Skip Headers
Oracle® Web Services Manager Deployment Guide
10g (10.1.3.3.0)

Part Number E10298-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
View PDF

E Authentication Sources

This chapter describes the authentication types supported by Oracle Web Services Manager (Oracle WSM) and how to configure them.

This chapter includes the following sections:

Overview of Authentication

Oracle WSM supports two types of authentication:

Oracle Access Manager

Oracle Access Manager and Oracle WSM provide an integrated and comprehensive identity management, Web services security, and system monitoring solution.

This section explains how to integrate Oracle WSM and Oracle Access Manager to authenticate users and to verify their privileges.

Note:

Oracle Access Manager was previously known as Oblix NetPoint and Oracle COREid.

Oracle Access Manager Integration Overview

You can use the Oracle Access Manager to provide authentication and authorization services for Oracle WSM operations. Oracle Access Manager authenticates a client's identity and then authorizes different levels of access depending on the identity of the client.

This overview briefly describes the components of Oracle Access Manager. It also identifies the requirements for integrating Oracle Access Manager with Oracle WSM.

Oracle Access Manager is comprised of the following components:

Identity System – The Identity System manages identity information about individuals, groups, organizations, and other objects. The Identity System also leverages user identity and policy information for other applications and systems across the enterprise. This eliminates the need to create and manage separate user identity repositories for each application.

The Identity System consists of an Identity Server and a WebPass component. Administrators configure these components using a Web-based administration tool known as the Identity System Console.

See the Oracle Access Manager Installation Guide and the Oracle Access Manager Identity and Common Administration Guide.

Access System – The Access System is the access-control system that provides single sign-on across any Web application. It supports a variety of access policies, and is fully integrated with the Identity System so that changes in user profiles are instantly reflected in the Access System's policy enforcement.

The Access System consists of the Policy Manager, Access Server, and WebGate:

  • Policy Manager – The Policy Manager provides a Web-based interface where administrators can create and manage access policies. The Policy Manager also communicates with the directory server to write policy data, and communicates with the Access Server when certain policy modifications are made.

    For more information about installing the Policy Manager, see Oracle Access Manager Installation Guide.

    Master Access Administrators and Delegated Access Administrators use the Policy Manager and Access System Console.

  • Access System Console – This is a Web-based application that provides administrators with the features and functionality related to System Configuration, System Management, and Access System Configuration.

  • Access Server – Access Server receives requests and then queries authentication, authorization, and auditing rules in the directory server. Based on the information in the directory server, the Access Server sends the authentication scheme, validates user credentials, authorizes the user, audits, and manages the session.

    For more information and an overview of Access Server processes, see Oracle Access Manager Introduction.

  • WebGate – WebGate is a server plug-in Oracle Access Manager access client that intercepts HTTP requests for Web resources and forwards them to the Access Server for authentication and authorization. A WebGate is shipped out-of-the-box with Oracle Access Manager.

  • AccessGate – An AccessGate is a custom access client that is specifically developed using the Software Development Kit (SDK) and Oracle Access Manager APIs, either by the customer or by Oracle. An AccessGate is a form of access client that processes requests for Web and non-Web resources (that is, non-HTTP) from users or applications.

Integration Procedure and Requirements

The following components must be installed in the order specified in the procedure that follows. For more information, see Oracle Access Manager Installation Guide.

Task Overview: Preparing for Integration

  1. Install Oracle Web Services Manager, as described in Oracle Web Services Manager Installation Guide.

  2. Install and set up the Identity, System including:

    1. Identity Server

    2. WebPass

    See Oracle Access Manager Installation Guide for more information.

  3. Install and set up at least one instance of each of the following components:

    1. Policy Manager (includes the Access System Console):

      • Define the policy base during the Policy Manager setup.

      • Define the policy domain root during the Policy Manager setup.

      • Accept the default authentication schemes during the Policy Manager setup. (Otherwise, you must create the authentication schemes using the Access System Console after setup.)

      • Create the Master Access Administrator who will have the authority to create policy domains, resource types, access control templates called schemes, and to assign other administrators the role of Delegated Administrator of a policy domain.

    2. Access Server.

    3. Create AccessGate and install it on the same machine as Oracle WSM.

      See the Oracle Access Manager Developer Guide for more information.

  4. Using the Oracle Access Manager Policy Manager, protect resources:

    1. Create a policy domain

    2. Bind the resource types to URL mappings.

    3. Create one or more authorization rules and associate users and groups with these rules. An authorization rule identifies who can access a resource and who is explicitly denied access to a resource. You can include one or more authorization rules in an authorization expression for a policy domain or policy. See the "Configuring User Authorization" chapter in Oracle Access Manager Access System Administration Guide.

