Skip Headers
Oracle® Fusion Middleware Enterprise Deployment Guide for Oracle Business Intelligence
11g Release 1 (11.1.1)

Part Number E15722-05
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
PDF · Mobi · ePub

12 Integrating an Enterprise Deployment with Oracle Identity Management

This chapter describes how to integrate Oracle Business Intelligence with Oracle Identity Management.

Before you perform the steps in this chapter, you must have successfully completed the installation and configuration steps described in both of the following:

Important:

Oracle strongly recommends that you read the Oracle Fusion Middleware Release Notes for any additional installation and deployment considerations before starting the setup process.

This chapter contains the following topics:

12.1 Configuring the Credential and Policy Store

This section contains the following topics:

12.1.1 Overview of Credential and Policy Store Configuration

Oracle Fusion Middleware allows using different types of credentials and policy stores in a WebLogic domain. Domains can use stores based on an XML file or on different types of LDAP providers. When a domain uses an LDAP store, all policy and credential data is kept and maintained in a centralized store. However, when using XML policy stores, the changes made on Managed Servers are not propagated to the Administration Server unless they use the same domain home. Because the Oracle Business Intelligence EDG topology uses different domain homes for the Administration Server and the Managed Server, Oracle requires the use of an LDAP store as policy and credential store for integrity and consistency.

By default, Oracle WebLogic Server domains use an XML file for the policy store. The following sections describe the steps required to change the default store to Oracle Internet Directory LDAP for credentials or policies.

Note:

The back-end repository for the policy store and the credential store must use the same kind of LDAP server. To preserve this coherence, note that reassociating one store implies reassociating the other one, that is, the reassociation of both credential and the policy stores is accomplished as a unit using Oracle Enterprise Manager Fusion Middleware Control or the WLST command reassociateSecurityStore.

12.1.2 Configuring the Credential Store

This section explains how to configure the credential store and contains the following topics:

12.1.2.1 Creating Users and Groups

Create the users and groups you need in Oracle Internet Directory, if you have not done so already. See the Oracle Fusion Middleware Administrator's Guide for Oracle Internet Directory for more information.

12.1.2.2 Backing Up Configuration Files

To be safe, first back up the relevant configuration files:

  • ORACLE_BASE/admin/domain_name/aserver/domain_name/config/config.xml

  • ORACLE_BASE/admin/domain_name/aserver/domain_name/config/fmwconfig/
    jps-config.xml

  • ORACLE_BASE/admin/domain_name/aserver/domain_name/config/fmwconfig/
    system-jazn-data.xml

Also back up the boot.properties file for the Administration Server.

12.1.2.3 Configuring the Identity Store to Use LDAP

To configure the credential store to use LDAP, set the proper authenticator using the Oracle WebLogic Server Administration Console, as follows:

  1. Log in to the Administration Console.

  2. Click the Security Realms link on the left navigation bar.

  3. Click the myrealm default realm entry to configure it.

  4. Open the Providers tab within the realm. Notice that there is a DefaultAuthenticator provider configured for the realm.

  5. In the Change Center, click Lock & Edit.

  6. Click New to add a new provider.

  7. Enter a name for the provider, such as OIDAuthenticator.

  8. Select the OracleInternetDirectoryAuthenticator type from the list of authenticators.

  9. Click OK.

  10. In the Providers screen, click the newly created authenticator.

  11. Set the control flag to SUFFICIENT. This indicates that if a user can be authenticated successfully by this authenticator, then that authentication should be accepted and any additional authenticators should not be invoked. If the authentication fails, it will be passed to the next authenticator in the chain.

    Make sure that all subsequent authenticators also have their control flag set to SUFFICIENT. In particular, check the control flag for the DefaultAuthenticator and set it to SUFFICIENT if necessary.

  12. Click Save.

  13. Open the Provider Specific tab, then enter details specific to your LDAP server, as shown in Table 12-1.

    Table 12-1 LDAP Server Details

    Parameter Value Description

    Host

    For example: oid.mycompany.com

    The host name of the LDAP server.

    Port

    For example: 636

    The LDAP server port number.

    Principal

    For example: cn=orcladmin

    The LDAP user DN used to connect to the LDAP server.

    Credential

    your_password

    The password used to connect to the LDAP server.

    SSL Enabled

    Selected

    Specifies whether SSL protocol is used when connecting to the LDAP server.

    User Base DN

    For example:

    cn=Users,dc=mycompany,
    dc=com

    Specifies the DN under which your Users start.

    Group Base DN

    For example: cn=Groups,dc=mycompany,
    dc=com

    Specifies the DN that points to your Groups node.

    User Name Attribute

    cn

    The user name attribute.

    Use Retrieved User Name as Principal

    Selected

    This option must be enabled.


  14. Click Save when done.

  15. Click Activate Changes to propagate the changes.

  16. Restart the Administration Server and the Managed Servers.

12.1.2.4 Setting the Order of Providers

Reorder the OID Authenticator and Default Authenticator and ensure that the control flags for each authenticator is set as follows:

  • OID LDAP Authenticator: SUFFICIENT

  • Default Authenticator: SUFFICIENT

Restart the Administration Server, the Managed Servers, and the Oracle Business Intelligence system components.

12.1.2.5 Moving the WebLogic Administrator to LDAP

After LDAP has been configured, all users (including administrative users) should be LDAP users. This must be configured by the LDAP administrator. An administration group should be created with the necessary users. For information about the required steps, see "Creating Users and Groups for Oracle Identity Manager" in the Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Identity Management. Use 'BIAdministrators' for the group name.

After this group is created, you must update the role definition for the WLS Global Admin role in WebLogic Server, as follows:

  1. Log in to the Administration Console.

  2. Go to the location that defines the Admin role by selecting Security Realms, then your realm name, then Role and Policies, then Global Roles, then Roles, and then Admin. Click the View Role Conditions link.

    By default, you can see that the Administrators group in Oracle Internet Directory defines who has the Admin role in WebLogic Server.

  3. Click Add Conditions to add a different group name (BIAdministrators). Then, delete the Administrators group, leaving the new one you added.

  4. Click Save.

  5. After making this change, any members of the new group specified will be authorized to administer WebLogic Server.

12.1.2.5.1 Updating the boot.properties File and Restarting the System

The boot.properties file for the Administration Server must be updated with the WebLogic admin user created in Oracle Internet Directory. Follow these steps to update the boot.properties file:

  1. On APPHOST1, go to the following directory:

    APPHOST1> cd ORACLE_BASE/admin/domain_name/aserver/
    domain_name/servers/AdminServer/security
    
  2. Rename the existing boot.properties file:

    APPHOST1> mv boot.properties boot.properties.backup
    
  3. Use a text editor to create a file called boot.properties under the security directory. Enter the following lines in the file:

    username=admin_user
    password=admin_user_password
    
  4. Save the file.

  5. Stop and restart the Administration Server.

12.1.3 Configuring the Policy Store

The domain policy store is the repository of system and application-specific policies. In a given domain, there is one store that stores all policies that all applications deployed in the domain can use. This section provides the steps to configure Oracle Internet Directory LDAP as the policy store for the Oracle Business Intelligence EDG topology.

