Contents for Integrating ALES with Application Environments
Using the Administration Console
Accessing the Administration Console
Setting Administration Console Preferences
Securing ALES Components
Overview
ALES Resources
Administrative Operations
Privileges
Context Attributes
Evaluation Functions
Authorization Queries
Enumerated Types
ALES Identities
Default Role Mapping Policies
Default Authorization Policies
Viewing Authorization Policies
Setting Up Application Security Administrators
Overview
Establishing a Resource Parent for the Application
Create Administrative Users
Identity Directories
Users and Groups
Policies
Integrating ALES with Applications
Overview
Security Service Modules
SSM Security Providers
Web Server SSMs
Web Server SSM Overview
Web Server Environmental Binding
Web Services Security Service APIs
Security Providers
Web Server SSM Features
Web Single Sign-on Capabilities
Authentication Service Features
Authorization Service Features
Auditing Service Features
Role Mapping Features
Credential Mapping Features
Administration Features
Session Management Features
Configuration Features
Web Server Constraints and Limitations
Web Server SSM Integration Tasks
Web Server Environmental Bindings
WebLogic Server SSMs
WebLogic Server SSM Integration Tasks
WebLogic Server SSM Environmental Bindings
Enabling SAML-based Single Sign-On
Overview
Configuring ALES as a SAML Assertion Consumer
Configuring ALES as a SAML Assertion Producer
Enabling SPNEGO-based Single Sign-on
Configuring Single Sign-On with Microsoft Clients
Requirements
Enabling a Web Service or Web Application
Configuring the SPNEGO Security Provider
Editing the Descriptor File
Configuring Active Directory Authentication
Utility Requirements
Configuring and Verifying Active Directive Authentication
Configure the Active Directory Authentication Provider
Configure the Client .NET Web Service
Configure the Internet Explorer Client Browser
Configure the Sites
Configure Intranet Authentication
Verify the Proxy Settings
Set the Internet Explorer 6.0 Configuration Settings
Configuring Metadirectories
Why Use Metadirectories?
Metadirectory Configuration Overview
Installing the Metadirectory Software
Configuring Metadirectory Tables and Database Triggers
Creating Metadirectory Destination Tables
Metadirectory Destination Table Guidelines and Restrictions
Creating Metadirectory Destination Tables Using Oracle or Sybase
Configuring a JDBC Connection Pool and JMS
Configuring Metadirectory Database Triggers
Configuring Metadirectory Schemas
Extracting the Source Schemas
Loading the Source Schemas
Extracting the Destination Schemas
Loading the Destination Schemas
Configuring the Source-to-Destination Topology
Configuring the Topology Transformations
UpLoading User and Group Data
Configuring Metadirectory Synchronization
Configuring the Synchronization Hub
Configuring the Directory Connector
Configuring the Policy Database Connectors
Starting the Synchronization Hub
Starting the Source and Destination Connectors
Verifying that Metadirectory Synchronization Works
Authorization Caching
Understanding Authorization Caching
Configuring Authorization Caching
Authorization Caching Expiration Functions