Skip Headers
Oracle® Access Manager Integration Guide
10
g
(10.1.4.2)
Part Number E10356-01
Home
Book List
Index
Contact Us
Next
View PDF
Contents
List of Examples
List of Figures
List of Tables
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
What's New in Oracle Access Manager?
Product and Component Name Changes
Supported Integrations
Updates to the OracleAS Single Sign-On Integration
Updates to the Oracle Identity Federation Integration
Updates to the Siebel 7 Integration
Updates to the SAP Integration
Updates to the RSA Securid Integration
Updates to the WebLogic Integration
Updates to the WebSphere Integration
Updates to the Plumtree Integration
Configuring Single Sign-On with Oracle Identity Management
Configuring Impersonation
Configuring Single Sign-On with Lotus Domino
1
Introduction
1.1
About Oracle Access Manager Integrations
1.1.1
Integrations With Other Oracle Products
1.1.2
Integrations with Third-Party Products
Part I Integration with Oracle Applications and Middleware
2
Integrating the Apache v1.3 and Oracle HTTP Server
2.1
About the Integration of OHS and Oracle Access Manager
3
Integrating the Oracle Virtual Directory
3.1
About the Integration of Oracle Virtual Directory and Oracle Access Manager
4
Integrating with Oracle Application Servers
4.1
Integration Overview and Environment Preparation
4.1.1
Supported Authentication Schemes for the Oracle Application Servers
4.1.2
OracleAS 10g Infrastructure
4.1.3
Integration Architecture
4.1.4
Supported Versions and Platforms
4.1.5
Preparing Your Environment
4.2
Single Sign-On with OracleAS 10g
4.2.1
Enabling Single-Sign On
4.2.1.1
Creating the Java Class for Integration
4.2.2
Integrating the Delegated Administration Service
4.2.3
Integrating the Portal
4.2.4
Enabling Single-Sign On for Forms
4.2.5
Integrating Reports Services
4.2.6
Synchronizing the Oracle Internet Directory and Oracle Access Manager LDAP Directory
4.2.7
Implementing Global Logout from OracleAS Single Sign-On and Access Server
4.2.8
Configuring Oracle Access Manager for Integration with OracleAS 10g
4.2.8.1
Configuring the Access System for OracleAS Single Sign-On 10.1.2.0.2
4.2.9
Protecting the Single-Sign On Login URL
4.3
Authorization Support for Applications Protected by OracleAS Single Sign-On
4.3.1
About Authorization of OracleAS Single Sign-On-Protected Applications
4.3.2
Configuring Authorization Support for OracleAS Single Sign-On-Protected Resources
4.4
Testing the Integration with OracleAS
4.5
OracleAS 10g Files
4.5.1
SSOOblixAuth.java
4.5.2
Logout.jsp
4.6
Troubleshooting the OracleAS 10g Integration
5
Federated Single Sign-On Using Oracle Identity Federation
5.1
About Federated Single Sign-On
5.2
About Federated Authorization
5.3
Setting up the Federated Attribute Sharing Environment
5.3.1
Setting Parameters in the config.xml File
5.3.2
Configuring Basic Authentication
5.3.3
Configuring SSL and Client Certificate Authentication
5.3.4
Configure the Session Token Cache for Federated Attribute Sharing
5.4
Configuring the Authentication Scheme for Attribute Sharing
5.4.1
Configuring the Basic Components of the Authentication Scheme
5.4.2
Configuring Plug-ins and Steps for the Authentication Scheme
5.5
Configuring the Authorization Schemes and Policies for Attribute Sharing
5.5.1
Configuring Basic Characteristics of the Authorization Scheme
5.5.2
Configuring Rules and Policies for the Attribute Sharing Authorization Scheme
6
Integrating Oracle Identity Management
6.1
About the Integration with Oracle Identity Management
6.2
Oracle Identity Management Components
6.3
Supported Version and Platforms
6.4
Integration Architecture
6.5
Preparing Your Environment
6.6
Setting Up Oracle Access Manager Single Sign-On for Oracle Identity Management
6.7
Setting Up Oracle Identity Management for Single Sign-On with Oracle Access Manager