To ensure proper access to the Oracle Internet Directory LDAP server directory used as a policy store, you must set a node in the server directory.

An Oracle Internet Directory administrator must follow these steps to create the appropriate node in the Oracle Internet Directory server:

  1. Create an LDIF file (jpstestnode.ldif in this example) specifying the following DN and CN entries:

    dn: cn=jpsroot_bi,dc=mycompany,dc=com
    cn: jpsroot_bi
    objectclass: top
    objectclass: OrclContainer
    

    The DN of the root node (jpsroot_bi in the previous step) must be distinct from any other DN. One root node can be shared by multiple WebLogic domains. It is not required that his node be created at the top level, as long as read and write access to the subtree is granted to the Oracle Internet Directory administrator.

  2. Import this data into the Oracle Internet Directory server using the command ldapadd, as shown in the following example:

    OIDHOST1> ORACLE_HOME/bin/ldapadd -h ldap_host -p ldap_port -D cn=orcladmin 
    -w password -c -v -f jpstestnode.ldif
    
  3. Verify that the node has been successfully inserted using the command ldapsearch, as shown in the following example:

    OIDHOST1> ORACLE_HOME/bin/ldapsearch -h ldap_host -p ldap_port -D cn=orcladmin 
    -w password -b "cn=jpsroot_bi,dc=mycompany,dc=com" objectclass="orclContainer"
    
  4. When using Oracle Internet Directory as the LDAP-Based policy store, run the utility oidstats.sql in the INFRADBHOST to generate database statistics for optimal database performance:

    OIDHOST1> connect ods/welcome1
    OIDHOST1> @ORACLE_HOME/ldap/admin/oidstats.sql
    

    Note: The oidstats.sql utility only needs to be run once after the initial provisioning.

12.1.4 Reassociating Credentials and Policies

To reassociate the policy and credential store with Oracle Internet Directory, use the WLST reassociateSecurityStore command, as follows:

  1. From APPHOST1, start the wlst shell:

    APPHOST1> cd ORACLE_COMMON_HOME/common/bin
    APPHOST1> ./wlst.sh
    
  2. Connect to the WebLogic Administration Server using the wlst connect command, as follows:

    connect ("AdminUser", "AdminPassword", "t3://hostname:port")
    

    For example:

    connect ("weblogic", "welcome1", "t3://ADMINVHN:7001")
    
  3. Run the reassociateSecurityStore command, as follows:

    reassociateSecurityStore(domain="domainName", admin="cn=admin_user_name",
    password="orclPassword", ldapurl="ldap://LDAPHOST:LDAPPORT", servertype="OID",
    jpsroot="cn=jpsroot_bi")
    

    For example:

    wls:/bifoundation_domain/serverConfig>
    reassociateSecurityStore(domain="bifoundation_domain", admin="cn=orcladmin",
    password="welcome1", ldapurl="ldap://oid.mycompany.com:389", servertype="OID",
    jpsroot="cn=jpsroot_bi,dc=mycompany,dc=com")
    
  4. Restart the Administration Server after the command completes successfully.

Note:

For credential and policy changes to take effect, the servers in the domain must be restarted.

12.1.5 Refreshing User GUIDs After Identity Store Reassociation

This section contains the following topics:

12.1.5.1 About User GUIDs

In Oracle Business Intelligence 11g Release 1 (11.1.1), users are recognized by their global unique identifiers (GUIDs), not by their names. GUIDs are identifiers that are completely unique for a given user. Using GUIDs to identify users provides a higher level of security because it ensures that data and metadata is uniquely secured for a specific user, independent of the user name.

Oracle recommends that you follow these two best practices to ensure that GUIDs are consistently applied in each phase of the development to production lifecycle:

  • Ensure that a fan-out replica of the identity store is used between development, test, and production systems, so that user GUIDs are consistent and identical across the complete development to production lifecycle. See "Setting Up Replication" in the Oracle Fusion Middleware Administrator's Guide for Oracle Internet Directory for further information about creating fan-out replicas.

  • Wherever possible, secure access to data and metadata using application roles rather than individual users.

12.1.5.2 About Refreshing GUIDs

GUID refresh (also called GUID synchronization or GUID regeneration) updates any metadata references to user GUIDs in the Oracle BI repository and Oracle BI Presentation Catalog. During the GUID refresh process, each user name is looked up in the identity store. Then, all metadata references to the GUID associated with that user name are replaced with the GUID in the identity store.

GUID refresh might be required when Oracle Business Intelligence is reassociated with an identity store that has different GUIDs for the same users. This situation might occur when reassociating Oracle Business Intelligence with a different type of identity store and should be a rare event.

Note that if Oracle best practices are not observed and Oracle Business Intelligence repository data is migrated between systems that have different GUIDs for the same users, GUID refresh is required for the system to function. This is not a recommended practice, because it raises the risk that data and metadata secured to one user (for example, John Smith, who left the company two weeks ago) becomes accessible to another user (for example, John Smith, who joined last week). Using application roles wherever possible and using GUIDs consistently across the full development production lifecycle prevents this problem from occurring.

12.1.5.3 Refreshing User GUIDs

To refresh user GUIDs, perform the following steps on APPHOST1 and APPHOST2. Note that GUID refresh must occur with only one node operating at a time.

  1. Stop Oracle BI Server and Presentation Services on all nodes except where you are refreshing the user GUIDs. For example:

    cd ORACLE_BASE/admin/instancen/bin
    ./opmnctl stopproc ias-component=coreapplication_obips1
    ./opmnctl stopproc ias-component=coreapplication_obis1
    
  2. Update the FMW_UPDATE_ROLE_AND_USER_REF_GUIDS parameter in NQSConfig.INI:

    1. Open NQSConfig.INI for editing at:

      ORACLE_INSTANCE/config/OracleBIServerComponent/coreapplication_obisn
      
    2. Locate the FMW_UPDATE_ROLE_AND_USER_REF_GUIDS parameter and set it to YES, as follows:

      FMW_UPDATE_ROLE_AND_USER_REF_GUIDS = YES;
      
    3. Save and close the file.

  3. Update the Catalog element in the instanceconfig.xml file:

    1. Open instanceconfig.xml for editing at:

      ORACLE_INSTANCE/config/OracleBIPresentationServicesComponent/
      coreapplication_obipsn
      
    2. Locate the Catalog element and update it as follows:

      <Catalog>
      <UpgradeAndExit>false</UpgradeAndExit>
      <UpdateAccountGUIDs>UpdateAndExit</UpdateAccountGUIDs>
      </Catalog>
      
    3. Save and close the file.

  4. On the node where you are refreshing the GUIDs, start the Oracle BI Server and Presentation Services using opmnctl:

    cd ORACLE_BASE/admin/instancen/bin
    ./opmnctl startproc ias-component=coreapplication_obis1
    

    After you confirm that the Oracle BI Server is running, then start Presentation Services:

    ./opmnctl startproc ias-component=coreapplication_obips1
    
  5. Set the FMW_UPDATE_ROLE_AND_USER_REF_GUIDS parameter in NQSConfig.INI back to NO.

    Important: You must perform this step to ensure that your system is secure.

