Index
A B C D E F G H I L M N O P Q R S T U V W
A
- AAA Server
-
- see Access Server
- aaa_mon.exe, F.4.2
- About page, 1.3.5
- Access Manager
-
- SDK, configuring, 7.9
- Access Manager SDK, 7.9
-
- formerly named Access Server SDK, Preface
- Access Server, 1.2.1
-
- AAA Server configuration option
- auditing, 9.1
- cache flush, caveat, 8.1.1
- cache updates, 7.8.6, 7.8.6
- changing the security password, 8.7
- changing to Cert mode, 8.3.4
- changing to Open mode, 8.3.2
- changing to Simple mode, 8.3.3
- changing transport security modes for, 8.3
- configureAAAServer tool, 7.5.5.3, 8.7
- file-based auditing for, 11.5
- location for user and configuration data, 7.5
- logging, 10.1
- reconfiguring after setting up Policy Manager, 7.5.5.3
- setting up redirect URLs for account locout, 7.8.5.3
- SNMP monitoring of, 12.2
- transport security for, 8.1.1
- Access Server SDK
-
- now named Access Manager SDK, Preface
- Access System
-
- changing to Open security mode, 8.3.2
- changing to Simple transport security, 8.3.3
- changing transport security modes for, 8.3
- log in, 1.3.1.2
- transport security for, 8.1.1, 8.1.1
- AccessGate
-
- changing transport security modes for, 8.3
- logging, 10.1
- transport security for, 8.1.1
- Active Directory, 7.5.6.1
-
- Access Server with LDAP, C.3
- ADSI configuration with Oracle Access Manager, B.1
- authentication, A.2
- authorization, A.2
- backward compatibility, A.6
- configuring with LDAP, C
- credential_mapping plug-in, A.3
- defining directory server profiles, A.1.1
- deleting a disjoint searchbase, A.1.2.1
- deploying with, A
- disjoint searchbases for, A.1.2
- group-search read operations, A.1.3
- increasing the length of the SAM account name, Preface
- LDAP authentication with ADSI, C.5
- Microsoft Global Catalog, C.1
- .NET features, A.7
- ObMyGroups action attribute, A.2.3
- parent-child authentication, A.2.1
- parent-child authorization, A.2.2
- Policy Manager setup with LDAP, C.2
- required schema modifications, 3.8
- setting up profiles and searchbases, A.1
- timeouts for LDAP, C.4
- troubleshooting, A.8
- what's new in this release, Preface
- administration
-
- preparing for, 1
- administrators
-
- about Identity administrators, 2.1
- administrators with access to all attributes, 4.4.8
- configuring, 2, 2.2
- delegated administration
-
- adding delegated administrators, 2.3.3
- configuring, task overview, 2.3.1
- models of, 2.3.2
- delegated administrators, 2.3
- Delegated Identity Administrators, 2.1, 2.1
- deleting administrators, 2.2.1
- Identity System, 2
- Master Administrators, 2.1, 2.1
- Master Identity Administrators, 2.1, 2.1
- substitute administrators, 2.3.4
-
- assuming another administrator's identity, 2.3.4
- temporarily granting your rights to another person, 2.3.4
- ADSI, 7.5.6.1
-
- bind mechanisms for the Access Server, B.3.1
- bind mechanisms for the Identity Server, B.2.3
- configuration files, B.2.4, B.3.2
- configuration for Access System, B.3
- configuring for, B
- configuring for the Access System, B.7
- configuring for the Identity System, B.4
- mixed ADSI and LDAP configuration, B.2.2
- pageSize parameter, B.8
- troubleshooting, B.9
- Anonymous access, 4.4.4
- ANR, D.1
- attributes
-
- class attribute, 3.2
-
- selecting, 3.3.1
- class attributes for template object classes, 3.3.1
- configuring, 3.6.1, 3.8
- configuring lists of radio buttons, check boxes, and so on, 3.8.1
- configuring lists of values using directory queries (filters), 3.8.1
- data types, 3.6.2
-
- binary, 3.6.2
- distinguished name, 3.6.2
- integer, 3.6.2
- postal address, 3.6.2
- string, 3.6.2
- telephone, 3.6.2
- derived
-
- about, 3.9
- adding to a User Manager tab, 3.9.2
- caveats, 3.9
- example of, 3.9.1
- display names, localing, 3.8.2
- display types, 3.6.4
-
- boolean, 3.6.4
- check box, 3.6.4
- date, 3.6.4
- email, 3.6.4
- filter builder, 3.6.4
- GIF image, 3.6.4
- GIF image URL, 3.6.4
- location, 3.6.4
- media, 3.6.4
- multi-line text, 3.6.4
- None, 3.6.4
- numeric string, 3.6.4
- object selector, 3.6.4
- postal address, 3.6.4
- radio button, 3.6.4
- selection menu, 3.6.4
- single line text, 3.6.4
- S/MIME certificate, 3.6.4
- filters to use with searches, 3.8.4
- giving users access to the class attribute, 3.3.1
- how used in Identity applications, 3.1
- lists, defining, 3.8.1.2
- localizing, 3.8.2
- password, 3.6.3.5
- provisioning (template) attributes, 3.1.5
- rules for static lists of attributes, defining, 3.8.1.1
- search
-
- attribute used as the key in searches, 3.2
- based on finding the same value in different attributes, 3.9
- dynamic, 3.8.7.5
- dynamic with multiple values, 3.8.7.7
- dynamic with wild cards, 3.8.7.6
- returning results that match an attribute on a profile page, 3.8.7.5
- returning targets that match the DN of the logged-in user, 3.8.7.4
- search key (class) attribute, 3.2
- selecting what can be searched, 4.2.4
- selection keys, 4.4.10
- semantic types, 3.6.3
-
- challenge, 3.6.3.5
- defined during setup, 3.6.3.1
- DN prefix, 3.6.3.1
- full name, 3.6.3.1, 3.6.3.2
- Group Dynamic Member, 3.6.3.3
- Group Owner, 3.6.3.3
- Group Static Member, 3.6.3.3
- location coordinates, 3.6.3.4
- login, 3.6.3.1
- lost passwords, attributes for managing, 3.6.3.5
- map, 3.6.3.6
- none, 3.6.3.6
- password, 3.6.3.1
- photo, 3.6.3.2
- preferred email address, 3.6.3.6
- response, 3.6.3.5
- title, 3.6.3.2
- used in Group Manager, 3.6.3.3
- used in profile pages, 3.6.3.2
- template attributes, 3.1.5
- viewing, 3.7
- auditing, 11
-
- about, 11.1
- actions Identity applications, 4.7
- audit database, about, 11.4.5
- audit database, creating, 11.6.1.2
- audit database, setting up, 11.6.1
- audit reports, setting up, 11.7, 11.7
- authentication events, 7.8.2.2
- connecting Access and Identity Servers to the database, 11.6.1.5
- Crystal Reports, 11.2.4
- Crystal Reports templates, using, 11.7
- Crystal repository, 11.4.6
- database auditing architecture, 11.4
- database auditing requirements, 11.3.2
- database auditing, setting up, 11.6
- diagnostics, 11.2.6
- diagnostics, on-screen, 11.2.6
- dynamic, 11.2.4
- enabling for Access Servers, 11.2.6
- enabling on Identity Servers, 11.2.6
- file vs database auditing, 11.2
- file-based, setting up, 11.5
- formatting, 11.2.6
- Global User Access Privilege Report, 11.2.6
- GUI location for auditing functions, 11.2.6
- Identity events to be audited, 11.2.6
- master audit rule, 11.2.6
- new features, Preface
- OCI connection type, 11.4.4.2
- ODBC data source definitions, 11.4.2
- ODBC drivers, 11.4.3
- Oracle Database as the audit repository, Preface
- output type and amount, 11.2.5
- performance considerations, 11.2.2
- policy information, 11.2.3
- profile information, 11.2.3
- RDBMS profile configuration, 11.4.4
- RDBMS profiles for, 11.2.6
- RDMBS profiles for, 11.2.6
- reports, types of, 11.4.6.1
