Index
A C D E F H I K L M N O P R S T U V W
A
- access control
-
- and Windows Impersonation, 20.2
- Access Control Lists and Entries, 20.7.3
- Access Manager SDK
-
- formerly named Access Server SDK, Preface
- Access Server SDK
-
- now named Access Manager SDK, Preface
- Access Tokens, 20.7.1
- AccessGate, 10.2
- actions
-
- in federated authorization, 5.2
- Active Directory
-
- and impersonation, 20.6
- configuring a trusted user for impersonation, 20.3.3
- configuring impersonation for services, 20.1
- return attributes to set for impersonation, 20.3.5
- Anonymous authentication scheme
-
- use in federated authorization, 5.4.2
- Apache, Preface, 2, 4.1.5
- Apache WebGate, Preface
- ASP.NET
-
- about, 18
- and OAM role-based authorization, 18.10
- authorization with the security connector, 18.7
- environment setup, 18.8.1
- integration requirements, 18.3.4
- IPrincipal.IsInRole method, 18.3
- OblixHttpModule, 18.6
- OblixPrincipal object, 18.6.1
- security connector for, about, 18.4
- Security Connector, using, 18.8
- security principals and identifiers, 18.2
- setting up the ASP.NET application, 18.9
- setting up the OAM role action, 18.9.1
- attribute sharing
-
- plug-in, 5.2, 5.2
- AUTH_PASSWORD, 20.5
- AUTH_TYPE, 20.5, 20.6.4
- AUTH_USER, 20.5
- authentication
-
- scheme
-
- default schemes, Preface
- authentication scheme
-
- for attribute sharing, 5.4
- for federated single sign-on, 5.4
- authorization
-
- and Windows impersonation, 20.2
- schemes for attribute sharing, 5.5
- schemes, for federated single sign-on, 5.5
- Authorization Manager Services
-
- see AzMan
- authorization plug-in
-
- cache, 5.3.1, 5.5
- Authorization Success, 20.6.4
- AzMan
-
- about, 19, 19.4
- about the integration, 19
- applications and scopes, 19.4.2
- authentication rules and schemes for, 19.3.1
- authorization process overview, 19.2
- authorization stores, 19.4.1
- Oracle Access Manager requirements, 19.3
C
- cache
-
- authorization plug-in, 5.3.1, 5.5
- session token, 5.3.4
- CMS
-
- about, 21
- completing the integration, 21.4.5
- impersonation setup, 21.4.4
- installing Microsoft components, 21.4.2
- installing Oracle Access manager components, 21.4.1
- integration process overview, 21.3
- Microsoft components, 21.2.3
- Oracle Access Manager components, 21.2.2
- supported platforms, 21.2
- task overview of the integration, 21.4
- testing the integration, 21.4.6
- Windows impersonation, 21.1.1
- config.xml, 5.2, 5.3.1
- Content Management Server
-
- see CMS
- COREid
-
- now named Oracle Access Manager, Preface
D
- Delegated Administration Service, 4.2.2
- Delegated Administration Service (DAS), 4.2.2
E
- Enabling Impersonation, 16, 20
-
- With a Header Variable, 20.3
- with a User Name and Password, 20.5
F
- features
-
- new, Preface
- federation, Preface
-
- about, 5.1
- form-based authentication
-
- about, A
- for Oracle AS SSO, 4.6
- forms90.conf, 4.2.4
H
- header variables
-
- for impersonation, 20.3
- httpd.conf, 4.1.5
I
- Identity Provider, 5.2
- Identity System
-
- SSO logout for, A.2
- IMPERSONATE, 20.6.4
- impersonation, 20.1
-
- about, 20.1
- action in a policy domain, 20.3.5
- and third-party products, 20.4
- attacks, 5.3.1
- creating an Impersonator as a Trusted User, 20.3.2
- Domino, 1.1.2, 16, 16.1
- enabling, 20
- enabling with a header variable, 20.3
- enabling with user name and password, 20.5
- for OWA, 20.6
- impersonator as a trusted user, 20.3.2
- requirements for, 20.3.1
- testing, 20.3.8
- Windows impersonation, about, 20.7
K
- Kerberos Protocol, 20.7.5
L
- login
-
- form-based, 4.2.4
- login semantic type, 4.2.9
- login URL, protecting, 4.2.9
- OracleAS SSO login page, 4.6
- LOGON_PASSWORD, 20.5
- LOGON_USER, 20.5
- logout
-
- configuring, A
- custom logout pages, A.3
- from OracleAS SSO and the Access Server, 4.2.7
- how it works, A.2
- logout URL, 4.2.7, A.2
- logout.jsp for OracleAS SSO, 4.5.2
- Lotus Domino, 16.1
-
- about, 16
M
- MediumSecurity_AuthPlugin, 4.2.1.1
N
- name changes, Preface
