Skip Headers
Oracle® Fusion Middleware Oracle Authorization Policy Manager Administrator's Guide (Oracle Fusion Applications Edition)
11g Release 1 (11.1.4)

Part Number E20839-03
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Feedback page
Contact Us

Go to previous page
Previous
PDF · Mobi · ePub

Index

A  B  C  D  E  F  G  H  I  J  L  M  N  O  P  R  S  T  U  W 

A

Admin Policy
Administration Role
Admin Policy, 5.3.1
Administration Console
authorization management, 1.4.1.1
customize, 7.1
Home area, 1.4.3
log in, 1.3.1
Navigation Panel, 1.4.2
online help, 1.4.4
searches, 3.7
sign out, 1.3.2
system configuration, 1.4.1.2
using, 1.4
Administrator Roles
managing, 5.6
advanced search, 3.9
analyzing differences, 6.4
APM
role template, 9.1
Application
administration, 5.3
defined, 3.1
managing, 3.5.1
Application Roles
managing, 3.5.5, 3.5.6
application roles, 3.9.4
applications, 3.9.2
applying a patch, 6.6
Attribute
managing, 3.5.9
Attribute Retrievers
predefined, 4.1
attributes, 3.9.9
auditing, 12.2
configuration, 12.2.2
more information, 12.2.3
authorization management, 1.4.1.1
authorization policies, 3.9.8
Authorization Policy, 2.1.2
and Obligations, 3.5.5.1
defined, 2.1
managing, 3.5.5

B

Baseline policy store, 6.1.1
big picture, 1.1.3

C

cache
configuring, 12.4
changes and conflicts, 6.4
cinfiguration
debugging, 12.5.1
Condition
managing, 3.6
configuration
logging, 12.5.1
customizations
Administration Console, 7.1

D

data security policies, 9.1
data sources required by templates, 9.2
datastore
access, 4.4
debugging, 12.5
Java Security Module, 12.5.1.1
policy distribution, 12.5.3
seaching logs, 12.5.2
WebLogic Server Security Module, 12.5.1.2
delegating administration, 5.3, 5.4, 5.5
dimension attribute, 9.1
dimension values, 9.1

E

elements
of policies, 3.3
Entitlements
managing, 3.5.4
entitlements, 3.9.7
Extensions
managing, 3.5.9
external roles, 3.9.1

F

Function
managing, 3.5.9
functions, 3.9.10

G

General tab, 6.3
Global
defined, 3.1
Security Modules, 11.2
system administrators, 5.6
globalization, 1.2.8
glossary, 2.3
Application, 2.3
Application Role, 2.3
Attributes, 2.3
Authorization Policy, 2.3
Condition, 2.3
Entitlement, 2.3
External Role, 2.3
Functions, 2.3
Obligation, 2.3
Policy Domain, 2.3
policy store, 2.3
Principal, 2.3
Resource, 2.3
Resource Type, 2.3
Role Category, 2.3
Role Mapping Policy, 2.3

H

hierarchical resource types, 3.5.2.1
high availability, 1.2.5
Home area, 1.4.3

I

identity store
LDAP configuration, 1.2.4
installation, 1.2.2

J

jazn-data.xml, 6.1.2
jps-config.xml, C

L

log in, 1.3.1
log out, 1.3.2
loggers, 1.2.7
logging
debug configuring, 12.5.1
searching logs, 12.5.2

M

migrating policies, 12.3
Database to XML, 12.3.4
LDAP to XML, 12.3.2
XML to Database, 12.3.3
XML to LDAP, 12.3.1

N

naming rules, 9.1
Navigation Panel, 1.4.2

O

Obligations
creating, 3.5.5.1
online help, 1.4.4
OpenLDAP, 1.1.2.2
Oracle Platform Security Services, 1.2.1

P

parameters
PDP Proxy, C.3
policy distribution, C.1
policy store, C.4
Security Modules, C.2
Patch Application button, 6.3
Patch Details tab, 6.3
PDP Proxy parameters, C.3
PIP
see Attribute Retrievers, 4.1
PIP credentials, 4.4
policy
creation
additional elements, 3.3
defining procedure, 3.2
definition procedure
additional elements, 3.3
migrating, 12.3
policy creation, 3.2
policy distribution
debugging, 12.5.3
overview, 8.1
parameters, C.1
procedure, 8.3
Policy Domain
administration, 5.5
overview, 5.4
policy evaluation, 2.2
policy objects
Application, 3.5.1
Application Roles, 3.5.5, 3.5.6
Attribute, 3.5.9
Authorization Policy, 3.5.5
Condition, 3.6
defined, 2.3
Application, 2.3
Application Role, 2.3
Attributes, 2.3
Authorization Policy, 2.3
Condition, 2.3
Entitlement, 2.3
External Role, 2.3
Functions, 2.3
Obligation, 2.3
Policy Domain, 2.3
policy store, 2.3
Principal, 2.3
Resource, 2.3
Resource Type, 2.3
Role Category, 2.3
Role Mapping Policy, 2.3
definitions, 2.3
Entitlements, 3.5.4
Extensions, 3.5.9
Function, 3.5.9
management, 3.1
Resource, 3.5.3
Resurce Types, 3.5.2
Role Catalog, 3.5.5, 3.5.6
Role Category, 3.5.8
Role Mapping Policy, 3.5.7
search, 3.9, 3.9.1, 3.9.2, 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 3.9.8, 3.9.9, 3.9.10, 3.9.11
policy store
parameters, C.4
policy types, 2.1
Authorization Policy, 2.1.2
evaluating, 2.2
Role Mapping Policy, 2.1.3
policy upgrade, 6.1.1
Policy Upgrade Management tab, 6.3
policy use case, 2.4
pop-up search box, 3.7
Production policy store, 6.1.1

R

related issues, 6.4
required data source, 1.2.1
resolving differences, 6.5
Resource
managing, 3.5.3
Resource Types
managing, 3.5.2
resource types, 3.9.3
hierarchical, 3.5.2.1
resources, 3.9.6
Role Catalog, 3.5.5, 3.5.6
Role Category
defined, 2.3
managing, 3.5.8
role mapping policies, 3.9.5
Role Mapping Policy, 2.1.3
defined, 2.1
managing, 3.5.7
role template, 9.1
roles
assigning, 2.1.3

S

search
Administration Console, 3.7
advanced, 3.9
application roles, 3.9.4
applications, 3.9.2
attributes, 3.9.9
authorization policies, 3.9.8
entitlements, 3.9.7
external roles, 3.9.1
functions, 3.9.10
pop-up search, 3.7
resource types, 3.9.3
resources, 3.9.6
role mapping policies, 3.9.5
simple, 3.8
users, 3.9.11
searching logs, 12.5.2
Security Modules
configuring, 11.2
Java
debug, 12.5.1.1
parameters, C.2
WebLogic Server
debug, 12.5.1.2
security modules
and WebLogic Server, 12.1
simple search, 3.8
SSL, 1.2.6
system administrators, 5.6
system configuration, 1.4.1.2

T

troubleshooting
unable to login, B.1

U

unable to login, B.1
upgrading
analyzing differences, 6.4
application policies, 6
applying a patch, 6.6
changes and conflicts, 6.4
General tab, 6.3
overview, 6.1.2
Patch Details tab, 6.3
policies, 6.1.1
related issues, 6.4
resolving differences, 6.5
use case, 2.4
users, 3.9.11

W

WebLogic Server
integration, 12.1
wildcard, 10.2.1, 10.2.1, 10.2.1
wildcard character, 10.2.1, 10.2.1, 10.2.1