Manage Reports), you can perform a number of operations:

  • Add: Create a new report as described in "Adding a Report".

  • Delete: Check the box beside the report name on the Manage User Access Privilege Reports page, then click the Delete button to remove the report. Confirm that you want to delete the report when asked.


    Note:

    To delete or execute multiple reports simultaneously, check all the boxes on which to operate, then click the appropriate button.

  • Execute: Check the box beside the report name on the Manage User Access Privilege Reports page, then click the Execute button. Confirm that you want to execute the report when asked.

  • Refresh: Update the list of reports on the Manage User Access Privilege Reports page by clicking the Refresh button.

  • Modify: Click a link on the Manage User Access Privilege Reports page to display the Manage Existing Report page, then change the parameters for the existing static audit report. See "Adding a Report" for details about each option.

8.8 Managing Sync Records

The Policy Manager creates synchronization records, which are stored on the directory server. Over time, these records accumulate. You can manage the space these records consume on the directory server by periodically archiving or purging all the records prior to a specified date.

The archive file is typically named nnn.ldif, where nnn is a string of numbers representing both the moment at which the file was created and the cut-off time for archiving or purging records. All records created prior to the cut-off time will be archived or purged.

By default, the archived file is stored in:

PolicyManager_install_dir\access\oblix\data\common

where PolicyManager_install_dir represents the directory where you installed the Policy Manager.

To archive sync records

  1. From the Access System Console, click System Management, then click Manage Sync Records.

  2. On the Manage Sync Records page, use the drop down lists to specify the Date of sync records generated.

  3. Click the Archive Sync Records button.

  4. When asked if you really want to archive the records, click OK to execute the action (or Cancel to revoke the operation).

  5. Record the location when you are presented with a message like the following:

    Successfully archived 210 sync records generated before the selected date to file
    /export/home/COREid1014/webcomponent/access/oblix/data/common/syncrecords109099
    8000.20040729.040844.ldif.
    
    

To purge sync records

  1. From the Access System Console, click System Management, then click Manage Sync Records.

  2. On the Manage Sync Records page, use the drop down lists to specify the Date of sync records generated.

  3. Click the Purge Sync Records button.

  4. When asked if you really want to purge the records, click OK to execute the action (or Cancel to revoke the operation).

For more information about reports, see the Oracle Access Manager Identity and Common Administration Guide.