    4. Create default rules, including an authentication rule, authorization expressions, and an audit rule for the policy domain.

    5. Create policies to protect subsets of resources in the policy domain. Policies enable you to differentiate how subsets of resources in a domain are protected. You can use policies to establish more or less stringent protection for a subgroup of resources of a policy domain. See "Protecting Resources with Policy Domains" in Oracle Access Manager Access System Administration Guide

    6. Test the policy domain.

    See Oracle Access Manager Access System Administration Guide for more information.

  5. Configure Oracle WSM to use AccessGate.

    See "Configuring Oracle WSM to Use a Custom AccessGate".

  6. Configure AccessGate to work with Oracle WSM.

    See "Configuring AccessGate to Work with Oracle Access Manager".

  7. Configure policy steps in Oracle WSM.

    See "Configuring Policy Steps in Oracle WSM".

The next sections describe authentication mechanisms, resources, and URL patterns for the Access Server and AccessGate.

Authentication Mechanisms

Oracle WSM supports the following Oracle Access Manager authentication mechanisms:

  • Oracle Access and Identity Basic Over LDAP (formerly COREid Basic Over LDAP)

  • Basic over LDAP

  • Client Certificate

Oracle WSM collapses these three authentication methods into two methods and implements them as User Name and Password and Client Certificates.

Table E-1 shows the correspondence between the Oracle WSM and Oracle Access Manager authentication mechanisms.

Table E-1 Authentication Mechanisms Compared

Oracle Web Services Manager
Oracle Access Manager

User Name and Password

Basic over LDAP

User Name and Password

Oracle Access and Identity

Client Certificates

Client Certificates


When you integrate Oracle WSM and Oracle Access Manager, you must decide whether to use user names and passwords (Basic over LDAP) or client certificates for authentication.

Resources

The only resource supported is HTTP.

URL Patterns

URL patterns must look like the following example:

http:///gateway/services/TimeService

Configuring Oracle WSM to Use a Custom AccessGate

Complete the following steps to set up authentication policies in the Oracle WSM Policy Manager:

  • Install Oracle WSM.

  • Install AccessGate on the system where Oracle WSM resides.

  • Change the startup script for Oracle WSM to include the library path for AccessGate Java native libraries.

Microsoft Windows

For a Microsoft Windows installation, this procedure assumes that you have installed the Access Manager SDK in the following directory

C:\Oblix\NetPoint\AccessServerSDK

The Oracle WSM startup script is the following:

install_home\bin\wsmadmin.bat

where install_home is the root directory for your Oracle WSM installation.

Linux

For a Linux installation, this procedure assumes that you have installed the Access Manager SDK in the following directory:

/Oblix/NetPoint/AccessServerSDK

The Oracle WSM startup script is the following:

install_home\bin\wsadmin.sh

where install_home is the root directory for your Oracle WSM installation.

Configuring AccessGate to Work with Oracle Access Manager

To facilitate the handshake between AccessGate and Oracle Access Manager, run the utility configureAccessGate.exe, located in the following directory:

installdirectory\AccessServerSDK\oblix\tools\configureaccessgate

where installdirectory is the root folder for your Access Manager SDK installation.

From a command prompt, execute the following command:

configureAccessGate.exe -i installdirectory\AccessServerSDK -t AccessGate -P AccessGatePwd -w CoreSvAccessGt -m open -h AccessServerHostname -p accessserverport -a accessserverid -r AccessServerpassphrase

The parameters are described in Table E-2.

Table E-2 Description of configureAccessGate.exe Parameters

Parameter Description

-i installdirectory

Installation directory for AccessServerSDK

-t AccessGate

AccessGate keyword. Enter as shown.

-P AccessGatePwd

AccessGate password. When an entry for AccessGate is created in Oracle Access Manager, a password may be specified.

-w CoreSvAccessGt

AccessGate name that was specified when the AccessGate entry is created in Oracle Access Manager.

-m open

Oracle Access Manager intercomponent mode. The valid values are open, simple, or cert.

-h AccessServerHostname

Name of the host on which Access Server is installed.

-p accessserverport

Port on which Access Server is running.

-a accessserverid

Access Server name in Oracle Access Manager

-r AccessServerpassphrase

Access Server simple mode password. This password is required if Access Server in Oracle Access Manager is running in simple mode. It is not required if Access Server is running in open mode.


Creating Policies Using the Oracle Access Manager Policy Manager

The following is a summary of tasks that you must complete to set up policies on an Oracle Access Manager Policy Manager.