  6. Update the Catalog element in instanceconfig.xml to remove the UpdateAccount GUIDs entry.

  7. Restart the Oracle Business Intelligence system components using opmnctl:

    cd ORACLE_BASE/admin/instancen/bin
    ./opmnctl stopall
    ./opmnctl startall
    

12.2 Oracle Access Manager 10g Integration

This section describes how to set up Oracle Access Manager 10g as a single sign-on solution for the Oracle Business Intelligence topology.

This section contains the following topics:

12.2.1 About Oracle Access Manager Integration

The instructions for Oracle Access Manager 10g assume an existing Oracle Access Manager installation, complete with Access Managers and a policy protecting the Policy manager. For more information about installing and configuring an Oracle Access Manager installation, see the Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Identity Management.

The configuration described in this chapter includes a directory service such as Oracle Internet Directory, either as a standalone component or as part of an Oracle Virtual Directory configuration. This section provides the necessary steps for configuring your Oracle Business Intelligence installation with Oracle Internet Directory.

In addition, the Oracle Access Manager installation should have its own Web server configured with WebGate. This section also provides steps for using the Oracle Access Manager Web server as a delegated authentication server.

12.2.2 Using the Oracle Access Manager Configuration Tool

This section explains how to use the Oracle Access Manager Configuration Tool and contains the following topics:

12.2.2.1 About the Oracle Access Manager Configuration Tool

The Oracle Access Manager Configuration Tool (oamcfgtool) starts a series of scripts and sets up the required policies. It requires various parameters as inputs. Specifically, it creates the following:

  • A Form Authentication scheme in Oracle Access Manager

  • Policies to enable authentication in Oracle WebLogic Server

  • A WebGate entry in Oracle Access Manager to enable Oracle HTTP Server WebGates (from your Web tier) to protect your configured application

  • A Host Identifier, depending on the scenario chosen (a default host identifier would be used, if not provided)

  • Policies to protect and unprotect the application-specific URL

12.2.2.2 Collecting Information for the Oracle Access Manager Configuration Tool

Collect or prepare the following information before running the Oracle Access Manager Configuration Tool:

  • Password: Create a secure password. This will be used as the password for the WebGate installation performed later.

  • LDAP Host: The host name of the Directory Server or load balancer address, for HA/EDG configurations.

  • LDAP Port: The port number of the Directory Server.

  • LDAP USER DN: The DN of the LDAP administrator user (for example, "cn=orcladmin").

  • LDAP password: The password of the LDAP administrator user.

  • OAM_AA_HOST: The host name of the Oracle Access Manager instance.

  • OAM_AA_PORT: The Oracle Access Manager port number.

12.2.2.3 Running the Oracle Access Manager Configuration Tool

The Oracle Access Manager Configuration Tool is located in the following directory:

MW_HOME/oracle_common/modules/oracle.oamprovider_11.1.1

The tool can be run from any computer with the required installation files. In this case, you run it from APPHOST1.

Note:

When integrating with Oracle Identity Management, use the transport mode currently in use by the Oracle Identity Management servers. For example, Open, Simple, or Cert.

Run the Oracle Access Manager Configuration Tool, as follows (all on a single line):

MW_HOME/jrockit_version/bin/java -jar oamcfgtool.jar mode=CREATE
app_domain="bifoundation_domain" protected_uris="$PROTECTED_URI_LIST"
public_uris="$PUBLIC_URI_LIST" ldap_host="oid.mycompany.com" ldap_port=389 
ldap_userdn="cn=LDAP_admin_user_name"
ldap_userpassword=LDAP_admin_user_password oam_aaa_host=OAMHOST1
oam_aaa_port=OAMPORT1 oam_aaa_mode=simple

For $PROTECTED_URI_LIST, use:

"/analytics/saw.dll,/xmlpserver,/ui,/bioffice,/em,/console,/ui/adfAuthentication"

For $PUBLIC_URI_LIST, use:

"/analytics,/analytics/saw.dll/wsdl,/analytics-ws/saw.dll,/xmlpserver/services,
/xmlpserver/report_service,/xmlpserver/ReportTemplateService.xls,
/xmlpserver/Guest,/ui/do/logout,/ui/images,/bioffice/services/saw?WSDL"

You will be prompted for the app_agent_password.

Note:

If additional URLs need to be protected later, run the Oracle Access Manager Configuration Tool again using the same app_domain. Be sure to include all the URLs that need to be protected, not just the new ones.

12.2.2.4 Verifying Successful Creation of the Policy Domain and AccessGate

This section covers how to validate that the Policy Domain and AccessGate were created successfully.

Verifying the Policy Domain

Follow these steps to verify the policy domain:

  1. Log on to Oracle Access Manager at:

    http://OAMADMINHOST:port/access/oblix

  2. Click Policy Manager.

  3. Click the My Policy Domains link on the left panel. A list of all policy domains is displayed, including the domain you just created.

  4. Click the link to the policy domain you just created. The General area of the domain is displayed.

  5. Click the Resources tab. The URIs you specified are displayed. You can also click other tabs to view other settings.

Verifying the AccessGate Configuration

Follow these steps to verify the AccessGate configuration:

  1. Click the Access System Console link on the top right. Note that this link toggles between Access System Console and Policy Manager when you click it.

  2. Click the Access System Configuration tab.

  3. Click the AccessGate Configuration link in the left pane.

  4. Enter bifoundation_domain as the search criterion (or another substring in your app_domain), and then click Go.

    The AccessGate for the domain you just created is displayed. This result will have the suffix _AG (for example, bifoundation_domain_AG).

  5. Click the AccessGate for your domain to see details.

12.2.3 Updating the Host Identifier

The Oracle Access Manager Configuration Tool uses the value of the app_domain parameter to create a host identifier for the policy domain. This host identifier must be updated with all the host name variations for the host so that the configuration works correctly.

Follow these steps to update the host identifier created by the Oracle Access Manager Configuration Tool:

  1. Navigate to the Access System Console by entering the following URL in your Web browser:

    http://hostname:port/access/oblix

    where hostname refers to the host where the WebPass Oracle HTTP Server instance is running, and port refers to the HTTP port of the Oracle HTTP Server instance.

  2. When prompted for a username and password, log in as an administrator. Click OK.

  3. On the Access System main page, click the Access System Console link.

  4. On the Access System Console page, click the Access System Configuration tab.

  5. On the Access System Configuration page, click Host Identifiers on the bottom left.

  6. On the List all host identifiers page, click the host identifier created by the Oracle Access Manager Configuration Tool. For example, select bifoundation_domain.

  7. On the Host Identifier Details page, click Modify.

  8. On the Modifying host identifier page, add all the possible host name variations for the host. Click the plus and minus symbols to add or delete fields as necessary.

