Skip Headers
Oracle® Identity Manager Connector Guide for Microsoft Active Directory User Management
Release 9.1.1

Part Number E11197-07
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
View PDF

2 Deploying the Connector

The procedure to deploy the connector can be divided into the following stages:

Note:

Some of the procedures described in this chapter are meant to be performed on the target system. The minimum permissions required to perform these procedures depends on the target system that you are using:

2.1 Preinstallation

Preinstallation information is divided across the following sections:

2.1.1 Preinstallation on Oracle Identity Manager

This section contains the following topics:

2.1.1.1 Files and Directories On the Installation Media

The contents of the connector installation media directory are described in Table 2-1.

Table 2-1 Files and Directories On the Installation Media

File in the Installation Media Directory Description

configuration/ActiveDirectory-CI.xml

This XML file contains configuration information that is used during the connector installation process.

lib/xliActiveDirectory.jar

This JAR file contains the class files required for provisioning. During connector installation, this file is copied into the following directory:

OIM_HOME/xellerate/JavaTasks

lib/xliADRecon.jar

This JAR file contains the class files required for reconciliation. During connector installation, this file is copied into the following directory:

OIM_HOME/xellerate/ScheduleTask

Files in the resources directory

Each of these resource bundles contains language-specific information that is used by the connector. During connector installation, these resource bundles are copied into the following directory:

OIM_HOME/xellerate/connectorResources

Note: A resource bundle is a file containing localized versions of the text strings that are displayed on the Administrative and User Console. These text strings include GUI element labels and messages.

scripts/ProvTerminalServiceAttr.vbs

This VBScript file is used to set values for Terminal Services Profile fields of the target system during provisioning operations. This script is called by the Remote Manager.

While performing the procedure described in "Installing the Remote Manager", you copy this file into a directory on the target system host computer.

scripts/ReconTerminalServiceAttr.vbs

This VBScript file is used to fetch values from Terminal Services Profile fields of the target system during reconciliation runs. This script is called by the Remote Manager.

While performing the procedure described in "Installing the Remote Manager", you copy this file into a directory on the target system host computer.

test/config/config.properties

This file is used to set input test data for the connector testing utility.

test/config/log.properties

This file is used to set log messages that must be displayed on the console when you run the connector testing utility.

test/lib/xlapiclient.ear

This EAR file contains the JAR files required to run the testing utility for Oracle Identity Manager running on IBM WebSphere Application Server.

test/scripts/runADTest.bat

test/scripts/runADtest.sh

These scripts are used to run the testing utility.

test/scripts/wsapiclient.cmd

This file is used by the testing utility if Oracle Identity Manager is running on IBM WebSphere Application Server.

xml/ActiveDirectory-ConnectorConfig.xml

This XML file contains definitions for the connector components. These components include the following:

  • Resource objects

  • IT resource types

  • Process forms

  • Process tasks and adapters

  • Process definition

  • Prepopulate rules

  • Lookup definitions

  • Scheduled tasks


Note:

The files in the test directory are used only to run tests on the connector by using the testing utility. The Diagnostic Dashboard is an alternative to the testing utility. Chapter 5, "Testing the Connector" describes both testing options.

2.1.1.2 Determining the Release Number of the Connector

You might have a deployment of an earlier release of the connector. While deploying the latest release, you might want to know the release number of the earlier release. To determine the release number of the connector that has already been deployed:

  1. In a temporary directory, extract the contents of the following JAR file:

    OIM_HOME/xellerate/JavaTasks/xliActiveDirectory.jar

  2. Open the Manifest.mf file in a text editor. The Manifest.mf file is one of the files bundled inside the xliActiveDirectory.jar file.

    In the Manifest.mf file, the release number of the connector is displayed as the value of the Version property.

2.1.2 Preinstallation on the Target System

Preinstallation on the target system involves performing the procedure described in the following section.

2.1.2.1 Creating a Target System User Account for Connector Operations

Oracle Identity Manager requires a target system user account to access the target system during reconciliation and provisioning operations. You provide the credentials of this user account while performing the procedure described in "Configuring the IT Resource for the Target System".

In Microsoft Active Directory

You can use a Microsoft Windows 2003 Server (Domain Controller) administrator account. Alternatively, you can create a user account and assign the minimum required rights to the user account.

Note:

If you want to enable the reconciliation of deleted target system records, then you must use an administrator account.

To create the Microsoft Active Directory user account for connector operations:

See Also:

Microsoft Active Directory documentation for detailed information about performing this procedure
  1. Create a group (for example, OIMGroup) on the target system. While creating the group, select Security Group as the group type and as Global or Universal as the group scope.

  2. Make this group a member of the Account Operators group.

  3. Assign all read permissions to this group.

    Note:

    You assign read permissions on the Security tab of the Properties dialog box for the user account. This tab is displayed only in Advanced Features view. To switch to this view, select Advanced Features from the View menu on the Microsoft Active Directory console.
  4. Create a user (for example, OIMUser) on the target system.

  5. Make the user a member of the group (for example, OIMGroup) created in Step 1.

In Microsoft ADAM

To create the Microsoft ADAM user account for connector operations:

See Also:

Microsoft ADAM documentation for detailed information about these steps
  1. Create a user account in Microsoft ADAM.

  2. Set a password for the user account.

  3. Enable the user account by setting the msDS-UserAccountDisabled field to false.

  4. Enter a value in the userPrincipalName field.

    The value that you provide must be in the user_name@domain_name format, for example, OIMuser@mydomain.com.

  5. Add the distinguished name of the user to the Administrators group.

2.2 Installation

Installation steps are divided across the following sections:

2.2.1 Installation on Oracle Identity Manager

Installation on Oracle Identity Manager consists of the following procedures:

2.2.1.1 Running the Connector Installer

Note:

In this guide, the term Connector Installer has been used to refer to the Connector Installer feature of the Administrative and User Console.

To run the Connector Installer:

  1. Copy the contents of the connector installation media directory into the following directory:

    OIM_HOME/xellerate/ConnectorDefaultDirectory

  2. Log in to the Administrative and User Console by using the user account described in the "Creating the User Account for Installing Connectors" section of Oracle Identity Manager Administrative and User Console Guide.

