Using the procedure described in this chapter, you can protect Oracle Identity Navigator with Oracle Access Manager using a WebGate agent.
The procedure uses an Oracle Internet Directory authenticator to enable Oracle WebLogic Server to assert the subject set by Oracle Access Manager.
This is a specific example of Oracle Access Manager used to protect URLs. Although it outlines the general approach for this type of configuration, you are not limited to using the exact steps and components used here. For example, Oracle Internet Directory is one of several identity stores certified with Oracle Access Manager 11g.
In Release 220.127.116.11.0, Oracle Identity Navigator is protected by the domain agent out-of-the-box. In earlier releases, this was not the case; manual configuration was required to protected the URLs.
This chapter contains this section:
You can use Oracle Access Manager to SSO-enable the Oracle Identity Navigator Administration Console using the Kerberos authentication scheme with Windows Native Authentication (WNA) as the challenge method.
The prerequisites are as follows:
When installing Oracle HTTP Server, uncheck Oracle WebCache and associated selected components with WebLogic domain.
Oracle Access Manager 11g has been installed and configured properly.
Oracle HTTP Server 11g has been installed and configured as a front-ending proxy web server for Oracle Identity Navigator.
Oracle Access Manager 11g webgate for Oracle HTTP Server 11g has been installed on the Oracle HTTP Server 11g.
Oracle Fusion Middleware Installation Guide for Oracle Identity and Access Management for details about installation of the listed components. The following sections are of specific interest:
Installing and Configuring Only Oracle Identity Navigator
Installing and Configuring Only Oracle Access Manager
The high-level SSO-enablement steps are as follows:
Use the Oracle Access Manager Administration Console to configure a new resource for the agent under which the Oracle Identity Navigator URL is to be protected.
Configure Oracle HTTP Server to point to the Oracle Access Manager domain which has the resources and policies configured.
Use the Administration Console to add the two new identity providers, namely the Oracle Access Manager Identity Asserter and the Oracle Internet Directory Authenticator.
Use Oracle Directory Services Manager (ODSM) to grant administrator privileges to the login user.
These steps are detailed in subsequent sub-sections.
At the Oracle Access Manager console:
Select the Policy Configuration tab.
Under Application Domains, select the agent under which the Oracle Identity Navigator URL is to be protected (for example, -OIMDomain).
Choose Resources and click the create icon to add a new resource. Enter the type, host identifier and value, (/oinav/…/*) and click the Apply button.
Choose Protected Policy or the policy whose authentication schema is the LDAP schema. In the resources table, click the add icon and choose the Oracle Identity Navigator URL (/oinav/…/*) from the drop-down list.
Repeat the step for Authorization Policy.
Take these steps to ensure that Oracle HTTP Server points to the Oracle Access Manager domain where the resources and policies are configured:
Navigate to the Oracle HTTP Server server config directory, for example,
/scratch/mydir1/oracle/product/11.1.1/as_1/instances/instance1/config/OHS/ohs1), and find the
<IfModule mod_weblogic.c> block, add the host and the port number of the Oracle Identity Navigator URL to be protected. For example:
MatchExpression /oinav* WebLogicHost=host WebLogicPort=port
Restart the Oracle HTTP Server server in the OHS install
bin directory, for example,
/scratch/mydir1/oracle/product/11.1.1/as_1/instances/instance1/bin) by executing the following command:
-./opmnctl restartproc ias=component=ohs1
Take these steps to add two new identity providers and grant administrator privileges to the login user:
Using the Administration Console, navigate to Security Realms, then myreleam, then Providers.
Add these two providers: OAM Identity Asserter and OID Authenticator.
Set the Control Flag of the OAM Identity Asserter to
Update the following settings in the OID Authenticator:
Set the Control Flag to
Select the Provider specific tab and make the necessary changes, supplying the host, port, and other credentials of the Oracle Internet Directory server. Configure the correct LDAP setting in the OID Authenticator.
The users and Groups in the LDAP will be reflected in the console.
Use Oracle Directory Services Manager (ODSM) to give the administrator privilege to the login user:
Create a user in the LDAP server that is associated with Oracle Access Manager, for example:
Create an Administrators group in the LDAP directory, namely
Assign the Administrators role to the user,
testuser, by adding the user to the Administrator group.
You can now test an SSO by this user to Oracle Identity Navigator.
Re-order the providers as follows:
Default Identity Asserter
Restart Oracle WebLogic Server.
Enter the protected Oracle Identity Navigator URL, which will have the host and port from the Oracle HTTP Server install: