Skip navigation.

Integrating ALES with Application Environments

   Previous Next vertical dots separating previous/next from contents/index/pdf Contents View as PDF   Get Adobe Reader

Using the Administration Console

Accessing the Administration Console

Setting Administration Console Preferences

Securing ALES Components

Overview

ALES Resources

Administrative Operations

Privileges

Context Attributes

Evaluation Functions

Authorization Queries

Enumerated Types

ALES Identities

Default Role Mapping Policies

Default Authorization Policies

Viewing Authorization Policies

Setting Up Application Security Administrators

Overview

Establishing a Resource Parent for the Application

Create Administrative Users

Identity Directories

Users and Groups

Policies

Integrating ALES with Applications

Overview

Security Service Modules

SSM Security Providers

Web Server SSMs

Web Server SSM Overview

Web Server Environmental Binding

Web Services Security Service APIs

Security Providers

Web Server SSM Features

Web Single Sign-on Capabilities

Authentication Service Features

Authorization Service Features

Auditing Service Features

Role Mapping Features

Credential Mapping Features

Administration Features

Session Management Features

Configuration Features

Web Server Constraints and Limitations

Web Server SSM Integration Tasks

Web Server Environmental Bindings

WebLogic Server SSMs

WebLogic Server SSM Integration Tasks

WebLogic Server SSM Environmental Bindings

Enabling SAML-based Single Sign-On

Overview

Configuring ALES as a SAML Assertion Consumer

Configuring ALES as a SAML Assertion Producer

Enabling SPNEGO-based Single Sign-on

Configuring Single Sign-On with Microsoft Clients

Requirements

Enabling a Web Service or Web Application

Configuring the SPNEGO Security Provider

Editing the Descriptor File

Configuring Active Directory Authentication

Utility Requirements

Configuring and Verifying Active Directive Authentication

Configure the Active Directory Authentication Provider

Configure the Client .NET Web Service

Configure the Internet Explorer Client Browser

Configure the Sites

Configure Intranet Authentication

Verify the Proxy Settings

Set the Internet Explorer 6.0 Configuration Settings

Configuring Metadirectories

Why Use Metadirectories?

Metadirectory Configuration Overview

Installing the Metadirectory Software

Configuring Metadirectory Tables and Database Triggers

Creating Metadirectory Destination Tables

Metadirectory Destination Table Guidelines and Restrictions

Creating Metadirectory Destination Tables Using Oracle or Sybase

Configuring a JDBC Connection Pool and JMS

Configuring Metadirectory Database Triggers

Configuring Metadirectory Schemas

Extracting the Source Schemas

Loading the Source Schemas

Extracting the Destination Schemas

Loading the Destination Schemas

Configuring the Source-to-Destination Topology

Configuring the Topology Transformations

UpLoading User and Group Data

Configuring Metadirectory Synchronization

Configuring the Synchronization Hub

Configuring the Directory Connector

Configuring the Policy Database Connectors

Starting the Synchronization Hub

Starting the Source and Destination Connectors

Verifying that Metadirectory Synchronization Works

Authorization Caching

Understanding Authorization Caching

Configuring Authorization Caching

Authorization Caching Expiration Functions

 

Skip footer navigation  Back to Top Previous Next