Skip Headers
Oracle® Adaptive Access Manager Developer's Guide
Release 10
g
(10.1.4.5)
Part Number E12052-03
Home
Book List
Contents
Index
Contact Us
Previous
Next
View PDF
List of Tables
2-1 Device fingerprint Flow (F2) Reference APIs
2-2 Validate User/ Passwd (CP1) Reference API
2-3 Update Authentication Status (P5) Reference APIs
2-4 Post Authentication Rules (R3) Reference APIs
2-5 Device Fingerprint Flow (F2) Reference APIs
2-6 Pre Authentication Rules Reference APIs
2-7 Use AuthentiPad Rules (R2) Reference APIs
2-8 Generate Non-Personalized TextPad (P2) Reference APIs
2-9 Generate Personalized TextPad or KeyPad Reference APIs
2-10 Display TextPad or KeyPad Reference APIs
2-11 Decode AuthentiPad Input Reference APIs
2-12 Validate User/Passwd Reference APIs
2-13 Update Authentication Status Reference APIs
2-14 Post Authentication Rules Reference APIs
2-15 Registration Required Rules Reference APIs
2-16 Challenge Reference APIs
2-17 Check Challenge Question Answer Reference APIs
2-18 Run Challenge Rules Reference APIs
3-1 Directories Searched for Properties Files
3-2 ASP.NET applications samples
4-1 Property Files of Interest
4-2 API handleTrackerRequest Parameters
4-3 API createTransaction Parameters
4-4 API updateTransaction Parameters
4-5 API handleTransactionLog Parameters
4-6 API updateTransactionStatus Parameters
4-7 API updateLog Parameters
4-8 API updateAuthStatus Parameters
4-9 processPatternAnalysis
4-10 API markDeviceSafe Parameters
4-11 API IsDeviceMarkedSafe Parameters
4-12 API clearSafeDeviceList Parameters
4-13 API processRules Parameters
4-14 API getFinalAuthStatus Parameters
4-15 API setTemporaryAllow Parameter
4-16 API cancelAllTemporaryAllows Parameters
4-17 API resetUser Parameters
4-18 API getRulesData Parameters
4-19 API getActionCount Parameters
5-1 Settings for Troubleshooting
5-2 Conditions Defined in an Interceptor
5-3 Filters Defined in an Interceptor
5-4 Pre-defined Variables Supported by the Proxy
5-5 Adaptive Strong Authenticator Interface
5-6 Setting up the proxy
5-7 Proxy settings after application discovery
5-8 Settings for Capturing HTTP
5-9 Settings to restore detault proxy behavior
7-1 Properties of Rows
7-2 Properties of Each Key
8-1 oaamAccessGate Configuration
8-2 ohsWebGate Configuration
8-3 OAAM ASA Authentication Scheme Configuration
8-4 OAAM ASA Authentication Scheme Configuration - Plugins
8-5 ohsWebGate Configuration
9-1 updateTransactionStatus Parameters
9-2 updateAuthStatus Parameters
9-3 processPatternAnalysis