- requirements for, 11.3.1
- security considerations, 11.2.1
- SQL Server, installing, 11.6.1.1
- static reports, 11.2.3
- success and failure of Identity System actions, 11.2.6
- authentication, Preface
-
- auditing authentication events, 7.8.2.2, 11.4.6.1
- Fast Bind for, 7.5.6.1
- for ADSI, B.7, C.5
- for transport security, 7.4.2, 7.7.2
- monitoring authentication actions, 12.3.3
- monitoring authentication plug-ins, 12.3.3, 12.3.3
- not required for self-registration, 5.10
- plug-in APIs, Preface
- reports on authentication attempts, 9.1.2
- scheme
-
- default schemes, Preface
- scheme for disjoint searchbases, 7.5.8, 7.5.8
- schemes, modifying to include a password policy, 7.8.4.1
- with Active Directory, A.2
- authorization, Preface, Preface
-
- auditing authorization events, 11.4.6.1
- authorization plug-ins MIB objects, 12.3.3
- AzMan plug-in, D.8
- for ADSI, C.5
- monitoring authorization events, 12.3.3
- monitoring authorization plug-ins, 12.3.3
- plug-in APIs, Preface
- with Active Directory, A.2
- auxiliary object classes
-
- adding to a tab, 4.2.6
B
- backURL, 7.8.5.1, 7.8.5.2
C
- CA certificates
-
- importing multiple, 8.6
- security
-
- CA certificates, 8.1.2
- cache
-
- Access cache flush, caveat, 8.1.1
- Access Server cache updates, 7.8.6
- managing Identity Server caches, 7.3.4
- Cert mode
-
- about, 8.1
- changing the Access System to, 8.3.4
- installing a certificate for, 8.2.3
- cert7.db, 8.1
- cert8.db, 8.1
- certificates
-
- installing, 8.2.3
- challenge attribute, 7.8.3.5
- challenge phrase
-
- deleting, 7.8.3.5
- change attribute workflow, 5.1.6
- cloning, 7.10
- components
-
- copying, 7.10
- configuration data
-
- pointing to a new directory server, 7.5.6
- profile for storing, 7.5.1
- configureAAAServer command, 8.3.2, 8.3.3
- configureAAAServer tool, 8.1
- configureAccessGate, 8.3.3
- core dump, F.4, F.4.4
- COREid
-
- now named Oracle Access Manager, Preface
- crash, F.4.4
- create group workflow, 5.1.6
- create object workflow, 5.1.6
- create user workflow, 5.1.6
D
- data types, 3.6.2
-
- binary, 3.6.2
- distinguished name, 3.6.2
- integer, 3.6.2
- postal address, 3.6.2
- string, 3.6.2
- telephone, 3.6.2
- data, exporting
-
- see exporting data
- database instance
-
- adding, 7.5.6
- configuring, 7.5.6.1
- deleting, 7.5.7
- for an LDAP profile, 7.5.6
- for an RDBMS profile, 7.5.6
- deactivate user workflow, 5.1.6
- delegated administration
-
- adding delegated administrators, 2.3.3
- ASP model, 2.3.2.3
- extranet model, 2.3.2.1
- intranet model, 2.3.2.2
- models of, 2.3.2
- what can be delegated, 2.3.1
- Delegated Identity Administrators
-
- see also delegated administration
- definition, 2.1
- tasks performed by, 2.1
- delete group workflow, 5.1.6
- delete object workflow, 5.1.6
- derived attributes
-
- see also attributes, derived
- diagnostics, F.4.2
-
- about capturing, F.4
- collecting in the log files, 10.8.1
- manually recording a stack trace, F.4.5, F.4.5
- stack traces, F.4.4
- tools for running, F.4.2
- directory server profile
-
- creating, 7.5.2
- database instance, configuring, 7.5.6.1
- deleting a database instance from, 7.5.7
- modifying, 7.5.4
- re-running setup after modifying, 7.5.5
- sharing profiles, 8.1.1
- viewing, 7.5.3
- directory servers
-
- profiles for, 7.5.1
- transport security changes for, 8.4
- transport security for, 8.1.1
- working with multiple searchbases, 7.5.8
- disjoint searchbases, 7.5.8
- display types
-
- boolean, 3.6.4
- check box, 3.6.4
- date, 3.6.4
- email, 3.6.4
- filter builder, 3.6.4
- GIF image, 3.6.4
- GIF image URL, 3.6.4
- location, 3.6.4
- media, 3.6.4
- multi-line text, 3.6.4
- None, 3.6.4
- numeric string, 3.6.4
- object selector, 3.6.4, 3.8.3
- password, 3.6.4
- postal address, 3.6.4
- radio button, 3.6.4
- selection menu, 3.6.4
- single line text, 3.6.4
- S/MIME certificate, 3.6.4
- DIT
-
- nonoverlapping directory trees, 7.5.8
- searching multiple branches of, 7.5.8
E
- email
-
- setting addresses for user feedback, 7.3.2
- exporting data
-
- see also object templates
- about, 3.1.1, 6
- IdentityXML actions, 6.2
- limitations of, 5.3
- object templates, 6.1
- using a workflow, 6.2
F
- failover, 7.6.1
- Fast Bind, 7.5.6.1
- features
-
- new, Preface
- filters
-
- see LDAP filters
- static LDAP, 3.8.7.1
- static with wild cards, 3.8.7.2
- usage, 3.8.7
- full name, 3.6.3.2
G
- genCert utility, 8.1.2, 8.3.3
- GIF
-
- data type, 3.6.2
- display type, 3.6.2, 3.6.4
-
- for photos, 4.5.1.1
- display type, configuring, 3.8.8
- files in the Chystal Repository database, 11.4.2
- image, referencing in a file system, 4.5.1.2
- image, used in a location map in a workflow, 5.11
- images used in the Identity System u.i., 7.1
- location coordinates semantic type, 3.6.3.4
- semantic type, 3.6.3.2
- semantic type for, 3.6.3.6
- tab image, 4.2.1
- title image, 4.3.4.3
- globalization
-
- see also localization
- support for, Preface
- Group Manager
-
- ability to create groups, 4.5.3
- about, 4.1
- adding auxiliary object classes, 4.2.6
- adding derived attributes to, 3.9.2
- allowing users to view and modify data, 4.4.8
- class attribute, 3.3.1
- configuring, 4.2.8
- configuring multiple languages for, 7.2
- configuring objects for, 3.1
- configuring search fields for, 4.2.4
- configuring what is returned on a search, 4.2.5
- configuring, about, 4
- controlling read access to an object class via a class attribute, 3.3.1
- displaying configured object classes, 3.1.4
- Dynamic Members Only, 4.6.5
- expanding a dynamic group, 4.9.1
- Group Manager Configuration tab, 4.2
- group type panels, 4.3.6
- localizing, 4.2.2
- My Groups, 4.2.8
- My Groups tab, 4.2, 4.3.6
- objects configured during installation, 3.1.3
- only one tab for, 4.2.1
- panels, 4.3
-
- configuring, 4.3.4
- deleting, 4.3.4
- localizing, 4.3.8
- ordering, 4.3.5
- viewing, 4.3.3
- performance consideration, 4, 4.4, 4.4.6, 4.6, 4.6.1
- profile pages, 4.3
- reports, 4.8.1
- search
-
- starting point for searches in the DIT, 4.4
- sending data to back-end systems, 6.1
- subscribing to groups, 4.6.6
- supported workflow types, 5.1.8
- tabs
-
- configuring, 4.2
- modifying, 4.2.1
- viewing, 4.2.1
- View Member Profiles, 4.2.8
- workflow types for, 5.1.8
- groups, 4.6.5
-
- ability to create, 4.5.3
- adding members, 4.6.4
- change attribute, 5.1.10
- configuring legacy groups, Preface, 4.5.4
- create group, 5.1.10
- customize using URL parameters, 4.2.8
- delete group, 5.1.10
- deleting members, 4.6.3
- dynamic, 4.2.8, 4.9.1
- dynamic members, showing, 4.2.8
- expanding a dynamic group, 4.9.1
- finding, 4.6.2
- Group Manager application, 1.2.1
- group type panels, 4.3.6
- mail server for notifications, 7.3.3
- managed in the Group Manager, 1.2.1
- managed in the Identity System, 1.2
- managing, 4.6.1
- managing large groups, 4, 4.4, 4.4.6, 4.6, 4.6.1