Task overview: Setting up a Policy in the Oracle Access Manager Policy Manager

  1. Create a policy domain.

  2. Create resource-type-to-URL mappings.

  3. Create policies in the policy domain.

  4. Define default authentication rules.

  5. Define default authorization rules and associate users and groups with the rules.

Sample Policy Creation: Oracle Access and Identity Basic Over LDAP

The following sections illustrate how to use the Oracle Access Manager Policy Manager application in Oracle Access Manager to create a policy domain named Oracle WSM. It also describes how to use an Oracle Access and Identity Basic Over LDAP authentication scheme to protect a service named TimeService. This service was created in the Oracle Web Services Manager Gateway (gateway).

The following example shows the service ID for TimeService is SID0002001.

To protect the TimeService resource using an Oracle Access and Identity authentication scheme

  1. Launch the Access System Console.

    Enter the following URL in a browser:

    http://WebPass_hostname:port/access/oblix
    
    

    where WebPass_hostname refers to the machine hosting the WebPass application server, port refers to the HTTP port number of the WebPass application server instance, and /access/oblix connects to the Access System Console.

  2. Select the Oracle Access Manager Policy Manager application, and click Create Policy Domain in the left navigation pane.

  3. Enter Oracle WSM in the Name field, specify an optional description, and click Save.

  4. To add resources, click the Resources tab, then click Add.

  5. Enter the following details for the gateway/services/TimeService and gateway/services/SID0002001 URLs:

    • Resource Type – http

    • URL Prefix – /gateway/services/TimeService

  6. To add an Authorization rule for this Policy Domain, click the Authorization Rules tab, then click Add.

  7. Enter and save the following information:

    • Name – SimpleAuthRule

    • Enabled – Yes

    • Allow takes precedence – No

  8. Click the Allow Access and complete the following steps:

    1. People – Click Select User to select by user name. Use the Search facility to display configured users, and click Add before the name of each user who is allowed to access resources protected by this rule.

    2. Role – Select No Role in the Role selection box to prevent users from being selected based on roles or select Anyone to allow anyone access to the protected resources.

    3. Rule – Enter an LDAP filter that specifies the users and groups who are allowed to access

  9. Click Select User, and add the users to whom you want to give access.

  10. Click Policies and create a policy named TimePolicy with the following information:

    Name – TimePolicy
    Resource Type – http
    Resource – all
    Resource operations – Get, Post, Other

Sample Policy Creation: Client Certificates

The following paragraphs describe how to use the Oracle Access Manager Policy Manager to create a policy domain called Oracle WSM. It shows how to use client certificates to protect the TimeService service.

To create a policy using a client certificate authentication scheme

  1. Launch the Access System Console and select the Policy Manager.

  2. From the Policy Manager, click Create Policy Domain in the left navigation pane.

  3. Enter Oracle WSM in the Name field and click Save.

  4. In the Description field, type a brief description of the policy domain.

  5. Click the Resources tab, and add the following resources:

    Resource Type – http
    URL Prefix – /gateway/services/TimeService
    Resource Type – http
    URL Prefix – /gateway/services/SID0003001
  6. Click the Default Rules tab, select the Authentication Rule sub-tab, click Add, give the rule a name, and choose the Client Certificates authentication scheme.

  7. Click the Authorization Rules tab, click Add, then add the following information:

    Name – SimpleAuthRule
    Enabled – Yes
    Allow takes precedence – No
  8. Save the rule.

  9. Click Allow Access sub-tab, and select the allowed users.

  10. Click Select User and add the users to whom you want to give access.

  11. Click Policies, then create TimePolicy by entering the following information:

    Name – TimePolicy
    Resource Type – http
    Resource – all
  12. Save the policy rule.

  13. Click the policy rule that was just created (TimePolicy).

  14. Click Authentication Rule sub-tab.

The following sections describe these tasks in detail.

Configuring Policy Steps in Oracle WSM

The following sections illustrate how to configure policy steps for a gateway:

Enforcement with User Name and Password

The following example shows how to configure policy steps for User Name and Password for a gateway.

  1. Register the TimeService service to a gateway.

  2. Modify the request pipeline for this service and include the following steps in the following order:

    • Extract Credentials

    • Oracle Access Manager Authenticate Authorize step

      Namespaces – Enter a list of name spaces separated by spaces (white space-delimited strings).

      UserID xpath – Enter an xpath that points to the location of the user name, for example, wsse:Username.

      Password xpath – Enter an xpath for password, for example, wsse:Password.

      AccessGate Install Directory – The following is the default installation directory for AccessGate:

      • On Microsoft Windows, the default directory is C:\Program Files\Netpoint\AccessServerSDK.

      • On Linux, the default directory is: /opt/netpoint/AccessServerSDK.

      These directory paths differ if your AccessGate installation directory is different.