  3. Click Deployment Management, and then click Install Connector.

  4. From the Connector List list, select ActiveDirectory 9.1.1. This list displays the names and release numbers of connectors whose installation files you copy into the default connector installation directory:

    OIM_HOME/xellerate/ConnectorDefaultDirectory

    If you have copied the installation files into a different directory, then:

    1. In the Alternative Directory field, enter the full path and name of that directory.

    2. To repopulate the list of connectors in the Connector List list, click Refresh.

    3. From the Connector List list, select ActiveDirectory 9.1.1.

  5. Click Load.

  6. To start the installation process, click Continue.

    The following tasks are performed, in sequence:

    1. Configuration of connector libraries

    2. Import of the connector XML files (by using the Deployment Manager)

    3. Compilation of adapters

    On successful completion of a task, a check mark is displayed for the task. If a task fails, then an X mark and a message stating the reason for failure is displayed. Depending on the reason for the failure, make the required correction and then perform one of the following steps:

    • Retry the installation by clicking Retry.

    • Cancel the installation and begin again from Step 0.

  7. If all three tasks of the connector installation process are successful, then a message indicating successful installation is displayed. In addition, a list of steps that you must perform after the installation is displayed. These steps are as follows:

    1. Ensuring that the prerequisites for using the connector are addressed

      Note:

      At this stage, run the PurgeCache utility to load the server cache with content from the connector resource bundle in order to view the list of prerequisites. See "Clearing Content Related to Connector Resource Bundles from the Server Cache" for information about running the PurgeCache utility.

      There are no prerequisites for some predefined connectors.

    2. Configuring the IT resource for the connector

      Record the name of the IT resource displayed on this page. The procedure to configure the IT resource is described later in this guide.

    3. Configuring the scheduled tasks

      Record the names of the scheduled tasks displayed on this page. The procedure to configure these scheduled tasks is described later in this guide.

When you run the Connector Installer, it copies the connector files and external code files to destination directories on the Oracle Identity Manager host computer. These files are listed in Table 2-2.

Table 2-2 Files Copied During Connector Installation

File in the Connector Installation Media Directory Destination Directory

lib/xliActiveDirectory.jar

OIM_HOME/xellerate/JavaTasks

lib/xliADRecon.jar

OIM_HOME/xellerate/ScheduleTask

Files in the resources directory

OIM_HOME/xellerate/connectorResources


Installing the Connector in an Oracle Identity Manager Cluster

While installing the connector in a clustered environment, you must copy all the JAR files and the contents of the resources directory into the destination directories on each node of the cluster. See Table 2-2 for information about the files that you must copy and their destination locations on the Oracle Identity Manager host computer.

2.2.1.2 Copying the Connector Files

Table 2-3 lists the files that you must copy to the Oracle Identity Manager host computer.

Note:

  • The directory paths given in the first column of this table correspond to the location of the connector files on the installation media. See "Files and Directories On the Installation Media" for more information about these files.

  • If a particular destination directory does not already exist on the Oracle Identity Manager host computer, then create it.

Table 2-3 Files to Be Copied to the Oracle Identity Manager Host Computer

File in the Installation Media Directory Destination Directory

Files in the scripts directory

OIM_HOME/XLIntegrations/ADUM/scripts

Files in the test directory

OIM_HOME/XLIntegrations/ADUM/test


2.2.1.3 Copying the ldapbp.jar File

The ldapbp.jar file is used by the connector to enable LDAP-based search of user records on the target system. You must download this file from the Sun Web site and copy it into the ThirdParty directory as follows:

  1. Log on the Sun Web site at

    http://java.sun.com/products/jndi/downloads/index.html

  2. Click Download JNDI 1.2.1 & More.

  3. From the table on the page that is displayed, select and download the ldap-1_2_4.zip file.

  4. Extract the contents of the ZIP file and copy the ldapbp.jar file from the lib directory to the OIM_HOME/xellerate/ThirdParty directory.

Note:

In an Oracle Identity Manager cluster, copy this JAR file into the ThirdParty directory on each node of the cluster.

2.2.1.4 Configuring the IT Resource for the Target System

The IT resource for the target system is created during connector installation. This IT resource contains connection information about the target system. Oracle Identity Manager uses this information during reconciliation and provisioning.

You must specify values for the parameters of the ADITResource IT resource as follows:

  1. Log in to the Administrative and User Console.

  2. Expand Resource Management.

  3. Click Manage IT Resource.

  4. In the IT Resource Name field on the Manage IT Resource page, enter ADITResource and then click Search. Figure 2-1 shows the Manage IT Resource page.

    Figure 2-1 Manage IT Resource Page

    Description of Figure 2-1 follows
    Description of "Figure 2-1 Manage IT Resource Page"

  5. Click the edit icon for the IT resource.

  6. From the list at the top of the page, select Details and Parameters.

  7. If you are using a Remote Manager to provision to or reconcile from the Terminal Services Profile fields, then select the name of the Remote Manager.

  8. Specify values for the parameters of the IT resource. Figure 2-2 shows the Edit IT Resource Details and Parameters page.

    Figure 2-2 Edit IT Resource Details and Parameters Page

    Description of Figure 2-2 follows
    Description of "Figure 2-2 Edit IT Resource Details and Parameters Page"

    Table 2-4 describes each parameter of the IT resource.

    Table 2-4 Parameters of the IT Resource for the Target System

    Parameter Description

    ADAM Lockout Threshold Value

    If the target system is Microsoft ADAM, then enter the number of unsuccessful login attempts after which a user's account must be locked.

    If the target system is Microsoft Active Directory, then you need not enter a value. The value set in Microsoft Active Directory is automatically determined and used.

    Default value: 5

    ADGroup LookUp Definition

    This parameter holds the name of the lookup definition in which the names of group fields are stored after group lookup synchronization.

    Value: Lookup.ADReconciliation.GroupLookup

    This value is the same as that of the Lookup Code Name attribute of the AD Group Lookup Recon scheduled task, which is discussed in "Scheduled Tasks for Lookup Field Synchronization".

    Note: You must not change the value of this parameter.

    Admin FQDN

    Enter the fully qualified domain name of the user account that you create by performing the procedure described in "Creating a Target System User Account for Connector Operations".

    You can use any one of the following formats to enter the domain name:

    • user_login@domain.com

    • cn=user_login,cn=Users,dc=domain,dc=com

    Sample values:

    john_doe@example.com

    cn=OIMadmin,cn=Users,dc=domain,dc=com

    Admin Password

    Enter the password of the user account that you create by performing the procedure described in "Creating a Target System User Account for Connector Operations".

    AtMap ADUser

    This parameter holds the name of the lookup definition for user field mappings between Oracle Identity Manager and the target system. This lookup definition is used during user provisioning operations.

    The default value of this parameter is AtMap.AD. Retain this value if the target system is Microsoft Active Directory.