- membership determined by an LDAP filter, 4.9.1
- nested, 4.2.8
- nested members, showing, 4.2.8
- static, 4.2.8
- static members, showing, 4.2.8
- subscribing to, 4.6.5, 4.6.6
- you are a member of, 4.2.8
- you are an administrator of, 4.2.8
H
- header panels, 4.3.2
- help, 1.3.4
I
- Identity applications
-
- see User Manager
- about, 1.2.1.2
- configuration, examples of, 4.5
- configuring
-
- see objects and attributes
- example of configuring, 4.5
- purpose of, 1.2.1.2
- tabs, 4.2, 4.2.1
-
- modifying, 4.2.1
- Identity Server
-
- adding, 7.4.2
- auditing, 9.1
- auditing, configuration, 11.6.2
- cache flush caveat, 8.1.1
- caches, 7.3.4
- configuration, 7.3
- definition, 1.2.1
- deleting parameters, 7.4.4
- email address for feedback, setting, 7.3.2
- Group Manager application, 1.2.1
- installation, 1.2.1.1
- logging, 10.1
- mail server alerts, configuring, 7.3.3
- managing, 7.4
- managing from the command line, 7.4.5
- modifying, 7.4.3
- modifying settings, 7.3
- multiple, setting up, 7.4.1
- Organization Manager application, 1.2.1
- session timeout setting, 7.3.1
- settings, configuring, 7.3
- SNMP monitoring of, 12.2
- timeout threshold, 7.7.5.4
- transport security
-
- changing, 8.2
- User Manager application, 1.2.1
- viewing, 7.4.3
- viewing settings, 7.3
- WebPass connections
-
- limiting connection attempts, 7.7.5.4
- WebPass plug-in, 1.2.1
- who configures, 2.1
- Identity System
-
- administration, about, 1.2
- administrators, 2
- ADSI configuration, B.2
- components, 1.2.1
- configuration, about, 1.2
- configuration, overview, 1.2.1.2
- configuring, Preface
- configuring the Access Manager SDK, 7.9
- configuring, about, 1.2.1.2
- Identity Server, 1.2.1
- installation summary, 1.2.1.1
- login, 1.3.1.1
- managing, about, 1.2.1.3
- transport security
-
- changing, 8.2
- transport security for, 8.1.1, 8.1.1
- WebPass, 1.2.1
- impersonation
-
- enabling, D.4
- installation, 7.10
L
- languages
-
- see localization
- LDAP
-
- data
-
- configuring for Oracle Access Manager, 3
- process overview, 3.1.2
- read and write access to, 4.4.8
- viewing on a profile page, 3.1
- filters
-
- advanced, 4.4.7
- for searches, 4.4.6
- query builder, 4.4.6
- objects in a workflow, 5.1.7
- objects, on a panel, 4.3.1
- profiles, 7.5.1
- redirecting client requests, 7.5.6.1
- referrals, 7.5.6.1, 7.5.6.1
- lists
-
- about, 3.8.1
- defining, 3.8.1.2
- localization, 3.8.2
-
- about, 7.2
- attribute display names, 4.3.8
- enabling languages, 7.3.5
- language evaluation order, 7.2.2
- managing multiple languages, 7.3.5
- of administrative pages, 7.2.1
- of panels, 4.3.4
- of search results, 4.2.5
- overview, 7.2
- panel display names, 4.3.7
- reports, 4.8.2
- tabs, 4.2.2
- log out
-
- from the Identity System, 1.3.6.1
- Logging
-
- log level, 10.4.4
- logging
-
- about, 10.1
- activating a log-handler, 10.4.4
- automatic updates, Preface, Preface, Preface, Preface, Preface, Preface, Preface, Preface
- autosync, 10.5
- autosync parameter, 10.4.3
- Buffer_Size, 10.6
- configuration file, 10.2
-
- comments in, 10.2.2.2
- modifying, 10.2.2
- names, 10.2.1
- order of elements, 10.4.6
- order of evaluation of entries, 10.5.1
- parameters, 10.6
- structure, 10.4
- configuration file structure, 10.4, 10.4
- configuring in the Identity System Console, 10.4.3, 10.7
- default configuration file, 10.2.2.2, 10.2.2.2
- default log configuration file, 10.6.1
- default settings for logs, 10.6.1
- directing log output, 10.4.4
- File_Name, 10.6
- FileLogWriter, 10.3
- global log level threshold, 10.4.3
- levels, 10.5
- ListName, 10.6
- log configuration file path, 10.2.1
- log file buffer size, 10.4.4
- log file name, 10.4.4
- log file rotation, 10.4.4
- log levels, about, 10.1
- log levels, setting a level for each module, 10.8
- log levels, table of, 10.1.1
- log output destinations, 10.3
- log writer, 10.4.4
- log writers, 10.3
- Log_Level, 10.6
- Log_Status, 10.5, 10.6
- Log_Threshold_Level, 10.5
- Log_Writer, 10.6
- Max_Rotation_Size, 10.6
- Max_Rotation_Time, 10.6
- MODULE_CONFIG section, 10.8.1
- modules within a log file, 10.8.1.2
- MPFileLogWriter, 10.3
- new features in this release, Preface, Preface, Preface, Preface
- order of elements in the configuration file, 10.4.6
- output, where sent, 10.3
- per-module thresholds, 10.8
- per-module thresholds, configuring, 10.8.2
- request processing time, logs of, 10.9
- sending log data to multiple destinations, 10.3
- SNMP, 12.8
- stack traces in log files, 10.1.2
- sychronizing the configuration file and the Identity System Console settings, 10.5
- SysLogWriter, 10.3
- system log on Solaris and Linux, 10.6.1
- system log on Windows, 10.6.1
- thresholds, 10.8.1
- timing of requests, 10.9.3
- what's new in this release, Preface, Preface, Preface
- when a server restart is needed, 10.2.2.1
- where log data is sent, 10.3
- xmlns, 10.6
- login, 1.3.1, 1.3.1
-
- to the Access System, 1.3.1.2
- to the Identity System, 1.3.1.1
- logout, 1.3.6
- lost password management
-
- about, 7.8.3
- challenge phrases and responses, 7.8
- configuring, 7.8.3.5
- deleting challenge phrases, 7.8.3.5
- enabling, 7.8.3.5
- new features in this release, Preface
- overview of configuring, 7.8.3
- presenting multiple challenges phrases, 7.8.3.2
- redirection to a password reset page, 7.8.5.1
- redirection URL, 7.8.2.2
- semantic types for challenge and response, 3.6.3.5
- stylesheets for lost password management, 7.8.2.3
- stylesheets for password reset pages, 7.8
- URL, syntax, 7.8.3.1
- viewing policies for, 7.8.3.5
M
- managing subscriptions, 4.6.5
- Master Administrator
-
- definition, 2.1
- tasks performed by, 2.1
- Master Identity Administrators
-
- definition, 2.1
- tasks performed by, 2.1
- MODULE_CONFIG section, 10.8.1
- monitoring
-
- see SNMP
- MTHML, 7.3.3
- My Groups, 4.2.8
N
- name changes, Preface
- names, new, Preface
- .NET, A.7
-
- about, D
- adding attributes dynamically, D.2.1
- adding attributes for a group, D.2.2
- ambiguous names, resolving, D.1
- ANR, D.1
- dynamically linked auxiliary classes, D.2
- enabling Fast Bind, D.3
- enabling impersonation, D.4
- Integrated Windows Authentication, D.5
- integrating the Security Connector for ASP.NET, D.10
- integration with AzMan, D.8
- integration with Smart Card authentication, D.9
- managed code and helper classes, D.7
- Microsoft Resources, D.12
- troubleshooting, D.11
- with Access System password management, D.6
- NetPoint
-
- now named Oracle Access Manager, Preface
- NetPoint SAML Services
-
- now named Oracle Identity Federation, Preface
- new features
-
- auditing to Oracle Database, Preface
- logging, Preface, Preface, Preface, Preface
- new features in this release, Preface, Preface
- Novell Directory Server
-
- requirements for configuration, 3.8
O
- object class kind, 3.2
- object class type, 3.2
- Object Class(es) field, 4.2.1
- object classes