- names, new, Preface
- NetPoint
-
- now named Oracle Access Manager, Preface
- NetPoint SAML Services
-
- now named Oracle Identity Federation, Preface
- NPUSERNAME, 20.6.4
O
- OC4J_BI_FORMS, 4.2.4
- OC4J_SECURITY, 4.2.1.1
- OHS, Preface, 2, 4.1.5
- OHS WebGate, Preface
- OID
-
- see Oracle Internet Directory
- Oracle Access Manager
-
- formerly NetPoint or COREid, Preface
- Oracle Application Server, Preface, 2, 4.1.5
-
- about the integration, 4, 4.1
- authorization, support for, 4.3
- directory synchronization, 4.2.6
- global logout, 4.2.7
- infrastructure, 4.1.2
- integrating Delegated Administration Service, 4.2.2
- Integrating the Portal, 4.2.3
- integration architecture, 4.1.3
- integration settings for Oracle Access Manager, 4.2.8
- preparing for integration, 4.1.5
- Reports Services, 4.2.5
- sample files, 4.5
- single sign-on, 4.2
- single sign-on login URL, 4.2.9
- single sign-on, enabling, 4.2.1
- single sign-on, enabling for forms, 4.2.4
- testing the integration, 4.4
- Oracle Application Server Portal, 4.2.3
- Oracle E-Business Suite, 9
- Oracle HTTP Server, Preface, 2, 4.1.5
- Oracle HTTP Server (OHS), 4.1.2
- Oracle Identity Federation, Preface, 5.2
-
- about, 5
- and authorization, 5.2
- attribute sharing authentication scheme, 5.4
- authentication scheme, 5.4.2
- authorization rules and policies, 5.5.2
- authorization schemes, 5.5
- configuring basic authentication, 5.3.2
- config.xml, 5.3.1
- etup, 5.3
- formerly SHAREid, Preface
- session token cache, 5.3.4
- SSL and client certificates, 5.3.3
- Oracle Identity Management
-
- about, 6
- about the integration, 6.1
- components, 6.2
- configuring an Apache proxy for JBoss, 6.8
- environment preparation, 6.5
- integration architecture, 6.4
- OAM setup for the integration, 6.6
- setting up OIM for the integration, 6.7
- Oracle Identity Manager
-
- about, 6.1, 9.1
- integration
-
- about, 6.1, 9.1
- supported versions, 6.3
- Oracle Internet Directory, 4.1.2, 4.1.2, 4.1.5, 4.2.2, 4.2.2
- Oracle SSO Server, 4.1.2
- Oracle Virtual Directory, 3
- OracleAS 10g, 4.1.2
- OracleAS Single Sign-On, Preface, 2, 4.1.5
P
- PeopleSoft
-
- about, 8
- Peoplesoft
-
- components, 8.2
- environment preparation, 8.5
- integrating with, about, 8.1
- integration architecture, 8.3
- setting up for the integration, 8.7
- setting up OAM for Peoplesoft, 8.6
- single sign-off, 8.8
- troubleshooting the integration, 8.9
- performance
-
- encryption parameters, impact, 5.3.1
- session token cache, impact, 5.3.4
- plug-ins
-
- attribute sharing, 5.2, 5.2
- Plumtree
-
- about the integration, 12.1
- anonymous access, 12.5.1
- benefits of the integration, 12.1
- configuration file modifications for single sign-on, 12.3.3
- configuring anonymous access, 12.5.1
- creating a single sign-on authentication source, 12.3.1
- creating an LDAP authentication source, 12.3.2
- guest pages, 12.5.1
- integration architecture, 12.1
- Knowledge Directory, 12.5.2
- logout, 12.3.5
- password management, 12.5.3
- policy domain for, 12.4.2
- protecting with the Access System, 12.4
- self-registration, 12.5.4
- single sign-on logout, 12.3.5
- supported versions, 12.2
- synchronizing LDAP data, 12.3.4
- task overview of integration, 12.1
- WebGate configuration for, 12.4.3
- policy domain
-
- default, Preface
- Policy Manager API, Preface
- Procedure
-
- ASP.NET
-
- To set up OAM role actions, 18.9.1
- To set up the ASP.NET application, 18.9
- To set up your environment, 18.8.1
- AzMan
-
- To add access policies, 19.6.4
- To add default rules and the authentication rule, 19.6.4
- To add the authorization scheme to the authorization rule, 19.6.4
- To create a custom authorization scheme, 19.6.2
- To create a policy domain and add a resource, 19.6.3
- impersonation
-
- To add an impersonation action to your policy domain, 20.3.5, 20.6.4
- To add the impersonation dll to your IIS configuration, 20.3.6, 20.6.5
- To bind your trusted OWA user to your WebGate, 20.6.3
