15 Performing Advanced Configuration Tasks for Oracle Privileged Account Manager

This chapter provides information about performing some advanced configuration for Oracle Privileged Account Manager.

This chapter includes the following sections:

15.1 Configuring Oracle Privileged Account Manager to Communicate With Target Systems Over SSL

Oracle Privileged Account Manager can connect to target systems through Secure Socket Layer (SSL) or non-SSL options. The SSL option is more secure, but requires some additional configuration.

To communicate securely over SSL with a target system, the WebLogic instance running Oracle Privileged Account Manager must trust the SSL certificate used by the target system because Oracle Privileged Account Manager inherits its SSL configuration from the WebLogic container in which it runs. To have the WebLogic instance running Oracle Privileged Account Manager (and therefore Oracle Privileged Account Manager) trust the target system's SSL certificate, you must import the certificate into the truststore used by that WebLogic instance.

Note:

The steps for configuring SSL communication are different if you are using an IBM WebSphere instance.

Refer to "Differences When Configuring Oracle Privileged Account Manager to Communicate with Target Systems Over SSL" in the Oracle Fusion Middleware Third-Party Application Server Guide for Oracle Identity and Access Management for instructions.

Use the following steps to enable SSL communication between the target system and Oracle Privileged Account Manager:

  1. Export the SSL certificate from the target system host computer.

    Note:

    The steps for exporting an SSL certificate are different for each target system type. Refer to the product documentation provided for your target system for detailed instructions.

  2. Copy the certificate to the machine where you have the WebLogic instance running Oracle Privileged Account Manager.

    If you have the Oracle Privileged Account Manager/Oracle Identity Navigator Console and the Oracle Privileged Account Manager server running on different machines, you must copy the SSL certificate to the Oracle Privileged Account Manager server machine.

  3. Run the following command to import the certificate into the JVM truststore of the WebLogic Server on which Oracle Privileged Account Manager is running:

    JAVA_HOME\bin\keytool -import -file FILE_LOCATION -keystore TRUSTSTORE_LOCATION 
    -storepass TRUSTSTORE_PASSWORD -trustcacerts -alias ALIAS
    

    Where

    • JAVA_HOME is the location used by your WebLogic server. For example.

      • MW_HOME/jrockit..

      • MW_HOME/jdk..

      • The location where you installed the Java software

    • FILE_LOCATION is the full path and name of the certificate file.

    • TRUSTSTORE_LOCATION is one of the following truststore paths:

      Table 15-1 Truststore Locations

      If you are using: Import the Certificate into the Keystore in This Directory:

      Oracle jrockit_R27.3.1-jdk

      JROCKIT_HOME/jre/lib/security

      The default Oracle WebLogic Server JDK

      WEBLOGIC_HOME/java/jre/lib/security/cacerts

      A JDK other than Oracle
      jrockit_R27.3.1-jdk or
      Oracle WebLogic Server JDK

      JAVA_HOME/jre/lib/security/cacerts


    • TRUSTSTORE_PASSWORD is the password for the truststore.

    • ALIAS is an alias for the certificate.

    Note:

    The default password for the cacerts keystore is changeit.

  4. Restart all WebLogic servers.

Note:

For more information about WebLogic security concepts and how to create custom keystores, refer to "Configuring Identity and Trust" in the Oracle Fusion Middleware Securing Oracle WebLogic Server.

15.2 Securing Data On Disk

Oracle Privileged Account Manager can operate with or without Oracle Database Transparent Data Encryption (TDE) mode.

Note:

Oracle strongly recommends that you enable TDE mode for enhanced security.

For more information about Transparent Data Encryption, refer to the "Securing Stored Data Using Transparent Data Encryption" topic in Oracle Database Advanced Security Administrator's Guide.

You can enable or disable TDE mode at any point after installing and configuring Oracle Privileged Account Manager.

This section describes how to change the TDE mode for Oracle Privileged Account Manager. The topics include:

Note:

The instructions for enabling or disabling TDE mode are essentially the same whether you are using a WebLogic server or an IBM WebSphere server.

Refer to "Differences When Securing Data On Disk" in the Oracle Fusion Middleware Third-Party Application Server Guide for Oracle Identity and Access Management for information about the minor differences if you are using Oracle Privileged Account Manager on IBM WebSphere.