6.8
Configuring Apache as a Proxy for JBoss
7
Integrating Siebel 7
7.1
About the Integration with Siebel 7
7.1.1
Siebel 7 Components
7.2
Integration Architecture
7.3
Supported Version and Platforms
7.4
Preparing Your Environment
7.5
Setting Up Oracle Access Manager Single Sign-on for Siebel Application Server
7.5.1
Setting Up Siebel 7 for integration with Oracle Access Manager
7.5.2
Setting up Oracle Access Manager for Integration with Siebel 7
7.5.3
Testing Integration Between Oracle Access Manager and Siebel
7.5.4
Notes on Integrating in a Multi-Domain Active Directory Environment
7.6
Configuring Session Logout
7.6.1
Configuring the Siebel Timeout
7.6.2
Configuring the Oracle Access Manager Session Timeout
7.6.3
Configuring the Siebel Logout Behavior
8
Integrating PeopleSoft
8.1
About the Integration with PeopleSoft
8.2
PeopleSoft Components
8.3
PeopleSoft Integration Architecture
8.3.1
Single Sign-On Process
8.4
Supported Version and Platforms
8.5
Preparing Your Environment
8.6
Setting Up Oracle Access Manager Single Sign-On for PeopleSoft
8.7
Setting up PeopleSoft for Single Sign-On with Oracle Access Manager
8.8
Configuring Single Signoff for PeopleSoft
8.9
Troubleshooting the PeopleSoft Integration
9
Integrating Oracle E-Business Suite
9.1
About the Integration with Oracle E-Buisiness Suite
Part II Integration with Third-Party Applications
10
Integrating the Security Provider for WebLogic SSPI
10.1
About the Security Provider
10.1.1
WebLogic and Oracle Access Manager Integration Points
10.2
Integration Architecture
10.2.1
Authentication for Mixed Web and Non-Web Resources
10.2.2
Authentication for Web-Only Resources
10.2.3
Authentication for the Portal
10.3
Supported Versions and Platforms
10.4
Online Assistance
10.5
Installing and Configuring the Security Provider
10.5.1
Preparing the Environment
10.5.2
Installing the Security Provider
10.5.3
Completing a Typical Installation
10.5.4
Completing Advanced Installation
10.5.5
Setting Up WebLogic Policies in Oracle Access Manager
10.5.6
Running the NetPoint Policy Deployer
10.5.7
Manually Configuring WebLogic Policies in Oracle Access Manager
10.5.8
Mapping WebLogic Resources to Oracle Access Manager Resources
10.5.8.1
NetPointResourceMap.conf File Format
10.5.9
Preparing the WebLogic Environment
10.5.10
Configuring the Identity Server
10.5.11
Configuring Multiple WebPass Instances
10.6
Using Role Based Policies
10.6.1
Use the NetPoint Policy Deployer Tool
10.6.2
Manually Configure WebLogic Role Based Policies in Oracle Access Manager
10.7
Configuring Single Sign-On for the WebLogic Portal
10.7.1
Configuring web.xml to Add Filter-related Nodes
10.7.2
Adding Authentication Methods to web.xml
10.7.3
Configuring the login or groupspace jsp used by the Login Portlet
10.7.4
Copying ObLoginFilter.class in the WEB_INF/classes
10.7.5
Completing Setup
10.7.6
Testing Single Sign-On for the WebLogic Portal
10.8
Authorization Data from an External Source
10.9
Audit Files
10.10
Debug Log Files
10.11
User Creation/Deletion and Group Creation
10.12
Configuration Files
10.12.1
NetPointProvidersConfig.properties
10.12.2
NetPointWeblogicTools.properties
10.13
Implementation Notes for Active Directory
10.13.1
Configuring Security Provider for WebLogic
10.13.2
Setting a Domain in NetPointProvidersConfig.properties
10.13.2.1
About Parameter Names in the NetPointProvidersConfig.properties file
10.13.2.2
Setting up Cookies and Header Attributes in SSPI
10.14
Tips
10.14.1
WebLogic Portal Admin Console Changes
10.14.1.1
Configuring Multiple Policy Domains for Different WebLogic Servers
10.15
Troubleshooting the Security Provider for WebLogic
10.16
Additional Resources
11
Integrating with IBM WebSphere
11.1
About the Connector for WebSphere
11.1.1
WebSphere Components