- To bind your trusted user to your WebGate, 20.3.4
- To create a trusted user account, 20.3.2
- To create a trusted user account for OWA, 20.6.1
- To create an IIS virtual site not protected by SPPS, 20.3.8.1, 20.3.8.1
- To extend impersonation to resources beyond the computer protected by a WebGate, 20.3.7
- To give appropriate rights to the trusted user, 20.3.3, 20.6.2
- To test impersonation through a Web page, 20.6.6.2
- To test impersonation through a Web page that displays server variables, 20.3.8.3
- To test impersonation through the Event Viewer, 20.3.8.2, 20.6.6.1
- MCMS
-
- To complete the MCMS integration, 21.4.5
- To install Microsoft components, 21.4.2
- To install Oracle Access Manager for the integration, 21.4.1
- To integrate with the MCMS, 21.4.3
- To test single sign-on for your MCMS integration, 21.4.6.2
- To test your MCMS integration, 21.4.6.1
- Oracle Application Server
-
- To access the protected reports page, 4.2.5
- To code a JAVA class to look for a Oracle Access Manager HeaderVar, 4.2.1.1
- To configure authentication using OSSO and authorization using OAM, 4.3.2
- To configure logout for the integration, 4.3.2
- To configure the integration with OracleAS Single Sign-On 10.1.2.0.2, 4.2.8.1
- To create a default RAD, 4.6
- To create a user-specific RAD, 4.6
- To define an external authentication scheme in OAM, 4.3.2
- To define policies to protect middle tier applications, 4.3.2
- To enable single sign-on for forms, 4.2.4
- To find these database schema passwords, 4.6
- To implement global logout from OracleAS Single Sign-On, 4.2.7
- To test Oracle Access Manager SSO for OracleAS, 4.4
- To verify that this directive is set to false, 4.6
- Oracle Identity Federation
-
- To configure a rule expression in an attribute sharing access policy, 5.5.2
- To configure an authorization rule for local users in an attribute sharing access policy, 5.5.2
- To configure an authorization rule for remote users in an attribute sharing access policy, 5.5.2
- To configure basic characteristics of the attribute sharing authorization scheme, 5.5.1
- To configure the basic characteristics of the attribute sharing authentication scheme, 5.4.1
- To configure the config.xml file, 5.3.1
- To configure the plug-ins for the attribute sharing authentication scheme, 5.4.2
- To configure the protected resources in an attribute sharing access policy, 5.5.1
- To configure the steps for the attribute sharing authentication scheme, 5.4.2
- To set up client certificate authentication, 5.3.3
- To set up HTTPS, 5.3.3
- Oracle Identity Management
-
- To configure single sign-on for OIM, 6.7
- To configure single sign-on in OAM, 6.6
- To configure the Apache HTTP server as a proxy for JBoss, 6.8
- To set up a WebGate on an HTTP servre, 6.6
- Peoplesoft
-
- To configure direct login to Peoplesoft on an Apache OHS, 8.9
- To configure single signoff for Peoplesoft, 8.8
- To set up OAM for the integration, 8.6
- To set up Peoplesoft for integration with OAM, 8.7
- Plumtree
-
- To automatically synchronize data, 12.3.4
- To create a Knowledge Directory folder, 12.5.2.2
- To create a policy domain for guest access, 12.5.1
- To create a single sign-on authentication source on Plumtree, 12.3.1
- To create a single sign-on password, 12.3.1
- To create the policy domain, 12.4.2
- To lock the NetPointAnonymous account, 12.5.1
- To manually synchronize data, 12.3.4
- To set Knowledge Directory preferences, 12.5.2.1
- To set up the WebGate for Apache, 12.4.3
- To upload a document, 12.5.2.3
- To view the updated Plumtree database, 12.3.4.1
- RSA
-
- To add a resource to your policy domain, 14.4.5.2
- To configure a CGI directory on the iPlanet Enterprise Server, 14.4.3.3
- To configure Apache Web servers for the SecurID CGI script, 14.4.3.3
- To configure the CGI script on IIS Web servers, 14.4.3.3
- To create a policy domain to protect the SecurID script, 14.4.5.1
- To define the path to Perl, 14.4.3.2
- To define the SecurID authentication scheme, 14.4.4.2