  3. Save the policy.

  4. Commit the changes.

  5. Send a request to the gateway with the following service URL, including the user name and password in the HTTP header.

    http://<host:port>/gateway/services/TimeService
    
    

    The user name and password be for one of the users allowed by the current Oracle Access Manager authorization rules.

  6. When the policy steps correctly have been configured correctly, the service will respond. Otherwise a SOAPFault error message is returned.

Enforcement with Certificates

  1. Register the TimeService service on a gateway.

  2. Modify the request pipeline for this service and include the following steps in the following order:

    • Verify Signature

    • Oracle Access Manager Authenticate Authorize step

      Keystore location – Enter the location of the keystore file.

      Keystore password – Enter the password for the keystore file.

      Signer's public-key alias – Enter the signer's public-key alias.

      AccessGate Install Directory – The first of the following two examples is for Windows, and the second is for Linux.

      C:\Oblix\NetPoint\AccessServerSDK
      /Oblix/NetPoint/AccessServerSDK
      
      

      These directory paths differ if your AccessGate installation directory is different.

  3. Save the policy by clicking Save.

  4. Commit the changes by clicking Commit.

  5. Send a request to the gateway through the following URL:

    http://<host:port>/gateway/services/TimeService
    
    
  6. If the policy steps have been configured correctly, the service will respond. Otherwise, a SOAPFault error message is returned.

Oracle Access Manager Authenticate Authorize Configuration

The Oracle Access Manager Authenticate Authorize policy step uses the Java Native Interface (JNI) libraries. Therefore, you must configure your environment variables to load the shared libraries.

OPMN-Managed Deployments

If your system is managed using Oracle Process Manager and Notification (OPMN), then use the following procedure for your platform. Your Oracle WSM installation is managed using OPMN if you use the opmnctl start and stop commands to start and stop Oracle WSM.

  1. Open the ORACLE_HOME/opmn/conf/opmn.xml file.

  2. Find the OC4J instance that is hosting the gateway or agent component. Look for the following entries in the opmn.xml file.

    <ias-component id="group1" status="enabled">
         <process-type id="Name_of_OC4J_Instance" module-id="OC4J" STATUS="ENABLED">
           <module-data>
             <category id="start-parameters">
               <data id="java-options" value="server  ..."/>
    
    
  3. On Microsoft Windows, add the path for the Access Server SDK to the Java options as shown below in bold:

    <ias-component id="group1" status="enabled">
         <process-type id="Name_of_OC4J_Instance" module-id="OC4J" status="enabled">
           <module-data>
             <category id="start-parameters">
               <data id="java-options" value="server  
                 -Djava.library.path=c:\pathto\AccessServerSDK\oblix\lib ..."/>
    
    
  4. On Linux, add the LD_LIBRARY_PATH and LD_ASSUME_KERNEL environment variables as shown in bold:

    <ias-component id="group1" status="enabled">
       <environment>
          <variable id="LD_LIBRARY_PATH" value="/pathto/AccessServerSDK/oblix/lib" append="true"/>
          <variable id="LD_ASSUME_KERNEL" value=2.4.19"/>
        </environment>
         <process-type id="Name_of_OC4J_Instance" module-id="OC4J" status="enabled">
           <module-data>
             <category id="start-parameters">
               <data id="java-options" value="server  
                  ..."/>
    
    

Standalone Oracle WSM Basic Install Deployments

If you installed a standalone version of Oracle WSM using the Basic installation option, then your Oracle WSM is not managed by OPMN. Oracle WSM is started using the wsmadmin command. If this is the case, then perform the step appropriate to the platform on which Oracle WSM is installed:

  • On Microsoft Windows, edit the ORACLE_HOME\owsm\bin\wsmadmin.bat file. Add \pathto\AccessServerSDK\oblix\lib to the Path environment variable.

  • On Linux, edit the ORACLE_HOME/owsm/bin/wsmadmin.sh file. Add /pathto/AccessServerSDK/oblix/lib to the Path environment variable, and set the LD_ASSUME_KERNEL environment variable to 2.4.19.

Active Directory

You can configure Active Directory to support both Oracle WSM System User authentication and End-User authentication.

Configuring Active Directory for End User Authentication

To configure Active Directory to provide authentication services for end users, you must verify that your PEP supports the Active Directory Authenticate policy step, then add that step to the policy associated with the PEP. For more information, see Oracle Web Services Manager Administrator's Guide.

Note:

Active Directory cannot be used to authenticate the Oracle Web Services Manager system user.

Using an LDAP Directory to Authenticate Users

You can configure an LDAP Directory to support either Oracle WSM System User authentication, or end-user authentication, or both. For more information, see the "Managing Oracle Web Services Manager Roles" chapter in Oracle Web Services Manager Administrator's Guide.