15.2.1 Enabling TDE Mode

You can enable TDE mode by performing the following steps:

  1. Enable TDE in the Database

  2. Enable Encryption in the Oracle Privileged Account Manager Schema

  3. Enable TDE Mode in the Oracle Privileged Account Manager Server Configuration

15.2.1.1 Enable TDE in the Database

To enable TDE in the database, refer to "Enabling Transparent Data Encryption" in the Oracle Database Advanced Security Administrator's Guide.

Note:

For additional information, refer to "Securing Stored Data Using Transparent Data Encryption" in the Oracle Database Advanced Security Administrator's Guide.

15.2.1.2 Enable Encryption in the Oracle Privileged Account Manager Schema

You can enable encryption in the Oracle Privileged Account Manager schema by using sqlplus (or any other client) to run the following opamxencrypt.sql script with the Oracle Privileged Account Manager schema user:

IAM_HOME/opam/sql/opamxencrypt.sql

For example,

sqlplus DEV_OPAM/welcome1 @IAM_HOME/opam/sql/opamxencrypt.sql

15.2.1.3 Enable TDE Mode in the Oracle Privileged Account Manager Server Configuration

You can enable TDE mode in the Oracle Privileged Account Manager server configuration by using one of the following methods:

From the Oracle Privileged Account Manager Console

To enable TDE mode by using the Console, refer to step 3 in Section 5.2.3.1, "From the Console."

From the Oracle Privileged Account Manager Command Line Tool

To enable TDE mode (if the tdemode flag is set to false) by using the command line tool, complete the following steps:

Note:

Before you begin, ensure that the Oracle Privileged Account Manager server is running.

  1. Set the environment variables, ORACLE_HOME and JAVA_HOME.

  2. Run the following script:

    On UNIX, type:

    ORACLE_HOME/bin/opam.sh -url OPAM_Server_Url -x modifyconfig -configtype global
    -propertyname tdemode -propertyvalue true -u OPAM_APPLICATION_CONFIGURATOR_USER
    -p Password
    

    On Windows, type:

    ORACLE_HOME\bin\opam.bat -url OPAM_Server_Url -x modifyconfig 
    -configtype global -propertyname tdemode -propertyvalue true -u OPAM_APPLICATION_CONFIGURATOR_USER
    -p Password
    
  3. Perform the steps described in the "Optional: Enabling TDE in Oracle Privileged Account Manager Data Store" section of the Oracle Fusion Middleware Installation Guide for Oracle Identity and Access Management.

15.2.2 Disabling TDE Mode

You can switch to non-TDE mode by performing the following steps:

  1. Disable TDE Mode in the Oracle Privileged Account Manager Server Configuration

  2. Disable Encryption in the Oracle Privileged Account Manager Schema

15.2.2.1 Disable TDE Mode in the Oracle Privileged Account Manager Server Configuration

You can disable TDE mode in the Oracle Privileged Account Manager server by using one of the following methods:

From the Oracle Privileged Account Manager Console

To disable TDE mode by using the Console, refer to step 3 in Section 5.2.3.1, "From the Console."

From the Oracle Privileged Account Manager Command Line Tool

To disable TDE mode by using the command line tool, complete the following steps:

Note:

Before you begin, ensure that the Oracle Privileged Account Manager server is running.

  1. Set the environment variables, ORACLE_HOME and JAVA_HOME.

  2. Run the following script:

    On UNIX:

    ORACLE_HOME/opam/bin/opam.sh -url OPAM_Server_Url -x modifyconfig 
    -configtype global -propertyname tdemode -propertyvalue false 
    -u OPAM_APPLICATION_CONFIGURATOR_USER -p Password
    

    Where OPAM_Server_Url is of the form:

    https://OPAM_Managed_Server_Hostname:OPAM_Managed_Server_SSL_port/opam
    

    On Windows:

    ORACLE_HOME\opam\bin\opam.bat -url OPAM_Server_Url -x modifyconfig 
    -configtype global -propertyname tdemode -propertyvalue false 
    -u OPAM_APPLICATION_CONFIGURATOR_USER -p Password
    