- To define who has access, 14.4.5.3
- To enable logging and testing, 14.4.6
- To install the ACE/Agent on each Windows-based Access Server, 14.4.2.2.2
- To integrate SecurID authentication, 14.6.2
- To prepare a Unix-based Oracle SecurID Access Server, 14.4.2.2.1
- To prepare a Windows-based Oracle SecurID Access Server, 14.4.2.2.2
- To prepare an Active Directory Forest, 14.4.1
- To prepare your environment for SecurID integration, 14.4.1
- To register an Access Server as an ACE/Agent Host, 14.4.2.1
- To relocate the Oracle-provided SecurID directories, 14.4.3.1
- To set up the Access Server log, 14.7.6
- To verify the ACE/Agent installation on the Unix-based host (optional), 14.4.2.2.1
- To verify the ACE/Server log configuration, 14.7.8
- To verify the status of each Windows-based Access Server, 14.7.1
- SAP
-
- To configure a form-based authentication scheme for NetWeaver, 13.6.4.2
- To configure a WebGate on the SAP proxy server, 13.6.4.2
- To configure an SAP Enterprise Portal security policy in Oracle Access Manager, 13.6.4.2
- To configure Oracle Access Manager for SAP Enterprise Portal 6.0, 13.6.3.3
- To configure SAP Enterprise Portal 6.0 for external authentication, 13.6.3.5
- To configure the proxy server to access NetWeaver, 13.6.4.2
- To configure the UME properties, 13.6.4.3
- To configure the Visual Administrator properties, 13.6.4.3
- To modify the Login module stack to use header variables, 13.6.4.3
- To prepare for the integration with SAP, 13.4
- To set up Oracle Access Manager for integration with SAP, 13.5.2
- To set up SAP for integration with Oracle Access Manager, 13.5.1
- To set up SAP PAS for integration with Oracle Access Manager, 13.5.1
- To test Access System authentication, 13.5.3
- To test Oracle Access Manager single sign-on, 13.5.3
- To test SAP R/3 instance installation, 13.5.1
- To test the ADM instance installation, 13.5.1
- To test the integration, 13.6.3.6
- To test the integration with SAP NetWeaver Portal, 13.6.4.4
- SharePoint
-
- To add an impersonation action to your policy domain, 17.6.4
- To add the impersonation dll to your IIS configuration, 17.6.5
- To bind your trusted user to your WebGate, 17.6.3
- To configure IIS Security for the SPPS integration, 17.7.1
- To configure importing user profiles in SharePoint Portal Server, 17.7.4
- To configure the wildcard extension for SPPS virtual servers, 17.7.2
- To create an IIS virtual site not protected by SPPS, 17.6.6.1
- To define managed paths in SharePoint, 17.4.2.1
- To edit web.config for the SPPS integration, 17.7.3
- To give appropriate rights to the trusted user, 17.6.2
- To install Oracle Access Manager components for the integration, 17.4.2
- To test impersonation through a Web page that displays server variables, 17.6.6.3
- To test impersonation through the Event Viewer, 17.6.6.2
- To test single sign-on for your integration, 17.7.5.2
- To test your integration, 17.7.5.1
- SharePoint Portal
-
- To compile audiences, 17.4.1
- To create a portal, 17.4.1
- To create a trusted user account, 17.6.1
- To create audiences, 17.4.1
- To edit audiences, 17.4.1
- To upload a document to the portal, 17.4.1
- Siebel
-
- To complete logout configuration, 7.6.3
- To configure Apache Web server 1.3.x or 2.0.1, 13.6.3.2
- To create a new project, 7.6.3
- To create a Web page for logout, 7.6.3
- To create a Web template, 7.6.3
- To create a Web template file, 7.6.3
- To prepare for configuration, 7.6.3
- To set the Siebel Name Server Configuration Parameters, 7.5.1
- To set up Oracle Access Manager for the integration, 7.5.2
- To setup Siebel 7 for integration with Oracle Access Manager, 7.5.1
- To test Oracle Access Manager session timeout, 7.5.3
- To test Oracle Access Manager single sign-on, 7.5.3
- single sign-on
-
- To configure single sign-on using a Lotus Domino Web server, 16.1
- Smart Card
-
- To complete Smart Card certificate enrollment, 15.6.1.2
- To configure the authentication scheme for Smart Card, 15.6.1.5
