Skip Headers
Oracle® Access Manager Integration Guide
10g (10.1.4.2)

Part Number E10356-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Feedback page
Contact Us

Go to previous page
Previous
View PDF

Index

A  C  D  E  F  H  I  K  L  M  N  O  P  R  S  T  U  V  W 

A

access control
and Windows Impersonation, 20.2
Access Control Lists and Entries, 20.7.3
Access Manager SDK
formerly named Access Server SDK, Preface
Access Server SDK
now named Access Manager SDK, Preface
Access Tokens, 20.7.1
AccessGate, 10.2
actions
in federated authorization, 5.2
Active Directory
and impersonation, 20.6
configuring a trusted user for impersonation, 20.3.3
configuring impersonation for services, 20.1
return attributes to set for impersonation, 20.3.5
Anonymous authentication scheme
use in federated authorization, 5.4.2
Apache, Preface, 2, 4.1.5
Apache WebGate, Preface
ASP.NET
about, 18
and OAM role-based authorization, 18.10
authorization with the security connector, 18.7
environment setup, 18.8.1
integration requirements, 18.3.4
IPrincipal.IsInRole method, 18.3
OblixHttpModule, 18.6
OblixPrincipal object, 18.6.1
security connector for, about, 18.4
Security Connector, using, 18.8
security principals and identifiers, 18.2
setting up the ASP.NET application, 18.9
setting up the OAM role action, 18.9.1
attribute sharing
plug-in, 5.2, 5.2
AUTH_PASSWORD, 20.5
AUTH_TYPE, 20.5, 20.6.4
AUTH_USER, 20.5
authentication
scheme
default schemes, Preface
authentication scheme
for attribute sharing, 5.4
for federated single sign-on, 5.4
authorization
and Windows impersonation, 20.2
schemes for attribute sharing, 5.5
schemes, for federated single sign-on, 5.5
Authorization Manager Services
see AzMan
authorization plug-in
cache, 5.3.1, 5.5
Authorization Success, 20.6.4
AzMan
about, 19, 19.4
about the integration, 19
applications and scopes, 19.4.2
authentication rules and schemes for, 19.3.1
authorization process overview, 19.2
authorization stores, 19.4.1
Oracle Access Manager requirements, 19.3

C

cache
authorization plug-in, 5.3.1, 5.5
session token, 5.3.4
CMS
about, 21
completing the integration, 21.4.5
impersonation setup, 21.4.4
installing Microsoft components, 21.4.2
installing Oracle Access manager components, 21.4.1
integration process overview, 21.3
Microsoft components, 21.2.3
Oracle Access Manager components, 21.2.2
supported platforms, 21.2
task overview of the integration, 21.4
testing the integration, 21.4.6
Windows impersonation, 21.1.1
config.xml, 5.2, 5.3.1
Content Management Server
see CMS
COREid
now named Oracle Access Manager, Preface

D

Delegated Administration Service, 4.2.2
Delegated Administration Service (DAS), 4.2.2

E

Enabling Impersonation, 16, 20
With a Header Variable, 20.3
with a User Name and Password, 20.5

F

features
new, Preface
federation, Preface
about, 5.1
form-based authentication
about, A
for Oracle AS SSO, 4.6
forms90.conf, 4.2.4

H

header variables
for impersonation, 20.3
httpd.conf, 4.1.5

I

Identity Provider, 5.2
Identity System
SSO logout for, A.2
IMPERSONATE, 20.6.4
impersonation, 20.1
about, 20.1
action in a policy domain, 20.3.5
and third-party products, 20.4
attacks, 5.3.1
creating an Impersonator as a Trusted User, 20.3.2
Domino, 1.1.2, 16, 16.1
enabling, 20
enabling with a header variable, 20.3
enabling with user name and password, 20.5
for OWA, 20.6
impersonator as a trusted user, 20.3.2
requirements for, 20.3.1
testing, 20.3.8
Windows impersonation, about, 20.7

K

Kerberos Protocol, 20.7.5

L

login
form-based, 4.2.4
login semantic type, 4.2.9
login URL, protecting, 4.2.9
OracleAS SSO login page, 4.6
LOGON_PASSWORD, 20.5
LOGON_USER, 20.5
logout
configuring, A
custom logout pages, A.3
from OracleAS SSO and the Access Server, 4.2.7
how it works, A.2
logout URL, 4.2.7, A.2
logout.jsp for OracleAS SSO, 4.5.2
Lotus Domino, 16.1
about, 16