    If you are using Microsoft ADAM, then change the value to AtMap.ADAM.

    Port Number

    Enter the number of the port at which SSL is running on the target system host computer.

    Sample values:

    For Microsoft Active Directory:

    • 636, if the Use SSL parameter is set to yes

    • 389, if the Use SSL parameter is set to no

    For Microsoft ADAM:

    • 50000, if the Use SSL parameter is set to yes

    • 50001, if the Use SSL parameter is set to no

    The Use SSL parameter is described later in this table. This parameter is also mentioned in "Configuring SSL for Microsoft Active Directory".

    Remote Manager Prov Lookup

    This parameter holds the name of the lookup definition that stores Terminal Services Profile field mappings between Oracle Identity Manager and the target system.

    Value: AtMap.AD.RemoteScriptlookUp

    Note: You must not change the value of this parameter.

    If you want to use Environment, Remote Control, or Sessions fields for provisioning operations, then see "Adding New Fields for Provisioning".

    Remote Manager Prov Script Path

    Enter the full path and name of the ProvTerminalServiceAttr.vbs script file on the target system host computer.

    Sample value: RM_HOME\scripts\ProvTerminalServiceAttr.vbs

    See "Installing the Remote Manager" for more information.

    Note:

    • Do not enter a value for this parameter if you do not want to use the Remote Manager.

    • This parameter is not used for Microsoft ADAM.

    Root Context

    Enter the base DN on which reconciliation of deleted user data and provisioning are to be carried out.

    Sample values:

    dc=example,dc=com

    Note: You must enter a value for this parameter.

    Server Address

    Enter the host name or IP address of the Microsoft Windows computer (target system host computer) on which Microsoft Active Directory is installed.

    Sample values:

    w2khost

    172.20.55.120

    Invert Display Name

    Enter yes if you want the Display Name field to be in the LAST_NAME FIRST_NAME format. Enter (or retain) no if you want the Display Name field to be in the FIRST_NAME LAST_NAME format.

    For example, if you enter yes, then the Display Name field for user John Doe would show Doe John.

    Default value: no

    Note:

    • This parameter is used only during provisioning operations.

    • If you want to set this parameter to yes, then note that it works only with the ADITResource IT resource. It will not work if the IT resource for the target system has a different name. This point has also been mentioned under Bug 7212391 in the "Known Issues" chapter.

    Use SSL

    Enter yes to specify that you will configure SSL between Oracle Identity Manager and the target system. Otherwise, enter no.

    Default value: yes

    Note: It is recommended that you configure SSL to secure communication with the target system. You must configure SSL if you want to set or change user passwords during provisioning operations. Refer to "Configuring SSL for Microsoft Active Directory" for information about enabling SSL.

    isADAM

    Enter yes to specify that the target system is Microsoft ADAM.

    Enter no to specify that the target system is Microsoft Active Directory.

    isLookupDN

    Use this parameter as follows to specify whether you want the Lookup.ADReconciliation.GroupLookup and Lookup.ADReconciliation.Organization lookup definitions to be populated with distinguished names (DNs) or relative DNs during lookup field synchronization:

    • Enter yes if you want the lookup fields to be populated with the DNs.

    • Enter no if you want the lookup fields to be populated with the relative DNs.

    Default value: no

    Note: The value of this parameter is used during lookup field synchronization, provisioning, and reconciliation. After a lookup field synchronization run, you must not change the value of this parameter. This point is also mentioned in "Guidelines on Using the Connector".

    isUserDeleteLeafNode

    In Microsoft Active Directory, a user account can have other user accounts defined as its leaf nodes. Use the isUserDeleteLeafNode parameter to configure one of the following events to take place when a Delete User provisioning operation is carried out on a user account that has leaf nodes:

    • Enter yes as the value of the parameter if you want the user account and its leaf nodes to be deleted on the target system.

    • Enter no as the value of the parameter if you want a message stating that the user account has leaf nodes to be displayed to the user performing the Delete User provisioning operation.

    Default value: no

    Note: This parameter is not used for Microsoft ADAM. You must not change the default value if the target system is Microsoft ADAM.

    Allow Password Provisioning

    Enter yes as the value of this parameter if you want:

    • Password changes on Oracle Identity Manager to be propagated to the target system. This applies to both trusted source and target resource modes.

    • Password changes for an OIM User to be propagated to all resources allocated (provisioned) to the OIM User.

    Enter no as the value of this parameter if you do not want password changes on Oracle Identity Manager to be propagated to the target system.

    AtMap ADGroup

    Enter the name of the lookup definition that stores field mappings used for group provisioning:

    For Microsoft Active Directory: AtMap.ADGroup

    For Microsoft ADAM: AtMap.ADAMGroup

    UPN Domain

    Enter the name of the domain in which you want to provision and reconcile users.

    Sample value: example.com

    On the Administrative and User Console, the User ID field is prepopulated with the User Login value from the OIM User form. In addition, the User Principal Name field is prepopulated with the concatenated value of the User ID field and UPN Domain parameter value separated by the at sign (@). For example, if you enter example.com as the value of the UPN Domain parameter and if the user ID is jdoe, then the User Principal Name field is prepopulated with jdoe@example.com.

    If required, you can change the User ID part of the User Principal Name field value during provisioning operations.

    Target Locale: TimeZone

    Enter the time zone of the target system. For example, enter GMT-07:00 if the target system is in Arizona in the United States.


  9. To save the values, click Update.

2.2.2 Installation on the Target System

This section discusses the following topics:

2.2.2.1 Installing the Remote Manager

The Remote Manager enables you to include the Terminal Services Profile fields of the target system in reconciliation and provisioning operations.

Note:

  • Perform the procedure described in this section only if you want to include Terminal Services Profile fields in reconciliation and provisioning operations.

  • In this guide, the directory in which you install the Remote Manager is referred to as RM_HOME.