- To configure the cert_authn.dll, 15.6.1.6
- To prepare a certification authority, 15.6.1.2
- To prepare Active Directory, 15.6.1.1
- To prepare Oracle Access Manager for Smart Card authentication, 15.6.1.4
- To prepare the IIS Web server for certification authentication, 15.6.1.3
- To protect resources, 15.6.1.5
- WebLogic
-
- To add authorization and authentication rules to the domain, 10.5.7
- To add basic authentication to WebLogic's web.xml file, 10.7.2
- To add filter-related nodes, 10.7.1
- To add filter-related nodes in WebLogic's web.xml file, 10.7.1
- To add form-based authentication to WebLogic's web.xml file, 10.7.2
- To add resources to the domain in Oracle Access Manager, 10.5.7
- To complete setup, 10.7.5
- To configure multiple WebPass instances, 10.5.11
- To configure the Identity Server, 10.5.10
- To configure the login or groupspace jsp for the Login Portlets, 10.7.3
- To configure the Security Provider for an Active Directory forest, 10.13.1
- To configure the WebLogic resource types, 10.5.5
- To create a policy domain in Oracle Access Manager, 10.5.7
- To create authentication schemes for WebLogic, 10.5.5
- To create policies for the domain, 10.5.7
- To enable the listing of all groups in the Admin Console, 10.14.1
- To finish a typical installation, 10.5.3
- To finish an advanced installation, 10.5.4
- To implement an example, 10.8
- To install the Security Provider for WebLogic, 10.5.2
- To map WebLogic resources to Oracle Access Manager resources, 10.5.8
- To map Weblogic resources to Oracle Access Manager resources, 10.5.9
- To prepare for running the Policy Deployer Tool, 10.5.6
- To Prepare the BEA WebLogic Server 8.1.x, 10.13.2
- To prepare the environment, 10.5.9
- To run the Policy Deployer after the first time, 10.5.6
- To run the Policy Deployer Tool for the first time, 10.5.6
- To test single sign-on for the Portal Server, 10.7.6
- To use other names, 10.7.4
- WebSphere
-
- To build a WebSphere secure application, 11.8.3.1
- To complete WebGate configuration details, 11.6.4
- To configure multiple WebPass instances for the Connector for WebSphere, 11.6.7
- To configure single sign-on for the WebSphere Portal v5, 11.10.9
- To configure single sign-on logout for WebSphere Portal v5 and v6, 11.10.9
- To configure the AccessGate for the NetPointWASRegistry, 11.5.3.1
- To configure the Connector for an Active Directory forest, 11.13.1
- To configure the Identity Server after installation, 11.5.2.2
- To create a policy domain for the WebSphere Administration Console, 11.5.5
- To create a policy domain for WebSphere, 11.5.4.3
- To define a resource type for WebSphere, 11.5.4.1
- To define an authentication scheme for WebSphere, 11.5.4.2
- To define the installation directory, 11.6.2
- To enable logging for TAI for WAS 5, 11.8.3.2
- To enable logging for TAI for WAS 6 and 6.1, 11.9.6
- To enable the NetPointWASRegistry in WAS 5, 11.8.1
- To enable the NetPointWASRegistry in WAS 6, 11.9.2
- To enable the NetPointWASRegistry in WAS 6.1, 11.9.2
- To install and configure TAI for WAS 5, 11.8.3
- To install and configure TAI for WAS 6, 11.9.4
- To install and configure TAI for WAS 6.1, 11.9.4
- To install the SimpleSessionSecure application, 11.8.3.1
- To integrate the WebSphere Portal 6.0 with Oracle Access Manager, 11.10.4
- To integrate the WebSphere Portal v5.1 with Oracle Access Manager, 11.10.3
- To integrate the WebSphere Portal with Oracle Access Manager, 11.10.2
- To launch installation, 11.6.1
- To prepare your environment for integration, 11.5.1
- To regenerate the plug-in configuration, 11.8.3.1
- To run the registryTester program, 11.7.2
- To set up the Connector for WebSphere, 11.7.1
- To specify AccessGate details, 11.6.5
- To specify Connector for WebSphere details, 11.6.3
- To supply the paths to the certificate files, 11.6.6
- To test Access System authentication and single sign-on, 11.8.3.1
- To test single sign-on for Access System-protected WebSphere resources, 11.8.3.1, 11.9.5, 11.9.5