M

MediumSecurity_AuthPlugin, 4.2.1.1

N

name changes, Preface
names, new, Preface
NetPoint
now named Oracle Access Manager, Preface
NetPoint SAML Services
now named Oracle Identity Federation, Preface
NPUSERNAME, 20.6.4

O

OC4J_BI_FORMS, 4.2.4
OC4J_SECURITY, 4.2.1.1
OHS, Preface, 2, 4.1.5
OHS WebGate, Preface
OID
see Oracle Internet Directory
Oracle Access Manager
formerly NetPoint or COREid, Preface
Oracle Application Server, Preface, 2, 4.1.5
about the integration, 4, 4.1
authorization, support for, 4.3
directory synchronization, 4.2.6
global logout, 4.2.7
infrastructure, 4.1.2
integrating Delegated Administration Service, 4.2.2
Integrating the Portal, 4.2.3
integration architecture, 4.1.3
integration settings for Oracle Access Manager, 4.2.8
preparing for integration, 4.1.5
Reports Services, 4.2.5
sample files, 4.5
single sign-on, 4.2
single sign-on login URL, 4.2.9
single sign-on, enabling, 4.2.1
single sign-on, enabling for forms, 4.2.4
testing the integration, 4.4
Oracle Application Server Portal, 4.2.3
Oracle E-Business Suite, 9
Oracle HTTP Server, Preface, 2, 4.1.5
Oracle HTTP Server (OHS), 4.1.2
Oracle Identity Federation, Preface, 5.2
about, 5
and authorization, 5.2
attribute sharing authentication scheme, 5.4
authentication scheme, 5.4.2
authorization rules and policies, 5.5.2
authorization schemes, 5.5
configuring basic authentication, 5.3.2
config.xml, 5.3.1
etup, 5.3
formerly SHAREid, Preface
session token cache, 5.3.4
SSL and client certificates, 5.3.3
Oracle Identity Management
about, 6
about the integration, 6.1
components, 6.2
configuring an Apache proxy for JBoss, 6.8
environment preparation, 6.5
integration architecture, 6.4
OAM setup for the integration, 6.6
setting up OIM for the integration, 6.7
Oracle Identity Manager
about, 6.1, 9.1
integration
about, 6.1, 9.1
supported versions, 6.3
Oracle Internet Directory, 4.1.2, 4.1.2, 4.1.5, 4.2.2, 4.2.2
Oracle SSO Server, 4.1.2
Oracle Virtual Directory, 3
OracleAS 10g, 4.1.2
OracleAS Single Sign-On, Preface, 2, 4.1.5

