3/54
List of Figures
1-1 The OPSS Architecture
2-1 Application Policy Logical Model
7-1 The OPSS Identity Store Service
10-1 The Create Key Dialog
10-2 The Crteate Key Dialog
12-1 Audit Event Flow
13-1 Audit Schema
15-1 Identity Asserter Configuration with Oracle Access Manager and WebGates
15-2 Authenticator for Web and non-Web Resources
16-1 Pre-seeded Resources in the User ID Assertion Authentication Policy
16-2 Pre-seeded Responses in the User ID Assertion Policy
16-3 Pre-seeded Application SSO Authentication Policy and Resources
16-4 Pre-seeded Responses for the Application SSO Authentication Policy
16-5 Pre-seeded Application SSO Authorization Policy and Resources
16-6 Sample Authorization Policy for Trusted Header Assertion
17-1 Sample OAMCfgTool Policy Domain General Tab
17-2 Sample OAMCfgTool Policy Domain Resources Tab
17-3 Sample OAMCfgTool Policy Domain Authorization Rules Tab
17-4 Sample OAMCfgTool Policy Domain Default Rules Tab
17-5 Sample OAMCfgTool Policy Domain Policies Tab
17-6 OAMCfgTool Policy Domain Delegated Access Admins Tab
17-7 Sample OAMCfgTool Host Identifiers
17-8 Sample OAMCfgTool AccessGate Profile
17-9 Default Login Form for Single Sign-On with 10g WebGates
17-10 Create Policy Domain Page in the Oracle Access Manager Policy Manager
18-1 Location of OSSO Components in the Oracle WebLogic Security Framework
18-2 OSSO Identity Asserter Processing
19-1 Applications, Security Stores, and Management Tools
19-2 Identity Propagation with HTTP Calls
19-3 Mapping of Application Roles to Users and Groups
19-4 Application Life Cycle Phases
28-1 Integrating Applications with the Audit Framework
Scripting on this page enhances content navigation, but does not change the content in any way.