Skip Headers
Oracle® Fusion Middleware Installation Guide for Oracle Identity and Access Management
11g Release 2 (11.1.2)

Part Number E27301-04
Go to Documentation Home
Home
Go to Table of Contents
Contents
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
PDF · Mobi · ePub

7 Configuring Oracle Adaptive Access Manager

This chapter explains how to configure Oracle Adaptive Access Manager. It includes the following topics:

7.1 Overview

For Oracle Identity and Access Management 11g Release 2 (11.1.2), Oracle Adaptive Access Manager includes two components:

Note:

Oracle Adaptive Access Manager (Offline) is included in the Oracle Identity and Access Management Suite. When you are installing Oracle Identity and Access Management 11g Release 2 (11.1.2), Oracle Adaptive Access Manager (Offline) is also installed along with Oracle Adaptive Access Manager. For configuring Oracle Adaptive Access Manager (Offline), see Section 7.5, "Configuring Oracle Adaptive Access Manager (Offline)".

7.2 Important Note Before You Begin

Before you start installing and configuring Oracle Identity and Access Management products in any of the scenarios discussed in this guide, note that IAM_Home is used to refer to the Oracle Home directory that includes Oracle Identity Manager, Oracle Access Management, Oracle Adaptive Access Manager, Oracle Entitlements Server, Oracle Identity Navigator, Oracle Privileged Account Manager, and Oracle Access Management Mobile and Social. You can specify any name for this Oracle Home directory.

7.3 Installation and Configuration Roadmap for Oracle Adaptive Access Manager

Table 7-1 lists the tasks for installing and configuring Oracle Adaptive Access Manager.

Table 7-1 Installation and Configuration Flow for Oracle Adaptive Access Manager

No. Task Description

1

Review installation concepts in the Installation Planning Guide.

Read the Oracle Fusion Middleware Installation Planning Guide, which describes the process for various users to install or upgrade to Oracle Fusion Middleware 11g (11.1.2) depending on the user's existing environment.

2

Review the system requirements and certification documents to ensure that your environment meets the minimum installation requirements for the components you are installing.

For more information, see Section 2.1, "Reviewing System Requirements and Certification".

3

Obtain the Oracle Fusion Middleware Software.

For more information, see Section 3.2.1, "Obtaining the Oracle Fusion Middleware Software"

4

Review the Database requirements.

For more information, see Section 3.2.2, "Database Requirements".

5

Run Oracle Fusion Middleware Repository Creation Utility (RCU) to create and load the appropriate schemas for Oracle Identity and Access Management products.

For more information, see Section 3.2.3, "Creating Database Schema Using the Oracle Fusion Middleware Repository Creation Utility (RCU)".

6

Review WebLogic Server and Middleware Home requirements.

For more information, see Section 3.2.4, "WebLogic Server and Middleware Home Requirements".

7

Start the Oracle Identity and Access Management Installer.

For more information, see Section 3.2.6, "Starting the Oracle Identity and Access Management Installer".

8

Install the Oracle Identity and Access Management 11g software.

Oracle Adaptive Access Manager is included in the Oracle Identity and Access Management Suite. You can use the Oracle Identity and Access Management 11g Installer to install Oracle Identity and Access Management Suite.

For more information, see Section 3.2.7, "Installing Oracle Identity and Access Management (11.1.2)".

9

Run the Oracle Fusion Middleware Configuration Wizard to configure your Oracle Identity and Access Management products in a new or existing WebLogic domain.

This chapter describes the following configuration scenarios:

10

Configure the Database Security Store.

For more information, see Section 3.2.9, "Configuring Database Security Store for an Oracle Identity and Access Management Domain".

11

Start the servers.

You must start the Administration Server and all Managed Servers. For more information, see Section 7.6, "Starting the Servers".

12

Complete the post-installation tasks.