    The Preferred HTTP Host value used in the Access System Configuration must be added as one of the host name variations. For example:

    bifoundation_domain, webhost1.mycompany.com:7777, webhost2.mycompany.com:7777, 
    APPHOST1VHN1.mycompany.com:9704, APPHOST2VHN1.mycompany.com:9704, 
    ADMIN.mycompany.com:80, ADMINVHN.mycompany.com:7001, APPHOST1VHN1:9704, 
    APPHOST2VHN1:9704, ADMINVHN:7001
    
  9. Select Update Cache and then click Save.

    The following message is displayed: "Updating the cache at this point will flush all the cache in the system. Are you sure?"

    Click OK to finish saving the configuration changes.

  10. Verify the changes on the Host Identifier Details page.

12.2.4 Updating the WebGate Profile

The Oracle Access Manager Configuration Tool populates the Preferred_HTTP_Host and hostname attributes for the WebGate profile that is created with the value of the app_domain parameter. Both of these attributes must be updated with the correct values for the configuration to work.

Follow these steps to update the WebGate profile created by the Oracle Access Manager Configuration Tool:

  1. Navigate to the Access System Console by entering the following URL in your Web browser:

    http://hostname:port/access/oblix

    where hostname refers to the host where the WebPass Oracle HTTP Server instance is running, and port refers to the HTTP port of the Oracle HTTP Server instance.

  2. When prompted for a username and password, log in as an administrator. Click OK.

  3. On the Access System main page, click the Access System Console link.

  4. On the Access System Console page, click the Access System Configuration tab to display the AccessGate Search page.

  5. Enter the appropriate search criteria and click Go to display a list of AccessGates.

  6. Select the AccessGate created by the Oracle Access Manager Configuration Tool. For example: bifoundation_domain_AG

  7. On the AccessGate Details page, select Modify to display the Modify AccessGate page.

  8. On the Modify AccessGate page, update the following:

    • Hostname: Update the hostname with the name of the computer where WebGate is running. For example: webhost1.mycompany.com

    • Preferred HTTP Host: Update the Preferred_HTTP_Host with one of the host name variations specified in the previous section. For example: webhost1.mycompany.com:7777

    • Primary HTTP Cookie Domain: Update the Primary HTTP Cookie Domain with the Domain suffix or the host identifier. For example: mycompany.com

    • Port: Update the port with the port where WebGate is running. For example: 7777*

    • Maximum Connections: Set to 4.

  9. Click Save, then click OK to confirm.

  10. Verify the values displayed on the Details for AccessGate page to confirm that the updates were successful.

12.2.5 Installing and Configuring WebGate

WebGate must be installed on each of the WEBHOSTn computers to secure the Web tier. To do this, follow these steps:

  1. Launch the WebGate installer using the following command:

    ./Oracle_Access_Manager10_1_4_3_0_linux_OHS11g_WebGate -gui
    
  2. The Welcome screen is displayed. Click Next.

  3. In the Customer Information screen, enter the user name and user group under which the Web server is running. Click Next to continue.

  4. In the installation target screen, specify the directory where WebGate should be installed. Click Next to continue.

  5. In the installation summary screen, click Next.

  6. Download the required GCC runtime libraries for WebGate as instructed in the WebGate configuration screen, and use Browse to point to their location on the local computer. Click Next to continue.

  7. The installer now creates the required artifacts. After that process is complete, click Next to continue.

  8. In the transport security mode screen, select the same mode that was configured for the BI Access Gate (for example, Simple) and click Next to continue.

    Note:

    When integrating with Oracle Identity Management, use the transport mode currently in use by the Oracle Identity Management servers. For example, Open, Simple, or Cert.

  9. In the WebGate Configuration screen, provide the details of the Access Server that will be used. You must provide the following information:

    • WebGate ID, as provided when the Oracle Access Manager Configuration Tool was executed

    • Password for WebGate

    • Access Server ID, as reported by the Oracle Access Manager Access Server configuration

    • Access Server host name, as reported by the Oracle Access Manager Access Server configuration

    • Access Server port number, as reported by the Oracle Access Manager Access Server configuration

    • Global Access Protocol Pass Phrase

    You can obtain these details from your Oracle Access Manager administrator. Click Next to continue.

  10. In the Configure Web Server screen, click Yes to automatically update the Web server. Click Next to continue.

  11. In the next Configure Web Server screen, specify the full path of the directory containing the httpd.conf file. Click Next to continue.

  12. In the next Configure Web Server page, a message informs you that the Web Server configuration has been modified for WebGate. Click Yes to confirm.

  13. Stop and start your Web server for the configuration updates to take effect. Click Next to continue.

  14. In the next Configure Web Server screen, a message about SSL is displayed. Click Next to continue.

  15. In the next Configure Web Server screen, a message with the location of the document that has information about the rest of the product setup and Web server configuration is displayed. Choose No and click Next to continue.

  16. The final Configure Web Server screen appears with a message to manually launch a browser and open the HTML document for further information on configuring your Web server. Click Next to continue.

  17. The Oracle COREid Readme screen appears. Review the information on the screen and click Next to continue.

  18. A message appears, providing details of the installation and informing you that the installation was successful.

12.2.6 Configuring IP Validation for WebGate

IP Validation determines if a client's IP address is the same as the IP address stored in the ObSSOCookie generated for single sign-on. IP Validation can cause issues in systems using load balancer devices configured to perform IP termination, or when the authenticating webgate is front-ended by a different load balancer from the one front-ending the enterprise deployment. To configure your load balancer so that it is not validated in these cases, follow these steps:

  1. Navigate to the Access System Console using the following URL:

    http://hostname:port/access/oblix
    

    Where hostname refers to the host where the WebPass Oracle HTTP Server instance is running, and port refers to the HTTP port of the Oracle HTTP Server instance.

  2. On the Access System main page, click the Access System Console link, and then log in as an administrator.

  3. On the Access System Console main page, click Access System Configuration, and then click the Access Gate Configuration link on the left pane to display the AccessGates Search page.

  4. Enter the appropriate search criteria and click Go to display a list of AccessGates.

  5. Select the AccessGate created by the Oracle Access Manager configuration tool.

  6. Click Modify at the bottom of the page.

  7. In the IPValidationException field, enter the address of the load balancer used to front-end the deployment.

  8. Click Save at the bottom of the page.

12.2.7 Setting Up WebLogic Authenticators

The instructions in this section assume that you have already set up the LDAP Authenticators.

This section contains the following topics:

12.2.7.1 Setting Up the Oracle Access Manager ID Asserter

To set up the Oracle Access Manager ID Asserter, follow these steps:

  1. Log in to the Administration Console.

  2. In the Change Center, click Lock & Edit.

  3. Navigate to SecurityRealms\myrealm\Providers.

  4. Click New and select OAM Identity Asserter from the drop-down menu.

  5. Name the asserter (for example: OAM ID Asserter) and click OK.

  6. Click the newly added asserter to see the configuration screen for OAM Identity Asserter.

  7. Set the control flag to REQUIRED and click Save.

  8. Open the Provider Specific tab to configure the following required settings:

    • Primary Access Server: Provide the Oracle Access Manager server endpoint information in HOST:PORT format.

