Skip Headers
Oracle® Access Manager Upgrade Guide
10g (10.1.4.2.0)

Part Number B32416-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
View PDF

13 Upgrading Your Access System Customizations

Tasks in this chapter are intended for administrators who are responsible to upgrade and redeploy earlier Access System customizations. Oracle recommends that you upgrade and then test your upgraded customizations in a small isolated environment.

Unless explicitly stated, the information in this chapter applies to both upgrade methods. The tasks you perform will depend on what was implemented in your earlier installation. You can skip any task that is not relevant for your earlier environment. This chapter includes the following topics:

Note:

When you are performing a zero downtime upgrade, Oracle recommends that you perform these tasks and test your upgraded customizations in the cloned environment. For more information, see "Customization Upgrades Using the Zero Downtime Upgrade Method".

13.1 Prerequisites and Guidelines

Before starting to upgrade any Access System customizations, Oracle recommends that you:

After completing and testing each upgraded customization, Oracle recommends that you back up the directory containing the upgraded customization and store it in a new location.

13.2 Upgrading Auditing and Reporting for the Access Server

As discussed earlier, you need to complete a few activities to ensure that your auditing and access reporting environment is properly set up for Oracle Access Manager 10g (10.1.4.0.1). To complete activities for the Access Server, you will use information available in the file:

AccessServer_install_dir\oblix\reports\crystal\audit.sql

The procedures are similar to those you performed for the Identity Server, as outlined next. For details about individual steps within the task here, including uploading the audit schema, see the Oracle Access Manager Identity and Common Administration Guide. For general information about the procedures, see "Upgrading Auditing and Access Reporting for the Identity System".

Task overview: Upgrading auditing and reporting with a Microsoft SQL Server

  1. Retain the original database, as is, to preserve your original data.

  2. After upgrading all Policy Managers, upgrade the first Access Server (but do not restart the Access Server Service).

  3. If you are using an MS SQL database, review information in "Database Record Sizing".

  4. To query or generate any report that requires data from both the old and new database, you need to import the earlier data audited by each Access Server instance into the 10g (10.1.4.0.1) database and confirm that it is imported successfully. You will repeat this step for each Access Server instance that you upgrade.

    The serverId field in audit table indicates the ID of the Access Server that audited that record. Based on the serverId field, it is feasible to differentiate the records audited by each Access Server. The same rule applies to the Identity Servers.

    Note:

    With an MS SQL database instance, earlier data might be truncated, as described in "Database Record Sizing". There is no data truncation with an Oracle database instance.
  5. Change the DSN (ODBC Data Source Name used by the RDBMS profile of audit & reporting applications) on this computer to refer to the new database instance.

    Note:

    If you have multiple Access Servers on the same computer, be sure to upgrade all Access Server instances on this computer before you change the DSN to refer to the new database.
  6. Start the Access Server service.

    The Access Server will now audit and store data in the new database instance. However, other Access Servers will continue to audit and store data in the old database instance.

  7. Upgrade all other Access Server instances as follows:

    • Upgrade the next Access Server instance but do not restart the Access Server service.

    • Repeat step 4 to import data for this Access Server instance.

      Note:

      If you have multiple Access Servers on the same computer, be sure to upgrade all Access Server instances on this computer before you change the DSN to refer to the new database.
    • Repeat step 5 to change the DSN (ODBC Data Source Name used by the RDBMS profile of the audit & reporting applications) on this computer to refer to the new database instance.

    • Repeat step 6 to restart the Access Server service on this computer.

    • Repeat this step (7) for all Access Servers in your environment.

  8. After upgrading all Access Server instances, you complete the rest of the Access System deployment-specific activities in this chapter. You can upgrade WebGates as described in"Upgrading WebGates In Place".

  9. Start auditing, as described in the Oracle Access Manager Identity and Common Administration Guide.

13.3 Confirming Access System Failover and Load Balancing

If your previous Access System installation was configured for failover or load balancing, it is a good idea to verify that these configurations are still working properly.

During Policy Manager Upgrades: When creating the Directory Server Profile during the incremental upgrade to release 6.5, directory server credentials are read from:

PolicyManager_install_dir/access/oblix/config/userDB.lst

If the configuration tree is in the user directory server and under the user node, then the configuration directory profile is not created. Otherwise, a configuration directory profile is created using directory server information from:

PolicyManager_install_dir/oblix/config/ldap/configdb.lst

The configuration directory profile is marked for use only by the Policy Manager. Profiles are not created for Policy Manager failover servers. In the case of release 6.1, if the policy tree was on a separate directory server a profile for policy data existed.

During Access Server Upgrades: Profiles are not created for the configuration or policy trees at this time. Before release 6.5, Access System connection pools values for Initial Connections and Maximum Connections appeared in the UserDB.lst and UserDBFailover.lst. These might not be retained. Also, many .lst files have been transformed into .xml files as part of the globalization effort.