Complete the following post-installation tasks:


7.4 Oracle Adaptive Access Manager in a New WebLogic Domain

This topic describes how to configure Oracle Adaptive Access Manager in a new WebLogic administration domain. It includes the following sections:

7.4.1 Appropriate Deployment Environment

Perform the configuration in this topic if you want to install Oracle Adaptive Access Manager in an environment where you may install other Oracle Identity and Access Management 11g components, such as Oracle Identity Navigator, Oracle Access Management, or Oracle Identity Manager at a later time in the same domain.

You can use the Oracle Identity Navigator interface and dashboard to discover and launch the Oracle Adaptive Access Manager console from within Oracle Identity Navigator.

7.4.2 Components Deployed

Performing the configuration in this section deploys the following:

  • WebLogic Administration Server

  • Managed Servers for Oracle Adaptive Access Manager, depending on the Oracle Adaptive Access Manager Domain Configuration template you choose.

  • Oracle Adaptive Access Manager Console on the Administration Server.

7.4.3 Dependencies

The configuration in this section depends on the following:

7.4.4 Procedure

Perform the following steps to configure only Oracle Adaptive Access Manager in a new WebLogic domain:

  1. Start the Oracle Fusion Middleware Configuration Wizard by running the <IAM_Home>/common/bin/config.sh script (on UNIX), or <IAM_Home>\common\bin\config.cmd (on Windows).

    The Welcome screen of the Oracle Fusion Middleware Configuration Wizard appears.

  2. On the Welcome screen, select the Create a new WebLogic domain option. Click Next. The Select Domain Source screen appears.

  3. On the Select Domain Source screen ensure that the Generate a domain configured automatically to support the following products: option is selected. Select Oracle Adaptive Access Manager Admin Server - 11.1.2.0.0 [IAM_Home].

    In addition, you can select the following:

    • Oracle Adaptive Access Manager - Server - 11.1.2.0.0 [IAM_Home]

    • Oracle Adaptive Access Manager Offline - 11.1.2.0.0 [IAM_Home]

    Note:

    When you select the Oracle Adaptive Access Manager Admin Server - 11.1.2.0.0 [IAM_Home] option, the following options are also selected, by default:

    • Oracle Enterprise Manager 11.1.1.0 [oracle_common]

    • Oracle Platform Security Service 11.1.1.0 [IAM_Home]

    • Oracle JRF 11.1.1.0 [oracle_common]

    When you select the Oracle Adaptive Access Manager - Server - 11.1.2.0.0 [IAM_Home] option, in addition to the templates mentioned above, the Oracle WSM Policy Manager - 11.1.1.0 [oracle_common] is also selected, by default.

    Click Next. The Select Domain Name and Location screen appears.

  4. Enter a name and a location for the domain to be created, and click Next. The Configure Administrator User Name and Password screen appears.

  5. Configure a user name and a password for the administrator. The default user name is weblogic. Click Next.

  6. Choose a JDK and Production Mode in the Configure Server Start Mode and JDK screen of the Oracle Fusion Middleware Configuration Wizard. Click Next. The Configure JDBC Component Schema screen is displayed.

  7. On the Configure JDBC Component Schema screen, select a component schema, such as the OAAM Admin Server Schema, the OPSS Schema, or the OAAM Admin MDS Schema, that you want to modify.

    You can set values for Schema Owner, Schema Password, Database and Service, Host Name, and Port. Click Next. The Test JDBC Component Schema screen appears. After the test succeeds, click Next. The Select Optional Configuration screen appears.

  8. On the Select Optional Configuration screen, you can configure the Administration Server and Managed Servers, Clusters, and Machines, and Deployments and Services, and RDBMS Security Store. Click Next.

  9. Optional: Configure the following Administration Server parameters:

    • Name

    • Listen address

    • Listen port

    • SSL listen port

    • SSL enabled or disabled

  10. On the Select Optional Configuration screen, select Managed Servers, Clusters and Machines to configure the managed server. For more information, see "Configure Managed Servers" in the Oracle Fusion Middleware Creating Domains Using the Configuration Wizard.