    • AccessGate Name: Provide the name of the AccessGate (for example, bifoundation_domain_AG).

    • AccessGate password: Provide the password for the AccessGate.

  9. Click Save when done.Click Activate Changes to propagate the changes.Restart the Administration Server and the Managed Servers.

12.2.7.2 Setting the Order of Providers

Reorder the Oracle Access Manager Identity Asserter, Oracle Internet Directory Authenticator, and Default Authenticator by ensuring that the control flag for each authenticator is set, as follows:

  • OAM Identity Asserter: REQUIRED

  • OID LDAP Authenticator: SUFFICIENT

  • Default Authenticator: SUFFICIENT

Then, restart the Administration Server, the Managed Servers, and the Oracle Business Intelligence system components.

12.2.8 Configuring Applications

This section explains how to configure applications, and contains the following topics:

12.2.8.1 Enabling SSO/Oracle Access Manager for Oracle BI Enterprise Edition

To enable SSO and Oracle Access Manager for Oracle BI Enterprise Edition, follow these steps:

  1. Log in to Fusion Middleware Control.

  2. Go to Business Intelligence > coreapplication > Security.

  3. Click Lock and Edit Configuration.

  4. Choose Enable SSO and select Oracle Access Manager for SSO Provider.

  5. Configure the login/logout information for the Oracle BI Presentation Services processes by entering the logon and logoff URLs in the following fields:

    • The SSO Provider Logon URL: http://OAM_host:OAM_port/oamsso/login.html

    • The SSO Provider Logoff URL: http://OAM_host:OAM_port/access/oblix/lang/en-us/logout.html

  6. Click Apply.

  7. Click Activate Changes.

  8. Restart all Oracle Business Intelligence system components using opmnctl or Fusion Middleware Control.

12.2.8.2 Enabling SSO/Oracle Access Manager for Oracle BI Publisher

To enable SSO and Oracle Access Manager for Oracle BI Publisher, follow these steps:

  1. In Oracle BI Publisher, go to the Administration > Security Configuration page to enable SSO.

  2. On the Security Configuration Page, provide the following information in the Single Sign-On section:

    1. Select Use Single Sign-On.

    2. For Single Sign-On Type, select Oracle Access Manager.

    3. For Single Sign-Off URL, enter a URL of the following format:

      http://OAM_host:OAM_port/access/oblix/lang/en-us/logout.html
      
  3. Click Apply.

  4. Restart the bipublisher application from the Administration Console.

12.2.8.3 Enabling SSO/Oracle Access Manager for Oracle BI for Microsoft Office

SSO configuration for Oracle BI for Microsoft Office was covered in Section 9.5.4.1, "Configuring Oracle BI for Microsoft Office Properties." If you have not already enabled SSO for Oracle BI for Microsoft Office, perform the steps in Section 9.5.4.1 to accomplish this task.

12.2.8.4 Enabling SSO/Oracle Access Manager for Oracle BI Search

To enable SSO and Oracle Access Manager for Oracle BI Search, follow these steps:

  1. Open the BISearchConfig.properties file for editing. You can find this file at:

    DOMAIN_HOME/config/fmwconfig/biinstances/coreapplication/
    
  2. Set the value of BIServerSSOUrl to the following:

    https://bi.mycompany.com/analytics

  3. Save and close the file.

12.2.8.5 Enabling SSO/Oracle Access Manager for Oracle Real-Time Decisions

This section provides information about Oracle Real-Time Decisions configuration with Oracle Access Manager.

This section contains the following topics:

12.2.8.5.1 Oracle RTD and Oracle Access Manager Logout Guidelines

For Oracle RTD to comply with Oracle Access Manager logout guidelines (in particular, invoking a logout through /adfAuthentication?logout=true&end_url=/ui/do/logout), integration with Oracle Access Manager 10g requires additional WebGate configuration to handle the end_url. Without this additional configuration, you are logged out, but not redirected to the end URL because Oracle Access Manager 10g WebGate does not process end_url.

For information about configuration procedures, see the Oracle Fusion Middleware Application Security Guide.

12.2.8.5.2 Avoiding Problems with Decision Center Logout Redirection

When Webgate 10g against Oracle Access Manager (OAM) 11g is configured as the SSO provider for Oracle RTD Decision Center access, logging out of, then back into Decision Center should ask users for their user name and password credentials on the re-login. To ensure that this occurs correctly, you must configure the following Oracle RTD Decision Center resources in OAM/Webgate as public (unprotected or anonymous access):

  1. Decision Center logout URI /ui/do/logout

  2. Decision Center images /ui/images/*

12.3 Oracle Access Manager 11g Integration

This section describes how to set up Oracle Access Manager 11g as the single sign-on solution for the Oracle Business Intelligence Enterprise Deployment topology.

This section contains the following sections:

12.3.1 Overview of Oracle Access Manager Integration

Oracle Access Manager is the recommended single sign-on solution for Oracle Fusion Middleware 11g Release 1. For more information on installing and configuring an Oracle Access Manager installation, see the Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Identity Management. This section explains the procedure for configuring the Oracle Business Intelligence installation with an existing Oracle Access Manager 11g installation and the underlying directory service. Oracle recommends using either Oracle Internet Directory, Oracle Virtual Directory, or both of these directory services.

Note:

The Oracle Business Intelligence topology described in this guide uses a Single Sign-On configuration where both the Oracle Business Intelligence system and the Single Sign-On system are in the same network domain (mycompany.com). For a multi-domain configuration, refer to the required configuration steps in Chapter 11, "Introduction to Single Sign-On with Oracle Access Manager 11g," in the Oracle Fusion Middleware Administrator's Guide for Oracle Access Manager with Oracle Security Token Service.

12.3.2 Prerequisites for Oracle Access Manager

The setup for Oracle Access Manager assumes an existing Oracle Access Manager installation complete with Access Managers and a policy protecting the Policy Manager. For more information on installing and configuring Oracle Access Manager, see the Oracle Fusion Middleware Enterprise Deployment Guide for Oracle Identity Management. This setup includes a directory service such as Oracle Internet Directory, either standalone or as part of an Oracle Virtual Directory configuration. This chapter provides the necessary steps for configuring your Oracle Business Intelligence installation with either Oracle Internet Directory or Oracle Virtual Directory.

In addition, the Oracle Access Manager installation should have its own Web server configured with a WebGate. This section also provides the steps for using the Oracle Access Manager Web server as a delegated authentication server.

12.3.3 Install WebGate

You must install a WebGate on each of the WEBHOST computers where an HTTP Server has already been installed. Section 12.3.3 and Section 12.3.4 should be repeated for each WEBHOST in the deployment environment.

12.3.3.1 Installing GCC Libraries

You must download and install third-party GCC libraries on your computer before installing WebGate.