11.1.2
Connector for WebSphere Components
11.2
Integration Architecture
11.2.1
Scenario 1: Use of NetPointWASRegistry
11.2.2
Scenario 2: Architecture for Single Sign-On
11.2.3
Mapping Users and Groups to Security Roles in WAS
11.3
Integration Scenario with the Oracle Access ManagerCMR
11.4
Supported Versions and Platforms
11.5
Preparing to Install the Connector
11.5.1
Preparing Your Environment
11.5.2
Configuring the Identity System for WAS Integration
11.5.2.1
Configuring WebPass Failover
11.5.2.2
Configuring the Identity Server
11.5.3
Configuring the Access System for WAS Integration
11.5.3.1
Configuring the AccessGate for WAS Integration
11.5.4
Configuring Resource Protection in the Access System
11.5.4.1
Defining a Resource Type for WebSphere
11.5.4.2
Defining an Authentication Scheme for WebSphere
11.5.4.3
Defining a Policy Domain for WebSphere
11.5.5
Defining a Policy Domain for the WebSphere v6.0 Administration Console
11.6
Installing the Connector for WebSphere
11.6.1
Launching the Installation
11.6.2
Defining the Installation Directory
11.6.3
Specifying Connector Details
11.6.4
Completing Details for the WebGate
11.6.5
Specifying AccessGate Details
11.6.6
Installing a Certificate
11.6.7
Configuring Multiple WebPass Instances for the Connector
11.7
Completing Connector Setup
11.7.1
Setting Up the Connector for WebSphere
11.7.2
Testing Environment Setup
11.8
Configuring WebSphere Application Server v5
11.8.1
Enabling the NetPointWASRegistry in WAS v5
11.8.2
Testing the NetPointWASRegistry for WebSphere v5
11.8.3
Configuring the TAI for WebSphere v5
11.8.3.1
Testing the TAI for WAS v5
11.8.3.2
Enabling Logging for TAI for WAS v5
11.9
Configuring the WebSphere Application Server v6
11.9.1
Supported Versions and Platforms
11.9.2
Enabling the NetPointWASRegistry for WAS 6 and 6.1
11.9.3
Testing the NetPointWASRegistry for WebSphere v6
11.9.4
Configuring the TAI for WebSphere 6 and 6.1
11.9.5
Testing the TAI for WAS 6 and 6.1
11.9.6
Enabling Logging for TAI for WAS 6 and 6.1
11.10
Integrating with WebSphere Portal
11.10.1
About Integration with the CMR
11.10.2
Setting up the WebSphere Portal v5.0.2 with Oracle Access Manager
11.10.3
Setting Up WebSphere Portal v5.1 With Oracle Access Manager
11.10.4
Setting Up WebSphere Portal v6.0 With Oracle Access Manager
11.10.5
Managing Users and Groups with Portal v5 and v6
11.10.6
Modifying User Profiles and Attributes with Portal v5 and v6
11.10.7
Password Management with Portal v5 and v6
11.10.8
Access Control for the WebSphere Portal v5 and v6
11.10.9
Configuring Single Sign-on Functions for the Portal v5 and v6
11.11
Configuration Files
11.11.1
NetPointWASRegistry.properties
11.11.2
WebGate.properties
11.11.3
TrustedServers.properties
11.12
Implementation Notes for the TAI
11.13
Implementation Notes for Active Directory
11.13.1
Configuring the Connector for WebSphere for an Active Directory Forest
11.13.2
Set Active Directory Domain in NetPointWASRegistry.properties
11.14
Troubleshooting the Connector for WebSphere
11.14.1
Troubleshooting the Connector for Portal Server v5
11.14.1.1
Portal Server v5 Installation-Related Issues
11.14.1.2
Custom Security Integration Related Issues
12
Integrating Plumtree Corporate Portal
12.1
About the Integration with Plumtree Corporate Portal
12.2
Supported Versions and Platforms
12.3
Enabling Single Sign-on in PlumTree 5.0.4
12.3.1
Creating a Single Sign-On Authentication Source
12.3.2
Creating an LDAP Authentication Source
12.3.3
Editing Configuration Files to Support Single Sign-On
12.3.4
Synchronizing LDAP Data with Plumtree Database
12.3.4.1
Viewing Synchronized Information
12.3.5
Enabling Single Sign-On Logout
12.4
Setting Up the Access System to Protect Plumtree 5.0.4
12.4.1
Installing Oracle Access Manager Components
12.4.2