-
- about, 3.1
- auxiliary, 3.1.4
- structural, 3.1.4
- template object classes, 3.1.5
- Object Selector display type
-
- search filters for, 3.8.3
- object templates
-
- see also template objects
- configuration, 6.5
- elements in the file, 6.5.3
- file, example of, 6.5.3
- file, format of, 6.5.1
- object template file, 6.5.1
- objects
-
- see also object classes
- adding object classes, 3.4
- attribute used as the key in searches, 3.2
- auxiliary object classes, 3.1.4, 3.4.1
- changing the structural object class, 3.3.2
- class attribute, 3.2
-
- selecting, 3.3.1
- class attributes, about, 3.6
- class kind, 3.2
- class type, 3.2
- class types, 3.1.6
- configured at installation, 3.1.3
- defaults configured at installation, 3.1.3
- deleting object classes, 3.5
- displayed on profile pages, 3.1
- enabling users to view and modify, about, 3
- generic, 3.1.6
- group, 3.1.6
- in a workflow, 5.1.7
- inheritance of, 3.1.4
- location, 3.1.6
- mix-in, 3.1.4
- modifying, 3.3
- object templates, 6.1
- person, 3.1.6
- process for configuring, 3.1.2
- template object classes, 3.1.5
- template objects, 3.1.1
-
- note about modifying, 6.2
- template objects, about, 6
- template objects, how used in the Identity System, 3.1.5
- used for provisioning, 3.1.1
- viewing, 3.2
- oblixAdvancedGroup, 4.6.5
- oblixpppcatalog.lst, 5.5.3.6
- obtaining information from the Identity Server, 1.2.1
- ois_cert.pem, 8.1.2
- ois_chain.pem, 8.1.2
- ois_key.pem, 8.1.2
- ois_mon.exe, F.4.2
- Open mode
-
- about, 8.1
- Oracle Access Manager
-
- formerly NetPoint or COREid, Preface
- introduction, Preface, 1.3
- Oracle Identity Federation, Preface
-
- formerly SHAREid, Preface
- Oracle Virtual Directory Server, 7.5.2
- Org. Manager
-
- about, 4.1
- adding auxiliary object classes, 4.2.6
- adding derived attributes to, 3.9.2
- adding tabs to, 4.2.3
- allowing users to view and modify data, 4.4.8
- arbitrary tabs in, 4.2
- change attribute, 5.1.10
- class attribute, 3.3.1
- configuring at least one panel for, Preface, Preface
- configuring multiple languages for, 7.2
- configuring objects for, 3.1
- configuring search fields for, 4.2.4
- configuring what is returned on a search, 4.2.5
- configuring, about, 4
- container limits, 4.9.4
- container limits, deleting, 4.9.4.2
- controlling read access to an object class via a class attribute, 3.3.1
- copying container limits across domains, 4.9.4.1
- create object, 5.1.10
- definition, 1.2.1
- delete object, 5.1.10
- deleting a tab, 4.2.9
- displaying configured object classes, 3.1.4
- header panels, 4.3.2
- localizing, 4.2.2
- location tab, 4.5.2
- modifying a container limit, 4.9.4.2
- multiple tabs for, 4.2.1
- objects configured during installation, 3.1.3
- ordering a tab, 4.2.10
- Org. Manager Configuration tab, 4.2
- panels
-
- configuring, 4.3.4
- deleting, 4.3.4
- localizing, 4.3.8
- viewing, 4.3.3
- reports, 4.8.1
- search
-
- starting point for searches in the DIT, 4.4
- sending data to back-end systems, 6.1
- supported workflow types, 5.1.8
- tabs, 3.1.4
-
- configuring, 4.2
- modifying, 4.2.1
- viewing, 4.2.1
- workflow types for, 5.1.8
- out of office flag, 5.5.4
P
- panels, 4.3.4
-
- about, 4.3
- adding, 4.3.4
- deleting, 4.3.4
- group type panels, 4.3.6
-
- adding, localizing, modifying , deleting, 4.3.7
- modifying, 4.3.4
- ordering, 4.3.5
- using objects on a panel, 4.3.1
- viewing, 4.3.3
- parameter files, E
-
- about, E
- password policies
-
- see passwords
- passwords, 3.6.4
-
- see also lost password management
- challenge phrases, deleting, 7.8.3.5
- changing the Access Server password, 8.7
- configuring, 7.8.2
- configuring policies for, about, 7.8
- expiration notification, 7.3.3
- for Access Server security, 8.7
- for transport security, changing, 8.5
- Global Pass Phrase, 8.2.2
- lost password management
-
- new features, Preface
- lost password management attributes, 7.8.3.5
- new features in this release, Preface
- notification of expiration, 7.3.3
- order of password policy evaluation, 7.8.1
- password policies
-
- account lockout duration, 7.8.2.3
- account lockout URL, 7.8.2.3
- applying to resources that the Access System protects, 7.8.4
- configuring the default policy, 7.8.2.2
- creating, 7.8.2.3
- custom account lockout redirect URL, 7.8.2.2
- defaults for, 7.8.2.2
- deleting, 7.8.2.5
- enabling, 7.8.2.3
- expiry notification, 7.8.2.3
- expiry warning URL, 7.8.2.3
- externally provided validation rules, 7.8.2.3
- for a specific domain, 7.8.2.3
- forcing a change after an administrator reset, 7.8.2.3
- implementing in the Access System, 7.8.4
- including in an authentication scheme, 7.8.4.1
- lost password redirect URL, 7.8.2.2
- minimum age, 7.8.2.3
- minimum length, 7.8.2.3
- minimum number of numeric or nonalphanumeric characters, 7.8.2.3
- minimum number of upper or lowercase characters, 7.8.2.3
- modifying, 7.8.2.4
- new in this release, Preface
- number of allowed login attempts, 7.8.2.3
- password change redirect URL, 7.8.2.2
- password expiration warning URL, 7.8.2.2
- password history, 7.8.2.3
- restricting to a domain, 7.8.2.3
- stylesheets for the lost password notification page, 7.8.2.3
- stylesheets for the password reset page, 7.8.2.3
- successful authentication events, 7.8.2.2
- unsuccessful authentication events, 7.8.2.2
- validity period, 7.8.2.3
- viewing, 7.8.2.1
- Password semantic type, 3.6.3, 3.6.3.1, 6.5.2
- password.xml, 8.3.3
- required semantic type for the person object class, 3.6.3.1
- semantic types for lost password management, 3.6.3.5
- Sun iPlanet restrictions, 5.10
- transport security passwords, 8.5
- PEM files, 8.1.2
- performance, 4, 4.4, 4.4.6, 4.6, 4.6.1
-
- processing times for requests, 10.9
- photos
-
- default image, 4.5.1.3
- displaying in user profiles, 4.5.1
- importing to the directory, 4.5.1.1
- referencing in a file system, 4.5.1.2
- plug-ins
-
- for Active Directory, A.3
- logging, 10.1
- policy data
-
- profile for storing, 7.5.1
- policy domain
-
- default, Preface
- Policy Manager
-
- changing to Cert mode, 8.3.4
- changing to Open mode., 8.3.2
- changing to Simple mode, 8.3.3
- location for configuration and user data, 7.5
- logging, 10.1
- transport security for, 8.1.1
- Policy Manager API, Preface
- preparing for administration, 1
- Procedure
-
- Access Manager SDK
-
- To configure the Access Manager SDK, 7.9
- Access System
-
- To configure the Access System to work with a disjoint searchbase, 7.5.8
- Active Directory
-
- To add a disjoint searchbase for the Disjoint_domain (AD), A.1.2
- To configure group-search read opertaions on Windows 2003, A.1.3
- To configure SSO with the Identity or Access System (AD), A.4
- To configure the credential_mapping plug-in (AD), A.3
- To enable LDAP authentication for the Access Server, C.5
- To set up additional directory server profiles, A.1.1
