2 Managing Oracle Identity Navigator

This chapter describes the common configuration and management tasks an enterprise administrator will perform while using Oracle Identity Navigator.

This chapter contains the following topics:

2.1 Configuring the Identity Store

Note:

This section provides information about configuring the domain identity store using Oracle Internet Directory or Oracle Virtual Directory with a supported LDAP-based directory server. For information about other supported identity stores, see "System Requirements and Certification".

Consult the vendor product documentation for information about configuring the identity store in your environment.

You need to configure a domain identity store before you can view users when searching from the Oracle Identity Navigator Access Privileges pane. To configure the identity store as the main authentication source, you must configure the Oracle WebLogic Server domain where Oracle Identity Navigator is installed.

Configuration is done in the WebLogic Server Administration Console. Setting the Control Flag attribute for the authenticator provider determines the ordered execution of the Authentication providers. The possible values for the Control Flag attribute are:

  • REQUIRED - This LoginModule must succeed. Even if it fails, authentication proceeds down the list of LoginModules for the configured Authentication providers. This setting is the default.

  • REQUISITE - This LoginModule must succeed. If other Authentication providers are configured and this LoginModule succeeds, authentication proceeds down the list of LoginModules. Otherwise, control is returned to the application.

  • SUFFICIENT - This LoginModule need not succeed. If it does succeed, return control to the application. If it fails and other Authentication providers are configured, authentication proceeds down the LoginModule list.

  • OPTIONAL - This LoginModule can succeed or fail. However, if all Authentication providers configured in a security realm have the JAAS Control Flag set to OPTIONAL, the user must pass the authentication test of one of the configured providers.

For more information about creating a new default authenticator in Oracle WebLogic Server, see Oracle Fusion Middleware Oracle WebLogic Server Administration Console Online Help and Oracle Fusion Middleware Securing Oracle WebLogic Server.

To configure the OID authenticator in Oracle WebLogic Server:

  1. Log in to Oracle WebLogic Server Administration Console, and click Lock & Edit in the Change Center.

  2. In Oracle WebLogic Server Administration Console, select Security Realms from the left pane and click the realm you are configuring. For example, myrealm.

  3. Select the Providers tab, then select the Authentication sub-tab.

  4. Click New to launch the Create a New Authentication Provider page. Complete the fields as follows:

    • Name: Enter a name for the authentication provider. For example, MyOIDDirectory.

    • Type: Select OracleInternetDirectoryAuthenticator from the list.

    • Click OK. The authentication providers table is updated.

  5. In the authentication providers table, click the newly added authenticator.

  6. In Settings, select the Configuration tab, then select the Common tab.

    • Set the Control Flag to SUFFICIENT.

    • Click Save.

  7. Select the Provider Specific tab and enter the following required settings using values for your environment:

    • Host: The host name of the Oracle Internet Directory server.

    • Port: The port number on which the Oracle Internet Directory server is listening.

    • Principal: The distinguished name (DN) of the Oracle Internet Directory user to be used to connect to the Oracle Internet Directory server. For example: cn=OIDUser,cn=users,dc=us,dc=mycompany,dc=com.

    • Credential: Password for the Oracle Internet Directory user entered as the Principal.

    • Group Base DN: The base distinguished name (DN) of the Oracle Internet Directory server tree that contains groups.

    • User Base DN: The base distinguished name (DN) of the Oracle Internet Directory server tree that contains users.

    • All Users Filter: LDAP search filter. Click More Info... for details.

    • User From Name Filter: LDAP search filter. Click More Info... for details.

    • User Name Attribute: The attribute that you want to use to authenticate (for example, cn, uid, or mail). For example, to authenticate using a user's email address you set this value to mail.

  8. Click Save.

  9. From the Settings for myrealm page, select the Providers tab, then select the Authentication tab.

  10. Click Reorder.

  11. Select the new authenticator and use the arrow buttons to move it into the first position in the list.

  12. Click OK.

  13. Click DefaultAuthenticator in the Authentication Providers table to display the Settings for DefaultAuthenticator page.

