Skip Headers
Oracle® Fusion Middleware Integration Guide for Oracle Access Manager
11g Release 1 (11.1.1)

Part Number E15740-07
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Master Index
Master Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
PDF · Mobi · ePub

3 Integrating with Oracle Identity Navigator

This chapter describes how Oracle Access Manager integrates with Oracle Identity Navigator.

Using the procedure described in this chapter, you can protect Oracle Identity Navigator with Oracle Access Manager using a WebGate agent.

The procedure uses an Oracle Internet Directory authenticator to enable Oracle WebLogic Server to assert the subject set by Oracle Access Manager.

Note:

This is a specific example of Oracle Access Manager used to protect URLs. Although it outlines the general approach for this type of configuration, you are not limited to using the exact steps and components used here. For example, Oracle Internet Directory is one of several identity stores certified with Oracle Access Manager 11g.

Note:

In Release 11.1.1.5.0, Oracle Identity Navigator is protected by the domain agent out-of-the-box. In earlier releases, this was not the case; manual configuration was required to protected the URLs.

This chapter contains this section:

3.1 Enabling Single Sign-On

You can use Oracle Access Manager to SSO-enable the Oracle Identity Navigator Administration Console using the Kerberos authentication scheme with Windows Native Authentication (WNA) as the challenge method.

The prerequisites are as follows:

See Also:

Oracle Fusion Middleware Installation Guide for Oracle Identity and Access Management for details about installation of the listed components. The following sections are of specific interest:

  • Installing and Configuring Only Oracle Identity Navigator

  • Installing and Configuring Only Oracle Access Manager

The high-level SSO-enablement steps are as follows:

These steps are detailed in subsequent sub-sections.

3.1.1 Configure a New Resource for the Agent

At the Oracle Access Manager console:

  1. Select the Policy Configuration tab.

  2. Under Application Domains, select the agent under which the Oracle Identity Navigator URL is to be protected (for example, -OIMDomain).

  3. Choose Resources and click the create icon to add a new resource. Enter the type, host identifier and value, (/oinav/…/*) and click the Apply button.

  4. Choose Protected Policy or the policy whose authentication schema is the LDAP schema. In the resources table, click the add icon and choose the Oracle Identity Navigator URL (/oinav/…/*) from the drop-down list.

  5. Repeat the step for Authorization Policy.

3.1.2 Configure Oracle HTTP Server for the Oracle Access Manager Domain

Take these steps to ensure that Oracle HTTP Server points to the Oracle Access Manager domain where the resources and policies are configured:

  1. Navigate to the Oracle HTTP Server server config directory, for example, /scratch/mydir1/oracle/product/11.1.1/as_1/instances/instance1/config/OHS/ohs1), and find the mod_wl_ohs.conf file.

  2. In the <IfModule mod_weblogic.c> block, add the host and the port number of the Oracle Identity Navigator URL to be protected. For example:

    MatchExpression /oinav* WebLogicHost=host WebLogicPort=port
    
  3. Restart the Oracle HTTP Server server in the OHS install bin directory, for example, /scratch/mydir1/oracle/product/11.1.1/as_1/instances/instance1/bin) by executing the following command:

    -./opmnctl restartproc ias=component=ohs1
    

3.1.3 Add New Identity Providers

Take these steps to add two new identity providers and grant administrator privileges to the login user:

  1. Using the Administration Console, navigate to Security Realms, then myreleam, then Providers.

  2. Add these two providers: OAM Identity Asserter and OID Authenticator.

  3. Set the Control Flag of the OAM Identity Asserter to Required

  4. Update the following settings in the OID Authenticator:

    • Set the Control Flag to Sufficient

    • Select the Provider specific tab and make the necessary changes, supplying the host, port, and other credentials of the Oracle Internet Directory server. Configure the correct LDAP setting in the OID Authenticator.

    The users and Groups in the LDAP will be reflected in the console.

  5. Use Oracle Directory Services Manager (ODSM) to give the administrator privilege to the login user:

    1. Create a user in the LDAP server that is associated with Oracle Access Manager, for example: uid=testuser,cn=users,dc=us,dc=oracle,dc=com

    2. Create an Administrators group in the LDAP directory, namely cn=Administrators,cn=groups,dc=us,dc=oracle,dc=com

    3. Assign the Administrators role to the user, testuser, by adding the user to the Administrator group.

    4. You can now test an SSO by this user to Oracle Identity Navigator.

  6. Re-order the providers as follows:

    1. OAMIdentityAsserter

    2. Authenticator

    3. Default Authenticator

    4. Default Identity Asserter

  7. Restart Oracle WebLogic Server.

  8. Enter the protected Oracle Identity Navigator URL, which will have the host and port from the Oracle HTTP Server install:

    http://OHSHost:OHSPort/oinav/faces/idmNag.jspx