- To set up additional directory server profiles (AD), A.1.1
- To set up the Access Server for Active Directory, C.3
- To set up the Policy Manager for Active Directory, C.2
- To specify Access Server failover after installation, C.4
- administrators
-
- To assign or remove a substitute, 2.3.4
- To assume an identity, 2.3.4
- To delegate administration, 2.3.3
- To delete an administrator, 2.2.1
- To revert to your own identity, 2.3.4
- To specify Master Administrators and Master Identity Administrators, 2.2
- ADSI
-
- To associate an ADSI agent with every domain, B.2.2
- To enable ADSI for additional directory profiles, B.6
- To enable LDAP authentication for the Access Server, B.7
- auditing
-
- To modify an existing audit schema, 11.6.1.3
- audits, logs, and reports
-
- To add an SNMP Manager directly after general parameters, 12.6
- To add an SNMP trap destination in silent mode, 12.6
- To add or delete a log-handler definition, 10.7, 10.7
- To add or delete log-handler definitions, 10.7
- To change the formatting of a report, 4.8.1
- To configure a collection of SNMP statistics, 12.5
- To configure a report, 4.8.1
- To configure collection of SNMP statistics, 12.5, 12.5
- To configure file-based auditing for an Access Server, 11.5
- To configure file-based auditing for an Identity Server, 11.5
- To configure general parameters first, 12.6
- To configure the SNMP Agent and trap destinations, 12.6, 12.6
- To connect Crystal Reports to the audit database, 11.7
- To copy the audit schema to the audit database host, 11.6.1.4
- To copy the Oracle Access Manager-specific Crystal resources, 11.7
- To create a primary RDBMS instance, 11.6.1.5
- To create an ODBC data source definition (Windows), 11.6.1.5
- To create an ODBC data source definition to connect Crystal Reports to the Oracle/Crystal Repository, 11.7
- To create an RDBMS profile, 11.6.1.5
- To create and manage user access privilege reports, 11.6.2
- To create the audit database (Oracle Database on Linux), 11.6.1.2
- To create the audit database (Oracle Database on Windows), 11.6.1.2
- To create the audit database (SQL Server or Windows), 11.6.1.2
- To delete an SNMP Manager directly after adding one, 12.6
- To delete an SNMP trap destination in silent mode, 12.6
- To delete reports, 4.8.2
- To edit orMap.ini, 11.7
- To enable and configure auditing for each Access Server, 11.6.2
- To enable and configure auditing for each Identity Server, 11.6.2
- To install Crystal Reports, 11.7
- To install the patch for Crystal Reports, 11.7
- To localize reports, 4.8.2
- To make the RDBMS profile visible (Linux), 11.6.1.5
- To make the RDBMS profile visible (Windows), 11.6.1.5
- To modify audit output formatting for the Access System, 11.6.2
- To modify audit output formatting for the Identity System, 11.6.2
- To modify the log threshold from the Identity System Console, 10.7, 10.7, 10.7, 10.7
- To set or modify auditing policies, 4.7.2
- To specify global Identity System events and profile attributes for audit, 11.6.2
- To specify User, Group, or Org. Manager events for audit, 11.6.2
- To upload and verify the audit schema (Oracle Database on Windows or Linux, 11.6.1.4, 11.6.1.4
- To upload the audit schema (SQL Server on Windows), 11.6.1.4, 11.6.1.4
- To verify that all Identity Servers can record data to the audit database (supported Unix platforms), 11.6.2
- To verify that all Identity Servers can record data to the audit database (Windows), 11.6.2
- To verify the audit schema (SQL Server on Windows), 11.6.1.4
- To view auditing policies, 4.7.1
- To view or modify log-handler definitions, 10.7, 10.7, 10.7, 10.7
- To view or modify reports, 4.8.2
- basics
-
- To log in to the Access System, 1.3.1.2
- To log in to the Identity System, 1.3.1.1
- To use the Query Builder, 4.4.6
- To use the search function, 1.3.2.2
- diagnostics
-
- To collect diagnostic information, F.4.2
- To retrieve the name of a diagnostic object, F.4.2
- To view a list of supported diagnostic operations, F.4.2
- directory
-
- To configure the Access System to work with a disjoint searchbase, 7.5.8
- To configure the Identity System to work with a disjoint searchbase, 7.5.8
- disagnostics
-
- To manually request a stack trace, F.4.5
- Identity applications
-
- To add a derived attribute to an application tab, 3.9.2
- To add a disjoint searchbase for a disjoint domain, 4.4.5
- To add a tab, 4.2.3
- To add an auxiliary or template object class to a tab, 4.2.6
- To add group members, 4.6.4
- To add, modify, or delete a Group Type panel, 4.3.7
- To build a complex filter, 4.4.7
- To change the formatting of a report, 4.8.1
- To change the order in which panels are displayed, 4.3.5
- To configure a report, 4.8.1
- To configure photos for importing to a directory, 4.5.1.1
- To configure the header panel, 4.3.2
- To copy container limits from one domain to another, 4.9.4.1
- To create or add a panel, 4.3.4.3
- To create, view, and modify localized tab configuration, 4.2.2
- To delete a container limit, 4.9.4.2
- To delete a disjoint searchbase, 4.4.5
- To delete a tab, 4.2.9
- To delete group members, 4.6.3
- To delete reports, 4.8.2
- To expand a dynamic group, 4.9.1
- To import photos to the directory, 4.5.1.1
- To localize a panel, 4.3.4.4
- To localize attribute display names, 4.3.8
- To localize panel display names, 4.3.7
- To localize reports, 4.8.2
- To localize search results, 4.2.5
- To modify a container limit, 4.9.4.2
- To modify attributes specific to the User, Group, or Org. Manager, 4.3.8
- To order the tabs in the Organization Manager, 4.2.10
- To reference photos that reside in a file system, 4.5.1.2
- To select what users see in My Groups and View Member Profiles, 4.2.8
- To set or modify attribute permissions, 4.4.9
- To set or modify auditing policies, 4.7.2
- To set the globalparams.xml file, 4.9.2
- To set the searchbase, 4.4.4
- To specify what attribute can be used in a search, 4.2.4
- To subscribe to a group, 4.6.6
- To subscribe to multiple groups, 4.6.6
- To use the Query Builder, 4.4.6
- To view a group, 4.6.2
- To view a panel in an end user Identity System application, 4.3.3
- To view and add container limits, 4.9.4
- To view auditing policies, 4.7.1
- To view group members, 4.6.2
- To view Group Type panels, 4.3.6
- To view or modify a panel's configuration, 4.3.4.4
- To view or modify reports, 4.8.2
- To view or modify tab configuration information, 4.2.1
- To view the search result attributes, 4.2.5
- Identity System
-
- To change a style, 7.1.5
- To change a style name, 7.1.4
- To configure the Identity System to work with a disjoint searchbase, 7.5.8
- To delete a custom style, 7.1.6
- To deploy a style, 7.1.3
- To set the default style, 7.1.7
- To view currently configured styles, 7.1.1
- logging
-
- To configure a module-specific log threshold, 10.8.2