  11. Optional: Configure Clusters, as required.

    For more information about configuring clusters for Oracle Identity and Access Management products, see the "Configuring High Availability for Identity Management Components" topic in the guide Oracle Fusion Middleware High Availability Guide.

  12. Optional: Assign Managed Servers to Clusters, as required.

  13. Optional: Configure Machines, as needed. This step is useful when you want to run the Administration Server on one machine and Managed Servers on another physical machine.

    Tip:

    Before configuring a machine, use the ping command to verify whether the machine or host name is accessible.

  14. Optional: Assign the Administration Server to a machine.

  15. Optional: Select Deployments, such as applications and libraries, and Services to target them to a particular cluster or server.

  16. Optional: Configure RDBMS Security Store, as required.

  17. On the Configuration Summary screen, review the domain configuration, and click Create to start creating the domain.

A new WebLogic domain to support Oracle Adaptive Access Manager is created in the <MW_HOME>\user_projects\domains directory (on Windows). On UNIX, the domain is created in the <MW_HOME>/user_projects/domains directory.

Note:

After configuring Oracle Adaptive Access Manager in a new WebLogic administration domain, you must configure the Database Security Store. For more information, see Section 3.2.9, "Configuring Database Security Store for an Oracle Identity and Access Management Domain".

7.5 Configuring Oracle Adaptive Access Manager (Offline)

This topic describes how to configure Oracle Adaptive Access Manager (Offline) in a new WebLogic domain. It includes the following topics:

7.5.1 Components Deployed

Performing the configuration in this section deploys the following:

  • WebLogic Administration Server

  • Oracle Adaptive Access Manager (Offline) application on the Oracle Adaptive Access Manager Managed Server

7.5.2 Dependencies

The configuration in this section depends on the following:

7.5.3 Procedure

Perform the following steps to configure Oracle Adaptive Access Manager (Offline) in a new WebLogic domain:

  1. Start the Oracle Fusion Middleware Configuration Wizard by running the <IAM_Home>/common/bin/config.sh script (on UNIX), or <IAM_Home>\common\bin\config.cmd (on Windows).

    The Welcome screen of the Oracle Fusion Middleware Configuration Wizard appears.

  2. On the Welcome screen, select the Create a new WebLogic domain option. Click Next. The Select Domain Source screen appears.

  3. On the Select Domain Source screen, ensure that the Generate a domain configured automatically to support the following products: option is selected. Select Oracle Adaptive Access Manager Offline - 11.1.2.0.0 [IAM_Home].

    Note:

    When you select the Oracle Adaptive Access Manager Offline - 11.1.2.0.0 [IAM_Home] option, the following options are also selected, by default:

    • Oracle Enterprise Manager 11.1.1.0 [oracle_common]

    • Oracle Platform Security Service 11.1.1.0 [IAM_Home]

    • Oracle JRF 11.1.1.0 [oracle_common]

    Click Next. The Specify Domain Name and Location screen appears.

  4. Enter a name and a location for the domain to be created, and click Next. The Configure Administrator User Name and Password screen appears.

  5. Configure a user name and a password for the administrator. The default user name is weblogic. Click Next. The Configure Server Start Mode and JDK screen appears.

  6. Choose a JDK and Production Mode in the Configure Server Start Mode and JDK screen. Click Next. The Configure JDBC Component Schema screen is displayed.

  7. On the Configure JDBC Component Schema screen, select a component schema, such as the OAAM Offline Schema, the OPSS Schema, or the OAAM Admin MDS Schema that you want to modify. You can set values for Schema Owner, Schema Password, Database and Service, Host Name, and Port. Click Next. The Test JDBC Component Schema screen appears. After the test succeeds, click Next. The Select Optional Configuration screen appears.

  8. On the Select Optional Configuration screen, you can configure the Administration Server, Managed Servers, Clusters, Machines, Deployments and Services, and RDBMS Security Store. Select the relevant check boxes and click Next.