    Where OPAM_Server_Url is of the form:

    https://OPAM_Managed_Server_Hostname:OPAM_Managed_Server_SSL_port/opam
    

15.2.2.2 Disable Encryption in the Oracle Privileged Account Manager Schema

You can disable encryption in the Oracle Privileged Account Manager schema by using sqlplus (or any other client) to run the following opamxunencrypt.sql script with the Oracle Privileged Account Manager schema user:

IAM_HOME/opam/sql/opamxunencrypt.sql

For example,

sqlplus DEV_OPAM/welcome1 @MW_HOME/Oracle_IDM1/opam/sql/opamxunencrypt.sql

15.3 Adding New Connectors to an Existing Oracle Privileged Account Manager Installation

This section describes the processes for adding new connectors to your existing Oracle Privileged Account Manager installation. The topics include:

15.3.1 Adding Connectors Supplied by Oracle

If you are adding new ICF connectors that are supplied by Oracle, then they will be accompanied by installation instructions. These instructions describe where to store the connector bundle and how to modify the installation specific opam-config.xml file.

15.3.2 Adding Custom Connectors

Oracle Privileged Account Manager can use custom connectors that you created or that were created by a third party. However, these connectors must strictly adhere to the ICF standard. After verifying that the connector is ICF-compliant, perform the following steps to deploy the connector for Oracle Privileged Account Manager consumption:

  1. Put the connector bundle in a location on the file system where the bundle can be read by the Oracle Privileged Account Manager at run time.

  2. Perform the following steps to create a configuration block for the connector and include that block in the installation specific opam-config.xml file:

    1. Design and create a relevant configuration block.

      Both the opam-config.xml and opam-config.xsd files contain documentation and an example at the beginning of the file describing how to create a configuration block.

    2. Ensure that this connector configuration block includes the file system location you specified for the connector bundle in step 1.

    3. Add the new connector configuration block to the opam-config.xml file by containing it in a <connectorConfig> block.

    4. Validate the modified opam-config.xml file against the opam-config.xsd file to ensure that the Oracle Privileged Account Manager server can read the modified file. You can use your favorite XML schema validation tool for this purpose.

  3. Restart the Oracle Privileged Account Manager server.

  4. Connect to Oracle Privileged Account Manager, and then add and configure a new target system using the newly added connector type.

15.4 Advanced Management of Session Manager Data

This section describes how to manage your Oracle Privileged Session Manager (Session Manager) data. The topics include:

15.4.1 Overview

The Session Manager stores all of its session recording data in the Oracle Privileged Account Manager database schema. Over time, as more information is recorded, the disk footprint for this database schema will grow. Therefore, having a strategy to effectively manage this data is important.

Compliance regulations may require that you store audit data (such as session recordings) for long periods. You need a good backup and recovery plan to protect the data.

A good backup plan accounts for these basic guidelines:

  • Growth rate of session recordings: The growth rate depends on the number of sessions and the type of activity (which results in recordable data) that occurs on those sessions. The growth of the session recording data generated daily determines, in turn, how often you want to perform backups.

  • Compliance regulations: Consult your organization's compliance regulations to determine how frequently backups are required and for how many years session recording storage is mandatory.

  • Online or offline data management: Consult your organization's compliance regulations to determine how frequently backups are required and what portion of session recording data must be easily accessible.

Oracle Database uses Oracle Recovery Manager (RMAN) for backup and recovery.
For details, refer to:

Note:

The Oracle Privileged Account Manager schema is created using the Oracle Repository Creation Utility (RCU) and the session recording data in the Oracle Privileged Account Manager schema is stored in the OPSM_SESSIONS table.

15.4.2 Partitioning

The Oracle Privileged Account Manager schema is unpartitioned by default. However, session recording data is cumulative and older data is never removed. If you store a high volume of session recording data, then you should consider partitioning the OPSM_SESSIONS table, which allows for easier archiving.

Benefits of partitioning include:

  • Improved Performance: If a table is range-partitioned by Timestamps, for example, queries by Timestamps can be processed on the partitions within that time-frame only.