P

PeopleSoft
about, 8
Peoplesoft
components, 8.2
environment preparation, 8.5
integrating with, about, 8.1
integration architecture, 8.3
setting up for the integration, 8.7
setting up OAM for Peoplesoft, 8.6
single sign-off, 8.8
troubleshooting the integration, 8.9
performance
encryption parameters, impact, 5.3.1
session token cache, impact, 5.3.4
plug-ins
attribute sharing, 5.2, 5.2
Plumtree
about the integration, 12.1
anonymous access, 12.5.1
benefits of the integration, 12.1
configuration file modifications for single sign-on, 12.3.3
configuring anonymous access, 12.5.1
creating a single sign-on authentication source, 12.3.1
creating an LDAP authentication source, 12.3.2
guest pages, 12.5.1
integration architecture, 12.1
Knowledge Directory, 12.5.2
logout, 12.3.5
password management, 12.5.3
policy domain for, 12.4.2
protecting with the Access System, 12.4
self-registration, 12.5.4
single sign-on logout, 12.3.5
supported versions, 12.2
synchronizing LDAP data, 12.3.4
task overview of integration, 12.1
WebGate configuration for, 12.4.3
policy domain
default, Preface
Policy Manager API, Preface
Procedure
ASP.NET
To set up OAM role actions, 18.9.1
To set up the ASP.NET application, 18.9
To set up your environment, 18.8.1
AzMan
To add access policies, 19.6.4
To add default rules and the authentication rule, 19.6.4
To add the authorization scheme to the authorization rule, 19.6.4
To create a custom authorization scheme, 19.6.2
To create a policy domain and add a resource, 19.6.3
impersonation
To add an impersonation action to your policy domain, 20.3.5, 20.6.4
To add the impersonation dll to your IIS configuration, 20.3.6, 20.6.5
To bind your trusted OWA user to your WebGate, 20.6.3
To bind your trusted user to your WebGate, 20.3.4
To create a trusted user account, 20.3.2
To create a trusted user account for OWA, 20.6.1
To create an IIS virtual site not protected by SPPS, 20.3.8.1, 20.3.8.1
To extend impersonation to resources beyond the computer protected by a WebGate, 20.3.7
To give appropriate rights to the trusted user, 20.3.3, 20.6.2
To test impersonation through a Web page, 20.6.6.2
To test impersonation through a Web page that displays server variables, 20.3.8.3
To test impersonation through the Event Viewer, 20.3.8.2, 20.6.6.1
MCMS
To complete the MCMS integration, 21.4.5
To install Microsoft components, 21.4.2
To install Oracle Access Manager for the integration, 21.4.1
To integrate with the MCMS, 21.4.3
To test single sign-on for your MCMS integration, 21.4.6.2
To test your MCMS integration, 21.4.6.1
Oracle Application Server
To access the protected reports page, 4.2.5
To code a JAVA class to look for a Oracle Access Manager HeaderVar, 4.2.1.1
To configure authentication using OSSO and authorization using OAM, 4.3.2
To configure logout for the integration, 4.3.2
To configure the integration with OracleAS Single Sign-On 10.1.2.0.2, 4.2.8.1
To create a default RAD, 4.6
To create a user-specific RAD, 4.6
To define an external authentication scheme in OAM, 4.3.2
To define policies to protect middle tier applications, 4.3.2
To enable single sign-on for forms, 4.2.4
To find these database schema passwords, 4.6
To implement global logout from OracleAS Single Sign-On, 4.2.7
To test Oracle Access Manager SSO for OracleAS, 4.4
To verify that this directive is set to false, 4.6
Oracle Identity Federation
To configure a rule expression in an attribute sharing access policy, 5.5.2
To configure an authorization rule for local users in an attribute sharing access policy, 5.5.2
To configure an authorization rule for remote users in an attribute sharing access policy, 5.5.2
To configure basic characteristics of the attribute sharing authorization scheme, 5.5.1
To configure the basic characteristics of the attribute sharing authentication scheme, 5.4.1
To configure the config.xml file, 5.3.1
To configure the plug-ins for the attribute sharing authentication scheme, 5.4.2
To configure the protected resources in an attribute sharing access policy, 5.5.1
To configure the steps for the attribute sharing authentication scheme, 5.4.2
To set up client certificate authentication, 5.3.3
To set up HTTPS, 5.3.3
Oracle Identity Management
To configure single sign-on for OIM, 6.7
To configure single sign-on in OAM, 6.6
To configure the Apache HTTP server as a proxy for JBoss, 6.8
To set up a WebGate on an HTTP servre, 6.6
Peoplesoft
To configure direct login to Peoplesoft on an Apache OHS, 8.9
To configure single signoff for Peoplesoft, 8.8
To set up OAM for the integration, 8.6
To set up Peoplesoft for integration with OAM, 8.7
Plumtree
To automatically synchronize data, 12.3.4
To create a Knowledge Directory folder, 12.5.2.2
To create a policy domain for guest access, 12.5.1
To create a single sign-on authentication source on Plumtree, 12.3.1
To create a single sign-on password, 12.3.1
To create the policy domain, 12.4.2
To lock the NetPointAnonymous account, 12.5.1