To install the Remote Manager:

  1. The Remote Manager installation files are shipped along with the Oracle Identity Manager installation files. You can install the Remote Manager on any computer that is a part of the domain. Depending on the application server that you use, perform the procedure to install the Remote Manager by following the instructions given in one of the following guides:

    • Oracle Identity Manager Installation and Configuration Guide for Oracle WebLogic Server

    • Oracle Identity Manager Installation and Configuration Guide for IBM WebSphere Application Server

    • Oracle Identity Manager Installation and Configuration Guide for JBoss Application Server

    • Oracle Identity Manager Installation and Configuration Guide for Oracle Application Server

  2. Copy the following JAR files into the RM_HOME\xlremote\JavaTasks directory:

    • OIM_HOME\xellerate\lib\xlVO.jar

    • OIM_HOME\xellerate\lib\xlScheduler.jar

    • OIM_HOME\xellerate\lib\xlAPI.jar

    • OIM_HOME\xellerate\JavaTasks\xliActiveDirectory.jar

    • OIM_HOME\xellerate\ScheduleTask\xliADRecon.jar

  3. Copy the ReconTerminalServiceAttr.vbs and ProvTerminalServiceAttr.vbs files from the OIM_HOME/XLIntegrations/ADUM/scripts directory to any directory that you create inside the RM_HOME directory.

    Note:

    • Ensure that the directory into which you copy the scripts has the required read and write permissions for the target system user account used by Oracle Identity Manager. This user account is described in "Creating a Target System User Account for Connector Operations".

    • Ensure that the RM_HOME directory is secured using Microsoft Windows best practices. Only the target system user account for Oracle Identity Manager must have permissions to access the RM_HOME directory.

  4. Use the following script to start the Remote Manager:

    RM_HOME\xlremote\remotemanager.bat
    
  5. Note the Remote Manager service name and URL. These values are displayed in the Remote Manager command window. You will need these values while creating the IT resource for the Remote Manager. The default values are RManager and rmi://HOST_NAME:12346. For example, for a Remote Manager running on ten.mydomain.com, the default values will be RManager and rmi://ten.mydomain.com:12346.

2.2.2.2 Enabling Logging in the Remote Manager

To enable logging in the Remote Manager:

  1. Add the following lines in the RM_HOME\xlremote\config\log.properties file:

    log4j.logger.OIMCP.ADCS=LOG_LEVEL
    
  2. In these lines, replace LOG_LEVEL with the log level that you want to set.

    For example:

    log4j.logger.OIMCP.ADCS=INFO
    
  3. In the log.properties file, use the following parameter to specify the name and location of the file in which you want log information to be recorded:

    log4j.appender.logfile.File
    

2.2.2.3 Enabling Client-Side Authentication for the Remote Manager

To enable client-side authentication for the Remote Manager:

  1. Open the RM_HOME/xlremote/config/xlconfig.xml file in a text editor.

  2. Set the ClientAuth property to true as follows:

    <ClientAuth>true</ClientAuth>
    
  3. Ensure that the RMIOverSSL property is set to true as follows:

    <RMIOverSSL>true</RMIOverSSL>
    
  4. Perform Steps 2 through 3 in the OIM_HOME/config/xlconfig.xml file.

2.3 Postinstallation

Postinstallation steps are divided across the following sections:

2.3.1 Postinstallation on Oracle Identity Manager

Configuring Oracle Identity Manager involves performing the following procedures:

Note:

In a clustered environment, you must perform these procedures on each node of the cluster.

2.3.1.1 Clearing Content Related to Connector Resource Bundles from the Server Cache

While you deploy the connector, the resource bundles are copied from the resources directory on the installation media into the OIM_HOME/xellerate/connectorResources directory. Whenever you add a new resource bundle in the connectorResources directory or make a change in an existing resource bundle, you must clear content related to connector resource bundles from the server cache.

To clear content related to connector resource bundles from the server cache:

  1. In a command window, change to the OIM_HOME/xellerate/bin directory.

    Note:

    You must perform Step 1 before you perform Step 2. An exception is thrown if you run the command described in Step 2 as follows:

    OIM_HOME/xellerate/bin/BATCH_FILE_NAME

  2. Enter one of the following commands:

    • On Microsoft Windows:

      PurgeCache.bat ConnectorResourceBundle
      
    • On UNIX:

      PurgeCache.sh ConnectorResourceBundle
      

    Note:

    You can ignore the exception that is thrown when you perform Step 2. This exception is different from the one mentioned in Step 1.

In this command, ConnectorResourceBundle is the content category that you must delete from the server cache.

See Also:

The following file for information about content categories:

OIM_HOME/config/xlconfig.xml

2.3.1.2 Enabling Logging

When you enable logging, Oracle Identity Manager automatically stores in a log file information about events that occur during the course of provisioning and reconciliation operations. To specify the type of event for which you want logging to take place, you can set the log level to one of the following:

  • ALL

    This level enables logging for all events.

  • DEBUG

    This level enables logging of information about fine-grained events that are useful for debugging.

  • INFO

    This level enables logging of messages that highlight the progress of the application at a coarse-grained level.

  • WARN

    This level enables logging of information about potentially harmful situations.

  • ERROR

    This level enables logging of information about error events that may allow the application to continue running.

  • FATAL

    This level enables logging of information about very severe error events that could cause the application to stop functioning.

  • OFF

    This level disables logging for all events.

The file in which you set the log level and the log file path depend on the application server that you use:

  • Oracle WebLogic Server

    To enable logging:

    1. Add the following line in the OIM_HOME/xellerate/config/log.properties file:

      log4j.logger.OIMCP.ADCS=LOG_LEVEL
      
    2. In this line, replace LOG_LEVEL with the log level that you want to set.

      For example:

      log4j.logger.OIMCP.ADCS=INFO
      

    After you enable logging, the log information is displayed on the server console.

  • IBM WebSphere Application Server

    To enable logging:

    1. Add the following line in the OIM_HOME/xellerate/config/log.properties file:

      log4j.logger.OIMCP.ADCS=LOG_LEVEL
      
    2. In these line, replace LOG_LEVEL with the log level that you want to set.

      For example:

      log4j.logger.OIMCP.ADCS=INFO
      

    After you enable logging, log information is written to the following file:

    WEBSPHERE_HOME/AppServer/logs/SERVER_NAME/SystemOut.log

  • JBoss Application Server

    To enable logging:

    1. In the JBOSS_HOME/server/default/conf/log4j.xml file, locate or add the following lines:

      <category name="OIMCP.ADCS">
         <priority value="LOG_LEVEL"/>
      </category>
      
    2. In the second XML code line of each set, replace LOG_LEVEL with the log level that you want to set. For example:

      <category name="OIMCP.ADCS">
         <priority value="INFO"/>
      </category>
      

    After you enable logging, log information is written to the following file:

    JBOSS_HOME/server/default/log/server.log

  • Oracle Application Server

    To enable logging:

    1. Add the following line in the OIM_HOME/xellerate/config/log.properties file:

      log4j.logger.OIMCP.ADCS=LOG_LEVEL
      
    2. In this line, replace LOG_LEVEL with the log level that you want to set.

      For example:

      log4j.logger.OIMCP.ADCS=INFO
      

    After you enable logging, log information is written to the following file:

    ORACLE_HOME/opmn/logs/default_group~home~default_group~1.log

2.3.1.3 Configuring High Availability of the Target System

Suppose you have set up multiple, replicated installations of the target system for high availability. You can use the Lookup.AD.BackupServers lookup definition to ensure that if the primary target system installation becomes unavailable, then Oracle Identity Manager switches to one of the secondary target system installations. The Lookup.AD.BackupServers lookup definition is one of the lookup definitions created when you deploy the connector.