- To log the timing of external requests, 10.9.3
- .NET
-
- To add attributes to a Group Profile panel, D.2.2
- To configure ANR in Identity System panels, D.1.2.2
- To configure the Access System to use Fast Bind, D.3
- To create an IWA authentication scheme in the Access System, D.5.3
- To enable IWA on the machine hosting the WebGate, D.5.1
- To modify an AccessGate through the Access System Console, D.5.2
- To specify additional auxiliary object classes in the User Manager, D.2.1
- To test IWA, D.5.4
- To update configuration data, D.1.2.1
- To use ANR in a search, D.1.2.4
- objects
-
- To add a derived attribute to an application tab, 3.9.2
- To add an object class, 3.4
- To change user or group structural object classes, 3.3.2
- To configure a derived attribute, 3.9.1
- To configure a GIF image display type, 3.8.8
- To configure an attribute, 3.8
- To create a filter, 3.8.4
- To create a static filter, 3.8.7.1
- To create a static search filter using a wild card, 3.8.7.2
- To create, view, or modify localized attribute display names, 3.8.2
- To define a list, 3.8.1.2
- To define a rule, 3.8.1.1
- To delete an auxiliary object class, 3.5
- To modify an object class type, 3.3
- To select the class attribute, 3.3.1
- To view an application-specific Modify Attribute page, 3.7
- To view configured object classes, 3.2
- To view the Modify Attribute page from the System Console, 3.7
- passwords, 7.8.2.5
-
- To configure lost password management for a password policy domain, 7.8.3.5
- To configure the Lost Password Management attributes, 7.8.3.5
- To create the default password policy, 7.8.2.2
- To enable or disable Lost Password Management, 7.8.3.5
- To enter a password change redirect URL, 7.8.5.1
- To modify a password policy's parameters, 7.8.2.4
- To modify an authentication scheme to include a password policy, 7.8.4.1
- To set up a default password expiry warning redirect URL, 7.8.5.2
- To set up the account lockout URL, 7.8.5.3
- To view a list of password policies, 7.8.2.1
- To view lost password policies, 7.8.3.5
- servers
-
- To add a style, 7.1.2
- To add or modify a database instance for an LDAP directory server profile, 7.5.6.1
- To add or modify a database instance for an RDBMS profile, 7.6.2
- To add or modify an RDBMS profile, 7.6.1
- To change a style, 7.1.5
- To change a style name, 7.1.4
- To configure a mail server, 7.3.3
- To configure the length of a user's Identity System session, 7.3.1
- To create a directory server profile, 7.5.2
- To customize email destinations, 7.3.2
- To delete a custom style, 7.1.6
- To delete a directory server instance for an LDAP directory server profile, 7.5.7
- To delete an Identity Server's parameters, 7.4.4
- To deploy a style, 7.1.3
- To manage a language, 7.3.5
- To modify an LDAP Directory Server Profile, 7.5.4
- To reconfigure the Access Server, 7.5.5.3
- To rerun Identity System setup, 7.5.5.1
- To rerun Policy Manager setup, 7.5.5.2
- To set the default style, 7.1.7
- To view an LDAP directory server profile, 7.5.3
- To view currently configured styles, 7.1.1
- To view Identity System details, 7.3.4
- To view or modify an Identity Server's parameters, 7.4.3
- To view or modify server settings, 7.3
- transport security
-
- To change the certificate password for the Access System, 8.5
- To change the certificate password for the Identity System, 8.5
- To change the Identity Server transport security mode, 8.2
- To change the transport security mode password, 8.7
- To change to Cert security mode, 8.3.4
- To change to Open security mode, 8.3.2
- To change to Simple security mode, 8.3.3
- To change transport security between Access Server and the directory server, 8.4
- To change transport security between the Identity Server and directory server, 8.4
- To change transport security to SSL between Policy Manager and the directory server, 8.4
- To install the signed certificate for Cert mode, 8.3.4
- troubleshooting
-
- To collect diagnostic information, F.4.2
- To manually request a stack trace, F.4.5
- To retrieve the name of a diagnostic object, F.4.2
- To view a list of supported diagnostic operations, F.4.2
- WebPass
-
- To add a WebPass, 7.7.2
- To change the transport security mode password, 7.7.4
- To disassociate an Identity Server from a WebPass, 7.7.6
- To modify a WebPass, 7.7.2
- To modify a WebPass through the command line, 7.7.4
- To reconfigure transport security mode through the command line, 7.7.4
- To remove a WebPass, 7.7.3
- To update the WebPass poll tracking refresh parameter, 7.7.7
- To view a configured WebPass, 7.7.1
- workflows
-
- To access the Workflow Definition applet, 5.3
- To add roles to a workflow definition, 5.9.4
- To allow a user to perform an asynchronous operation, 5.6
- To archive a workflow, 5.7.6
- To associate a subflow with a workflow, 5.4.1
- To associate an Out of Office attribute with a semantic type, 5.5.4
- To begin a new workflow definition, 5.3.1
- To configure a role, 5.9.4
- To configure email notification for workflow steps, 5.5.2
- To configure language-specific workflow panel information, 5.8.8
- To configure workflow attribute properties, 5.3.4
- To copy a workflow as a starting point for a new workflow, 5.8.2
- To copy a workflow as an alternative to modifying it, 5.8.2
- To create a self-registration workflow, 5.10
- To create a subflow, 5.4
- To create this (example) workflow, 5.3.9
- To define a self-registration workflow using the QuickStart tool, 5.2.1
- To define a workflow target, 5.3.2
- To define a workflow using the QuickStart tool, 5.2
- To define subsequent steps in a workflow, 5.3.5
- To define the first step in a workflow, 5.3.3
- To delete a workflow, 5.8.4
- To delete requests, 5.7.7
- To enable a workflow, 5.3.7
- To enable time-based escallation, 5.5.5
- To export workflows, 5.8.5
- To find a workflow ticket, 5.7.2
- To invoke a change attribute workflow, 5.7.1
- To lock or unlock a ticket, 5.7.8
- To make use of the Out of Office flag, 5.5.4
- To modify a workflow, 5.8.3
- To modify a workflow panel, 5.8.7
- To modify oblixpppcatalog.lst, 5.5.3.6
- To modify the workflow parameter files, 5.5.5
- To monitor a workflow, 5.7.5
- To preload the User, Group, and Organization Managers, 5.6.1
- To prepare a workflow step for dynamic participants, 5.5.3.6
- To process a workflow ticket, 5.7.2
- To reactivate a deactivated user, 5.7.4
- To run a workflow in Group Manager, 5.3.8
- To select attributes available for a workflow step, 5.3.4
- To specify a surrogate, 5.5.4
- To test a workflow, 5.3.8
- To view and export a workflow summary, 5.8.1
- To view current workflow panel settings, 5.8.6
- To view language-specific workflow panel information, 5.8.8
- Process overview
-
- A Create User workflow example, 5.1.12
- Creating and using a Create User workflow, 5.1.6.2
- Using IWA authentication, D.5