    • Optional: Configure the following Administration Server parameters:

      • Name

      • Listen Address

      • Listen Port

      • SSL Listen Port

      • SSL Enabled

    • Optional: Add and configure Managed Servers, as required. Note that Oracle Entitlements Server does not require a Managed Server because the application is deployed on the WebLogic Administration Server.

    • Optional: Configure Clusters, as required.

      For more information about configuring clusters for Oracle Identity and Access Management products, see the "Configuring High Availability for Identity Management Components" topic in the Oracle Fusion Middleware High Availability Guide.

    • Optional: Configure Machines, as needed. This step is useful when you want to run the Administration Server on one machine and Managed Servers on another physical machine.

      Tip:

      Before configuring a machine, use the ping command to verify whether the machine or host name is accessible.

    • Optional: Assign the Administration Server to a machine.

    • Optional: Select Deployments, such as applications and libraries, and Services to target them to a particular cluster or server.

    • Optional: Configure RDBMS Security Store Database, as required.

  9. On the Configuration Summary screen, review the domain configuration, and click Create to start creating the domain.

A new WebLogic domain to support Oracle Adaptive Access Manager (Offline) is created in the <MW_HOME>\user_projects\domains directory (on Windows). On UNIX, the domain is created in the <MW_HOME>/user_projects/domains directory.

Note:

After configuring Oracle Adaptive Access Manager (Offline) in a new WebLogic administration domain, you must configure the Database Security Store. For more information, see Section 3.2.9, "Configuring Database Security Store for an Oracle Identity and Access Management Domain".

7.6 Starting the Servers

After installing and configuring Oracle Adaptive Access Manager, you must run the Oracle WebLogic Administration Server and various Managed Servers, as described in Appendix C, "Starting the Stack". Ensure that you start the Oracle Adaptive Access Manager Administration Server before starting the Managed Servers.

7.7 Post-Installation Steps

After installing and configuring Oracle Adaptive Access Manager, you must complete the following tasks:

  1. Create Oracle WebLogic Server Users as follows:

    1. Log in to the Oracle WebLogic Administration Console for your WebLogic administration domain.

    2. Click on Security Realms, and then click on your security realm.

    3. Click the Users and Groups tab, and then click the Users tab under it.

    4. Create a user, such as user1, in the security realm.

    5. Assign the user user1 to rule administrators and environment administrators groups.

  2. Set up and back up Oracle Adaptive Access Manager Encryption Keys, as described in the "Setting Up Encryption and Database Credentials for OAAM" topic in the Oracle Fusion Middleware Administrator's Guide for Oracle Adaptive Access Manager. Ensure that you have a backup of the Oracle Adaptive Access Manager Encryption Keys; they are required if you want to re-create the Oracle Adaptive Access Manager domain.

  3. Import Snapshot of Policies as follows:

    A full snapshot of policies, dependent components and configurations is shipped with Oracle Adaptive Access Manager. The snapshot is in the oaam_base_snapshot.zip file and located in the MW_HOME/IAM_ORACLE_HOME/oaam/init directory.

    It contains the following items that must be imported into Oracle Adaptive Access Manager:

    • Challenge questions for English (United States)

      During registration, which could be enrollment, opening a new account, or another events such as a reset, the user selects different questions from a list of questions and enters answers to them. These questions, called challenge questions, are used to authenticate users.

      Questions for the languages you want to support must be in the system before users can be asked to register. These questions may also be required to log in to Oracle Adaptive Access Manager Server.

    • Entity definitions

      The actors that are tracked during authentication are called authentication entities and include user, city, device, and so on. These base entities are required to enable conditions that are used for patterns.

    • Out-of-the-box patterns

      Patterns are used by Oracle Adaptive Access Manager to either define one bucket or dynamically create buckets. Oracle Adaptive Access Manager collects data and populates these buckets with members based on pattern parameters, and rules perform risk evaluations on dynamically changing membership and distributions of the buckets.

    • Out-of-the-box configurable actions

      Configurable actions are actions that are triggered based on the result action or risk scoring or both after a checkpoint execution. The configurable actions are built using action templates.

