Skip Headers
Oracle® Access Manager Access Administration Guide
10g (10.1.4.3)

Part Number E12488-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
View PDF

What's New in Oracle Access Manager?

This section describes new features of the Oracle Access Manager release 10.1.4. This includes details for 10g (10.1.4.0.1), 10g (10.1.4.2.0), and 10g (10.1.4.3).

The following sections are included:

Note:

For a comprehensive list of all new features and functions in Oracle Access Manager 10.1.4, and a description of where each is documented, see the chapter on what's new in the Oracle Access Manager Introduction.

Product and Component Name Changes

The original product name, Oblix NetPoint, has changed to Oracle Access Manager. Most component names remain the same. However, there are several important changes that you should know about, as shown in the following table:

Item Was Is
Product Name Oblix NetPoint

Oracle COREid

Oracle Access Manager
Product Name Oblix SHAREid

NetPoint SAML Services

Oracle Identity Federation
Product Name OctetString Virtual Directory Engine (VDE) Oracle Virtual Directory
Product Name BEA WebLogic Application Server

BEA WebLogic Portal Server

Oracle WebLogic Server

Oracle WebLogic Portal

Product Release Oracle COREid 7.0.4 Also available as part of Oracle Application Server 10g Release 2 (10.1.2).
Directory Name COREid Data Anywhere Data Anywhere
Component Name COREid Server Identity Server
Component Name Access Manager Policy Manager
Console Name COREid System Console Identity System Console
Identity System Transport Security Protocol NetPoint Identity Protocol Oracle Identity Protocol
Access System Transport Protocol NetPoint Access Protocol Oracle Access Protocol
Administrator NetPoint Administrator

COREid Administrator

Master Administrator
Directory Tree Oblix tree Configuration tree
Data Oblix data Configuration data
Software Developer Kit Access Server SDK

ASDK

Access Manager SDK
API Access Server API

Access API

Access Manager API
API Access Management API

Access Manager API

Policy Manager API
Default Policy Domains NetPoint Identity Domain

COREid Identity Domain

Identity Domain
Default Policy Domains NetPoint Access Manager

COREid Access Manager

Access Domain
Default Authentication Schemes NetPoint None Authentication

COREid None Authentication

Anonymous Authentication
Default Authentication Schemes NetPoint Basic Over LDAP

COREid Basic Over LDAP

Oracle Access and Identity Basic Over LDAP
Default Authentication Schemes NetPoint Basic Over LDAP for AD Forest

COREid Basic Over LDAP for AD Forest

Oracle Access and Identity for AD Forest
Access System Service AM Service State

Policy Manager API Support Mode

Access Management Service

Note: Policy Manager API Support Mode and Access Management Service are used interchangeably.


All legacy references in the product or documentation should be understood to connote the new names.

Enhancements Available in 10g (10.1.4.3)

Included in this release are new enhancements and bug fixes for 10g (10.1.4.3) in addition to all fixes and enhancements from 10g (10.1.4.2.0) bundle patches through BP07. The following topics describe 10g (10.1.4.3) enhancements described in this book:

See Also:

Oracle Access Manager Introduction for a list of all new features and functions

Access Management Service Clarifications

Several clarifications have been made with regard to the Access Management Service in WebGate and Access Server profiles. This setting is Off by default. When set to On, the Access Server starts servicing requests from AccessGates. The Access Management Service must be On for associated Access Servers and AccessGates. The Access Management Service must be On for associated Access Servers and AccessGates. WebGates do not require the Access Management Service, unless an associated Access Server uses it.

See Also:

Chapter 3, "Configuring WebGates and Access Servers"

Access Tester Use with Custom Authentication and Authorization Plug-ins

New information has been added to describe how to use Access Tester when you have custom authentication or authorization plug-ins.

See Also:

"Using Access Tester"

Form-based Authentication Parameters

Oracle has added a new, optional, and configurable challenge parameter (maxpostdatabytes) for form-based authentication schemes only. Use of the maxpostdatabytes challenge parameter is similar to other challenge parameters (form, creds, action, and passthrough).

See Also:

Appendix A, "Form-Based Authentication"

Global Sequence Number Corruption Recovery

The oblixGSN objectclass in the directory server is used in the cache flush mechanism. It contains a global sequence number (a value in the obSeqNo attribute) that represents the flush request number. When you have multiple Access Servers writing to multiple directory servers, however, changes could cause the global sequence number in the directory servers to get out of sync. Thus, corresponding entries in the directory servers might become corrupted, which can lead to inconsistent performance in Oracle Access Manager.

Oracle Access Manager provides functionality that enables you to detect corrupted GSNs in the directory server from the command-line tool (recovergsncorruption) in the following path: PolicyManager_install_dir\access\oblix\tools. If corruption is discovered, you can initiate recovery processing after disabling the cache flush operation between Identity Servers and Access Servers.

See Also:

Internet Protocol Version 6

Oracle Access Manager supports Internet Protocol Version 4 (IPv4). However, you can configure Oracle Access Manager to work with clients that support IPv6 by setting up a reverse proxy server.

See Also:

Appendix D, "Using Oracle Access Manager with IPv6 Clients"

Multi-Language Deployments and English Only Messages

Messages for minor releases (10g (10.1.4.2.0) and 10g (10.1.4.3)) added for new functionality might not be translated and can appear in English only.

Native POSIX Thread Library (NPTL) for Linux

Earlier releases of Oracle Access Manager for Linux used the LinuxThreads library only. Using LinuxThreads required that you set the environment variable LD_ASSUME_KERNEL, which is used by the dynamic linker to decide what implementation of libraries is used. When you set LD_ASSUME_KERNEL to 2.4.19 the libraries in /lib/i686 are used dynamically.

RedHat Linux v5 and later releases support only Native POSIX Thread Library (NPTL), not LinuxThreads. To accommodate this change, Oracle Access Manager 10g (10.1.4.3) is compliant with NPTL specifications. However, LinuxThreads is used by default for all except Oracle Access Manager Web components for Oracle HTTP Server 11g.

Note:

On Linux, Oracle Access Manager Web components for Oracle HTTP Server 11g use only NPTL; you cannot use the LinuxThreads library. In this case, do not set the environment variable LD_ASSUME_KERNEL to 2.4.19.

Troubleshooting Tips

Several new tips have been added to the troubleshooting details in this guide:

See Also:

Appendix E, "Troubleshooting Oracle Access Manager"

WebGate User-Defined Configuration Parameters

Several new user-defined parameters have been added for use in WebGate configuration profiles.

See Also:

"Configuring User-Defined AccessGate Parameters"

WebGate Updates

URL Prefixes and Patterns

Triggering Authentication Actions After the ObSSOCookie Is Set

Form-based Authentication

Disabling Authentication Schemes

Persistent Cookies in Authentication Schemes

HTTP Header Variables and Cookies

Configuring Logout

Associating WebGates with Specific Virtual Hosts, Directories, and Files

Configuring the validate_password Plug-In

Overriding Windows-Enabled Impersonation

Configuring Lotus Domino and Windows Impersonation Single Sign-On

Troubleshooting