This chapter describes how to verify the installation of Oracle Identity Management 11g Release 1 (11.1.1) components.
It contains the following sections:
This topic describes how to verify Oracle Internet Directory (OID), Oracle Virtual Directory (OVD), Oracle Directory Services Manager (ODSM), Oracle Directory Integration Platform (ODIP), and Oracle Identity Federation (OIF) that you installed.
It includes the following sections:
Verify an Oracle Internet Directory or an Oracle Virtual Directory installation by:
/bin/opmnctl status -l command. For example, if Oracle Internet Directory is configured then the following result can be seen:
Processes in Instance: asinst_1 ---------------------------------+--------------------+---------+----------+------------+----------+-----------+------ ias-component | process-type | pid | status | uid | memused | uptime | ports ---------------------------------+--------------------+---------+----------+------------+----------+-----------+------ oid1 | oidldapd | 24032 | Alive | 582907955 | 113004 | 0:00:41 | N/A oid1 | oidldapd | 24024 | Alive | 582907954 | 56288 | 0:00:42 | N/A oid1 | oidmon | 24001 | Alive | 582907953 | 50232 | 0:00:43 | LDAPS:3131,LDAP:3060 EMAGENT | EMAGENT | 24000 | Alive | 582907952 | 5852 | 0:00:43 | N/A
/bin/ldapbind command on the non-SSL and SSL ports. For example:
On Non-SSL ports:
$ORACLE_HOME/bin/ldapbind -h <hostname> -p <port> -D cn=orcladmin -w <password>
On SSL ports:
$ORACLE_HOME/bin/ldapbind -h <hostname> -p <port> -D cn=orcladmin -w <password> -U 1
Verify the Oracle Directory Integration Platform installation using the
dipStatus command located in the $ORACLE_HOME/bin/ directory.
Note:You must set the WL_HOME and ORACLE_HOME environment variables before executing the
The following is the syntax for the
$ORACLE_HOME/bin/dipStatus -h HOST -p PORT -D wlsuser [-help]
-h | -host identifies the Oracle WebLogic Server where Oracle Directory Integration Platform is deployed.
-p | -port identifies the listening port of the Oracle WebLogic Managed Server where Oracle Directory Integration Platform is deployed.
-D | -wlsuser identifies the Oracle WebLogic Server login ID.
Note:You will be prompted for the Oracle WebLogic Server login password. You cannot provide the password as a command-line argument.
Best security practice is to provide a password only in response to a prompt from the command. If you must execute
dipStatus from a script, you can redirect input from a file containing the Oracle WebLogic Server password. Use file permissions to protect the file and delete it when it is no longer necessary.
To verify the Oracle Directory Services Manager installation, enter the following URL into your browser's address field:
host represents the name of the WebLogic Managed Server hosting Oracle Directory Services Manager.
port represents the WebLogic Managed Server listen port. You can determine the exact port number by examining the
Oracle Directory Services Manager is installed and running if the Welcome to Oracle Directory Services Manage screen appears.
Note:While the appearance of the Welcome screen verifies Oracle Directory Services Manager is installed and running, you cannot connect to an Oracle Internet Directory or Oracle Virtual Directory from Oracle Directory Services Manager without the appropriate directory server credentials.
Verify the Oracle Identity Federation installation by:
Accessing the Oracle Identity Federation metadata at the following URL. Oracle Identity Federation was installed and the Oracle Identity Federation server is running if you can access the metadata.
Note:host represents the name of the WebLogic Managed Server where Oracle Identity Federation was installed. port represents the listen port on that WebLogic Managed Server.
Accessing Fusion Middleware Control to verify that Oracle Identity Federation is available and running. For more information, see "Getting Started Using Oracle Enterprise Manager Fusion Middleware Control" in the Oracle Fusion Middleware Administrator's Guide.
This topic describes how to verify Oracle Identity Manager (OIM), Oracle Access Manager (OAM), Oracle Adaptive Access Manager (OAAM), Oracle Authorization Policy Manager (OAPM), and Oracle Identity Navigator (OIN) that you installed.
It includes the following sections:
Before you can verify the Oracle Identity Manager (OIM) installation, ensure that the following servers are up and running:
Administration Server for the domain in which the Oracle Identity Manager application is deployed
Managed Server hosting Oracle Identity Manager
Managed Server hosting the Oracle SOA 11g suite
You can verify your Oracle Identity Manager installation by:
Checking the Oracle Identity Manager Server URL, such as
Checking the Identity Management shell, such as
http://<Hostname>:<Port>/admin/faces/pages/Admin.jspx. This shell is used for Users and Role Management tasks.
Checking the Oracle Identity Manager Self Service URL, such as
Verifying the configuration between Oracle Identity Manager and Oracle SOA (BPEL Process Manager) as follows:
Log in to the Oracle Identity Manager Administration Console, with
Create a Request, such as modifying a user profile.