- To test the NetPointWASRegistry configuration, 11.8.2, 11.9.3
- To test the TAI, 11.9.5
- Process overview
-
- Access Manager API operation with the AzMan Plug-In, 19.2
- Attribute sharing used for federated authorization, 5.2
- Authentication with the integration, 7.2
- Authorization with the CMR, 11.3, 11.10.1
- Authorization with the Security Connector for ASP.NET, 18.7
- AzMan authorization after a user is authenticated, 19.5.3
- Events during authentication and authorization, 18.10
- Integration of Oracle Access Manager with Oracle Application Server, 4.1.3
- Integration with SAP ITS, 13.2.3
- Integration with SAP Portals, 13.6.1
- Login using the WAS with Access System single sign-on, 11.2.2
- Login using WAS with the NetPointWASRegistry, 11.2.1
- Request processing with MCMS integration, 21.3
- Request processing with the Sharepoint integration, 17.3
- Single sign-on between Oracle Access Manager-protected non-WebLogic resources to WebLogic resources, 10.2.3
- Single sign-on with Oracle Identity Management, 6.4
- Single sign-on with Peoplesoft, 8.3.1
- Smart Card authentication, 15.4.1
- SSO between WebLogic resources to Oracle Access Manager-protected non-WebLogic resources, 10.2.3
- User authentication for the Portal, 10.2.3
- User authentication, mixed resource types, 10.2.1
- User authentication, Web-only applications, 10.2.2
- WebGate operation with the AzMan Plug-in, 19.2
- When New PIN mode is On, 14.3.3
- When Next Tokencode is On, 14.3.2
- When the user chooses to define a new PIN, 14.3.3
- When the user requests a resource, 14.3.1
- When the user requests a system-generated PIN, 14.3.3
R
- REMOTE_USER, 20.5, 20.6.4
- Requirements
-
- impersonation, 20.3.1
- RSA
-
- about, 14
- Access Server for SecurID, 14.2.3
- ACE/Server, 14.1.2
- Active Directory forest considerations, 14.6
- adding ACE/Server users to OAM, 14.4.7
- CGI directory, configuring, 14.4.3.3
- credential mapping parameters, 14.5.2
- environment preparation, 14.4.1
- integrating SecurID authentication, 14.4
- integration summary, 14.1.4
- New PIN mode, 14.2.2.2
- New PIN sequence, 14.3.3
- Next Tokencode mode, 14.2.2.1, 14.3.2
- requesting a resource, 14.3.1
- requirements, 14.2.2
- RSA ACE/Server Platform Support, 14.2.2
- SecurID, 14.1
- SecurID authentication plug-in parameters, 14.5
- SecurID authentication scenarios, 14.3
- SecurID authentication scheme, 14.4.4
- SecurID authentication scheme plug-ins, 14.4.4.1
- SecurID authentication scheme, creating, 14.4.4.2
- SecurID authentication sequence, 14.3.1
- SecurID CGI script, 14.2.5.1
- SecurID challenge parameters, 14.4.4.1
- Securid policy domain, 14.4.5.1
- Securid resources, protecting, 14.4.5
- setting up Access Server for, 14.4.2
- troubleshooting the integration, 14.7
- WebGate requirements for, 14.2.5
S
- S4U2Self Extension, 20.7.6
- SAML, 5.2
- SAP
-
- about, 13.1
- Enterprise Portal
-
- external authentication confguration, 13.6.3.5
- Oracle Access Manager configuration, 13.6.3.3
- Oracle Access Manager prerequisites, 13.6.3.1
- prerequisites, 13.6.3.1
- proxy configuration, 13.6.3.2
- testing the integration, 13.6.3.6
- troubleshooting, 13.6.3.7, 13.6.4.5
- WebGate configuration, 13.6.3.4
- Enterprise Portal integration, 13.6
-
- architecture, 13.6.1
- supported platforms, 13.6.2
- integration architecture, 13.2.3, 13.6.1
- Internet Transaction Server (ITS), 13.2.1
- mySAP
-
- about, 13.1
- NetWeaver
-
- integrating with Oracle Access Manager, 13.6.4
- integration prerequisites, 13.6.4.1
- setting up the integration, 13.6.4.2
- supported platforms, 13.6.2
- testing the integration, 13.6.4.4
- NetWeaver Enterprise Portal
-
- troubleshooting, 13.6.4.5
- NetWeaver Enterprise Protal, 13.6
- Oracle Access Manager setup, 13.5, 13.5.2
- Pluggable Authentication Service (PAS), 13.2.2
- preparing for the integration, 13.4
- setup for the integration, 13.5.1
- supported platforms, 13.3
- testing the integration, 13.5.3