  14. Select the Configuration tab, then the Common tab, and select SUFFICIENT from the Control Flag list.

  15. In the Change Center, click Activate Changes.

  16. Restart Oracle WebLogic Server.

To use Oracle Virtual Directory as the domain identity store, you must do the following:

2.2 Configuring the Policy Store

When operating in a development or test environment you might find it convenient to use the default policy store, which is the system-jazn-data.xml file. However, Oracle recommends that in a production environment the domain policy store be LDAP-based. Data from the default system-jazn-data.xml file must be migrated when moving to an LDAP-based policy store such as Oracle Internet Directory. This process is called reassociation.

To re-configure the domain to use Oracle Internet Directory as the policy store, follow the steps in "Reassociating the OPSS Security Store" in Oracle Fusion Middleware Application Security Guide.

Note:

It is important to restart the admin and managed servers for re-association to be successful.

2.3 Configuring the Enterprise Roles

Enterprise roles must be created in the domain identity store to support the Common Admin Roles. Templates are provided for both Oracle Internet Directory and Oracle Virtual Directory configured with an LDAP-based directory server. The template is used with the ldifmigrator tool.

Pre-requisites to configuring enterprise roles for the Common Admin Roles:

  1. The domain identity store must be configured. For more information, see "Configuring the Identity Store".

  2. The domain policy store must be configured. For more information, see "Configuring the Policy Store".

For more information about supported identity and policy store configurations for Oracle Identity Navigator, see "System Requirements and Certification".

To configure enterprise roles in the domain identity store:

  1. Select the template for your environment from ORACLE_HOME/common/templates.

    • Oracle Internet Directory: use oinav_template_oid.ldif

    • Oracle Virtual Directory, use oinav_template_ovd.ldif

  2. To use the ldifmigrator tool, set $JAVA_HOME and include JAVA_HOME/bin in PATH.

  3. Use the ldifmigrator tool to create the enterprise roles in the identity store under <GroupBase> as follows, where <ldif template> is the template name:

    Run
    java -cp $MIDDLEWARE_HOME/oracle_common/modules/oracle.ldap_11.1.1/ldapjclnt11.jar -DORACLE_HOME=$ORACLE_HOME/oracle_common oracle.ldap.util.LDIFMigration   input_file=<ldif template>  output_file=<outputfile>  namespace=<GroupBase>  -load dn=<bindDn> password=<>  host=<hostName> port=<portNumber>
    

    When using Oracle Virtual Directory with an LDAP-based directory server, the host, port, dn, and groupbase refer to Oracle Virtual Directory and not the LDAP server.

2.4 Configuring Single Sign-On (SSO)

By default, the Oracle Access Manager 11g agent provides single sign-on functionality for Oracle Identity Navigator and the following Identity Management consoles:

  • Oracle Identity Manager

  • Oracle Access Manager

  • Oracle Adaptive Access Manager

  • Oracle Authorization Policy Manager

The Oracle Access Manager agent can only protect consoles in a single domain. If your environment spans multiple domains, you can use Oracle Access Manager 11g WebGate for Oracle HTTP Server 11g. To configure Oracle Identity Navigator for WebGate-based single sign-on, see the chapter "Integrating with Oracle Identity Navigator" in Oracle Fusion Middleware Integration Guide for Oracle Access Manager.

2.5 Configuring Secure Socket Layer (SSL)

The web.xml file provides configuration and deployment information for a Web application, such as Oracle Identity Navigator. The Oracle Identity Navigator web.xml file is in oinav.ear. The optional <user-data-constraint> element in web.xml can be used to specify a transport guarantee that prevents content from being transmitted insecurely. Within the <user-data-constraint> tag, the <transport-guarantee> tag defines how communication should be handled. There are three possible values for that tag:

  • NONE – the application does not require any transport guarantees.

  • INTEGRAL – the application requires that data sent between the client and server be sent in such a way that it cannot be changed in transit.

  • CONFIDENTIAL – the application requires that data be transmitted in a fashion that prevents other entities from observing the contents of the transmission.

Because Oracle Identity Navigator supports both SSL and non-SSL connections to component consoles, the web.xml attribute <user-data-constraint> is set to a default value of NONE. That is, Oracle Identity Navigator does not, by default, support a constraint for a transport guarantee. If you want such a guarantee, you can change the <transport-guarantee> tag within the <user-data-constraint> tag to either INTEGRAL or CONFIDENTIAL.

