1/11
Contents
List of Examples
List of Figures
List of Tables
Title and Copyright Information
Preface
Audience
Documentation Accessibility
Related Documents
Conventions
What's New in Oracle Access Manager?
Product and Component Name Changes
Oracle Access Manager 11g Software Developer Kit
1
Introduction to this Book
1.1
Chapter 2: Introduction to the Access SDK and API
1.2
Chapter 3: Creating Custom Authentication Plug-ins
1.3
Chapter 4: Writing Oracle Security Token Service Module Classes
1.4
Introduction to Java API References
2
Introduction to the Access SDK and API
2.1
Introduction to the Access SDK
2.2
Locating Access SDK Packages and Resources
2.3
Uses, Functionality, and New Features
2.4
Messages, Exceptions and Logging
2.4.1
Messages
2.4.2
Exceptions
2.4.3
Logging
2.5
Configuring and Deploying Access Clients
2.5.1
Configuration Requirements
2.5.2
Generating the Required Configuration Files
2.5.3
SSL Certificate and Key Files
2.5.3.1
Simple Transport Security Mode
2.5.3.2
Cert Transport Security Mode
2.6
Developing Access Clients
2.6.1
Introduction to Access Clients
2.6.1.1
When to Create a Custom Access Client
2.6.1.2
Access Client Architecture
2.6.1.3
Overview of Access Client Request Processing
2.6.2
Structure of an Access Client
2.6.2.1
Typical Access Client Execution Flow
2.6.2.2
Example of a Simple Access Client: JAccess Client.java
2.6.2.3
Example: Java Login Servlet
2.6.2.4
Example Using Additional Methods: access_test_java.java
2.6.2.5
Example of Implementing Certificate-Based Authentication in Java
2.7
Building and Deploying an Access Client Program
2.7.1
Setting the Development Environment
2.7.2
Compiling a New Access Client Program
2.7.3
Configuring and Deploying a New Access Client Program
2.8
Compatibility: 11g versus 10g Access SDK and APIs
2.8.1
Compatibility of the Access SDK
2.8.2
Compatibility of 10g JNI ASDK and 11g Access SDK
2.8.3
Deprecated: Oracle Access Manager 10g JNI SDK
2.9
Migrating Earlier Applications or Converting Your Code
2.9.1
Modifying Your Development and Runtime Environment
2.9.2
Migrating Your Application
2.9.2.1
Configuration Specific to Migration
2.9.3
Converting Your Code
2.9.3.1
Understanding Differences Between JNI ASDK and Access SDK
2.9.3.2
Converting Code
2.10
Best Practices
2.10.1
Avoiding Problems
2.10.1.1
Thread Safe Code
2.10.2
Identifying and Resolving Problems
3
Creating Custom Authentication Plug-ins
3.1
Introduction to Authentication Plug-ins
3.1.1
About the Custom Plug-in Life Cycle
3.1.2
About Planning, the Authentication Model, and Plug-ins
3.2
Introduction to Plug-in Interfaces
3.2.1
About the Plug-in Interfaces
3.2.1.1
GenericPluginService
3.2.1.2
AuthnPluginService
3.2.2
About Plug-in Hierarchies
3.3
Sample Code: Custom Database User Authentication Plug-in
3.3.1
Sample Code: Database User Authentication Plug-in
3.3.2
Sample Plug-in Configuration Metadata Requirements
3.3.3
Sample Manifest for the Plug-in
3.3.4
Plug-in JAR File Structure
3.4
Developing an Authentication Plug-in
3.4.1
About Writing a Custom Authentication Plug-in
3.4.2
Writing a Custom Authentication Plug-in
3.4.3
JARs Required for Compiling a Custom Authentication Plug-in
3.5
Adding Custom Plug-ins
3.5.1
About Managing Custom Plug-ins
3.5.2
Adding Custom Plug-ins
3.5.3
Checking a Plug-in's Activation Status
3.5.4
Deleting Custom Authentication Plug-ins
3.6
Creating a Custom Authentication Module for Custom Plug-ins
3.6.1
About Creating Custom Authentication Modules
3.6.2
Creating a Custom Authentication Module
3.7
Creating Authentication Schemes with Custom Authentication Modules
3.8
Configuring Logging for Custom Plug-ins
4
Writing Oracle Security Token Service Module Classes
4.1
Introduction to Oracle Security Token Service Custom Token Module Classes
4.2
Writing a TokenValidatorModule Class
4.2.1
About Writing a TokenValidatorModule Class
4.2.2
Writing a TokenValidatorModule Class
4.3
Writing a TokenIssuanceModule Class
4.3.1
About Writing a TokenIssuanceModule Class
4.3.2
Writing a TokenIssuanceModule Class
4.4
Making Custom Classes Available
4.4.1
About Making Classes Available
4.4.2
About Narrowing a Search for Custom Tokens
4.4.3
Managing Custom Tokens
4.5
Managing a Custom Oracle Security Token Service Configuration
4.5.1
Creating the Validation Template
4.5.2
Creating the Issuance Template for a Custom Token
4.5.3
Adding the Custom Token to a Requester Profile
4.5.4
Adding the Custom Token to the Relying Party Profile
4.5.5
Mapping the Token to a Requestor
4.5.6
Creating an /wssuser EndPoint
Scripting on this page enhances content navigation, but does not change the content in any way.