  • Better Manageability: You can create partitions on separate tablespaces (thus different disks), which enables you to move older data to slower and larger disks, while keeping newer data in faster and smaller disks.

    In addition, partitioning makes archiving much easier. For example, you can compress a single partition rather than having to partition the entire table.

  • Increased Availability: If a single partition is unavailable, for example, and you know that your query can eliminate this partition from consideration, then the query can be successfully processed without needing to wait for the unavailable partition.

15.4.3 Partition OPSM_SESSIONS Table

In this example, the OPSM_SESSIONS table is partitioned on a quarterly basis. Depending on your needs, you can choose to implement a different partitioning scheme.

To minimize application down time, Oracle recommends that partitioning is done before using this schema for an Oracle Privileged Account Manager deployment. If you are partitioning on an active Oracle Privileged Account Manager deployment, then you must first shut down all Oracle Privileged Account Manager processes before proceeding with the following steps.

The partitioning steps are as follows:

  1. Login to the database using SQLPlus as the Oracle Privileged Account Manager schema user.

  2. Rename the existing unpartitioned table. For example:

    RENAME OPSM_SESSIONS TO OPSM_SESSIONS_NONPART;
    
  3. Create a new partitioned table that follows the table structure of the unpartitioned table. This example uses the range-partitioning (by Timestamp) scheme:

    CREATE TABLE OPSM_SESSIONS
    PARTITION BY RANGE (STARTTIME)
    (
        PARTITION OPSM_SESSIONS_DEFAULT VALUES LESS THAN (MAXVALUE)
    )
    AS SELECT * FROM OPSM_SESSIONS_NONPART;
    
  4. Enable row movement to allow data to automatically move from partition to partition when new partitions are created. For example:

    ALTER TABLE OPSM_SESSIONS ENABLE ROW MOVEMENT;
    
  5. You can now create partitions. In this example, partitions are created by calendar quarter:

    ALTER TABLE OPSM_SESSIONS
    SPLIT PARTITION OPSM_SESSIONS_DEFAULT AT (TO_DATE('01/04/2013', 'DD/MM/YYYY'))
    INTO (PARTITION OPSM_SESSIONS_Q1_2013, PARTITION OPSM_SESSIONS_DEFAULT)
    UPDATE INDEXES;
     
    ALTER TABLE OPSM_SESSIONS
    SPLIT PARTITION OPSM_SESSIONS_DEFAULT AT (TO_DATE('01/07/2013', 'DD/MM/YYYY')) 
    INTO (PARTITION OPSM_SESSIONS_Q2_2013, PARTITION OPSM_SESSIONS_DEFAULT)
    UPDATE INDEXES;
     
    ALTER TABLE OPSM_SESSIONS
    SPLIT PARTITION OPSM_SESSIONS_DEFAULT AT (TO_DATE('01/10/2013', 'DD/MM/YYYY')) 
    INTO (PARTITION OPSM_SESSIONS_Q3_2013, PARTITION OPSM_SESSIONS_DEFAULT)
    UPDATE INDEXES;
     
    ALTER TABLE OPSM_SESSIONS
    SPLIT PARTITION OPSM_SESSIONS_DEFAULT AT (TO_DATE('01/01/2014', 'DD/MM/YYYY')) 
    INTO (PARTITION OPSM_SESSIONS_Q4_2013, PARTITION OPSM_SESSIONS_DEFAULT)
    UPDATE INDEXES;
    

Note:

You should periodically create new partitions for new quarters.

15.4.4 Purging

Purging removes the Oracle Privileged Account Manager session recording data from the Oracle Privileged Account Manager schema. Therefore, if you foresee needing to revisit this data at a later point, then use Oracle Recovery Manager (RMAN) for backup and recovery.

Keep in mind that with a range-partitioned table it is much more efficient to drop a partition when you want to remove old data, rather than deleting individual rows.

ALTER TABLE OPSM_SESSIONS DROP PARTITION OPSM_SESSIONS_Q1_2013;

Once partitions are created, you can purge and back up a particular partition. Refer to the Oracle Database documentation for details.

15.5 Moving from a Test Environment to a Production Environment

For information about moving Oracle Fusion Middleware components from one environment to another, refer to "Moving from a Test to a Production Environment" in Oracle Fusion Middleware Administrator's Guide.