To manually synchronize data, 12.3.4
To set Knowledge Directory preferences, 12.5.2.1
To set up the WebGate for Apache, 12.4.3
To upload a document, 12.5.2.3
To view the updated Plumtree database, 12.3.4.1
RSA
To add a resource to your policy domain, 14.4.5.2
To configure a CGI directory on the iPlanet Enterprise Server, 14.4.3.3
To configure Apache Web servers for the SecurID CGI script, 14.4.3.3
To configure the CGI script on IIS Web servers, 14.4.3.3
To create a policy domain to protect the SecurID script, 14.4.5.1
To define the path to Perl, 14.4.3.2
To define the SecurID authentication scheme, 14.4.4.2
To define who has access, 14.4.5.3
To enable logging and testing, 14.4.6
To install the ACE/Agent on each Windows-based Access Server, 14.4.2.2.2
To integrate SecurID authentication, 14.6.2
To prepare a Unix-based Oracle SecurID Access Server, 14.4.2.2.1
To prepare a Windows-based Oracle SecurID Access Server, 14.4.2.2.2
To prepare an Active Directory Forest, 14.4.1
To prepare your environment for SecurID integration, 14.4.1
To register an Access Server as an ACE/Agent Host, 14.4.2.1
To relocate the Oracle-provided SecurID directories, 14.4.3.1
To set up the Access Server log, 14.7.6
To verify the ACE/Agent installation on the Unix-based host (optional), 14.4.2.2.1
To verify the ACE/Server log configuration, 14.7.8
To verify the status of each Windows-based Access Server, 14.7.1
SAP
To configure a form-based authentication scheme for NetWeaver, 13.6.4.2
To configure a WebGate on the SAP proxy server, 13.6.4.2
To configure an SAP Enterprise Portal security policy in Oracle Access Manager, 13.6.4.2
To configure Oracle Access Manager for SAP Enterprise Portal 6.0, 13.6.3.3
To configure SAP Enterprise Portal 6.0 for external authentication, 13.6.3.5
To configure the proxy server to access NetWeaver, 13.6.4.2
To configure the UME properties, 13.6.4.3
To configure the Visual Administrator properties, 13.6.4.3
To modify the Login module stack to use header variables, 13.6.4.3
To prepare for the integration with SAP, 13.4
To set up Oracle Access Manager for integration with SAP, 13.5.2
To set up SAP for integration with Oracle Access Manager, 13.5.1
To set up SAP PAS for integration with Oracle Access Manager, 13.5.1
To test Access System authentication, 13.5.3
To test Oracle Access Manager single sign-on, 13.5.3
To test SAP R/3 instance installation, 13.5.1
To test the ADM instance installation, 13.5.1
To test the integration, 13.6.3.6
To test the integration with SAP NetWeaver Portal, 13.6.4.4
SharePoint
To add an impersonation action to your policy domain, 17.6.4
To add the impersonation dll to your IIS configuration, 17.6.5
To bind your trusted user to your WebGate, 17.6.3
To configure IIS Security for the SPPS integration, 17.7.1
To configure importing user profiles in SharePoint Portal Server, 17.7.4
To configure the wildcard extension for SPPS virtual servers, 17.7.2
To create an IIS virtual site not protected by SPPS, 17.6.6.1
To define managed paths in SharePoint, 17.4.2.1
To edit web.config for the SPPS integration, 17.7.3
To give appropriate rights to the trusted user, 17.6.2
To install Oracle Access Manager components for the integration, 17.4.2
To test impersonation through a Web page that displays server variables, 17.6.6.3
To test impersonation through the Event Viewer, 17.6.6.2
To test single sign-on for your integration, 17.7.5.2
To test your integration, 17.7.5.1
SharePoint Portal
To compile audiences, 17.4.1
To create a portal, 17.4.1
To create a trusted user account, 17.6.1
To create audiences, 17.4.1
To edit audiences, 17.4.1
To upload a document to the portal, 17.4.1
Siebel
To complete logout configuration, 7.6.3
To configure Apache Web server 1.3.x or 2.0.1, 13.6.3.2
To create a new project, 7.6.3
To create a Web page for logout, 7.6.3
To create a Web template, 7.6.3
To create a Web template file, 7.6.3
To prepare for configuration, 7.6.3
To set the Siebel Name Server Configuration Parameters, 7.5.1
To set up Oracle Access Manager for the integration, 7.5.2
To setup Siebel 7 for integration with Oracle Access Manager, 7.5.1
To test Oracle Access Manager session timeout, 7.5.3
To test Oracle Access Manager single sign-on, 7.5.3
single sign-on
To configure single sign-on using a Lotus Domino Web server, 16.1
Smart Card
To complete Smart Card certificate enrollment, 15.6.1.2
To configure the authentication scheme for Smart Card, 15.6.1.5
To configure the cert_authn.dll, 15.6.1.6
To prepare a certification authority, 15.6.1.2
To prepare Active Directory, 15.6.1.1
To prepare Oracle Access Manager for Smart Card authentication, 15.6.1.4
To prepare the IIS Web server for certification authentication, 15.6.1.3
To protect resources, 15.6.1.5
WebLogic
To add authorization and authentication rules to the domain, 10.5.7
To add basic authentication to WebLogic's web.xml file, 10.7.2
To add filter-related nodes, 10.7.1