- Security IDs, 20.7.2
- Service Provider, 5.2
- session token cache, 5.3.4
- SHAREid
-
- now named Oracle Identity Federation, Preface
- SharePoint integration
-
- about, 17
- and single sign-on, 17.1
- completing the integration, 17.7
- creating a portal, 17.4.1
- IIS security, 17.7.1
- impersonation
-
- adding an impersonation action to a policy domain, 17.6.4
- adding an impersonation DLL to IIS, 17.6.5
- setup, 17.6
- testing, 17.6.6
- Microsoft components, 17.4.1
- Oracle Access Manager components
-
- installing, 17.4.2
- Oracle Access manager components, 17.2.3
- request processing overview, 17.3
- supported platforms, 17.2
- synchronizing user profiles, 17.7.4
- task overview of impersonation setup, 17.6
- task overview of the integration, 17.4
- testing the integration, 17.7.5
- trusted user
-
- assigning rights, 17.6.2
- binding to the WebGate, 17.6.3
- trusted user accounts, 17.6.1
- user profile synchronization, 17.7.4
- web.config, 17.7.3
- wildcard extension, 17.7.2
- Windows Impersonation, using with, 17.1.1
- SharePoint Portal Server
-
- creating audiences, 17.4.1
- uploading a document, 17.4.1
- Siebel
-
- about, 7.1
- components, 7.1.1
- eapps.cfg parameters, 7.5.1
- integration
-
- about, 7.1
- integration architecture, 7.2
-
- diagram, 7.2
- Oracle Access Manager setup, 7.5.2
- preparing for the integration, 7.4
- session logout, 7.6
- session timeout, 7.5.3
- setup with Active Directory, 7.5.4
- Siebel application parameter file, 7.5.1
- single sign-on setup, 7.5
- supported versions, 7.3, 8.4
- testing the integration, 7.5.3
- timeout, 7.6.1
- Siebel 7, Preface
- single sign-on
-
- between Oracle Access Manager and OracleAS, Preface
- Smart Card
-
- about the integration, 15, 15.4.1
- authentication plug-ins, 15.3.2
- cert_decode plug-in, 15.3.2.1
- challenge method, 15.3.1
- client certificate authentication schemes for, 15.3
- credential_mapping plug-in, 15.3.2.2
- IIS Manager setup, 15.6.1.6
- integration architecture, 15.4
- preparing Active Directory, 15.6.1.1
- preparing Oracle Access Manager, 15.6.1.4
- preparing the CA, 15.6.1.2
- preparing the Web servers, 15.6.1.3
- protecting resources with Oracle Access Manager, 15.6.1.5
- supported platforms, 15.5
- task overview of setting up authentication, 15.6
- troubleshooting, 15.7
- SSOOblixAuth.class, 4.2.1.1
T
- Task Overview
-
- Creating and setting up a Sharepoint portal, 17.4.1
- Task overview
-
- Before installing the Security Provider for WebLogic, 10.5.1
- Completing Connector Setup, 11.7
- Configuration in a multi-domain Active Directory environment, 7.5.4
- configuring a custom logout page, A.3
- Configuring resource protection in the Access System, 11.5.4
- Configuring single sign-on for the Portal Server, 10.7
- Configuring the AzMan Plug-in, 19.6
- Configuring the Identity System for WAS integration, 11.5.2
- Enabling impersonation with a header variable, 20.3
- Installing Microsoft components for Sharepoint, 17.4.1
- Installing the Connector, 11.6
- Integrating Oracle Access Manager with OracleAS 10g, 4.2
- Integrating SecurID authentication, 14.4
- Integrating with MCMS, 21.4
- Integrating with Plumtree, 12.1
- Integrating with Sharepoint, 17.4, 17.5
- Integrating with the WebSphere Application Server, 11.1
- Integrating with WAS v5, 11.8
- Integration prerequisites for Oracle Access Manager integration
- Integration prerequisites for SAP Portal 6.0 integration
- Manually configuring WebLogic Policies in Oracle Access Manager, 10.5.7
- Prepare your environment for integration, 7.4
- Preparing for the Peoplesoft integration, 8.5
- Preparing to install the Connector for WebSphere, 11.5
- Preparing your Environment, 4.1.5
- Preparing your environment for AzMan, 19.6.1
- Protecting resources with Oracle Access Manager, 4.2.9
- Protecting Securid Resources, 14.4.5
- Setting up a SecurID WebGate, 14.4.3
- Setting up impersonation, 17.6
- Setting up impersonation for OWA, 20.6
- Setting up impersonation for the MCMS, 21.4.4