For information about moving Identity Management components, including Oracle Privileged Account Manager, from a test environment to a production environment, refer to "Moving Identity Management Components to a Target Environment" in Oracle Fusion Middleware Administrator's Guide.

15.6 Rebranding Oracle Privileged Account Manager

If necessary, you can rebrand the Login and Oracle Privileged Account Manager pages. The following topics contain instructions for changing the page title, branding text, and logo image on these pages:

Tip:

Create a back-up copy before you modify any files.

15.6.1 Customizing the Login Page

You configure branding changes for the Login page in the oinav.ear/oiNavApp-war.war/SignIn.jspx file.

Login Page Title

To change the Login page title, modify the title in af:document "#{signinBean.signInTitle}".

Refer to the following code sample:

<af:document id="d1" title="#{signinBean.signInTitle}" theme="dark"
 initialFocusId="pt1:_pt_it1">

Login Page Branding Text

To change the branding text on the Login page, modify the value of af:outputText "#{signinBean.title}", which is defined in the branding facet.

Refer to the following code sample:

<f:facet name="branding">
  <af:outputText value="#{signinBean.title}" id="ot1"/>
</f:facet>

Login Page Logo Image

To change the logo image on the Login page, perform these steps:

  1. Copy the new image, for example newlogo.png, into the following directory:

    oinav.ear/oiNavApp-war.war/images
    
  2. To skip the default logo, add the following line to the oinav.ear/oiNavApp-war.war/SignIn.jspx file:

    <f:attribute name="brandingLogoCls" value=""/>
    
  3. If the new logo's image size is larger than the default size 30, add the following line to adjust the header size:

    <f:attribute name="globalBrandingSize" value="60"/>
    
  4. Modify the branding facet by replacing newlogo.png, newlogo mouse over text, and new branding text.

    Refer to the following code sample:

    <f:facet name="branding">
      <af:panelGroupLayout layout="horizontal">
        <af:image source="/images/newlogo.png" shortDesc="newlogo mouse over text" id="im1"/>
        <af:spacer width="5"/>
        <af:outputText value="new branding text" id="ot1"/>
      </af:panelGroupLayout>
    </f:facet>
    

15.6.2 Customizing the Oracle Privileged Account Manager Page

You configure branding changes for the Oracle Privileged Account Manager page in the oinav.ear/oiNavApp-war.war/opam.jspx file.

Oracle Privileged Account Manager Page Title

To change the page title on the Oracle Privileged Account Manager page, modify the title in af:document "#{resBundle.PRODUCT_OPAM}"

Refer to the following code sample:

<af:document title="#{resBundle.PRODUCT_OPAM}" id="d1" theme="contentBody">

Oracle Privileged Account Manager Branding Text

To change the branding text on the Oracle Privileged Account Manager page, modify the value of af:outputText "#{resBundle.OPAM_PRODUCT_TITLE}", which is defined in the branding facet.

Refer to the following code sample:

<f:facet name="branding">
  <af:outputText value="#{resBundle.OPAM_PRODUCT_TITLE}" id="ot1"/>
</f:facet>

Oracle Privileged Account Manager Page Logo Image

To change the logo image on the Oracle Privileged Account Manager page, perform these steps:

  1. Copy the new image, for example newlogo.png, into the following directory:

    oinav.ear/oiNavApp-war.war/images
    
  2. To skip the default logo, add the following line to the oinav.ear/oiNavApp-war.war/opam.jspx file:

    <f:attribute name="brandingLogoCls" value=""/>
    
  3. If the new logo's image size is larger than the default size 30, add the following line to adjust the header size:

    <f:attribute name="globalHeaderSize" value="30"/>
    
  4. Modify the branding facet by replacing newlogo.png, newlogo mouse over text, and new branding text.

    Refer to the following code sample:

    <f:facet name="branding">
      <af:panelGroupLayout layout="horizontal">
        <af:image source="/images/newlogo.png" shortDesc="newlogo mouse over text" id="im1"/>
        <af:spacer width="5"/>
        <af:outputText value="new branding text" id="ot1"/>
      </af:panelGroupLayout>
    </f:facet>