2.6 Getting Started with Oracle Identity Navigator

Log in as an administrator as follows:

  1. Start the WebLogic Administration Server.

  2. Enter the following URL in a browser:

    http://host:port/oinav
    

    where port is the Administration Server port.

  3. Supply the Administrator Username and Password. The Administrator account must exist in the identity store and have the Oracle Identity Navigator Administrator role.

  4. Click Log In.

2.6.1 Initial Configuration Tasks

You must have appropriate privileges to perform the following tasks.

  1. Configure component categories. See "Managing the Product Launcher". Then add components manually or by using discovery. See "Adding a Component Link to the Product Launcher by Using Product Discovery".

    You must be the Oracle Identity Navigator administrator or have the Application Configurator Common Admin Role to perform this task.

  2. Configure BI Publisher. See "Configuring Oracle Business Intelligence Publisher".

    You must be the Oracle Identity Navigator administrator or have the Application Configurator Common Admin Role to perform this task.

  3. If your RSS feed is outside a firewall, configure a proxy. See "Configuring a Proxy to Access News Feeds".

    You must be an administrator to perform this task.

2.6.2 Configuring Oracle Business Intelligence Publisher

Oracle Identity Navigator has been integrated with Oracle BI Publisher. The interface supports stronger customization than BI Publisher alone. Using the Oracle Identity Navigator interface, each administrator can customize the Dashboard as needed. The report tree is less deep than with BI Publisher alone, so you can access reports with fewer clicks.

Note:

Only one Oracle Business Intelligence Publisher instance can be connected to an Oracle Identity Navigator instance.

2.6.2.1 Before You Create a Connection to BI Publisher

Before you attempt to create a connection between Oracle Identity Navigator and an instance of BI Publisher, you must install BI Publisher and configure the report templates. Optionally, you can configure BI Publisher for SSL.

2.6.2.1.1 Installing BI Publisher

You must install the following components:

  • BI Publisher 10.1.3.4.1

  • Automated Release Update 12355706 (March 2010) or later

See Also:

Oracle Business Intelligence Publisher Installation Guide in the Oracle Business Intelligence Publisher Enterprise Version 10.1.3.4 Documentation Library for more information about installing Oracle BI Publisher.
2.6.2.1.2 Configuring BI Publisher Report Templates

Oracle Identity Management BI Publisher report templates are installed as zip files under Oracle home directories. For 11gR1 components, all the templates are in a single zip file. These are all Audit report templates.

For 11gR1+ components, the template zip files are in specific directories under the component Oracle homes. For example:

Component Directory Under Oracle Home
Oracle Adaptive Access Manager oaam/reports
Oracle Access Manager oam/server/reports
Oracle Identity Manager server/reports

Copy and unzip audit report zip files to the audit report folder under the BI Publisher report root folder. Copy and unzip other report zip files to the BI Publisher report root folder. Use the BI Publisher web interface to configure data sources with report databases.

See Also:

  • Oracle Business Intelligence Publisher Administrator's and Developer's Guide in the Oracle Business Intelligence Publisher Enterprise Version 10.1.3.4 Documentation Library for more information about installing Oracle BI Publisher.

  • The chapter "Using Audit Analysis and Reporting" in Oracle Fusion Middleware Application Security Guide.

2.6.2.1.3 Configuring BI Publisher for SSL (Optional)

If you plan to use an SSL connection between Oracle Identity Navigator and BI Publisher, you must configure BI Publisher for SSL, as described in "Configuring BI Publisher for Secure Socket Layer (SSL) Communication" in Oracle Business Intelligence Publisher Administrator's and Developer's Guide in the Oracle Business Intelligence Publisher Enterprise Version 10.1.3.4 Documentation Library.

In addition to configuring BI Publisher for SSL, you must provision a CA certificate to Oracle Identity Navigator so it can connect to BI Publisher through SSL. Proceed as follows:

  1. Import the BI Publisher CA certificate into the Oracle WebLogic Server trust store, using the keytool command.

     keytool -keystore trust_store -export -alias alias -file certificate_file
     
    

    For example:

     keytool -keystore truststore.jks -export -alias cacert -file cacert.cer
     
    

    If you get a hostname verification error when you issue the keystore command, disable hostname verification by adding this flag to EXTRA_JAVA_PROPERTIES in the file setDomainEnv.sh:

    -Dweblogic.security.SSL.ignoreHostnameVerification=true
     
    

    Then issue the keystore command again.

