Understanding the Custom Authentication Flow

The following use case scenarios are used to explore custom authentication flow:

Use Case Scenario 1

Table 21 details the EPM System user directory configuration and search order used in this scenario. This scenario assumes that the custom authentication module uses an RSA infrastructure to authenticate users.

Table 21. Setup for Scenario 1

User Directory Type and NameSearch OrderCustom AuthenticationSample User NamesPassword[1]
Native Directory1Disabled

test_user_1

test_user_2

test_user_3

password

LDAP-Enabled

SunONE_West

2Disabled

test_ldap1

test_ldap_2

test_user_3

test_ldap_4

ldappassword

LDAP-Enabled

SunONE_East

3Enabled

test_ldap1

test_ldap_2

test_user_3

ldappassword on SunONE and RSA PIN in custom module

1 For simplicity, it is assumed that all users use the same user directory password.

To initiate the authentication process, a user enters a user name and password in the logon screen of an EPM System product.

In this scenario, the custom authentication module performs the following actions:

  • Accepts a user name and RSA PIN as the user credentials

  • Returns a user name in username@providername format, for example, test_ldap_2@SunONE_East, to EPM System security.

Table 22. User interaction and results

User Name and PasswordAuthentication ResultLogin User Directory
test_user_1/passwordSuccessNative Directory
test_user_3/passwordSuccessNative Directory
test_user_3/ldappasswordSuccessSunONE_West (search order 2)[1]
test_user_3/RSA PINSuccessSunONE_East (search order 3)[2]
test_ldap_2/ldappasswordSuccessSunONE_West (search order 2)
test_ldap_4/RSA PINFailure

EPM System displays an authentication error.[3]

 

1 The custom authentication cannot authenticate this user because the user entered EPM System credentials. EPM System can identify this user only in a user directory that is not enabled for custom authentication. The user is not in Native Directory (search order number 1)but is identified in SunONE West (search order number 2).

2 EPM System does not find this user in Native Directory (search order number 1) or SunONE West (search order number 2). The custom authentication module validates the user against RSA Server and returns test_user_3@SunONE_EAST to EPM System. EPM System locates the user in SunONE East (search order number 3), which is a custom authentication–enabled user directory.

3 Oracle recommends that all users authenticated by the custom module be present in a custom authentication–enabled user directory included in the search order. Login fails if the user name that is returned by the custom authentication module is not present in a custom authentication–enabled user directory included in the search order.

Use-case Scenario 2

Table 23 details the EPM System user directory configuration and search order used in this scenario. This scenario assumes that the custom authentication module uses an RSA infrastructure to authenticate users.

In this scenario, the custom authentication module performs the following actions:

  • Accepts a user name and RSA PIN as the user credentials

  • Returns a user name, for example, test_ldap_2, to EPM System security

Table 23. A sample search order

User Directory Search OrderCustom AuthenticationSample User NamesPassword[1]
Native Directory1Disabled

test_user_1

test_user_2

test_user_3

password
LDAP-Enabled, for example, SunONE2Enabled

test_ldap1

test_ldap2

test_user_3

ldappassword on SunONE and RSA PIN in custom module

1 For simplicity, it is assumed that all users use the same user directory password.

To initiate the authentication process, a user enters a user name and password on the login screen of an EPM System product.

Table 24. User interaction and results

User Name and PasswordLogin ResultLogin User Directory
test_user_1/passwordSuccessNative Directory
test_user_3/passwordSuccessNative Directory
test_user_3/ldappasswordFailureSunONE[1]
test_user_3/RSA PINSuccessSunONE[2]

1 Authentication of user against Native Directory fails because of password mismatch. Authentication of user using the custom authentication module fails because the password used is not a valid RSA PIN. EPM System does not try to authenticate this user in SunONE (search order 2), because custom authentication settings override EPM System authentication in this directory.

2 Authentication of user against Native Directory fails because of password mismatch. The custom authentication module authenticates the user and returns the user name test_user_3 to EPM System.

Use-case Scenario 3

Table 25 details the EPM System user directory configuration and search order used in this scenario. This scenario assumes that the custom authentication module uses an RSA infrastructure to authenticate users.

For clarity in such scenarios, Oracle recommends that your custom authentication module return the user name in username@providername format; for example, test_ldap_4@SunONE.

Table 25. A sample search order

User DirectorySearch OrderCustom AuthenticationSample User NamesPassword[1]
Native Directory1Enabled

test_user_1

test_user_2

test_user_3

RSA_PIN
LDAP-Enabled, for example, MSAD2Disabled

test_ldap1

test_ldap4

test_user_3

ldappassword
LDAP-Enabled, for example, SunONE3Enabled

test_ldap1

test_ldap4

test_user_3

ldappassword on SunONE and RSA PIN in custom module

1 For simplicity, it is assumed that all users use the same user directory password.

To initiate the authentication process, a user enters a user name and password in the logon screen of an EPM System product.

Table 26. User interaction and results

User Name and PasswordAuthentication ResultLogin User Directory
test_user_1/passwordSuccessNative Directory
test_user_3/RSA_PINSuccessNative Directory
test_user_3/ldappasswordSuccessMSAD (search order 2)
test_ldap_4/ldappasswordSuccessMSAD (search order 2)
test_ldap_4/RSA PINSuccessSunONE (search order 3)