To add filter-related nodes in WebLogic's web.xml file, 10.7.1
To add form-based authentication to WebLogic's web.xml file, 10.7.2
To add resources to the domain in Oracle Access Manager, 10.5.7
To complete setup, 10.7.5
To configure multiple WebPass instances, 10.5.11
To configure the Identity Server, 10.5.10
To configure the login or groupspace jsp for the Login Portlets, 10.7.3
To configure the Security Provider for an Active Directory forest, 10.13.1
To configure the WebLogic resource types, 10.5.5
To create a policy domain in Oracle Access Manager, 10.5.7
To create authentication schemes for WebLogic, 10.5.5
To create policies for the domain, 10.5.7
To enable the listing of all groups in the Admin Console, 10.14.1
To finish a typical installation, 10.5.3
To finish an advanced installation, 10.5.4
To implement an example, 10.8
To install the Security Provider for WebLogic, 10.5.2
To map WebLogic resources to Oracle Access Manager resources, 10.5.8
To map Weblogic resources to Oracle Access Manager resources, 10.5.9
To prepare for running the Policy Deployer Tool, 10.5.6
To Prepare the BEA WebLogic Server 8.1.x, 10.13.2
To prepare the environment, 10.5.9
To run the Policy Deployer after the first time, 10.5.6
To run the Policy Deployer Tool for the first time, 10.5.6
To test single sign-on for the Portal Server, 10.7.6
To use other names, 10.7.4
WebSphere
To build a WebSphere secure application, 11.8.3.1
To complete WebGate configuration details, 11.6.4
To configure multiple WebPass instances for the Connector for WebSphere, 11.6.7
To configure single sign-on for the WebSphere Portal v5, 11.10.9
To configure single sign-on logout for WebSphere Portal v5 and v6, 11.10.9
To configure the AccessGate for the NetPointWASRegistry, 11.5.3.1
To configure the Connector for an Active Directory forest, 11.13.1
To configure the Identity Server after installation, 11.5.2.2
To create a policy domain for the WebSphere Administration Console, 11.5.5
To create a policy domain for WebSphere, 11.5.4.3
To define a resource type for WebSphere, 11.5.4.1
To define an authentication scheme for WebSphere, 11.5.4.2
To define the installation directory, 11.6.2
To enable logging for TAI for WAS 5, 11.8.3.2
To enable logging for TAI for WAS 6 and 6.1, 11.9.6
To enable the NetPointWASRegistry in WAS 5, 11.8.1
To enable the NetPointWASRegistry in WAS 6, 11.9.2
To enable the NetPointWASRegistry in WAS 6.1, 11.9.2
To install and configure TAI for WAS 5, 11.8.3
To install and configure TAI for WAS 6, 11.9.4
To install and configure TAI for WAS 6.1, 11.9.4
To install the SimpleSessionSecure application, 11.8.3.1
To integrate the WebSphere Portal 6.0 with Oracle Access Manager, 11.10.4
To integrate the WebSphere Portal v5.1 with Oracle Access Manager, 11.10.3
To integrate the WebSphere Portal with Oracle Access Manager, 11.10.2
To launch installation, 11.6.1
To prepare your environment for integration, 11.5.1
To regenerate the plug-in configuration, 11.8.3.1
To run the registryTester program, 11.7.2
To set up the Connector for WebSphere, 11.7.1
To specify AccessGate details, 11.6.5
To specify Connector for WebSphere details, 11.6.3
To supply the paths to the certificate files, 11.6.6
To test Access System authentication and single sign-on, 11.8.3.1
To test single sign-on for Access System-protected WebSphere resources, 11.8.3.1, 11.9.5, 11.9.5
To test the NetPointWASRegistry configuration, 11.8.2, 11.9.3
To test the TAI, 11.9.5
Process overview
Access Manager API operation with the AzMan Plug-In, 19.2
Attribute sharing used for federated authorization, 5.2
Authentication with the integration, 7.2
Authorization with the CMR, 11.3, 11.10.1
Authorization with the Security Connector for ASP.NET, 18.7
AzMan authorization after a user is authenticated, 19.5.3
Events during authentication and authorization, 18.10
Integration of Oracle Access Manager with Oracle Application Server, 4.1.3
Integration with SAP ITS, 13.2.3
Integration with SAP Portals, 13.6.1
Login using the WAS with Access System single sign-on, 11.2.2
Login using WAS with the NetPointWASRegistry, 11.2.1
Request processing with MCMS integration, 21.3
Request processing with the Sharepoint integration, 17.3
Single sign-on between Oracle Access Manager-protected non-WebLogic resources to WebLogic resources, 10.2.3
Single sign-on with Oracle Identity Management, 6.4
Single sign-on with Peoplesoft, 8.3.1
Smart Card authentication, 15.4.1
SSO between WebLogic resources to Oracle Access Manager-protected non-WebLogic resources, 10.2.3
User authentication for the Portal, 10.2.3
User authentication, mixed resource types, 10.2.1
User authentication, Web-only applications, 10.2.2
WebGate operation with the AzMan Plug-in, 19.2
When New PIN mode is On, 14.3.3
When Next Tokencode is On, 14.3.2
When the user chooses to define a new PIN, 14.3.3
When the user requests a resource, 14.3.1
When the user requests a system-generated PIN, 14.3.3