  2. Restart the Weblogic server.

See Also:

Oracle Fusion Middleware Securing Oracle WebLogic Server for additional information about configuring SSL on the Oracle WebLogic Server.

2.6.2.2 Creating a Connection to BI Publisher

To create a connection, proceed as follows:

  1. Click the Administration tab.

  2. Expand BI Publisher.

  3. In the right pane, enter values for Host, Port, User, and Password.

  4. If you have configured Oracle Identity Navigator and BI Publisher to use an SSL connection, select SSL.

  5. Under Specify BI Publisher report components, click Create.

  6. Select a component and supply a name and path.

    To limit the connection entry to a subset of the reports available for the component, click the Finder icon and navigate to the desired path. You can have more than one path for a component. Using paths in this manner can reduce the amount of text associated with a report name on the Dashboard.

    Repeat for other for other components you want to add.

  7. Click Test to verify the connection information you have supplied. A dialog will verify that the connection has succeeded or tell you why it failed.

  8. If the test succeeds, click Apply to finish the configuration. If the test fails, consult the appropriate administrator at your site.

  9. To delete a component, select it and click Delete, then click Apply.

After BI Publisher has been configured, the My Reports section of the Dashboard page will contain the link Click here to create reports.

Note:

If you change the name or path of a component, the new name or path will apply to new reports. The reports that are already saved are not modified.

2.6.3 Configuring a Proxy to Access News Feeds

You might need to specify a proxy so that Oracle Identity Navigator can access Oracle news feeds from inside your firewall. You do this by adding lines to the setDomainEnv script, which is in the bin directory of your WebLogic domain. For example:

$MIDDLEWARE_HOME/user_projects/domains/base_domain/bin/setDomainEnv.sh

The file name is setDomainEnv.sh on Linux and UNIX systems and setDomainEnv.cmd on Windows systems. The script sets the domain-wide environment variables for starting and running a WebLogic Server instance. It is invoked by the startWebLogic and stopWebLogic commands.

Minimally, you must add the following lines to EXTRA_JAVA_PROPERTIES in the setDomainEnv file.

-Dhttp.proxyHost=proxy_server_host 
-Dhttp.proxyPort=proxy_server_port 
-Dhttp.nonProxyHosts=non_proxy_hosts

In the following example:

  • Oracle Identity Management components, including Oracle Identity Navigator are deployed in the Oracle WebLogic Server domain mycompany.com. The domain also contains the machines stajz18.mycompany.com and adc2170219.mycompany.com.

  • A firewall exists between the domain in mycompany.com and the Oracle news feed server. You must route news feed requests from Oracle Identity Navigator through the proxy server to the Oracle news feed site outside the firewall.

  • HTTP requests sent to servers stajz18.mycompany.com and adc2170219.mycompany.com need not be routed to the proxy server.

You would add the following lines to the setDomainEnv.sh file on the WebLogic Administration Server.

EXTRA_JAVA_PROPERTIES="-Dhttp.proxyHost=www-proxy.mycompany.com -Dhttp.proxyPort=80 -Dhttp.nonProxyHosts=stajz18.mycompany.com|adc2170219.mycompany.com ${EXTRA_JAVA_PROPERTIES}"
export EXTRA_JAVA_PROPERTIES

For completeness, you can also add the following additional lines:

-DftpProxyHost=ftp_host
-DftpProxyPort=FTP_proxy_server_port
-DsocksProxyHost=SOCKS_proxy_server_host
-DsocksProxyPort=SOCKS_proxy_server_port

You must restart WebLogic Administration Server for the changes to take effect.

2.7 Managing the Product Launcher

As Administrator, you can modify the list of categories and components that appear on the Product Launcher.

You can add components within a category using either of two methods

  • Specify component console information.

  • Specify host information and use product discovery to determine which component consoles are available.