After upgrading Access System Components, it is a good idea to verify the values for Initial Connections and Maximum Connections in the Database Instance profile of the newly created Directory Server profile.

Note:

For concurrent authentication requests on NDS directory servers, Oracle recommends that you increase the connection pool size to something higher than the default (1) for the user directory profile using the System Console.

To confirm failover, load balancing, and connection pool details after the Access System upgrade

  1. From the Access System Console, select System Configuration, Server Settings.

  2. Under the heading Configure LDAP Directory Server Profiles, select the name of the Profile you want to check.

  3. On the Directory Server Profile page, confirm the servers that use the failover information and confirm that the information matches previous settings. For example:

    • Maximum Active Servers

    • Failover Threshold

    • Sleep For (Seconds)

    • Max. Session Time (Min.)

  4. Locate the Database Instances list on the Directory Server Profile page and select the name of the Database Instance Profile you want to check.

  5. In the Database Instance Profile, verify the values for Initial Connections and Maximum Connections.

  6. Make any changes needed and save the profile.

  7. Perform a test to ensure that everything is working as expected.

For more information about configuring failover and load balancing, see the Oracle Access Manager Deployment Guide.

13.4 Upgrading Forms-based Authentication

As discussed in Chapter 4, in 10g (10.1.4.0.1), form-based authentication supports non-ASCII login credentials (username/password). When you use form-based authentication with 10g (10.1.4.0.1) WebGates, you must ensure that character set encoding for the login form is set to UTF-8.

To set the login form encoding to UTF-8 for 10g (10.1.4.0.1)

  1. Add the following META tag to the HEAD tag of the login form HTML page.

    <META http-equiv="Content-Type" content="text/html;charset=utf-8"> 
    
  2. If you upgrade an earlier WebGate to 10g (10.1.4.0.1), you must also update the login form HTML page after upgrading.

Note:

Basic Authentication fails with non-ASCII login credentials. Use form-based authentication for non-ASCII login credentials. Use Basic Authentication with ASCII login credentials.

13.5 Recompiling and Redesigning Custom Authentication and Authorization Plug-Ins

Custom Access System plug-ins are copied into the target directory during the Access Server upgrade. However, as discussed earlier, earlier plug-ins send and receive data in Latin-1 encoding.

To send or receive internationalized data you need to re-design plug-ins to use UTF-8 encoding. Also, on Solaris and Linux, release 5.2 and 6.x plug-ins must be re-compiled using the GCC v3.3.2 C++ compiler. For more information, see "Plug-ins".

Note:

Release 7.0 plug-ins as well as earlier plug-ins implemented as executables or those using a scripting language (such as perl) do not require recompiling after the upgrade. However, to send and receive internationalized data, earlier plug-ins should be redesigned to communicate using UTF-8 encoding.

To use authentication and authorization plug-ins

  1. Redesign custom authentication and authorization plug-ins to use UTF-8 encoding, if desired.

  2. Recompile release 5.2 or 6.x plug-ins on Solaris and Linux platforms using the GCC v3.3.2 compiler.

    WARNING:

    You must use the GCC v3.3.2 compiler, regardless of the compiler that might be provided with the Operating System.

  3. Complete any testing to ensure your plug-ins are working properly with 10g (10.1.4.0.1).

  4. When using plug-ins that send and receive data in Latin-1 encoding, ensure that any new Access Servers added to the upgraded environment are backward compatible as described in Chapter 4.

13.6 Associating Release 6.1.1 Authorization Rules with Access Policies

If you upgraded from release 6.5 or later, you can skip this discussion.

During an upgrade, the names of any release 6.1.1 Authorization Rules move to the Authorization Rules tab of the corresponding policy domain. In addition, the original rule is renamed with a combination of the name of the Policy to which the rule belongs, followed by the Authorization Rule name: PolicyName_AuthorizationRuleName.

For example, suppose your 6.1.1 installation includes a Policy Domain (named MyPolicyDomain) with two policies (named P1 and P2). And suppose that you have three Authorization Rules associated with these two policies: rules "A1" and "A2" are associated with policy P1, and rule A3 is associated with policy P2. In this case, after the upgrade you will find the following (under the Authorization Rules tab of MyPolicyDomain):

P1_A1 P1_A2 P2_A3

To confirm Release 6.1.1 Policy Domain Authorization Rule names

  1. After upgrading from release 6.1.1, navigate to the Policy Manager/Access System Console using the appropriate URL for your environment. For example:

    http://hostname:port/access/oblix
    

    where hostname refers to computer that hosts the Web server; port refers to the HTTP port number of the WebPass Web server instance; and /access/oblix connects to the Policy Manager and Access System Console.