R

REMOTE_USER, 20.5, 20.6.4
Requirements
impersonation, 20.3.1
RSA
about, 14
Access Server for SecurID, 14.2.3
ACE/Server, 14.1.2
Active Directory forest considerations, 14.6
adding ACE/Server users to OAM, 14.4.7
CGI directory, configuring, 14.4.3.3
credential mapping parameters, 14.5.2
environment preparation, 14.4.1
integrating SecurID authentication, 14.4
integration summary, 14.1.4
New PIN mode, 14.2.2.2
New PIN sequence, 14.3.3
Next Tokencode mode, 14.2.2.1, 14.3.2
requesting a resource, 14.3.1
requirements, 14.2.2
RSA ACE/Server Platform Support, 14.2.2
SecurID, 14.1
SecurID authentication plug-in parameters, 14.5
SecurID authentication scenarios, 14.3
SecurID authentication scheme, 14.4.4
SecurID authentication scheme plug-ins, 14.4.4.1
SecurID authentication scheme, creating, 14.4.4.2
SecurID authentication sequence, 14.3.1
SecurID CGI script, 14.2.5.1
SecurID challenge parameters, 14.4.4.1
Securid policy domain, 14.4.5.1
Securid resources, protecting, 14.4.5
setting up Access Server for, 14.4.2
troubleshooting the integration, 14.7
WebGate requirements for, 14.2.5