2.7.1 Adding a Component Link to the Product Launcher by Using Product Discovery

From the Administration tab, you can use product discovery to discover all active Java EE components in the domain, including the Oracle WebLogic Server console and Oracle Enterprise Manager Fusion Middleware Control.

  1. Click the Administration tab.

  2. Under Product Registration, select Discover Product(s). The Domain Selection page of the product discovery wizard appears in the right pane.

  3. Specify the Host, Port, User, and Password for the server from which you want to discover components. If you are using the SSL port, select SSL.

    Click Next.

  4. On the Available Products page, select the component consoles you want to add to Oracle Identity Navigator. For each console you select, specify a Display Name. If a category has not been selected automatically, select a category from the Category list.

    Click Next.

  5. On the Product Removed page, you can optionally select previously discovered components to remove.

    Click Next.

  6. Review the status of the links on the Confirmation page. If necessary, click Back and correct any errors. When the Confirmation page is correct, click Finish.

2.7.2 Adding a Link to the Product Launcher Without Product Discovery

Add a link as follows:

  1. Click the Administration tab.

  2. Under Product Registration, click the Create Product Link icon or select Create Product Link from the Actions list.

  3. In the New Product Registration dialog, select the type of component you want to add.

  4. Provide values for Category, Display Name, Type, Version, Host, Port, and URL.

  5. Click OK to add the link or Cancel to abandon adding the link.

2.7.3 Editing a Link

Edit a link as follows:

  1. Click the Administration tab.

  2. Under Product Registration, click the product you want to edit.

  3. On the Product Registration screen, make desired changes

  4. Click Apply to apply the changes or Revert to remove the changes you have made.

2.7.4 Removing a Link

Remove a link as follows:

  1. Click the Administration tab.

  2. Under Product Registration, highlight the item you want to remove.

  3. Click the Delete Product Link icon or select Delete Product Link from the Actions list.

  4. In the Confirmation dialog, click OK to proceed or click Cancel to cancel the deletion.

You can also use the product discovery interface to delete several links at once.

2.7.5 Adding a Category

Add a component category as follows:

  1. Click the Administration tab.

  2. Under Product Registration, select Create Category from the Actions list.

  3. In the right pane, enter the component category name.

  4. Click Save.

  5. Verify that the new category has been added to the left pane.

2.7.6 Editing a Category

Edit a category as follows:

  1. Click the Administration tab.

  2. Under Product Registration, select a product category. The product category information appears tin the right pane.

  3. Make the desired changes.

  4. Click Apply.

2.7.7 Removing a Product Category

Remove a category as follows:

  1. Click the Administration tab.

  2. Under Product Registration, select a product category. The product category information appears in the right pane.

  3. Select Delete Category from the Actions list.

  4. Click OK in the confirmation dialog.

2.8 Managing Access Privileges

Use the Access Privileges page to assign Common Admin Roles to users or to view role assignments. The Access Privileges Page has a Search pane on the left that enables you to search for a user or a Common Admin Role. If the search is successful and a selection from the results is made, data for that user or role appear in the right pane.

You can only view users after the domain identity store has been configured as the authentication source. For more information, see "Configuring the Identity Store".

You can the view, set, and modify access privileges for specific users using the Access Privileges page. For the Common Admin Roles, you can view which users have been assigned that role for each of the components.

When working with users, the Common Admin Roles are displayed in rows in a table on the right. The components are shown in the table columns.

Note:

The Common Admin Roles must have enterprise roles configured before they will be visible in the Access Privileges page. For more information, see "Configuring the Enterprise Roles".

To view the Access Privileges page:

  1. Click the Administration.

  2. Click Access Privileges in the navigation panel.

2.8.1 Searching for Users or Common Admin Roles

Search for users or roles from the Search pane in the Access Privileges page.

To search for a user:

  1. Select User from the Type list.

  2. Provide a search string, which can be a user name, user ID, or email address, or a substring, of any of those.

  3. Click the arrow. Oracle Identity Navigator displays all users who match the criteria.

  4. Select the user from the results list whose access privileges you want to view, set, or modify. The information appears on the right.

To search for a Common Admin Role:

  1. Select Common Admin Role from Type.

    The list of roles is displayed.

  2. Select a role from the results list to view which users are assigned to that role. The information displays on the right.