You can download the appropriate GCC library from the following third-party Web site:

http://gcc.gnu.org/

For Linux 32-bit, the required libraries are libgcc_s.so.1 and libstdc++.so.5 with a version number of 3.3.2. Table 12-2 lists the versions of GCC third-party libraries for Linux and Solaris.

Table 12-2 Versions of GCC Third-Party Libraries for Linux and Solaris

Operating System Architecture GCC Libraries Required Library Version

Linux 32-bit

x86

libgcc_s.so.1

libstdc++.so.5

3.3.2

Linux 64-bit

x64

libgcc_s.so.1

libstdc++.so.6

3.4.6

Solaris 64-bit

SPARC

libgcc_s.so.1

libstdc++.so.5

3.3.2


12.3.3.2 Installing WebGate

This section describes the procedures for installing WebGate.

Launching the Installer

The Installer program for Oracle HTTP Server 11g Webgate for Oracle Access Manager is included in the webgate.zip file.

To start the installation wizard:

  1. Extract the contents of the webgate.zip file to a directory. By default, this directory is named webgate.

  2. Move to the Disk1 directory under the webgate folder.

  3. Start the installer using the following command:

    $ ./runInstaller -jreLoc WebTier_Home/jdk
    

    After the installer starts, the Welcome screen appears.

Installation Flow and Procedure

If you need additional help with any of the installation screens, click Help to access the online help.

To install Oracle HTTP Server 11g Webgate for Oracle Access Manager:

  1. In the Welcome screen, click Next.

  2. In the Prerequisite Checks screen, click Next.

  3. In the Specify Installation Location screen, specify the Middleware Home and Oracle Home locations. You can use the default location, or choose another location.

    Note:

    The Middleware home contains an Oracle home for Oracle Web Tier.

    Click Next.

  4. In the Specify GCC Library screen, specify the directory that contains the GCC libraries, and click Next.

  5. In the Installation Summary screen, verify the information on this screen and click Install to begin the installation.

  6. In the Installation Progress screen, you may be prompted to run the ORACLE_HOME/oracleRoot.sh script to set up the proper file and directory permissions.

    Click Next to continue.

  7. In the Installation Complete screen, click Finish to exit the installer.

12.3.3.3 Post-Installation Steps

Complete the following procedure after installing Oracle HTTP Server 11g Webgate for Oracle Access Manager:

  1. Move to the following directory under your Oracle home for Webgate:

    $ cd Webgate_Home/webgate/ohs/tools/deployWebGate
    
  2. On the command line, run the following command to copy the required bits of agent from the Webgate_Home directory to the Webgate Instance location:

    $ ./deployWebGateInstance.sh -w Webgate_Instance_Directory 
    -oh Webgate_Oracle_Home
    

    Where Webgate_Oracle_Home is the directory where you have installed Oracle HTTP Server Webgate and created as the Oracle home for Webgate, as in the following example:

    MW_HOME/Oracle_OAMWebGate1
    

    The Webgate_Instance_Directory is the location of Webgate Instance Home, which is same as the Instance Home of Oracle HTTP Server, as in the following example:

    MW_HOME/Oracle_WT1/instances/instance1/config/OHS/ohs1
    

    Note:

    An Instance Home for Oracle HTTP Server is created after you configure Oracle HTTP Server.

  3. Run the following command to ensure that the LD_LIBRARY_PATH variable contains Oracle_Home_for_Oracle_HTTP_Server/lib:

    $ export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:Oracle_Home_for_Oracle_HTTP_Server/lib
    
  4. From your present working directory, move up one directory level:

    $ cd Webgate_Home/webgate/ohs/tools/setup/InstallTools
    
  5. On the command line, run the following command to copy the apache_webgate.template from the Webgate_Home directory to the Webgate Instance location (renamed to webgate.conf) and update the httpd.conf file to add one line to include the name of webgate.conf:

    $ ./EditHttpConf -w Webgate_Instance_Directory [-oh Webgate_Oracle_Home] 
    [-o output_file]
    

    Note:

    The -oh WebGate_Oracle_Home and -o output_file parameters are optional.

    Where WebGate_Oracle_Home is the directory where you have installed Oracle HTTP Server Webgate for Oracle Access Manager and created as the Oracle Home for Webgate, as in the following example:

    MW_HOME/Oracle_OAMWebGate1
    

    The Webgate_Instance_Directory is the location of Webgate Instance Home, which is same as the Instance Home of Oracle HTTP Server, as in the following example:

    MW_HOME/Oracle_WT1/instances/instance1/config/OHS/ohs1
    

    The output_file is the name of the temporary output file used by the tool, as in the following example:

    Edithttpconf.log

12.3.4 Register the WebGate Agent

This section describes the procedures for registering the WebGate Agent.

12.3.4.1 The RREG Tool

The RREG tool is part of the Oracle Access Manager 11g installation. If it is not already available, extract it using the following procedure:

  1. After installing and configuring Oracle Access Manager, navigate to the following location:

    IDM_Home/oam/server/rreg/client
    
  2. On the command line, untar the RREG.tar.gz file using gunzip, as in the following example:

    gunzip RREG.tar.gz
     
    tar -xvf RREG.tar
    

You can find the tool that is used to register the agent in the following location:

RREG_Home/bin/oamreg.sh

RREG_Home is the directory to which you extracted the contents of RREG.tar.gz/rreg.

The RREG Configuration Tool provides a way to register protected and public resources into the OAM system. The list of protected resources to be added to the OAM system is as follows:

/analytics/saw.dll
/bicontent
/bioffice
/biofficeclient
/xmlpserver
/ui
/mapviewer
/bicomposer
/bisearch
/em
/em/…/*
/console
/console/…/*

Where "/…/*" implies all resources under the base url context.

Note that you only need to include /bicomposer if BI Composer has been configured.

The list of public resources is:

/analytics
/analytics/saw.dll/wsdl
/bioffice/services/saw
/ui/do/logout
/xmlpserver/services
/xmlpserver/report_service
/xmlpserver/ReportTemplateService.xls
/xmlpserver/Guest
/biservices
/ui/images/*

The list of excluded resources is:

/rtis
/rtis/.../*
/schema
/schema/.../*
/ws
/ws/.../*
/wsm-pm
/wsm-pm/.../*

12.3.4.2 Updating the OAM11gRequest File

In the RREG_Home/input directory, there is a template file named OAM11GRequest.xml. Copy this template to a new file called BIOAM11GRequest.xml and edit it to create the policies for the Oracle Business Intelligence installation. After editing, the file should look as follows. Note that you only need to include /bicomposer if BI Composer has been configured.

Note:

Replace $$webtierhost$$, $$oamadminserverport$$, $$oamhost$$, and load_balancer_source_IP with their respective values in your installation.

<?xml version="1.0" encoding="UTF-8"?>

<!-- Copyright (c) 2009, 2010, Oracle and/or its affiliates. All rights reserved.

   NAME: OAM11GRequest_short.xml - Template for OAM 11G Agent Registration request 
file (Shorter version - Only mandatory values - Default values will be used for 
all other fields)
   DESCRIPTION: Modify with specific values and pass file as input to the tool.