S

S4U2Self Extension, 20.7.6
SAML, 5.2
SAP
about, 13.1
Enterprise Portal
external authentication confguration, 13.6.3.5
Oracle Access Manager configuration, 13.6.3.3
Oracle Access Manager prerequisites, 13.6.3.1
prerequisites, 13.6.3.1
proxy configuration, 13.6.3.2
testing the integration, 13.6.3.6
troubleshooting, 13.6.3.7, 13.6.4.5
WebGate configuration, 13.6.3.4
Enterprise Portal integration, 13.6
architecture, 13.6.1
supported platforms, 13.6.2
integration architecture, 13.2.3, 13.6.1
Internet Transaction Server (ITS), 13.2.1
mySAP
about, 13.1
NetWeaver
integrating with Oracle Access Manager, 13.6.4
integration prerequisites, 13.6.4.1
setting up the integration, 13.6.4.2
supported platforms, 13.6.2
testing the integration, 13.6.4.4
NetWeaver Enterprise Portal
troubleshooting, 13.6.4.5
NetWeaver Enterprise Protal, 13.6
Oracle Access Manager setup, 13.5, 13.5.2
Pluggable Authentication Service (PAS), 13.2.2
preparing for the integration, 13.4
setup for the integration, 13.5.1
supported platforms, 13.3
testing the integration, 13.5.3
Security IDs, 20.7.2
Service Provider, 5.2
session token cache, 5.3.4
SHAREid
now named Oracle Identity Federation, Preface
SharePoint integration
about, 17
and single sign-on, 17.1
completing the integration, 17.7
creating a portal, 17.4.1
IIS security, 17.7.1
impersonation
adding an impersonation action to a policy domain, 17.6.4
adding an impersonation DLL to IIS, 17.6.5
setup, 17.6
testing, 17.6.6
Microsoft components, 17.4.1
Oracle Access Manager components
installing, 17.4.2
Oracle Access manager components, 17.2.3
request processing overview, 17.3
supported platforms, 17.2
synchronizing user profiles, 17.7.4
task overview of impersonation setup, 17.6
task overview of the integration, 17.4
testing the integration, 17.7.5
trusted user
assigning rights, 17.6.2
binding to the WebGate, 17.6.3
trusted user accounts, 17.6.1
user profile synchronization, 17.7.4
web.config, 17.7.3
wildcard extension, 17.7.2
Windows Impersonation, using with, 17.1.1
SharePoint Portal Server
creating audiences, 17.4.1
uploading a document, 17.4.1
Siebel
about, 7.1
components, 7.1.1
eapps.cfg parameters, 7.5.1
integration
about, 7.1
integration architecture, 7.2
diagram, 7.2
Oracle Access Manager setup, 7.5.2
preparing for the integration, 7.4
session logout, 7.6
session timeout, 7.5.3
setup with Active Directory, 7.5.4
Siebel application parameter file, 7.5.1
single sign-on setup, 7.5
supported versions, 7.3, 8.4
testing the integration, 7.5.3
timeout, 7.6.1
Siebel 7, Preface
single sign-on
between Oracle Access Manager and OracleAS, Preface
Smart Card
about the integration, 15, 15.4.1
authentication plug-ins, 15.3.2
cert_decode plug-in, 15.3.2.1
challenge method, 15.3.1
client certificate authentication schemes for, 15.3
credential_mapping plug-in, 15.3.2.2
IIS Manager setup, 15.6.1.6
integration architecture, 15.4
preparing Active Directory, 15.6.1.1
preparing Oracle Access Manager, 15.6.1.4
preparing the CA, 15.6.1.2
preparing the Web servers, 15.6.1.3
protecting resources with Oracle Access Manager, 15.6.1.5
supported platforms, 15.5
task overview of setting up authentication, 15.6
troubleshooting, 15.7
SSOOblixAuth.class, 4.2.1.1

T

Task Overview
Creating and setting up a Sharepoint portal, 17.4.1
Task overview
Before installing the Security Provider for WebLogic, 10.5.1
Completing Connector Setup, 11.7
Configuration in a multi-domain Active Directory environment, 7.5.4
configuring a custom logout page, A.3
Configuring resource protection in the Access System, 11.5.4
Configuring single sign-on for the Portal Server, 10.7
Configuring the AzMan Plug-in, 19.6
Configuring the Identity System for WAS integration, 11.5.2
Enabling impersonation with a header variable, 20.3
Installing Microsoft components for Sharepoint, 17.4.1
Installing the Connector, 11.6
Integrating Oracle Access Manager with OracleAS 10g, 4.2
Integrating SecurID authentication, 14.4
Integrating with MCMS, 21.4
Integrating with Plumtree, 12.1
Integrating with Sharepoint, 17.4, 17.5
Integrating with the WebSphere Application Server, 11.1
Integrating with WAS v5, 11.8
Integration prerequisites for Oracle Access Manager integration
Integration prerequisites for SAP Portal 6.0 integration
Manually configuring WebLogic Policies in Oracle Access Manager, 10.5.7
Prepare your environment for integration, 7.4
Preparing for the Peoplesoft integration, 8.5
Preparing to install the Connector for WebSphere, 11.5
Preparing your Environment, 4.1.5
Preparing your environment for AzMan, 19.6.1
Protecting resources with Oracle Access Manager, 4.2.9
Protecting Securid Resources, 14.4.5
Setting up a SecurID WebGate, 14.4.3
Setting up impersonation, 17.6
Setting up impersonation for OWA, 20.6
Setting up impersonation for the MCMS, 21.4.4
Setting up Oracle Access Manager for integration with OracleAS 10g includes, 4.2.8
Setting Up Oracle Access Manager single sign-on for mySAP, 13.5
Setting up Smart Card Authentication, 15.6.1
Setting up the Access Server as an ACE/Agent, 14.4.2
Setting up the Sharepoint integration, 17.7
Testing the securid-cgi directory, 14.7.3
To prepare your environment, 14.6.1