2.8.2 Assigning the Common Admin Roles

Table 2-1 provides a summary of the Oracle Identity Navigator Common Admin Roles and the access rights each provides.

Table 2-1 Oracle Identity Navigator Common Admin Roles

Common Admin Role Name Entitlement

Security Admin

  • Access to all the product links in the Product Launcher.

  • Access Privileges allowing User/Role search and assignment.

Security Auditor

  • Access to all the product links in the Product Launcher.

  • Access to My Reports.

Application Configurator

  • Access to all the product links in the Product Launcher.

  • Access to BI Publisher features.

  • Access to Product Registration.


To assign a Common Admin Role to a user:

  1. Selecting the box for that role in the Components column.

  2. Click Apply to save the new settings or Revert to discard them.

2.9 Migrating Oracle Identity Navigator from Test to Production

For information about moving Oracle Fusion Middleware components from one environment to another, see "Moving from a Test to a Production Environment" in Oracle Fusion Middleware Administrator's Guide.

For information about moving Identity Management components, including Oracle Identity Navigator, from a test environment to a production environment, see "Moving Identity Management Components to a Production Environment" in Oracle Fusion Middleware Administrator's Guide.

2.10 Advanced: Configuring Component Administrative Role-Based Access

A component administrator has the privileges required to manage a specific Identity Management application's reports. Each component administrator can customize his or her own Dashboard page. Component administrators cannot access the Administration page of Oracle Identity Navigator.

Table 2-2 describes the Identity Management component specific Oracle Identity Navigator administrative roles and the access rights each conveys.

Table 2-2 Component Specific Administrative Roles

Component Specific Oracle Identity Navigator Admin Role Name Access Right Granted

OIM_ADMIN

  • Access to all the product links in the Product Launcher.

  • Access to Oracle Identity Manager reports in My Reports page.

OAM_ADMIN

  • Access to all the product links in the Product Launcher.

  • Access to the Oracle Access Manager reports in My Reports page.

OAAM_ADMIN

  • Access to all the product links in the Product Launcher.

  • Access to the Oracle Adaptive Access Manager reports in My Reports page.

OWSM_ADMIN

  • Access to all the product links in the Product Launcher.

  • Access to the Oracle Web Services Security reports in My Reports page.


These roles enable fine grained access control for all the reports. The following enterprise roles must be created in the domain identity store before you can begin using them:

  • OAM_ADMIN

  • OIM_ADMIN

  • OAAM_ADMIN

  • OWSM_ADMIN

Users or groups that are members of the listed enterprise roles then have the appropriate access privileges.

2.11 Troubleshooting

This section describes some problems that you could encounter while configuring or using Oracle Identity Navigator.

2.11.1 Cannot Access Oracle Identity Navigator in Browser

Problem

You enter the URL for Oracle Identity Navigator into a browser and attempt to access it. You receive an error message.

Solution

In a dual-stack, IPv4 and IPv6 environment, some URLs might be inaccessible from your browser. Consult your network administrator for more information.

2.11.2 Report Problems

Problem

You cannot create a connection to BI Publisher.

Solution

Make sure the Oracle WebLogic Server and BI Publisher server are running.

Problem

You cannot create or run a report.

Solution

Remember that different login accounts might have different roles. If you log in as a user who does not have the Oracle Access Manager administrator role, for example, you will not be able to create Oracle Access Manager reports.

Make sure the Oracle WebLogic Server, BI Publisher server, and Oracle Database are running.

You can access BI Publisher reports from BI Publisher itself. Doing so can help you determine whether a configuration problem is due to Oracle Identity Navigator or BI Publisher.

Consult Oracle WebLogic Server logs.

Problem

You cannot view PDF reports with Adobe Reader in a browser.

Solution

Either upgrade to a newer version of Reader or configure Reader to run directly, not as an embedded function within the browser. See your Adobe Reader documentation for more information.

Problem

You cannot view a report in MHTML format.

Solution

Open the report in HTML format.

2.11.3 Cannot View the Common Admin Roles

Problem

You cannot view the Common Admin Roles in the Oracle Identity Navigator user interface.

Solution

Verify enterprise roles have been created to support the Common Admin Roles. For more information, see "Configuring the Enterprise Roles".