-->
<OAM11GRegRequest>
    <serverAddress>http://$$oamhost$$:$$oamadminserverport$$</serverAddress>
    <hostIdentifier>$$webtierhost$$_bi</hostIdentifier>
    <agentName>$$webtierhost$$_bi</agentName>
    <applicationDomain>$$webtierhost$$_bi</applicationDomain>
    <cachePragmaHeader>private</cachePragmaHeader>
    <cacheControlHeader>private</cacheControlHeader>
    <ipValidation>1</ipValidation>
    <logOutUrls>
        <url>/oamsso/logout.html</url>
    </logOutUrls>
    <protectedResourcesList>
        <resource>/analytics/saw.dll</resource>
        <resource>/bicontent</resource>
        <resource>/bioffice</resource>
        <resource>/biofficeclient</resource>
        <resource>/xmlpserver</resource>
        <resource>/ui</resource>
        <resource>/mapviewer</resource>
        <resource>/bicomposer</resource>
        <resource>/bisearch</resource>
        <resource>/em</resource>
        <resource>/em/…/*</resource>
        <resource>/console</resource>
        <resource>/console/…/*</resource>
    </protectedResourcesList>
    <publicResourcesList>
        <resource>/analytics</resource>
        <resource>/analytics/saw.dll/wsdl</resource>
        <resource>/bioffice/services/saw</resource>
        <resource>/ui/do/logout</resource>
        <resource>/xmlpserver/services</resource>
        <resource>/xmlpserver/report_service</resource>
        <resource>/xmlpserver/ReportTemplateService.xls</resource>
        <resource>/xmlpserver/Guest</resource>
        <resource>/biservices</resource>
        <resource>/ui/images/*</resource>
    </publicResourcesList>
    <excludedResourcesList>
        <resource>/rtis</resource>
        <resource>/rtis/.../*</resource>
        <resource>/schema</resource>
        <resource>/schema/.../*</resource>
        <resource>/ws</resource>
        <resource>/ws/.../*</resource>
        <resource>/wsm-pm</resource>
        <resource>/wsm-pm/.../*</resource>
    </excludedResourcesList>
</OAM11GRegRequest>

12.3.4.3 Running the oamreg Tool

Run the oamreg tool using the following command:

$ RREG_Home/bin/oamreg.sh inband RREG_Home/input/BIOAM11gRequest.xml

Note that the JAVA_HOME operating system environment variable must be set to jdk6 for this command to work.

The run should look similar to the following:

------------------------------------------------
Welcome to OAM Remote Registration Tool!
Parameters passed to the registration tool are:
Mode: inband
Filename: /u01/oim/oim_home/oam/server/rreg/client/rreg/input/BIOAM11GRequest.xml
Enter admin username: oamadmin_user
Username: oamadmin_user
Enter admin password: my_password
Do you want to enter a Webgate password?(y/n):
y
Enter webgate password: my_password
Enter webgate password again: my_password
Password accepted. Proceeding to register..
Nov 9, 2011 6:48:44 PM
oracle.security.am.engines.rreg.client.handlers.request.OAM11GRequestHandler
getWebgatePassword
INFO: Passwords matched and accepted.
Do you want to import an URIs file?(y/n):
n
----------------------------------------
Request summary:
OAM11G Agent Name:WEBHOST_bi
URL String:WEBHOST_bi
Registering in Mode:inband
Your registration request is being been sent to the Admin server at:
http://oamserver.mycompany.com:OAM_ADMINSERVER_PORT
----------------------------------------
Inband registration process completed successfully! Output artifacts are created
in the output folder.

12.3.4.4 Copying Access Files to WEBHOSTs

In OPEN mode, the following two files are generated in OAM_REG_HOME/output/$$webtierhost$$_bi:

  • ObAccessClient.xml

  • cwallet.sso

Copy these files to the webgate instance (Webgate_Instance_Home/config/OHS/ohsN/webgate/config/) location on WEBHOST1 and WEBHOST2.

In SIMPLE mode, copy the following files from the OAM_REG_HOME/output/$$webtierhost$$_bi directory to the Webgate_Instance_Home/webgate/config directory on WEBHOST1 and WEBHOST2:

  • ObAccessClient.xml

  • cwallet.sso

  • password.xml

In addition, copy the following files from the OAM_REG_HOME/output/$$webtierhost$$_bi directory to the Webgate_Instance_Home/config/OHS/ohsN/webgate/config/simple directory on WEBHOST1 and WEBHOST2:

  • aaa_key.pem

  • aaa_cert.pem

Note:

When integrating with Oracle Identity Management, use the transport mode currently in use by the Oracle Identity Management servers. For example, Open, Simple, or Cert.

12.3.5 Configuring IP Validation for WebGate

IP Validation determines if a client's IP address is the same as the IP address stored in the ObSSOCookie generated for single sign-on. IP Validation can cause issues in systems using load balancer devices configured to perform IP termination, or when the authenticating webgate is front-ended by a different load balancer from the one front-ending the enterprise deployment. To configure your load balancer so that it is not validated in these cases, follow these steps:

  1. Go to the Oracle Access Manager 11g Console using the following URL:

    http://hostname:port/oamconsole
    
  2. Log in as the Oracle Access Manager 11g Administrator.

  3. On the Welcome page, click the System Configuration tab.

  4. In the Access Manager Settings section, expand the SSO Agents node. Then, double-click OAM Agents to display the OAM Agents Search page.

  5. Enter the appropriate search criteria and click Search to display a list of OAM Agents.

  6. Select the OAM Agent created by the Oracle Access Manager configuration tool.

  7. In the IP Validation Exception field, enter the address of the load balancer used to front-end the deployment.

  8. Click Apply at the top of the page.

12.3.6 Setting Up the WebLogic Authenticators

This section assumes that you have already set up the LDAP authenticator by following the steps in Section 12.1.2.3, "Configuring the Identity Store to Use LDAP." If you have not already created the LDAP authenticator, do it before continuing with this section.

This section includes the following topics:

12.3.6.1 Back Up Configuration Files

To be safe, first back up the relevant configuration files:

ORACLE_BASE/admin/domain_name/aserver/domain_name/config/config.xml
ORACLE_BASE/admin/domain_name/aserver/domain_name/config/fmwconfig/jps-config.xml
ORACLE_BASE/admin/domain_name/aserver/domain_name/config/fwmconfig/system-jazn-
data.xml

In addition, back up the boot.properties file for the Administration Server.

