This chapter provides some background information about Java plug-ins for Oracle Privileged Account Manager and explains how to configure and deploy plug-ins by using the Oracle Privileged Account Manager Console.
This chapter includes the following sections:
You can also manage Oracle Privileged Account Manager plug-ins from the command line or by using Oracle Privileged Account Manager's RESTful interface.
For information about using the Oracle Privileged Account Manager RESTful interface, refer to Section B.6, "Account Resource" in Appendix B, "Working with Oracle Privileged Account Manager's RESTful Interface."
A plug-in is a customized program that enables you to extend Oracle Privileged Account Manager's functionality to better meet your specific business and technical requirements. A plug-in enables you to provide custom logic as part of a transaction or by connecting to a custom data source.
An Oracle Privileged Account Manager plug-in can be a Java program that has a configuration entry in the Oracle Privileged Account Manager server. That configuration entry specifies the conditions for invoking the plug-in, which include:
An operation, such as
A resource, such as an account, a target, or a server
A timing, relative to the operation, such as
Oracle Privileged Account Manager plug-ins can provide various types of added functionality, such as:
Validating data before the Oracle Privileged Account Manager server performs an operation on it and performing specified actions after the server performs an operation
Sending notifications based on Oracle Privileged Account Manager operations
Performing step-up authentication and authorization
Authenticating users through external identity stores
Upon start-up, the Oracle Privileged Account Manager server loads your plug-in configuration and library. When the server processes requests, it calls the plug-in functions whenever the specified event takes place.
develop plug-ins for Oracle Privileged Account Manager. The topics include:
Currently, Oracle Privileged Account Manager does not ship with any complete plug-ins. Refer to Chapter 16, "Developing Plug-Ins for Oracle Privileged Account Manager" for additional information about developing plug-ins for Oracle Privileged Account Manager.
You can configure plug-ins for Oracle Privileged Account Manager operations. The plug-ins are invoked whenever the operations are performed and the plug-in filter rules are met. Any type of Oracle Privileged Account Manager client, such as the command line tool or the Oracle Privileged Account Manager Console, can perform these operations. The Oracle Privileged Account Manager server and the plug-in program communicate through the plug-in JAVA interface. When a plug-in is invoked, the Oracle Privileged Account Manager server sends information about the operation and the entities involved to the plug-in. The plug-in then operates on that information and, after completing execution, sends the result back to the Oracle Privileged Account Manager server.
For additional information, refer to Section 16.3.1, "Communication between the Server and Plug-In."
After developing a plug-in, you register it with Oracle Privileged Account Manager. Registration enables Oracle Privileged Account Manager to discover and configure the plug-in to be invoked for Oracle Privileged Account Manager events such as check-ins, checkouts, and so forth.
Oracle Privileged Account Manager's Java-based plug-in framework enables you to create new plug-ins as well as customize existing ones.
Currently, Oracle Privileged Account Manager only supports plug-ins written in Java.
To develop Oracle Privileged Account Manager plug-ins, you should be familiar with the following topics:
Oracle Privileged Account Manager
Oracle Privileged Account Manager RESTful API
In addition, you should have some proficiency programming in Java.
Some of the ways in which you can use plug-ins to extend Oracle Privileged Account Manager operations include:
Validating data before the server performs operations on that data
Performing actions that you define after the server successfully completes an operation
Defining extended operations
Authenticating users through external credential stores
Replacing an existing server module with a module of your own
Upon start-up, the Oracle Privileged Account Manager server loads your plug-in configuration and library. The server calls your plug-in functions while processing various Oracle Privileged Account Manager requests.
Oracle recommends using these guidelines when designing plug-ins:
Use plug-ins to guarantee that when Oracle Privileged Account Manager performs a specific operation, related actions are also performed.
Use plug-ins only for centralized, global operations that should be invoked for the program body statement, regardless of which user or application issues the statement.
Do not create recursive plug-ins.
For example, creating a
pre_checkout plug-in that itself issues a
checkout statement will cause the plug-in to execute recursively until it has run out of resources.
Use plug-ins judiciously. Remember, they are executed every time the associated operation occurs.
The Oracle Privileged Account Manager plug-in framework includes the following:
Plug-in configuration tools
Plug-in module interface
Plug-in RESTful APIs, including Java package oracle.xxx.xxx
To use the Oracle Privileged Account Manager server plug-in framework,
Write a user-defined plug-in procedure in Java.
Compile the plug-in module.
Register the plug-in module through the configuration entry interface by using Oracle Privileged Account Manager's
Oracle Privileged Account Manager supports plug-ins for operations on the following resources:
|Operations For Target Resources||Operations For Account Resources||Operations For Server Resources|
When developing plug-ins, Oracle Privileged Account Manager enables you to specify when those plug-ins are executed. Oracle Privileged Account Manager supports pre and post operation timings for plug-ins, which are described in the following sections:
Oracle Privileged Account Manager adds pre-operation plug-ins to a queue and executes them in a specified order before performing the designated operation. As Oracle Privileged Account Manager executes each pre plug-in that is in the queue, the results are passed from the current plug-in to the next one in the queue. For example, if a target-add pre plug-in modifies the plug-in description, then the next plug-in sees the modified description.
Oracle Privileged Account Manager will not perform the operation until all pre plug-ins have successfully finished executing. If a pre plug-in fails or times out, then the operation also fails and Oracle Privileged Account Manager will not execute any of the other pre plug-ins queued for that operation.
Adding lots of pre plug-ins may increase the time taken for the operation because Oracle Privileged Account Manager must execute all pre plug-ins before performing the operation.