Creating a Policy Domain
12.4.3
Configuring the WebGate
12.4.4
Configuring WebGate for IIS
12.5
Integrating Other Features
12.5.1
Enabling Anonymous Users to View Portal Guest Pages
12.5.2
Using the Knowledge Directory
12.5.2.1
Setting Preferences in the Knowledge Directory
12.5.2.2
Creating Folders
12.5.2.3
Uploading Documents
12.5.3
Password Management
12.5.4
Self-Registration
13
Integrating mySAP Applications
13.1
About Integrating Oracle Access Manager with mySAP
13.2
SAP Components
13.2.1
SAP Internet Transaction Server
13.2.2
Pluggable Authentication Service
13.2.3
Integration Architecture
13.3
Supported Versions and Platforms
13.4
Preparing to Integrate Oracle Access Manager with SAP
13.5
Setting up Oracle Access Manager Single Sign-on for mySAP
13.5.1
Setting Up SAP for Integration with Oracle Access Manager
13.5.2
Setting Up Oracle Access Manager for Integration with SAP
13.5.3
Testing Integration Between Oracle Access Manager and SAP
13.6
Integrating the SAP Enterprise Portal 6.0 and SAP NetWeaver Enterprise Portal SP9
13.6.1
Architecture for the Integration with SAP Enterprise Portal 6.0 and SAP NetWeaver Enterprise Portal
13.6.2
Supported Platforms for Integrating with SAP Enterprise Portal 6.0 and SAP NetWeaver Enterprise Portal
13.6.3
Integrating SAP Enterprise Portal 6.0
13.6.3.1
Prerequisites
13.6.3.2
Configuring a Proxy to Access SAP Enterprise Portal 6.0
13.6.3.3
Configure Oracle Access Manager for SAP Enterprise Portal 6.0
13.6.3.4
Configure WebGate on the Proxy Server
13.6.3.5
Configure SAP Enterprise Portal 6.0 for External Authentication
13.6.3.6
Testing the Integration with SAP Enterprise Portal 6.0
13.6.3.7
Troubleshooting the Integration with SAP Enterprise Portal 6.0
13.6.4
Integrating SAP NetWeaver Enterprise Portal SP9
13.6.4.1
Prerequisites for Integrating with SAP NetWeaver Enterprise Portal
13.6.4.2
Configuring the Proxy Servers and Oracle Access Manager for integration with SAP NetWeaver Enterprise Portal
13.6.4.3
Configuring SAP NetWeaver Enterprise Portal for the Integration
13.6.4.4
Testing the Integration with SAP NetWeaver Enterprise Portal
13.6.4.5
Troubleshooting the Integration with SAP NetWeaver Enterprise Portal
14
Integrating the RSA SecurID Authentication Plug-In
14.1
About Oracle Access Manager and SecurID Authentication
14.1.1
Supported Versions and Platforms
14.1.2
RSA Components
14.1.3
Oracle Access Manager Components
14.1.4
Integration Summary
14.2
Support and Requirements
14.2.1
Supported Versions and Platforms
14.2.2
RSA ACE/Server Requirements
14.2.2.1
Next Tokencode Mode Support
14.2.2.2
New PIN Mode Support
14.2.3
Oracle SecurID Access Server and ACE/Agent Requirements
14.2.4
Access Server and ACE/Agent Requirements
14.2.5
WebGate Requirements
14.2.5.1
SecurID CGI Script
14.3
SecurID Authentication Scenarios
14.3.1
SecurID Authentication Sequence
14.3.2
Next Tokencode Sequence
14.3.3
New PIN Sequence
14.4
Integrating SecurID Authentication
14.4.1
Preparing Your Environment
14.4.2
Setting up the Access Server as an ACE/Agent
14.4.2.1
Registering an ACE/Agent Host
14.4.2.2
Setting up the ACE/Agent Host
14.4.3
Setting Up a SecurID WebGate
14.4.3.1
Relocating Oracle SecurID Directories
14.4.3.2
Setting up the SecurID CGI Script
14.4.3.3
Configuring the CGI Directory
14.4.4
Creating a SecurID Authentication Scheme
14.4.4.1
Background
14.4.4.2
Defining an Authentication Scheme for SecurID
14.4.5
Protecting SecurID Resources
14.4.5.1
Creating a Policy Domain
14.4.5.2
Adding a Resource to Your Policy Domain
14.4.5.3
Defining Rules for this Domain
14.4.6
Testing the Policy Domain
14.4.7
Adding ACE/Server Users to Oracle Access Manager
14.5
Oracle Access Manager Authentication Plug-In Parameters
14.5.1
SecurID Plug-In Parameters
14.5.2
Credential Mapping Plug-In Parameters
14.6