12.3.6.2 Setting Up the OAM ID Asserter

To set up the OAM ID Asserter:

  1. Log into Weblogic Console, if not already logged in.

  2. Click Lock and Edit.

  3. Navigate to SecurityRealms, <Default Realm Name>, and then Providers.

  4. Click New and Select OAM Identity Asserter from the dropdown menu.

  5. Name the asserter (for example, OAM ID Asserter) and click Save.

  6. Click the newly added asserter to see the configuration screen for OAM Identity Asserter.

  7. Set the control flag to 'REQUIRED' .

  8. Ensure that both the ObSSOCookie and OAM_REMOTE_USER options are selected under active types.

  9. Click Save when done.

  10. Click Activate Changes to propagate the changes.

  11. Restart the Administration Server and Managed Servers.

Finally, log in as admin to the WLST console at:

ORACLE_COMMON_HOME/common/bin/wlst.sh

Then, run the following command:

addOAMSSOProvider(loginuri="/${app.context}/adfAuthentication",logouturi="oamsso/
logout.html")

For example:

wls:/offline> connect('weblogic','my_password','t3://ADMINVHN:7001')
Connecting to t3:ADMINVHN:7001 with userid weblogic ...
Successfully connected to Admin Server 'AdminServer' that belongs to domain
'bifoundation_domain'.

wls:/bifoundation_domain/serverConfig>
wls:/bifoundation_domain/serverConfig>
addOAMSSOProvider(loginuri="/${app.context}/adfAuthentication",logouturi="oamsso/
logout.html")

12.3.6.3 Setting the Order of Providers

Reorder the OAM Identity Asserter, OID Authenticator, and Default Authenticator by ensuring that the control flag for each authenticator is set as follows:

  • OAM Identity Asserter: REQUIRED

  • OID LDAP Authenticator (or OVD LDAP Authenticator): SUFFICIENT

  • Default Authenticator: SUFFICIENT

Then, restart the Administration Server, the Managed Servers, and the Oracle Business Intelligence system components.

12.3.7 Configuring Applications

This section explains how to configure applications, and contains the following topics:

12.3.7.1 Enabling SSO/Oracle Access Manager for Oracle BI Enterprise Edition

To enable SSO and Oracle Access Manager for Oracle BI Enterprise Edition, follow these steps:

  1. Log in to Fusion Middleware Control.

  2. Go to Business Intelligence > coreapplication > Security > Single Sign On.

  3. Click Lock and Edit Configuration.

  4. Choose Enable SSO and select Oracle Access Manager for SSO Provider.

  5. Configure the login/logout information for the Oracle BI Presentation Services processes by entering the logon and logoff URLs in the following fields:

    • The SSO Provider Logon URL: http://OAM_host:OAM_port/oamsso/login.html

    • The SSO Provider Logoff URL: http://OAM_host:OAM_port/oamsso/logout.html

  6. Click Apply.

  7. Click Activate Changes.

  8. Restart all Oracle Business Intelligence system components using opmnctl or Fusion Middleware Control.

12.3.7.2 Enabling SSO/Oracle Access Manager for Oracle BI Publisher

To enable SSO and Oracle Access Manager for Oracle BI Publisher, follow these steps:

  1. In Oracle BI Publisher, go to the Administration > Security Configuration page to enable SSO.

  2. On the Security Configuration Page, provide the following information in the Single Sign-On section:

    1. Select Use Single Sign-On.

    2. For Single Sign-On Type, select Oracle Access Manager.

    3. For Single Sign-Off URL, enter a URL of the following format:

      http://OAM_host:OAM_port/oamsso/logout.html
      
  3. Click Apply.

  4. Restart the bipublisher application from the Administration Console.

12.3.7.3 Enabling SSO/Oracle Access Manager for Oracle BI for Microsoft Office

SSO configuration for Oracle BI for Microsoft Office was covered in Section 9.5.4.1, "Configuring Oracle BI for Microsoft Office Properties." If you have not already enabled SSO for Oracle BI for Microsoft Office, perform the steps in Section 9.5.4.1 to accomplish this task.

12.3.7.4 Enabling SSO/Oracle Access Manager for Oracle BI Search

To enable SSO and Oracle Access Manager for Oracle BI Search, follow these steps:

  1. Open the BISearchConfig.properties file for editing. You can find this file at:

    DOMAIN_HOME/config/fmwconfig/biinstances/coreapplication/
    
  2. Set the value of BIServerSSOUrl to the following:

    https://bi.mycompany.com/analytics

  3. Save and close the file.

12.3.7.5 Enabling SSO/Oracle Access Manager for Oracle Real-Time Decisions

This section provides information about Oracle Real-Time Decisions configuration with Oracle Access Manager.

This section contains the following topics:

12.3.7.5.1 Oracle RTD and Oracle Access Manager Logout Guideline

For Oracle RTD to comply with Oracle Access Manager logout guidelines (in particular, invoking a logout through /adfAuthentication?logout=true&end_url=/ui/do/logout), integration with Oracle Access Manager 10g requires additional WebGate configuration to handle the end_url. Without this additional configuration, you are logged out, but not redirected to the end URL because Oracle Access Manager 10g WebGate does not process end_url.

For information about configuration procedures, see the Oracle Fusion Middleware Application Security Guide.

12.3.7.5.2 Avoiding Problems with Decision Center Logout Redirection

When Webgate 10g against Oracle Access Manager (OAM) 11g is configured as the SSO provider for Oracle RTD Decision Center access, logging out of, then back into Decision Center should ask users for their user name and password credentials on the re-login. To ensure that this occurs correctly, you must configure the following Oracle RTD Decision Center resources in OAM/Webgate as public (unprotected or anonymous access):

  1. Decision Center logout URI /ui/do/logout

  2. Decision Center images /ui/images/*

12.4 Backing Up the Identity Management Configuration

After you have verified that the extended domain is working, back up the configuration. This is a quick backup for the express purpose of immediate restore in case of problems in the further steps. The backup destination is the local disk. This backup can be discarded after the enterprise deployment setup is complete. At this point, the regular deployment-specific backup and recovery process can be initiated. The Oracle Fusion Middleware Administrator's Guide provides further details. For information on describing the Oracle HTTP Server data that must be backed up and restored, refer to the "Backup and Recovery Recommendations for Oracle HTTP Server" section in that guide. For information on how to recover components, see the "Recovering Components" and "Recovering After Loss of Component Host" sections in the guide. For recommendations specific to recovering from the loss of a host, see the "Recovering Oracle HTTP Server to a Different Host" section in the guide. Also refer to the Oracle Database Backup and Recovery User's Guide for information on database backup.

To back up the configuration at this point:

  1. Back up the Web tier:

    1. Shut down the instance using opmnctl.

      WEBHOSTn> ORACLE_BASE/admin/instance_name/bin/opmnctl stopall
      
    2. Back up the Middleware Home on the Web tier using the following command (as root):

      WEBHOSTn> tar -cvpf BACKUP_LOCATION/web.tar $MW_HOME
      
    3. Back up the Instance home on the Web tier using the following command (as root):

      WEBHOSTn> tar -cvpf BACKUP_LOCATION/web_instance.tar $ORACLE_INSTANCE
      
    4. Start the instance using opmnctl:

      WEBHOSTn> ORACLE_BASE/admin/instance_name/bin/opmnctl startall
      
  2. Back up the Administration Server domain directory. Perform a backup to save your domain configuration. The configuration files all exist under the ORACLE_BASE/admin/domain_name directory. Run the following command to create the backup:

    APPHOSTn> tar -cvpf edgdomainback.tar ORACLE_BASE/admin/domain_name