For a single primary installation, you can have any number of secondary installations. In addition, if you configure the connector to work with multiple primary installations, then you can specify secondary installations for each primary installation.

To use the Lookup.AD.BackupServers lookup definition, open it in the Design Console and enter code key and decode values for each combination of primary and secondary target system installation.

See Also:

Oracle Identity Manager Design Console Guide for information about working with lookup definitions

Table 2-5 shows samples entries for the Lookup.AD.BackupServers lookup definition.

Table 2-5 Samples Entries for the Lookup.AD.BackupServers Lookup Definition

Code Key Decode

172.20.55.64

172.20.55.65

172.20.55.64

172.20.55.66

172.20.55.97

172.20.55.98


In this table, the first two entries represent two secondary installations (172.20.55.65 and 172.20.55.66) for one primary installation (172.20.55.64). The third entry shows a one-to-one combination of primary (172.20.55.97) and secondary (172.20.55.98) installations.

2.3.2 Postinstallation on the Target System

Postinstallation on the target system consists of the following procedure.

2.3.2.1 Enabling or Disabling Password Policies in Microsoft Active Directory

In Microsoft Active Directory, the "Passwords must meet complexity requirements" policy setting is used to enable or disable password policies.

The procedure that you must perform depends on whether or not you want to achieve either or both of the following objectives:

  • Enable password policies

  • Configure SSL between Oracle Identity Manager and the target system

    Note:

    The procedure to configure SSL is discussed later in this guide.

Suppose there is a password policy on the target system for enforcing that the password field of user accounts is never left empty. At the same time, suppose you do not configure SSL. Under these conditions, the target system would reject provisioning operations that leave the password field empty. Therefore, you would not be able to perform such provisioning operations from Oracle Identity Manager. To enable provisioning operations under these conditions, you must disable password policies on the target system.

If you configure SSL and you want to enable both the default Microsoft Windows password policy and a custom password policy, then you must enable the "Passwords must meet complexity requirements" policy setting.

To enable or disable the "Passwords must meet complexity requirements" policy setting:

Note:

If you install Microsoft ADAM in a domain controller then it acquires all the policies of Microsoft Active Directory installed in the same domain controller. If you install Microsoft ADAM in a workgroup, then the local system policies are applied.
  1. On the Microsoft Windows computer hosting the target system, click the Start menu, Programs, Administrative Tools, and Domain Security Policy.

  2. Select Security Settings, expand Account Policies, and then click Password Policy.

  3. Double-click Passwords must meet complexity requirements.

  4. In the Password Must Meet Complexity Requirements Properties dialog box, select Define this policy setting and then select:

    • Enabled, if you want to enable password policies

    • Disable, if you do not want to enable password policies

  5. Click OK.

  6. Restart the target system.

2.3.3 Configuring the Remote Manager

This section discusses the following topics:

2.3.3.1 Creating the IT Resource for the Remote Manager

Note:

  • The information in this section does not apply to Microsoft ADAM.

  • If the target system is Microsoft Active Directory, then perform this procedure only if you want to use the Terminal Services Profile fields of the target system during reconciliation and provisioning operations.

To create the IT resource for the Remote Manager:

  1. Log in to the Administrative and User Console.

  2. Expand Resource Management.

  3. Click Create IT Resource.

  4. On the Step 1: Provide IT Resource Information section, perform the following steps:

    • IT Resource Name: Enter a name for the IT resource.

    • IT Resource Type: Select Remote Manager from the IT Resource Type list.

    • Remote Manager: Do not enter a value in this field.

  5. Click Continue. Figure 2-3 shows the IT resource values added on the Create IT Resource page.

    Figure 2-3 Step 1: Provide IT Resource Information

    Description of Figure 2-3 follows
    Description of "Figure 2-3 Step 1: Provide IT Resource Information"

  6. On the Step 2: Specify IT Resource Parameter Values section, specify values for the parameters of the IT resource and then click Continue. Figure 2-4 shows the Step 2: Specify IT Resource Parameter Values section.

    Figure 2-4 Step 2: Specify IT Resource Parameter Values

    Description of Figure 2-4 follows
    Description of "Figure 2-4 Step 2: Specify IT Resource Parameter Values"

    Table 2-6 provides information about the parameters of the IT resource.

    Table 2-6 Parameters of the IT Resource for the Remote Manager

    Parameter Description

    service name

    Enter a name for the Remote Manager.

    Sample value: RManager

    url

    Enter the IP address of the target system host computer and the port number at which the Remote Manager is listening.

    Sample value: rmi://10.0.0.1:12346


  7. On the Step 3: Set Access Permission to IT Resource page, the SYSTEM ADMINISTRATORS group is displayed by default in the list of groups that have Read, Write, and Delete permissions on the IT resource that you are creating.

    Note:

    This step is optional.

    If you want to assign groups to the IT resource and set access permissions for the groups, then:

    1. Click Assign Group.

    2. For the groups that you want to assign to the IT resource, select Assign and the access permissions that you want to set. For example, if you want to assign the ALL USERS group and set the Read and Write permissions to this group, then you must select the respective check boxes in the row, as well as the Assign check box, for this group.

    3. Click Assign.

  8. On the Step 3: Set Access Permission to IT Resource page, if you want to modify the access permissions of groups assigned to the IT resource, then:

    Note:

    • This step is optional.

    • You cannot modify the access permissions of the SYSTEM ADMINISTRATORS group. You can modify the access permissions of only other groups that you assign to the IT resource.

    1. Click Update Permissions.

    2. Depending on whether you want to set or remove specific access permissions for groups displayed on this page, select or deselect the corresponding check boxes.

    3. Click Update.

  9. On the Step 3: Set Access Permission to IT Resource page, if you want to unassign a group from the IT resource, then:

    Note:

    • This step is optional.

    • You cannot unassign the SYSTEM ADMINISTRATORS group. You can unassign only other groups that you assign to the IT resource.