- profile pages, 4.3
Q
- Query Builder
-
- about, 4.4.6
- advanced filters, 4.4.7
- QuickStart tool, 5.2, 5.2
-
- example, 5.2.1
R
- RDBMS profile
-
- adding, 7.6.1, 7.6.1
- database instance for, 7.6.2
- database instance for, adding, 7.6.2
- modifying, 7.6.1
- reactivate user workflow, 5.1.6
- read permission, 4.4
- realms, 7.5.8
- reporting, 9
-
- see also SNMP
- reports
-
- attributes not viewable via an Identity application, 4.8
- ResourceFilterSerachScope, 4.9.2
- response attribute, 7.8.3.5
- rules
-
- about, 3.8.1
- defining, 3.8.1.1
- usage, 3.8.7
S
- SAMAccountName, Preface, A.6
- schema data
-
- configuring, 3.1.2
- search, 1.3.2.2
-
- see also attributes, search
- aggregating search results, 1.3.3
- basic, 1.3.2.2
- changing the scope of a search, 4.9.2
- defining search filters, 3.8.4
- filters, 4.4.6
-
- dynamic, 3.8.7.5
- dynamic with multiple values, 3.8.7.7
- dynamic with wild cards, 3.8.7.6
- for Object Selector display type, 3.8.3
- static, 3.8.7.1
- static with multiple targets, 3.8.7.3
- static with wild cards, 3.8.7.2
- substitution syntax, 3.8.7.4
- finding data not viewable in an Identity application, 4.8
- finding users at the same level of the DIT as the logged in user, 3.8.7.4
- for group members, 4.6.2
- for multiple branches of the DIT, 4.4.5
- for multiple targets, 3.8.5, 3.8.7.3
- levels of the DIT to search, 4.9.2
- number of levels of the DIT to include, 4.9.2
- results, localizing, 4.2.5
- returning results that match an attribute on a profile page, 3.8.7.5
- scope, 4.9.2
- search results attributes, 4.2.5
- search results, configuring, 4.2.5
- searchbase
-
- about, 4.4.1
- guidelines for setting, 4.4.2
- setting, 4.4.4
- selecting items returned on a search, 1.3.3
- selecting what attributes are returned, 4.2.5
- setting the searchbase, 4.4.2
- substitution syntax for, 3.8.7.4
- via the selector, 1.3.3
- working with multiple search bases, 7.5.8
- searchbase
-
- about, 4.4.1
- configuring multiple searchbases, Preface
- deleting, A.1.2.1
- disjoint, 4.4.5
- disjoint searchbases for Active Directory, A.1.2
- for multiple branches of the DIT, 4.4.5
- guidelines for setting, 4.4.2
- multiple, Preface
- setting, 4.4.4
- setting for a group, 4.4.4.1
- security
-
- see also transport security
- Selector, 3.8.3
- self registration, 4.4.4
- self registration workflow, 5.1.6
- semantic type
-
- challenge, 3.6.3.5
- full name, 3.6.3.1
- group dynamic member, 3.6.3.3
- group owner, 3.6.3.3
- group static member, 3.6.3.3
- login, 3.6.3.1
- map, 3.6.3.6
- none, 3.6.3.6
- password, 3.6.3.1
- photo, 3.6.3.2
- preferred email address, 3.6.3.6
- response, 3.6.3.5
- title, 3.6.3.2
- session timeout, 7.3.1
- setup
-
- re-running manually, 7.5.5
- setup_accessmanager, 8.1
- setup_ois, 8.1
- setup_ois command, 8.2.2
- setup_ois utility, 8.2.3
- SHAREid
-
- now named Oracle Identity Federation, Preface
- Simple mode
-
- about, 8.1
- single sign-on
-
- configuring for Active Directory, A.4
- see also the Oracle Access Manager Access Administration Guide
-
- single sign-on
- SMTP server configuration, 7.3.3
- SNMP, 12
-
- about SNMP monitoring, 12.2
- Access Server MIB objects, 12.3.3
- Access Server traps, 12.3.3
- Access System Directory Server MIB objects, 12.3.3
- agent, about, 12.2.1
- agents, destinations for, 12.6
- authentication plug-ins MIB objects, 12.3.3
- configuration settings, 12.7
- configuring, 12.5
- data, destinations for, 12.6
- destinations for agents and traps, 12.6
- disabling monitoring, 12.5
- enabling monitoring, 12.5
- event traps, 12.2
- Identity Event API MIB objects, 12.3.2
- Identity Server MIB Objects, 12.3.2
- Identity Server traps, 12.3.2
- Identity System directory MIB objects, 12.3.2
- logging for, 12.8
- Management Information Base, 12.3
- messages, 12.9
- MIB hierarcy, illustration of, 12.3
- MIB index fields, 12.3.1
- monitoring, disabling, 12.5
- monitoring, enabling, 12.5
- Netstat vs SNMP values, 12.10
- network management station, 12.1
- NMS, use in SNMP monitoring, 12.1
- number of live connections, 12.10
- obscoreboard_params.xml, 12.7
- Oracle Access Manager MIB, 12.3
- polling, 12.2
- polling interval, 12.5
- prerequisites, 12.1
- request queue MIB objects, 12.3.3
- shutdown interval, 12.11
- statistics, collecting, 12.5
- traps, 12.2
- traps, destinations for, 12.6
- version supported, 12.2
- stack trace, F.4
-
- requesting manually, F.4.5, F.4.5
- stack traces, 10.1.2, F.4.4
- styles
-
- adding, 7.1.2
- adding a custom style directory, 7.1.2
- changing, 7.1.4
- configuring, 7.1
- configuring for multiple languages, 7.1.2
- deleting, 7.1.6
- deploying, 7.1.3
- directories for styles, 7.1.2
- setting the default, 7.1.7
- viewing, 7.1.1
- subflows
-
- about, 5.1.12
- subscriptions
-
- enabling legacy groups to accept, Preface, 4.5.4
- substitution syntax, 3.8.7.4, 5.3.2
- synchronization, 7.10
T
- Tab Filter field, 4.2.1
- tabs, 1.3.2.1, 3.1.4
-
- adding auxiliary and template object classes, 4.2.6
- adding to Org. Manager, 4.2.3
- configuring, 4.2
- deleting, 4.2.9
- localizing, 4.2.2
- modifying, 4.2.1
- Object Class(es) configuration field, 4.2.1
- ordering, 4.2.10
- panels, configuring, 4.3
- profile pages, configuring, 4.3
- searching, 4.2.4
- tab filter field, 4.2.1
- viewing, 4.2.1
- Task overview
-
- Assigning dynamic participants to a workflow step, 5.5.3.6
- Configuring a legacy group to support subscriptions, 4.5.4
- Configuring ADSI for the Access System, B.7
- Configuring ADSI for the Identity System, B.4
- Configuring multi-language functionality, 7.2
- Creating a plug-in or application to select dynamic participants, 5.5.3.6
- Creating a workflow definition, 5.1.5
- Defining a Create Location workflow, 5.11
- Defining a workflow using the workflow applet, 5.3
- Delegating administrators, 2.3.1
- Displaying information on an application, 4.1
- Enabling database auditing, 11.6
- Enabling Location functionality, 4.5.2
- Enabling Location functionality and users, 5.11
- Enabling Oracle Access Manager servers to connect to the audit database, 11.6.1.5
- Enabling surrogates, 5.5.4
- Preparing for the audit database, 11.6.1
- Preparing to use ANR during searches, D.1.2
- Setting up an RDBMS profile, 11.6.1.5
- Setting up for dynamix auxiliary classes, D.2
- Setting up IWA authentication, D.5
- Setting up multiple Identity Servers, 7.4.1
- To configure auditing, 11.6.2
- To connect Crystal Reports to the Oracle Repository, 11.7
- To create a secondary RDBMS instance, 11.6.1.5
- To set up audit reports, 11.7
- Uploading the audit schema, 11.6.1.4
- template attributes
-
- in a workflow, 5.1.7
- template objects
-
- about, 3.1.1
- classes
-
- adding to a tab, 4.2.6
- how viewed in the Identity System, 6.5.2
- note about modifying, 6.2
- used in workflows, 6.4
- used on a panel, 4.3.1
- timeout
-
- enforcing, 7.7.5.4