Active Directory Forest Considerations
14.6.1
Prerequisites
14.6.2
Integrating SecurID with an Active Directory Forest
14.6.2.1
SecurID Forms for an Active Directory Forest
14.7
Troubleshooting
14.7.1
ACE/Agent Issues
14.7.2
ACE/Server Configuration File
14.7.3
CGI Directory on SecurID WebGates
14.7.4
Environment Variable on Unix Systems
14.7.5
Form-Based Authentication
14.7.6
Access Server Log
14.7.7
Web Server Logs
14.7.8
RSA ACE/Server Logs
14.7.9
Permissions
14.7.10
SecurID Plug-In Parameters with Modified HTML Fields
14.7.11
Login Can Fail if the Login Attribute Contains an "@" Character
15
Integrating Smart Cards
15.1
About Smart Cards and the Access System
15.2
About Oracle Access Manager Components
15.3
About Client Certificate Authentication Schemes
15.3.1
Challenge Method, Challenge Parameter, and SSL Configuration for Smart Cards
15.3.2
Plug-Ins for Certificate-Based Authentication that You Use for Smart Cards
15.3.2.1
cert_decode Plug-In
15.3.2.2
credential_mapping Plug-In
15.4
Integration Architecture
15.4.1
Example Integration Architecture: ActivCard Authentication
15.5
Supported Versions and Platforms
15.6
Examples of Setting Up Smart Card Authentication
15.6.1
Setting Up Smart Cards for ActivCard
15.6.1.1
Preparing Active Directory
15.6.1.2
Preparing the CA and Enrolling for a Certificate
15.6.1.3
Preparing IIS Web Servers
15.6.1.4
Preparing Oracle Access Manager for Smart Card Authentication
15.6.1.5
Protecting Resources with Oracle Access Manager
15.6.1.6
Setting Up the IIS Manager
15.7
Troubleshooting
15.7.1
Problem Requesting X.509 Certificates
15.7.2
Additional Resources
15.7.2.1
Active Directory Resources
15.7.2.2
Smart Card Resources
15.7.2.3
Oracle Access Manager Policy Domain Details
16
Single Sign-On for Lotus Domino
16.1
Configuring Single Sign-On for Lotus Domino
17
Integrating SharePoint Server
17.1
About Oracle Access Manager and the SharePoint Server
17.1.1
About Windows Impersonation
17.2
Supported Platforms and Requirements
17.2.1
Supported Versions and Platforms
17.2.2
Required Microsoft Components
17.2.3
Required Oracle Access Manager Components
17.3
Request Processing by the SharePoint Portal Server Integration
17.4
Integrating with SharePoint Portal Server 2003
17.4.1
Installing Microsoft Components
17.4.2
Installing Oracle Access Manager Components
17.4.2.1
Defining Managed Paths in SharePoint
17.5
Integrating with SharePoint Office Server 2007
17.6
Setting Up Impersonation
17.6.1
Creating a Trusted User Accounts
17.6.2
Assigning Rights to the Trusted User
17.6.3
Binding the Trusted User to Your WebGate
17.6.4
Adding an Impersonation Action to a Policy Domain
17.6.5
Adding an Impersonation dll to IIS
17.6.6
Testing Impersonation
17.6.6.1
Creating an IIS Virtual Site Not Protected by SharePoint Server
17.6.6.2
Testing Impersonation Using the Event Viewer
17.6.6.3
Testing Impersonation using a Web Page
17.6.6.4
Negative Testing for Impersonation
17.7
Completing the SharePoint Server Integration
17.7.1
Configuring IIS Security
17.7.2
Configuring the Wildcard Extension
17.7.3
Editing web.config
17.7.4
Synchronizing User Profiles Between Directories
17.7.5
Testing Your Integration
17.7.5.1
Testing the SharePoint Portal Server Integration
17.7.5.2
Testing Single Sign-On for the SharePoint Portal Server Integration
18
Integrating With ASP.NET
18.1
About ASP.NET
18.2
Security Principals and Security Identifiers (SIDs)
18.3
IPrincipal.IsInRole Method Syntax
18.3.1
Parameters
18.3.2
Return value
18.3.3
Supported Versions and Platforms
18.3.4
Requirements
18.4
About the Security Connector for ASP.NET
18.5
Oracle Access Manager Components and Requirements
18.6
The OblixHttpModule
18.6.1
The OblixPrincipal Object
18.7
Authorization with the Security Connector for ASP.NET
18.8
Using the Security Connector for ASP.NET