    1. Select the Unassign check box for the group that you want to unassign.

    2. Click Unassign.

  10. Click Continue. Figure 2-5 shows the Step 3: Set Access Permission to IT Resource page.

    Figure 2-5 Step 3: Set Access Permission to IT Resource

    Description of Figure 2-5 follows
    Description of "Figure 2-5 Step 3: Set Access Permission to IT Resource"

  11. On the Step 4: Verify IT Resource Details page, review the information that you provided on the first, second, and third pages. If you want to make changes in the data entered on any page, click Back to revisit the page and then make the required changes.

  12. To proceed with the creation of the IT resource, click Continue. Figure 2-6 shows Step 4: Verify IT Resource Details page.

    Figure 2-6 Step 4: Verify IT Resource Details

    Description of Figure 2-6 follows
    Description of "Figure 2-6 Step 4: Verify IT Resource Details "

  13. The Step 5: IT Resource Connection Result page displays the results of a connectivity test that is run using the IT resource information. If the test is successful, then click Create. If the test fails, then you can perform one of the following steps:

    • Click Back to revisit the previous pages and then make corrections in the IT resource creation information.

    • Click Cancel to stop the procedure, and then begin from the first step onward.

    • Proceed with the creation process by clicking Create. You can fix the problem later, and then rerun the connectivity test by using the Diagnostic Dashboard.

      Note:

      If no errors are encountered, then the label of the button is Create, not Continue.

      Figure 2-7 shows the Step 5: Resource Connection Result page.

      Figure 2-7 Step 5: IT Resource Connection Result

      Description of Figure 2-7 follows
      Description of "Figure 2-7 Step 5: IT Resource Connection Result "

  14. Click Finish. Figure 2-8 shows the IT Resource Created Page

    Figure 2-8 Step 6: IT Resource Created

    Description of Figure 2-8 follows
    Description of "Figure 2-8 Step 6: IT Resource Created"

2.3.3.2 Configuring Oracle Identity Manager to Trust the Remote Manager

To configure Oracle Identity Manager to trust the Remote Manager:

  1. From the computer hosting the Remote Manager, copy the RM_HOME/xlremote/config/xlserver.cert file to a temporary directory on the Oracle Identity Manager host computer.

    Note:

    The server certificate in the OIM_HOME directory is also named xlserver.cert. Ensure that you do not overwrite that certificate.
  2. To import the certificate by using the keytool utility, run the following command:

    JAVA_HOME/jre/bin/keytool -import -alias ALIAS -file RM_CERT_LOCATION/xlserver.cert -keystore OIM_HOME/xellerate/config/.xlkeystore -storepass PASSWORD
    

    In the preceding command, replace:

    • JAVA_HOME with the location of the Java directory for your application server.

    • ALIAS with an alias for the certificate in the store.

    • RM_CERT_LOCATION with the full path of the temporary directory where you copied the certificate.

    • PASSWORD with the password of the keystore.

  3. Copy the OIM_HOME/xellerate/config/xlserver.cert file to a temporary directory on the Remote Manager host computer.

  4. To import the certificate by using the keytool utility on the Remote Manager host computer, run the following command:

    JAVA_HOME/jre/bin/keytool -import -alias ALIAS -file OIM_CERT_LOCATION/xlserver.cert -keystore RM_HOME/xlremote/config/.xlkeystore -storepass PASSWORD
    

    In the preceding command, replace:

    • JAVA_HOME with the location of the Java directory for your application server.

    • ALIAS with an alias for the certificate in the store.

    • OIM_CERT_LOCATION with the full path of the temporary directory where you copied the certificate.

    • PASSWORD with the password of the keystore.

      Note:

      It is recommended that you follow security best practices and change the default passwords used for the Remote Manager keystore. To change the Remote Manager keystore password, follow the instructions given in Oracle Identity Manager Installation and Configuration Guide for your application server.

2.3.3.3 Verifying That the Remote Manager Is Running

To verify that the Remote Manager is running:

  1. Use the following script to start the Remote Manager:

    RM_HOME\xlremote\remotemanager.bat

  2. Log in to the Design Console.

  3. Expand Administration, and double-click Remote Manager.

  4. Search for and open the Remote Manager that you have created.

  5. Click the Refresh icon. The screen displays details of the Remote Manager that you have configured. The "running" check box should be selected for the Remote Manager. This implies that the status of the Remote Manager is active.

2.3.4 Configuring SSL for Microsoft Active Directory

To configure SSL communication between Oracle Identity Manager and Microsoft Active Directory, you must perform the following tasks:

2.3.4.1 Installing Certificate Services

To install Certificate Services on the target system host computer:

Note:

Before you begin installing Certificate Services, you must ensure that Internet Information Services (IIS) is installed on the target system host computer.
  1. Insert the operating system installation media into the CD-ROM or DVD drive.

  2. Click Start, Settings, and Control Panel.

  3. Double-click Add/Remove Programs.

  4. Click Add/Remove Windows Components.

  5. Select Certificate Services.

  6. In the Windows Components Wizard, follow the instructions to start Certificate Services.

    Note:

    While providing input to the wizard, select Enterprise root CA as the CA type. This is required for adding a policy with the Domain Controller template, which is a step that you perform in the next procedure.

2.3.4.2 Enabling LDAPS

The target system host computer must have LDAP over SSL (LDAPS) enabled. To enable LDAPS:

  1. On the Active Directory Users and Computers console, right-click the domain node, and select Properties.

  2. Click the Group Policy tab.

  3. Select Default Domain Policy.

  4. Click Edit.

  5. Click Computer Configuration, Windows Settings, Security Settings, and Public Key Policies.

  6. Right-click Automatic Certificate Request Settings, and then select New and Automatic Certificate Request. A wizard is started.

  7. Use the wizard to add a policy with the Domain Controller template.

At the end of this procedure, the certificate is created and LDAPS is enabled on port 636. You can use an LDAP browser utility to verify that LDAPS is working.

Note:

While performing the procedure described in "Configuring the IT Resource for the Target System", you specify the port number as the value of the Port Number parameter.

2.3.4.3 Setting Up the Target System Certificate As a Trusted Certificate

If the Microsoft Active Directory certificate is not issued or certified by a CA, then set it up as a trusted certificate. To do this, you first export the certificate and then import it into the keystore of the Oracle Identity Manager host computer as a trusted CA certificate.