Log in to the SOA Infrastructure to verify whether the composite applications are displayed.
Log in to the BPEL Worklist application, with
In the list of tasks, verify whether the request has come for approval.
Click on the task, and click Approve in the Actions tab.
Click on the refresh icon. The request comes back. Approve it again.
http://<host>:<oim_port>/oim/faces/pages/Admin.jspx and verify whether the request is completed.
http://<host>:<oim_port>/admin/faces/pages/Admin.jspx and verify whether the user profile is modified.
Logging in to the Design Console,
xelsysadm, and the appropriate password. A successful login indicates that the installation was successful.
Starting the Remote Manager service by running
remotemanager.bat, as appropriate. (
remotemanager.sh on UNIX or
remotemanager.bat on Windows resides in your Oracle Home directory under a folder named
After completing the installation process, including post-installation steps, you can verify the installation and configuration of Oracle Access Manager (OAM) as follows:
Ensure that the Administration Server and the Managed Server are up and running.
Log in to the Administration Console for Oracle Access Manager using the URL:
When you access this Administration Console running on the Administration Server, you are prompted to enter a user name and password. Note that you must have Administrator's role and privileges.
Verify the Oracle WebLogic Server Administration Console. If the installation and configuration of Oracle Access Manager is successful, this console shows the Administration Server (for example,
oam_admin) and the Managed Server (for example, oam_server) in the running mode. In addition, if you check Application Deployments in this console, both
oam_admin and oam_server must be in active state.
After completing the installation process, including post-installation steps, you can verify the installation and configuration of Oracle Adaptive Access Manager (OAAM) as follows:
Start the Administration Server to register the newly created managed servers with the domain. To start the Administration Server, run the following command:
On Windows: At the command prompt, run the
startWebLogic script to start the Administration Server, as in the following example:
On UNIX: At the $prompt, run the
startWebLogic.sh script, as in the following example:
Start the Managed Server, as described in Starting the Stack.
Wait for the Administration Server and the Managed Server to start up.
Log in to the Administration Server for Oracle Adaptive Access Manager using the URL:
Log in to the Oracle Adaptive Access Manager Server using the URL:
After completing the installation and configuration of Oracle Authorization Policy Manager (OAPM), including the post-installation steps, you can verify the installation as follows:
Verify whether a login page appears when you access http://<hostname>:<apm-port>/apm.
After you log in, the Authorization Policy Manager Console is displayed. The home page should display three tabs: Authorization Management, System Configuration, and Policy Upgrade Management.
On the home page, ensure that the Authorization Management tab is active. Click Search - External Roles in the Global section on the home page. The Search - External Roles page is displayed.
These results indicate that your installation of Oracle Authorization Policy Manager was successful.
To verify the installation of Oracle Identity Navigator (OIN), complete the following steps:
Launch Oracle Identity Navigator in a browser by using the following URL:
The Oracle Identity Navigator dashboard and the resource catalog are displayed.
Click the Edit link on the upper right corner of the screen to switch to the Edit mode.
Click the Add Content button on the page. A resource catalog pops up.
In the pop-up dialog, click the Open link for the folder IDM Product Launcher. The Launcher task flow pops up.
In the pop-up dialog, click the Add link. Verify that the Launcher portlet is added to the page content. Continue to add News task flows to the page, without closing the pop-up dialog. Click the up arrow at the upper left corner. The top folder layout is displayed again. Click the Open link for the folder News. The News and Announcements task flow pops up.
In the News and Announcements pop-up dialog, click the Add link. Verify that the Report portlet is added to the page content. Continue to add Reports task flows to the page, without closing the pop-up dialog. Click the up arrow at the upper left corner. The top folder layout is displayed again. Click the Open link for the folder My Reports. Click the Add link and the Close button (X). All the three workflows are added to the page content.
Change the default layout, if necessary, by clicking the Pencil icon located on the upper right area of the screen.
To exit the Edit mode, click the Close button.
If the task flows are properly added to the page content, the screen displays the task flow content.
Test the Product Registration functionality as follows:
Create, edit, or delete the product information by clicking the Administration tab.
To add a new product, click the Create image icon in the Product Registration section. The New Product Registration dialog pops up.
Enter the relevant information in this dialog, and the new product registration is updated accordingly. The new product registration data is updated on the Launcher portlet after you click the Dashboard tab.
Click the product link and ensure that a new browser window or tab opens with the registered product URL.
Test the News functionality as follows:
Click the refresh icon to update the RSS feed content.
Click the news item link to open the source of content in a new browser window or tab.
Test the Reports functionality as follows:
Add a report by clicking the Add icon. The Add Report dialog pops up.
In this dialog, select a report to add, and click the Add Report button. Verify that the report is added.
Run a report by clicking the report icon. The report opens in a new browser window or tab.