- To delete a password policy, 7.8.2.5
- To set the globalparams.xml file, 4.9.2
- transport security
-
- about, 8.1
- changing for the Access Server, 8.3
- changing for the AccessGate, 8.3
- changing for the Identity Server, 8.2
- changing for the WebPass, 8.2
- changing to Cert for the Access System, 8.3.4
- changing to Cert mode, 8.2.3
- changing to Open mode for the Access System, 8.3.2
- changing to Simple for the Access System, 8.3.3
- changing to Simple mode, 8.2.2
- passwords, 8.5
- PEM files, 8.1.2
- setting between components, 8.1.1
- specifying during installation, 8.1
- troubleshooting, F, F
-
- capturing diagnostic information, F.4
- diagnostic tools, F.4.2
- stack traces, 10.1.2
- typical problems in Oracle Access Manager, F
- tuning
-
- processing times for requests, 10.9
U
- user data
-
- profile for storing, 7.5.1
- user interface, 1.3.2
-
- customizing, 7.1
- navigation elements, 1.3.2
- styles
-
- see also styles
- viewing, 7.1.1
- User Manager
-
- about, 4.1
- adding auxiliary object classes, 4.2.6
- adding derived attributes to, 3.9.2
- allowing users to view and modify data, 4.4.8
- class attribute, 3.3.1
- configuring multiple languages for, 7.2
- configuring objects for, 3.1
- configuring search fields for, 4.2.4
- configuring what is returned on a search, 4.2.5
- configuring, about, 4
- controlling read access to an object class via a class attribute, 3.3.1
- definition of, 1.2.1
- displaying configured object classes, 3.1.4
- header panels, 4.3.2
- localizing, 4.2.2
- My Identity tab, 4.2
- objects configured during installation, 3.1.3
- only one tab for, 4.2.1
- panels
-
- configuring, 4.3.4
- deleting, 4.3.4
- localizing, 4.3.8
- viewing, 4.3.3
- profile pages, 4.3
- reports, 4.8.1
- sample profile page, 3.1
- search
-
- starting point for searches in the DIT, 4.4
- sending data to back-end systems, 6.1
- supported workflow types, 5.1.8
- tabs
-
- configuring, 4.2
- modifying, 4.2.1
- viewing, 4.2.1
- User Manager Configuration tab, 4.2
- workflow example for, 5.1.2, 5.1.2, 5.1.2, 5.1.6.2
- workflow types for, 5.1.8
- User Manger
-
- panels, 4.3
- users
-
- adding
-
- at the same level of the DIT as the logged in user, Preface, Preface, Preface, 3.8.7.4, 5.3.2
- dynamically, Preface, Preface, Preface, 3.8.7.4, 5.3.2
- via substitution syntax, 5.3.2
- administrative, 2
- authentication of, Preface
- authorization of, Preface
- change attribute, 5.1.10
- configuring data that users see, 3
- create, 5.1.10
- delete, 5.1.10, 5.1.10
- group membership in Group Manager, 1.2.1
- Identity System sessions, 7.3.1
- information typically displayed about a user, 3.1.2
- LDAP attribute permissions, 4.4.9
- mail server for notifications, 7.3.3
- managing via User Manager, 1.2.1
- modify permissions, 4.4, 4.4.9
- permissions, 4.4, 4.4.9
- person object class type, 3.1.6
- reactivate, 5.1.10
- read and write permissions, 1.2, 4.4, 4.4.9
- self-registration, 1.2, 5.2.1
- session timeout, 7.3.1
- user applications, 4
- view permissions, 4.2.1, 4.4, 4.4.9
V
- VDS, 7.5.2
- View Member Profiles, 4.2.8
W
- WebGate
-
- and session timeouts, 7.3.1
- certificate request for, 8.1.2
- changing to Cert mode, 8.3.4
- changing to Open mode, 8.3.2
- changing to Simple mode, 8.3.3
- logging, 10.1
- WebPass
-
- adding, 7.7.2
- associating with an Identity Server, 7.7.5
- configuring, 7.7
- definition, 1.2.1
- deleting, 7.7.3
- disassociating from an Identity Server, 7.7.6
- Identity Server
-
- limiting attempts to connect to, 7.7.5.4
- install after the Identity Server, 7.7
- logging, 10.1
- modifying, 7.7.2
- modifying from the command line, 7.7.4
- setup_webpass command, 7.7.4
- transport security
-
- changing, 8.2
- viewing, 7.7.1
- viewing associations with Identity Servers, 7.7.5.1
- who configures, 2.1
- what's new in this release, Preface, Preface
- workflows
-
- about, 5.1
- actions
-
- change attribute, 5.1.10, 5.1.10, 5.1.10
- create group, 5.1.10
- create object, 5.1.10
- create user, 5.1.10
- delete group, 5.1.10
- delete object, 5.1.10
- delete user, 5.1.10, 5.1.10
- reactivate user, 5.1.10
- actions you can perform in a step, 5.1.11
- actions, about, 5.1.8, 5.1.9
- adding roles to, 5.9.4
- Anyone role, 5.9.4
- application for selecting participants, 5.5.3.6
- archiving requests, 5.7.6
- asynchronous operations, 5.6
- committing data via, 5.3.6
- copying, 5.8.2
- creating a location workflow, 5.11
- deactivating and reactivating users, 5.7.3
- defining, 5.3.1
- defining a target, 5.3.2
- deleting, 5.8.4
- dynamic participants, 5.1.3, 5.5.3, 5.5.3.3
-
- overview of assigning, 5.5.3.6
- dynamically assigning users to locations in the DIT, Preface
- enabling, 5.3.7
- end use of, 5.7
- entry conditions, 5.1.9
- escallation of, 5.5.5
- example of, 5.1.12
- example of creating, 5.3.8
- example of defining, 5.3.9
- examples of, 5.1.2
- exporting, 5.8.5
- external actions, 5.9.2
- finding and processing a ticket, 5.7.2
- how users access workflows, 5.1.6
- illustration of create user workflow, 5.1.4
- invoking, 5.7.1
- localizing, 5.8.8
- locking a ticket, 5.7.8
- mail server for ticket processing, 7.3.3
- modifying the appearance of workflow panels, 5.8.7
- monitoring, 5.7.5
- notifications, 5.1.9
- notifying step participants, 5.5.2
- Out of Office attribute, 5.5.4
- out of office flag, 5.5.4
- overview of creating, 5.1.5
- participants, 5.1.9
- performance of, 5.8.9
- picking a DIT location for the object being created, 5.3.2
- plug-ins for selecting participants, 5.5.3.6
- pre- and post- actions, 5.9.1
- pre and post processing, 5.1.9
- QuickStart tool, 5.2
- self-registration, 5.2.1
-
- mail notification, 5.1.11
- self-registration, creating, 5.10
- sending workflow data to back-end systems, 3.1.5
- starting a defintion, 5.3.1
- static participants, 5.5.3.1, 5.5.3.4
- step actions, 5.1.10
- step actions, about, 5.1.9
- steps, 5.3.5
-
- attributes, 5.3.4
- committing, 5.3.6
- steps, about, 5.1.8, 5.1.9
- subflows, 5.4
- subflows, about, 5.1.3, 5.1.12
- subflows, approving, 5.4.2
- subflows, associating with a workflow step, 5.4.1
- summary reports, exporting, 5.8.1
- summary reports, viewing, 5.8.1
- surrogate participants, 5.1.3
- surrogate participants, about, 5.5.4
- surrogates in, 5.5.4
- target, 5.3.2
- targets, 5.1.9
- template objects in, 3.1.5
- testing, 5.3.8
- ticket routing, 5.5.3.2
- tickets, about, 5.1.6.1
- tickets, advanced routing, 5.5
- time-based escallation, 5.5.5
- type of workflows, 5.1.8
- types
-
- change attribute, 5.1.6
- create group, 5.1.6
- create object, 5.1.6
- create user, 5.1.6
- deactivate user, 5.1.6
- delete group, 5.1.6
- delete object, 5.1.6
- reactivate user, 5.1.6
- self-registration, 5.1.6
- types of, 5.1.4
- use of template objects in, 6.3
- using the workflow applet, 5.3
- viewing workflow panel settings, 5.8.6
- who initiates, 5.1.1
- write permission, 4.4