To export the Microsoft Active Directory certificate:

  1. Click Start, Programs, Administrative Tools, and Certification Authority.

  2. Right-click the Certification Authority that you create, and then select Properties.

  3. On the General tab, click View Certificate.

  4. On the Details tab, click Copy To File.

  5. Use the wizard to create a certificate (.cer) file using base-64 encoding.

To import the target system certificate into the certificate store of the Oracle Identity Manager host computer:

Note:

All application server releases supported by Oracle Identity Manager release 9.1.0 are supported.

In a clustered environment, you must perform this procedure on all the nodes of the cluster.

  1. Copy the target system certificate to the Oracle Identity Manager host computer.

  2. Change to the directory where you copy the certificate file, and then enter a command similar to the following:

    keytool -import -alias ALIAS -file CER_FILE -keystore MY_CACERTS -storepass PASSWORD
    

    In this command:

    • ALIAS is the alias for the certificate (for example, the server name).

    • CER_FILE is the full path and name of the certificate (.cer) file.

      Table 2-7 shows the location of the certificate store for each of the supported application servers.

      Table 2-7 Certificate Store Locations

      Application Server Certificate Store Location

      Oracle WebLogic Server

      • If you are using BEA jrockit_R27.3.1-jdk, then copy the certificate into the following directory:

        JROCKIT_HOME/jre/lib/security

      • If you are using the default Oracle WebLogic Server JDK, then copy the certificate into the following directory:

        WEBLOGIC_HOME/java/jre/lib/security/cacerts

      IBM WebSphere Application Server

      • For a nonclustered configuration of any supported IBM WebSphere Application Server release, import the certificate into the following certificate store:

        WEBSPHERE_HOME/java/jre/lib/security/cacerts

      • For IBM WebSphere Application Server 6.1.x, in addition to the cacerts certificate store, you must import the certificate into the following certificate store:

        WEBSPHERE_HOME/AppServer/profiles/SERVER_NAME/config/cells/CELL_NAME/nodes/NODE_NAME/trust.p12

        For example:

        C:\Program Files\IBM\WebSphere\AppServer\profiles\AppSrv02\config\cells\wkslaurel3224Node02Cell\nodes\wkslaurel3224Node02\trust.p12

      • For IBM WebSphere Application Server 5.1.x, in addition to the cacerts certificate store, you must import the certificate into the following certificate store:

        WEBSPHERE_HOME/etc/DummyServerTrustFile.jks

      JBoss Application Server

      JAVA_HOME/jre/lib/security/cacerts

      Oracle Application Server

      ORACLE_HOME/jdk/jre/lib/security/cacerts


  3. To confirm whether or not the certificate has been imported successfully, enter a command similar to the following:

    keytool -list -alias ALIAS -keystore MY_CACERTS -storepass PASSWORD
    

    For example:

    keytool -list -alias MyAlias -keystore C:\mydir\java\jre\lib\security\cacerts -storepass changeit
    
  4. For a nonclustered configuration of IBM WebSphere Application Server, download the jsse.jar file from the Sun Web site and copy this file into the WEBSPHERE_HOME/java/jre/lib/ext directory.

  5. For a clustered configuration of IBM WebSphere Application Server, download the jnet.jar, jsse.jar, and jcert.jar files from the Sun Web site and copy these files into the WEBSPHERE_HOME/java/jre/lib/ext directory.

2.3.5 Configuring SSL for Microsoft ADAM

To configure SSL communication between Oracle Identity Manager and Microsoft ADAM, you must perform the following tasks:

2.3.5.1 Generating the Certificate in Microsoft ADAM

Note:

Before you begin generating the certificate, you must ensure that Internet Information Services (IIS) is installed on the target system host computer.

To generate the certificate in Microsoft ADAM, perform the following procedures:

2.3.5.1.1 Submitting a Request for the Certificate

To submit a request for the certificate:

  1. On the target system host computer, open Internet Information Services (IIS) Manager.

    You can use one of the following methods to open Internet Information Services (IIS) Manager:

    • Use the following URL:

      http://localhost/certsrv

    • Open Control Panel, double-click Administrative Tools, and then double-click IIS Service.

  2. Expand Web Sites, and then expand Default Web Site.

  3. Right-click CertSrv, and then select Browse.

  4. Click Request a certificate.

  5. Click Advanced certificate request.

  6. Click Create and submit a request to this CA.

  7. On the Advanced Certificate Request page, perform the following actions:

    Note:

    There are instructions for only some of the fields on this page. For the remaining fields, you can enter values according to your requirements.
    • In the Name field, enter the fully qualified domain name (FQDN) of the target system host computer. For example, enter hk128.corp.example.com.

      Note:

      On your target system installation, if a value is already selected in this field, then you need not change it.

      You need not enter values in the remaining fields of the Identifying Information region.

    • Select Store certificate in local computer certificate store.

    • Select PCKS10 as the format.

    • In the Friendly name field, enter the FQDN of the target system host computer. For example, enter hk128.corp.example.com.

  8. Click Submit.

  9. When a message asking you to confirm that you want to request a certificate is displayed, click Yes.

2.3.5.1.2 Issuing the Certificate

To issue the certificate:

  1. On the target system host computer, open Control Panel.

  2. Double-click Administrative Tools, and then double-click Certification Authority.

  3. In the Certification Authority window, expand Administrator and then open Pending Requests.

    The request that you created earlier is displayed on the right pane.

  4. Right-click the request, select All Tasks, and then select Issue.

  5. Open the Issued Certificates folder.

    The certificate is displayed on the right pane.

  6. Open Internet Information Services (IIS) Manager.

  7. Expand Web Sites, and then expand Default Web Site.

  8. Right-click CertSrv, and then select Browse.

  9. Click View the status of pending certificate request.

  10. Click the link for the certificate request.

  11. Click Install this certificate.

  12. When a message asking you to confirm that you want to add the certificate is displayed, click Yes.

    A message saying that the certificate has been successfully installed is displayed.

2.3.5.1.3 Adding the Certificate to the Personal Store of the Microsoft ADAM Service

To add the certificate to the personal store of the Microsoft ADAM service:

  1. On the target system host computer, use the Run dialog box to run the command for opening the Microsoft Management Console:

    mmc

  2. On the Microsoft Management Console, click File and then select Add/Remove Snap-in.

  3. On the Standalone tab of the Add/Remove Snap-in dialog box, click Add.

  4. From the list of snap-ins, select Certificates and then click Add.

  5. In the Certificates snap-in dialog box, select Service account.

  6. In the Select Computer dialog box, select Local computer and then click Next.

  7. From the Service account list in the Certificates snap-in dialog box, select the Microsoft ADAM service instance and then click Finish.