18.8.1
Setting Up Your Environment
18.9
Setting Up the ASP.NET Application for the Security Connector
18.9.1
Setting up the Oracle Access Manager Role Action
18.10
Oracle Access Manager Role-Based Authorization
19
Integrating Authorization Manager Services
19.1
About Oracle Access Manager and the AzMan Plug-In
19.1.1
Supported Versions and Platforms
19.2
Authorization with the AzMan Plug-In
19.3
Oracle Access Manager Components and Requirements
19.3.1
Oracle Access Manager Authorization Rules and Schemes
19.4
About the Windows Authorization Manager
19.4.1
Authorization Stores
19.4.2
Applications and Scopes
19.4.3
Operations and Tasks
19.4.4
Roles
19.4.5
Groups
19.4.6
Rules
19.4.7
Auditing
19.4.8
Authorization Manager (AzMan) API
19.5
Examples
19.5.1
Example 1: An Expense Application
19.5.2
Example 2: Oracle Access Manager Configuration
19.5.2.1
Authorization Scheme
19.5.2.2
Policy Domain
19.5.2.3
Resources
19.5.2.4
Authorization Rules
19.5.2.5
Default Rules
19.5.2.6
Access Policy
19.5.2.7
Delegated Access Administrators
19.5.3
Example 3: Authorization Process Flow
19.6
Configuring the AzMan Plug-In
19.6.1
Preparing Your Environment
19.6.2
Creating an Authorization Scheme for the AzMan Plug-In
19.6.3
Protecting Resources
19.6.4
Defining Authorization Rules and Policies
19.6.5
Using the AzMan Plug-In with the Access Manager API
19.7
Troubleshooting
20
Enabling Impersonation with the Access System
20.1
About Windows Impersonation
20.2
About Impersonation and the Access System
20.3
Enabling Impersonation With a Header Variable
20.3.1
Requirements
20.3.2
Creating an Impersonator as a Trusted User
20.3.3
Assigning Rights to the Trusted User
20.3.4
Binding the Trusted User to Your WebGate
20.3.5
Adding an Impersonation Action to a Policy Domain
20.3.6
Adding an Impersonation DLL to IIS
20.3.7
Extending Impersonation to Resources Beyond the WebGate's Host Computer
20.3.8
Testing Impersonation
20.3.8.1
Creating an IIS Virtual Site Not Protected by SPPS
20.3.8.2
Testing Impersonation Using the Event Viewer
20.3.8.3
Testing Impersonation using a Web Page
20.4
Setting Up Impersonation with Integrations
20.5
Enabling Impersonation with a User Name and Password
20.6
Setting Up Impersonation for OWA
20.6.1
Creating a Trusted User Account for OWA
20.6.2
Assigning Rights to the OWA Trusted User
20.6.3
Binding the Trusted OWA User to Your WebGate
20.6.4
Adding an Impersonation Action to a Policy Domain
20.6.5
Adding an Impersonation dll to IIS
20.6.6
Testing Impersonation for OWA
20.6.6.1
Testing Impersonation Using the Event Viewer
20.6.6.2
Testing Impersonation using a Web Page
20.7
Windows Impersonation Background
20.7.1
Access Tokens
20.7.2
Security IDs
20.7.3
Access Control Lists and Entries
20.7.4
Wildcard Extension
20.7.5
The Kerberos Protocol
20.7.6
The S4U2Self Extension
20.8
Negative Testing for Impersonation
21
Integrating With the Content Management Server
21.1
About Oracle Access Manager and the MCMS
21.1.1
About Windows Impersonation
21.2
Support and Requirements
21.2.1
Supported Versions and Platforms
21.2.2
Required Oracle Access Manager Components
21.2.3
Required Microsoft Components
21.3
Request Processing by the Integration
21.4
Integrating with the MCMS
21.4.1
Installing Oracle Access Manager
21.4.2
Installing Microsoft Components
21.4.3
Integrating with the MCMS
21.4.4
Setting Up Impersonation
21.4.5
Completing the MCMS Integration
21.4.6
Testing the MCMS Integration
21.4.6.1
Testing NetPoint/MCMS Integration
21.4.6.2
Testing single sign-on for the MCMS Integration
Part III Appendices
A
Configuring Logout
A.1
About Oracle Access Manager Logout
A.2
How Logout Works
A.3
Configuring and Customizing the Logout URL and Page
A.4
Configuring Single Sign-Off for an Integration Between Oracle Access Manager and Another Product
Index