Oracle® Student Learning Installation and Deployment Guide Release 3.1.3 Part Number E20664-04 |
|
|
PDF · Mobi · ePub |
This chapter describes the configuration steps in WebLogic Server before OSL deployment.
To install ADF 11g Runtime libraries in the existing WLS instance, see Section 35.6.1, "How to Install the ADF Runtime into an Existing WebLogic Server Using the Oracle Fusion Middleware Application Developer Installer" in the Oracle Fusion Middleware Fusion Developer's Guide for Oracle Application Development Framework 11g Release 1 (11.1.1.5.0) at:
To create a domain or extend the existing domain in the WLS instance for ADF applications, see Section 35.7, "Creating and Extending WebLogic Domains" in the Oracle Fusion Middleware Fusion Developer's Guide for Oracle Application Development Framework 11g Release 1 (11.1.1.5.0) at
When you generate or extend a domain, ensure that the domain is configured to support Oracle Enterprise Manager, Oracle JRF, and Oracle WSM Policy Manager.
Note:
For Oracle WSM Policy Manager, the schema DEV_MDS must exist in the Learning Tool database. Run the Oracle Fusion Middleware Repository Creation Utility 11g against the Learning Tool database. Ensure that Metadata Service under AS Common Schemas is selected.To configure the OSL Learning Tool data source:
Open the WLS Administration Console:
Log in to the WLS console using an administrator user name and password.
Select JDBC > Data Sources > New.
Edit the properties as specified in Table 8-1, "Data Source Properties".
Table 8-1 Data Source Properties
Attribute | Value | Meaning |
---|---|---|
Name |
|
Name of the data source |
JNDI Name |
|
JNDI name of the data source |
Database Type |
|
|
Database Driver |
|
JDBC driver used to connect to the database |
Database Name |
|
Oracle database SID or service name |
Host Name |
|
|
Port |
|
Database port |
Database User Name |
|
OSL database schema name |
Password |
|
Password for OSL schema |
Confirm Password |
|
Select Next.
Select Test Configuration to verify that the database connection parameters are set correctly.
Select the server targets for the data source from the list of available servers in the WLS domain on which to deploy the OSL LT Admin and OSL LT applications.
Click Finish.
The OSL credential map contains credentials for servers to which the OSL Learning Tool must authenticate. The servers include the remote JMS server for the Event publishing service (if remote Resources are used) and custom Content Integration. This section describes how to create the OSL credential map and store credentials in the OSL credential map.
To create a credential map:
Open the Oracle Enterprise Manager 11g Fusion Middleware Control.
From the navigation pane, expand WebLogic Domain.
Right-click the domain and click Security > Credentials.
On the Credentials page, click Create Map and name it OSL.
Click OK.
If you are using the default content integration with the default proxy type (Internal), ignore this section.
If you chose the WS proxy type or you are using a custom content integration, the OSL Learning Tool must pass authentication information to the content integration web service. You must specify the credentials of the JMS server in the OSL credential map.
To create a credential key:
Click the OSL Map created in Section 8.4.1, "Creating a Credential Map".
Click Create Key.
Enter the following details:
Map: OSL
Key: osl.content.credentials
Type: Password
Username: name of the user that can invoke the content integration web service. In the default content integration, this user is named contentintegration (as specified in Section 5.4, "Assigning Content Integration User").
Password: password of the above user
The OSL Learning Tool codebase requires permission to access the credential map mentioned in Section 8.4.2.1, "Creating the JMS Server Credential Key".
Perform the steps in Section 8.4.2.2, "Granting Codebase Permission to the Credential Store".
Configure the OID instance as the security provider for the WLS instance on which OSL is deployed so that OID users can access OSL.
To define a security provider for WLS:
Open the WLS Administration Console:
http://<WLSHostName>:port/console
Log in to the console using an administrator user name and password.
Select Security Realms > myrealm (default) > Providers (tab).
In the Authentication Providers table, select New.
Enter a name for the authentication provider in the Name field, for example OSL_OID
.
Choose OracleInternetDirectoryAuthenticator as from the Type list.
Click OK.
Select the new authentication provider instance on the Providers tab to navigate to its configuration page.
Select the Provider Specific tab under the Configuration tab.
Edit the properties in the Provider Specific configuration as described in Table 8-2, "Provider Specific Properties".
Table 8-2 Provider Specific Properties
Attribute | Value | Meaning |
---|---|---|
Host |
|
|
Port |
|
Default non-SSL OID port. |
Principal |
|
Administrator account to connect to OID. |
Credential |
< |
Password for OID administrator account. |
Confirm Credential |
< |
|
User Base DN |
< |
Value of the User Search Base attribute in OID. You can find this value on the OID administration page. The format of the value is: |
Use Retrieved User Name as Principal |
|
Specifies whether the user name retrieved from OID use as the Principal in the Subject. |
Group Base DN |
< |
Value of the Group Search Base attribute in OID. You can find this value on the OID administration page. The format of the value is: |
Propagate Cause for Login Exception |
|
Propagates OID exceptions to WLS to show in the console and logs. |
Click Save.
Restart the WLS instance.
Log in to the WLS console and select Security Realms > myrealm (default) > Users and Groups (tab).
Ensure that the OID users and groups are listed under Users and Groups.
Change the Control Flag attribute of the security provider so that OSL users must authenticate only against OID:
Select Security Realms > myrealm (default) > Providers (tab) > [name of the security provider] > Configuration (tab) > Common (tab).
Set Control Flag to Sufficient.
Reorder the security provider to be the first authentication provider.
Restart the WLS instance.