  8. In the Certificates snap-in dialog box, select My user account and then click Finish.

  9. In the Certificates snap-in dialog box, select Computer account and then click Next.

  10. In the Select Computer dialog box, select Local computer and then click Finish.

  11. Click Close, and then click OK.

  12. In the Microsoft Management Console window, expand Certificates - Local Computer, expand Personal, and then open Certificates.

  13. Right-click the certificate that you have added and copy it.

    The name of this certificate is the FQDN of the host computer.

  14. Paste the certificate into the following folders:

    • Personal folder under the Certificates - Service (ADAM_INSTANCE_NAME) on Local Computer folder

    • Personal folder under the Certificates - Current User folder

  15. To save the changes that you have made to the Microsoft Management Console, click File and then select Save.

2.3.5.1.4 Assigning Permissions to the Certificate Key

To assign the required permissions to the folder containing the certificate key:

  1. In Microsoft Windows Explorer, navigate to the MachineKeys folder. The path to this folder is similar to the following:

    C:\Documents and Settings\All Users\Application Data\Microsoft\Crypto\RSA\MachineKeys

  2. Right-click the MachineKeys folder, and then select Properties.

  3. Use the Add button to add the following groups and users:

    • Administrators

    • Everyone

    • NETWORK SERVICE

    • The user name of the account used to install Microsoft ADAM

    • SYSTEM

  4. From the Permissions list, select Full Control.

  5. Click Apply, and then click OK.

  6. In Microsoft Windows Explorer, expand the MachineKeys folder and select the certificate key. The time stamp for this certificate key is the date and time at which you created the certificate.

    Note:

    Refresh the folder if the certificate key that you created is not displayed.
  7. Right-click the key, and select Properties.

  8. Use the Add button to add the following groups and users:

    • Administrators

    • Everyone

    • NETWORK SERVICE

    • The user name of the account used to install Microsoft ADAM

    • SYSTEM

  9. From the Permissions list, select Full Control.

  10. Click Apply, and then click OK.

2.3.5.1.5 Restarting the Microsoft ADAM Instance

To restart the Microsoft ADAM instance:

  1. Open Control Panel.

  2. Double-click Administrative Tools, and then select Services.

  3. In the Services window, right-click the Microsoft ADAM instance and then select Restart.

2.3.5.1.6 Testing the Certificate

To test the certificate:

  1. To open the ADAM Tools Command Prompt window on the target system host computer, click Start, Programs, ADAM, and ADAM Tools Command Prompt.

  2. In the ADAM Tools Command Prompt window, enter ldp and then press Enter.

  3. From the Connection menu of the LDAPS dialog box, select Connect.

  4. In the Connect dialog box:

    • In the Server field, enter the FQDN of the target system host computer.

    • In the Port field, enter the SSL port number.

    • Select SSL.

  5. Click OK.

  6. If SSL has been successfully configured, then status messages about the connection are displayed on the right pane of the LDAPS window.

2.3.5.2 Setting Up the Target System Certificate As a Trusted Certificate

If the Microsoft ADAM certificate is not issued or certified by a CA, then set it up as a trusted certificate. To do this, you first export the certificate and then import it into the keystore of the Oracle Identity Manager host computer as a trusted CA certificate.

To export the Microsoft ADAM certificate:

  1. Open the Microsoft Management Console.

  2. In the Microsoft Management Console window, expand Certificates - Local Computer, expand Personal, and then open Certificates.

  3. Right-click the certificate, select All Tasks, and then select Export.

  4. Use the wizard to create a certificate (.cer) file using base-64 encoding.

To import the target system certificate into the certificate store of the Oracle Identity Manager host computer:

Note:

All application server releases supported by Oracle Identity Manager release 9.1.0 are supported.

In a clustered environment, you must perform this procedure on all the nodes of the cluster.

  1. Copy the target system certificate to the Oracle Identity Manager host computer.

  2. Change to the directory where you copy the certificate file, and then enter a command similar to the following:

    keytool -import -alias ALIAS -file CER_FILE -keystore MY_CACERTS -storepass PASSWORD
    

    In this command:

    • ALIAS is the alias for the certificate (for example, the server name).

    • CER_FILE is the full path and name of the certificate (.cer) file.

      Table 2-8 shows the location of the certificate store for each of the supported application servers.

      Table 2-8 Certificate Store Locations

      Application Server Certificate Store Location

      Oracle WebLogic Server

      • If you are using BEA jrockit_R27.3.1-jdk, then copy the certificate into the following directory:

        JROCKIT_HOME/jre/lib/security

      • If you are using the default Oracle WebLogic Server JDK, then copy the certificate into the following directory:

        WEBLOGIC_HOME/java/jre/lib/security/cacerts

      IBM WebSphere Application Server

      • For a nonclustered configuration of any supported IBM WebSphere Application Server release, import the certificate into the following certificate store:

        WEBSPHERE_HOME/java/jre/lib/security/cacerts

      • For IBM WebSphere Application Server 6.1.x, in addition to the cacerts certificate store, you must import the certificate into the following certificate store:

        WEBSPHERE_HOME/AppServer/profiles/SERVER_NAME/config/cells/CELL_NAME/nodes/NODE_NAME/trust.p12

        For example:

        C:\Program Files\IBM\WebSphere\AppServer\profiles\AppSrv02\config\cells\wkslaurel3224Node02Cell\nodes\wkslaurel3224Node02\trust.p12

      • For IBM WebSphere Application Server 5.1.x, in addition to the cacerts certificate store, you must import the certificate into the following certificate store:

        WEBSPHERE_HOME/etc/DummyServerTrustFile.jks

      JBoss Application Server

      JAVA_HOME/jre/lib/security/cacerts

      Oracle Application Server

      ORACLE_HOME/jdk/jre/lib/security/cacerts


  3. To confirm whether or not the certificate has been imported successfully, enter a command similar to the following:

    keytool -list -alias ALIAS -keystore MY_CACERTS -storepass PASSWORD
    

    For example:

    keytool -list -alias MyAlias -keystore C:\mydir\java\jre\lib\security\cacerts -storepass changeit
    
  4. For a nonclustered configuration of IBM WebSphere Application Server, download the jsse.jar file from the Sun Web site and copy this file into the WEBSPHERE_HOME/java/jre/lib/ext directory.

  5. For a clustered configuration of IBM WebSphere Application Server, download the jnet.jar, jsse.jar, and jcert.jar files from the Sun Web site and copy these files into the WEBSPHERE_HOME/java/jre/lib/ext directory.