- Setting up Oracle Access Manager for integration with OracleAS 10g includes, 4.2.8
- Setting Up Oracle Access Manager single sign-on for mySAP, 13.5
- Setting up Smart Card Authentication, 15.6.1
- Setting up the Access Server as an ACE/Agent, 14.4.2
- Setting up the Sharepoint integration, 17.7
- Testing the securid-cgi directory, 14.7.3
- To prepare your environment, 14.6.1
U
- URL
-
- logout URLs, 4.2.7, A.2
V
- virtual directory, 3
W
- WebGate, 10.2
-
- Apache, Preface
- OHS, Preface
- WebLogic
-
- Active Directory notes, 10.13
- advanced installation, 10.5.4
- auditing, 10.9
- authentication for the Portal Server, 10.2.3
- authentication for Web-only resources, 10.2.2
- authentication schemes, 10.5.5
- authorization data from an external source, 10.8
- client certificate authentication overview, 10.2.2
- completing setup, 10.7.5
- configuration files for the integration, 10.12
- configuring policies manually, 10.5.7
- debug log, 10.10
- Identity Server preparation, 10.5.10
- integration architecture, 10.2
- integration points with Oracle Access Manager, 10.1.1
- J2EE applications, 10.1
- login.jsp configuration, 10.7.3
- mapping WebLogic resources to Oracle Access Manager resources, 10.5.8
- mixed Web and non-Web resources, 10.2.1
- NetPointProvidersConfig.properties, 10.12.1
- NetPointWeblogicTools.properties, 10.12.2
- ObLoginFilter.class, 10.7.4
- policies in Oracle Access Manager, 10.5.5
- Portal Admin Console changes, 10.14.1
- preparing the environment, 10.5.1, 10.5.9
- resource type definitions, 10.5.5
- running the Policy Deployer, 10.5.6
- Security Provider
-
- about, 10.1
- installing, 10.5
- single sign-on configuration for the Portal Server, 10.7
- single sign-on testing for the Portal Server, 10.7.6
- supported platforms, 10.3
- user and group creation and deletion, 10.11
- user authentication for the portal server, 10.2.3
- user authentication process overview, 10.2.1
- user authentication, Web-only, process for, 10.2.2
- WebPass configuration, 10.5.11
- web.xml, 10.7.2
- web.xml configuration, 10.7.1
- WebSphere
-
- about the connector, 11.1
- access control, 11.10.8
- Access System configuration, 11.5.3
- Application Assembly Tool (AAT), 11.1.1
- completing connector setup, 11.7
- components, 11.1.1
- configuration files, 11.11
- configuring the TAI for v5, 11.8.3
- configuring the TAI for v6 and v6.1, 11.9.4
- configuring the v5 Application Server, 11.8
- configuring the v6 Application Server, 11.9
- Connector for WebSphere, about, 11.1
- Custom Member Repository (CMR), 11.1.2
- defining a policy domain for, 11.5.5
- EJB, 11.1
- enabling logging for v6 and v6.1, 11.9.6
- enabling NetPointWASRegistry for v6 and v6.1, 11.9.2
- Identity System configuration, 11.5.2
- Implementation Notes for Active Directory, 11.13
- Implementation Notes for the TAI, 11.12
- installing the connector, 11.6
- integrating with, 11
- integration architecture, 11.2
- integration process overview, 11.1
- integration scenario, 11.3
- JSP, 11.1
- mapping users and groups to security roles, 11.2.3
- NetPointWASRegistry, 11.1.2
- NetPointWASRegistry.properties, 11.11.1
- preparing to install the connector, 11.5
- resource protection in the Access System, 11.5.4
- servlets, 11.1
- testing environment setup, 11.7.2
- testing NetPointWASRegistry for v5, 11.8.2
- testing NetPointWASRegistry for v6, 11.9.3
- testing the TAI for v6 and v6.1, 11.9.5
- TrustedServers.properties, 11.11.3
- Web Trust Association Interceptor (TAI), 11.1.1
- WebGate.properties, 11.11.2
- WebSphere Portal
-
- about integration with CMR, 11.10.1
- integrating with, 11.10
- managing users and groups, 11.10.5
- modifying user profiles and attributes, 11.10.6
- password management, 11.10.7
- setting up v5.0.2, 11.10.2
- setting up v5.1, 11.10.3
- setting up v6.0, 11.10.4
- single sign-on, 11.10.9
- what's new in this release
-
- federation, Preface
- working with OracleAS SSO, Preface
- Wildcard Extension, 20.7.4
- Windows Impersonation, 20.1