      Note:

      If you are upgrading from Oracle Adaptive Access Manager 10.1.4.5 to Oracle Adaptive Access Manager 11g, you will see that the names and descriptions of the out-of-the-box action templates are slightly different, since the action templates in Oracle Adaptive Access Manager 11g are globalized and hence the difference.

    • Out-of-the-box policies

      Policies are designed to help evaluate and handle business activities or potentially risky activities that are encountered in day-to-day operation.

    • Any groups

      Collections of items used in rules, user groups, and action and alert groups are shipped with Oracle Adaptive Access Manager.

    Notes:

    • If you need to customize any properties, you should import the snapshot into your new test system, make the changes, export the snapshot, and import it into your new system. Alternatively you can import the snapshot on the new system and make the property changes directly, thereby eliminating the test system completely.

    For upgrading policies, components, and configurations, perform a backup, and then import the separate file. The following are available:

    • Default questions are shipped in the oaam_kba_questions_<locale>.zip files, which are located in the <MW_HOME>/<IAM_ORACLE_HOME>/oaam/init/kba_questions directory. The locale identifier <locale> specifies the language version.

    • Base policies are shipped in the oaam_sample_policies_for_uio_integration.zip file, which is located in the <MW_HOME>/<IAM_ORACLE_HOME>/oaam/init directory.

    • Configurable action templates are shipped in the OOTB_Configurable_Actions.zip file, which is located in the <MW_HOME>/<IAM_ORACLE_HOME>/oaam/init directory.

    • Base-authentication required entities are shipped in the Auth_EntityDefinition.zip file, which is located in the <MW_HOME>/<IAM_ORACLE_HOME>/oaam/init directory.

  4. Load Location Data into the Oracle Adaptive Access Manager database as follows:

    1. Configure the IP Location Loader script, as described in the topics "OAAM Command Line Interface Scripts" and "Importing IP Location Data" in the Oracle Fusion Middleware Administrator's Guide for Oracle Adaptive Access Manager.

    2. Make a copy of the sample.bharosa_location.properties file, which is located under the <MW_HOME>/<IAM_Home>/oaam/cli directory (on UNIX). On Windows, the sample.bharosa_location.properties file is located under the <MW_HOME>\<IAM_Home>\oaam\cli directory.

      Enter location data details in the location.data properties, as in the following examples:

      On Windows:

      location.data.provider=quova

      location.data.file=\\tmp\\quova\\EDITION_Gold_2008-07-22_v374.dat.gz

      location.data.ref.file=\\tmp\\quova\\EDITION_Gold_2008-07-22_v374.ref.gz

      location.data.anonymizer.file=\\tmp\\quova\\anonymizers_2008-07-09.dat.gz

      On UNIX:

      location.data.provider=quova

      location.data.file=/tmp/quova/EDITION_Gold_2008-07-22_v374.dat.gz

      location.data.ref.file=/tmp/quova/EDITION_Gold_2008-07-22_v374.ref.gz

      location.data.anonymizer.file=/tmp/quova/anonymizers_2008-07-09.dat.gz

    3. Run the loader on the command line as follows:

      On Windows: loadIPLocationData.cmd

      On UNIX: ./loadIPLocationData.sh

      Ensure that the Oracle Middleware Home (MW_HOME) environment variable is set before running the loadIPLocationData script.

7.8 Verifying the Oracle Adaptive Access Manager Installation

After completing the installation process, including post-installation steps, you can verify the installation and configuration of Oracle Adaptive Access Manager as follows:

  1. Start the Administration Server to register the newly created managed servers with the domain. To start the Administration Server, run the following command:

    • On Windows: At the command prompt, run the startWebLogic script to start the Administration Server, as in the following example:

      <MW_HOME>\user_projects\domains\base_domain\bin\startWebLogic

    • On UNIX: At the $ prompt, run the startWebLogic.sh script to start the Administration Server, as in the following example:

      <MW_HOME>/user_projects/domains/base_domain/bin/startWebLogic.sh

  2. Start the Managed Server, as described in Section 7.6, "Starting the Servers".

    Wait for the Administration Server and the Managed Server to start up.