U

URL
logout URLs, 4.2.7, A.2

V

virtual directory, 3

W

WebGate, 10.2
Apache, Preface
OHS, Preface
WebLogic
Active Directory notes, 10.13
advanced installation, 10.5.4
auditing, 10.9
authentication for the Portal Server, 10.2.3
authentication for Web-only resources, 10.2.2
authentication schemes, 10.5.5
authorization data from an external source, 10.8
client certificate authentication overview, 10.2.2
completing setup, 10.7.5
configuration files for the integration, 10.12
configuring policies manually, 10.5.7
debug log, 10.10
Identity Server preparation, 10.5.10
integration architecture, 10.2
integration points with Oracle Access Manager, 10.1.1
J2EE applications, 10.1
login.jsp configuration, 10.7.3
mapping WebLogic resources to Oracle Access Manager resources, 10.5.8
mixed Web and non-Web resources, 10.2.1
NetPointProvidersConfig.properties, 10.12.1
NetPointWeblogicTools.properties, 10.12.2
ObLoginFilter.class, 10.7.4
policies in Oracle Access Manager, 10.5.5
Portal Admin Console changes, 10.14.1
preparing the environment, 10.5.1, 10.5.9
resource type definitions, 10.5.5
running the Policy Deployer, 10.5.6
Security Provider
about, 10.1
installing, 10.5
single sign-on configuration for the Portal Server, 10.7
single sign-on testing for the Portal Server, 10.7.6
supported platforms, 10.3
user and group creation and deletion, 10.11
user authentication for the portal server, 10.2.3
user authentication process overview, 10.2.1
user authentication, Web-only, process for, 10.2.2
WebPass configuration, 10.5.11
web.xml, 10.7.2
web.xml configuration, 10.7.1
WebSphere
about the connector, 11.1
access control, 11.10.8
Access System configuration, 11.5.3
Application Assembly Tool (AAT), 11.1.1
completing connector setup, 11.7
components, 11.1.1
configuration files, 11.11
configuring the TAI for v5, 11.8.3
configuring the TAI for v6 and v6.1, 11.9.4
configuring the v5 Application Server, 11.8
configuring the v6 Application Server, 11.9
Connector for WebSphere, about, 11.1
Custom Member Repository (CMR), 11.1.2
defining a policy domain for, 11.5.5
EJB, 11.1
enabling logging for v6 and v6.1, 11.9.6
enabling NetPointWASRegistry for v6 and v6.1, 11.9.2
Identity System configuration, 11.5.2
Implementation Notes for Active Directory, 11.13
Implementation Notes for the TAI, 11.12
installing the connector, 11.6
integrating with, 11
integration architecture, 11.2
integration process overview, 11.1
integration scenario, 11.3
JSP, 11.1
mapping users and groups to security roles, 11.2.3
NetPointWASRegistry, 11.1.2
NetPointWASRegistry.properties, 11.11.1
preparing to install the connector, 11.5
resource protection in the Access System, 11.5.4
servlets, 11.1
testing environment setup, 11.7.2
testing NetPointWASRegistry for v5, 11.8.2
testing NetPointWASRegistry for v6, 11.9.3
testing the TAI for v6 and v6.1, 11.9.5
TrustedServers.properties, 11.11.3
Web Trust Association Interceptor (TAI), 11.1.1
WebGate.properties, 11.11.2
WebSphere Portal
about integration with CMR, 11.10.1
integrating with, 11.10
managing users and groups, 11.10.5
modifying user profiles and attributes, 11.10.6
password management, 11.10.7
setting up v5.0.2, 11.10.2
setting up v5.1, 11.10.3
setting up v6.0, 11.10.4
single sign-on, 11.10.9
what's new in this release
federation, Preface
working with OracleAS SSO, Preface
Wildcard Extension, 20.7.4
Windows Impersonation, 20.1