  2. On the Access System landing page, select the Policy Manager link.

  3. On the main Policy Manager page, select My Policy Domains on the left side of the page.

  4. On the My Policy Domains page, select the link to one of your earlier Policy Domains: DomainName.

  5. On the domain page, select the Authorization Rules tab.

  6. On the Authorization Rules page, look for the renamed rules which are sorted alphabetically.

13.7 Assuring Proper Authorization Failure Re-directs After Upgrading from 6.1.1

Each authorization rule in your Policy Domains might include Allow Access and Deny Access conditions. The Allow Access condition of the rule specifies who is authorized to access a protected resource. The Deny Access condition of an authorization rule specifies the end users and groups of users who are explicitly denied access to a resource protected by the rule. If Allow Access or Deny Access conditions (or both) are specified and they do not apply to a user, the user is not qualified by the rule. If a user is unqualified by a rule, by default the user is denied access to the requested resource.

A new authorization state was introduced in release 7.x (apart from authorization success and failure states). This new state is "inconclusive". To accommodate this new state when your earlier installation included authorization failure redirects, you complete the procedure here to specify an explicit Deny rule and to change Allow takes precedence to Yes on the General panel of the authorization rule.

To reset your Authorization Rule

  1. After upgrading from release 6.1.1, navigate to the Policy Manager/Access System Console using the appropriate URL for your environment. For example:

    http://hostname:port/access/oblix
    

    where hostname refers to computer that hosts the Web server; port refers to the HTTP port number of the WebPass Web server instance; and /access/oblix connects to the Policy Manager and Access System Console.

  2. On the Access System landing page, select the Policy Manager link.

  3. On the main Policy Manager page, select My Policy Domains on the left side of the page.

  4. On the My Policy Domains page, select the link to one of your earlier Policy Domains: DomainName.

  5. On the domain page, select the Authorization Rules tab.

  6. On the Authorization Rules page, look for the renamed rules which are sorted alphabetically and select the rule you want to modify.

  7. On the General panel, confirm that Allow takes precedence is set to Yes.

  8. Select the Deny Access panel, then create or modify a rule to specify the users and groups who are denied access to resources protected by this rule (using the People, Role, Rule, and IP Address controls) as indicated in the Oracle Access Manager Access Administration Guide.

13.8 Updating the ObAMMasterAuditRule_getEscapeCharacter in Custom C Code

If your earlier installation does not use C code created with the Policy manager, that includes the ObAMMasterAuditRule_getEscapeCharacter you can skip this discussion.

An object of the ObAMMasterAuditRule class represents the master audit rule, which specifies global audit parameters and defaults to be used if there is no audit rule specified for a specific policy. In earlier releases, ObAMMasterAuditRule_getEscapeCharacter returned the audit escape character. In 10g (10.1.4.0.1), the C language API the ObAMMasterAuditRule_getEscapeCharacter remains and you can continue using this. However, the audit escape character must be an ASCII character; otherwise the return value is incorrect.

You might need to modify your C code to use the new ObAMMasterAuditRule_getUTF8EscapeCharacter, which returns a pointer to the UTF-8 encoded audit escape character.

For more information, see "Policy Manager API". For details about using the Policy Manager API, see the Oracle Access Manager Developer Guide.

13.9 Validating Access System Customization Upgrades

You need to test your upgraded Access System customizations in a test or development environment before deploying these in an upgraded production environment.

To validate Access System customization upgrades

  1. Verify that your customizations have been restored properly by performing specific operations that will exercise the upgraded customizations.

  2. Verify that auditing and access reporting is working properly.

  3. Upgrade Not Successful: Proceed to "Recovering from an Access System Customization Upgrade Failure".

  4. Upgrade Successful: Proceed to "Backing Up Upgraded Access System Customizations" next.

13.10 Backing Up Upgraded Access System Customizations

As mentioned earlier, Oracle recommends that you finish each upgrade by backing up the appropriate 10g (10.1.4.0.1) directory. This will enable you to easily restore your environment to the newly upgraded state should that be a requirement.

To back up Access System customizations after upgrading them

  1. Back up the 10g (10.1.4.0.1) directory that contains the upgraded customizations and store it in a new location.

  2. When all customizations are completed and redeployed, proceed to validating operations as described in Chapter 14.

13.11 Recovering from an Access System Customization Upgrade Failure

If an Access System customization was not successful, you can perform the following steps to rollback this upgrade, then try again.

To recover from an unsuccessful Access System component upgrade

  1. Restore the earlier customization files or directory that you backed up before the upgrade (to recover the earlier customization), then back it up again. You will retain one as a backup copy and use one in the next step.

  2. Using a backup copy of your earlier customization files, restart the upgrade as described in this chapter.

13.12 Looking Ahead

After ensuring that your previous Access System customizations are integrated and operating properly in the upgraded environment, see Chapter 14.

If you are using the zero downtime upgrade method, see also Part VI.