  3. Log in to the Administration Server for Oracle Adaptive Access Manager, using the admin server username and password. Log in to the Administration Server using the following URL:

    http://<host>:<oaam_admin_server1_port>/oaam_admin

  4. Log in to the Oracle Adaptive Access Managed Server using the following URL:

    https://<host>:<oaam_server_server1_sslport>/oaam_server

7.9 Migrating Policy and Credential Stores

You begin policy and credential store migration by creating the JPS root and then you reassociate the policy and credential store with Oracle Internet Directory.

Migrating policy and credential stores involves the following steps:

  1. Creating JPS Root

  2. Reassociating the Policy and Credential Store

7.9.1 Creating JPS Root

Create the jpsroot in Oracle Internet Directory using the command line ldapadd command as shown in these steps:

  1. Create an ldif file similar to this:

    dn: cn=jpsroot_iam
    cn: jpsroot_iam_iam
    objectclass: top
    objectclass: orclcontainer
    
  2. Use ORACLE_HOME/bin/ldapadd to add these entries to Oracle Internet Directory. For example:

    ORACLE_HOME/bin/ldapadd -h oid.mycompany.com -p 389 -D cn="orcladmin" -w
    welcome1 -c -v -f jps_root.ldif
    

7.9.2 Reassociating the Policy and Credential Store

To reassociate the policy and credential store with Oracle Internet Directory, use the WLST reassociateSecurityStore command. Follow these steps:

  1. From IAMHOST1, start the wlst shell from the ORACLE_HOME/common/bin directory. For example:

    ./wlst.sh
    
  2. Connect to the WebLogic Administration Server using the wlst connect command shown below.

    connect('AdminUser',"AdminUserPassword",t3://hostname:port')
    

    For example:

    connect("weblogic_iam,"welcome1","t3://iamhost-vip.mycompany.com:7001")
    
  3. Run the reassociateSecurityStore command as shown below:

    Syntax:

    reassociateSecurityStore(domain="domainName",admin="cn=orcladmin",
    password="orclPassword",ldapurl="ldap://LDAPHOST:LDAPPORT",servertype="OID",
    jpsroot="cn=jpsRootContainer")
    

    For example:

    wls:/IAMDomain/serverConfig> reassociateSecurityStore(domain="IAMDomain",
    admin="cn=orcladmin",password="password",
    ldapurl="ldap://oid.mycompany.com:389",servertype="OID",
    jpsroot="cn=jpsroot_iam_iamhost1")
    

    The output for the command is as follows:

    {servertype=OID, jpsroot=cn=jpsroot_iam, admin=cn=orcladmin,
    domain=IAMDomain, ldapurl=ldap://oid.mycompany.com:389, password=password}
    Location changed to domainRuntime tree. This is a read-only tree with
    DomainMBean as the root.
    For more help, use help(domainRuntime)
    
    Starting Policy Store reassociation.
    LDAP server and  ServiceConfigurator setup done.
    
    Schema is seeded into LDAP server
    Data is migrated to LDAP server
    Service in LDAP server after migration has been tested to be available
    Update of jps configuration is done
    Policy Store reassociation done.
    Starting credential Store reassociation
    LDAP server and  ServiceConfigurator setup done.
    Schema is seeded into LDAP server
    Data is migrated to LDAP server
    Service in LDAP server after migration has been tested to be available
    Update of jps configuration is done
    Credential Store reassociation done
    Jps Configuration has been changed. Please restart the server.
    
  4. Restart the Administration Server after the command completes successfully. For information about restarting the Administration Server, see Appendix C, "Starting the Stack".

7.10 Getting Started with Oracle Adaptive Access Manager After Installation

After installing Oracle Adaptive Access Manager, refer to the Oracle Fusion Middleware Administrator's Guide for Oracle Adaptive Access Manager.