Oracle Privileged Account Manager adds post-operation plug-ins to a queue and executes them after performing the designated operation. Oracle Privileged Account Manager executes post plug-ins for both successful and failed operations. Post plug-ins see the results, including the success or failure status of the operation, but they cannot modify the results because the operation has already completed. Oracle Privileged Account Manager executes all queued post plug-ins and it does not matter if some of them fail. Results from one post plug-in cannot be passed to another.
Adding post plug-ins does not increase the time taken for the operation because they are not executed until after the operation is performed.
The Oracle Privileged Account Manager server executes plug-ins on specifically configured operations for specific end users. You can configure filtering rules that determine for which users or groups a plug-in will or will not be executed, and for which results codes a post plug-in will be executed.
Only administrators with the Security Administrator Admin role can add, edit, or remove Filter Rules.
You can specify the users or groups for which a plug-in should be executed by adding them to an Enabled user or group list. Similarly, you can specify the users or groups for which a plug-in should not be executed by adding them to a Disabled user or group list.
Oracle Privileged Account Manager evaluates filtering rules in the following sequence to decide which rule takes precedence over another:
HTTP Result Code (for post plug-ins)
In general, rules that are defined at the user level override those that are defined at the group level, because the user level rules are more specific. User level rules target a specific user rather than a group of users.
In addition, the Disabled lists take precedence over Enabled lists.
Result codes override all other filtering rules.
For example, assume person1 is a user in the Administrators group. If you put person1 in the Disabled user list and Administrators into the Enabled group list, then the Oracle Privileged Account Manager will not invoke the plug-in for person1 because the server checks the Disabled user list before checking the Enabled group list, and because the user-level rule overrides the group-level rule.
However, if you put person1 in the Enabled user list and put Administrators in the Disabled group list, then person1 can invoke the plug-in because the Enabled user check is performed before the Disabled group check.If there are no values in these four fields, then all users and groups can invoke the plug-in. However, as long as there is one user or group in the Enabled user list or Enabled group list, then only that user or group can invoke the plug-in. No others can invoke that plug-in. If person1 is the only user in the Enabled user list, then all other users and groups are prevented from invoking the plug-in.
The Filtering Rules evaluation sequence stops when it finds a match. For example, if the filter finds an Enabled user that matches the user who is performing the action, then the filtering stage stops. It does not matter if the user is present in any Enable or Disable group filters.
After performing an Oracle Privileged Account Manager operation, the server returns an HTTP response containing an HTTP status integer (such as 200 for success, 201 for creation, 401 for insufficient privileges, and so on.)
You can configure filtering rules for post plug-ins that are based on one or more HTTP result code values. For example, if you specify a filtering rule for result code 200, then the server will only execute the post plug-in when the result status is 200.
Result codes override all other filtering rules.
You must be an Oracle Privileged Account Manager administrator with the Application Configurator Admin Role to create plug-ins.
When you create a new plug-in configuration, the status is disabled and the plug-in cannot be executed. Only an administrator with the Security Administrator Admin Role can enable plug-in configurations and determine under which conditions those plug-ins can be executed.
To create a plug-in configuration from the Console,
Select Plug-in Configuration in the Configuration accordion to open the Search Plug-in Configuration page.
Click Create, located in the Search Results table toolbar.
When the Plug-In Configuration: Untitled page displays, provide the following information in the Configuration Settings section:
Enter a name for the new plug-in configuration.
Enter a description for this plug-in configuration.
Choose the type of resource on which the plug-in will perform:
Choose the operation that the plug-in will perform.
Note: Refer to Section 11.2.7, "Supported Operations and Timings" for a complete list of supported operations.
Note: Refer to Section 11.2.7, "Supported Operations and Timings" for more information.
Enter a value to specify the order in which a plug-in is queued for execution in relation to other plug-ins. For example, plug-in 1 is executed before plug-in 2. (Minimum is 1)
Specify a value to indicate the maximum duration (in seconds) for which the plug-in can be executed. When the plug-in execution exceeds this time out period, Oracle Privileged Account Manager aborts the plug-in execution. (Default is
Note: For additional information, refer to Section 11.2.7, "Supported Operations and Timings."
Plug-in Class Name
Enter the name of the Java class that implements the plug-in's interface.
Enter the plug-in's Java version number.
Note: Oracle Privileged Account Manager does not actually use the plug-in version. Instead, Oracle Privileged Account Manager uses the jar file listed in the plug-in's directory.
To configure a Java classpath where the plug-in jar file is located, use the Class Paths section as follows:
To add a classpath, click Add.
When a new row is displayed in the table, type the Java classpath into the blank field. For example,
The Oracle Privileged Account Manager server process must be able to access the specified class path files. You can specify any type of location, such as local file system, network file system, etc.
To delete a classpath, select that classpath row in the table, and then click Remove.
To configure custom attributes for the plug-in, expand and use the Custom Attributes section as follows:
To add an attribute, click Add.
When a new row is displayed in the table, type the Attribute Name and Value into the blank fields. For example, for an email notification plug-in, you might create a
notificationemail attribute with a value of
To delete a custom attribute, select that attribute's row in the table, and then click Remove.
You must be an Oracle Privileged Account Manager administrator with the Security Administrator Admin Role to add, edit, or remove Filter Rules.
For information about how Oracle Privileged Account Manager uses filtering rules, refer to Section 11.2.8, "Filtering Rules."
Expand the Users or Groups sections to specify for which users or groups the server can or cannot invoke the plug-in.
Select the Enabled tab or Disabled tab and click Add.
When the Add dialog displays, enter one or more letters of a name into the User Name field or Group Name field and click Search.
When the search results display, select the row you want, and click Add.
A success message displays above the search results list.
Continue selecting and adding users or groups until you are finished, then click Close.
Expand the Result Codes section to configure filtering rules for a post plug-in that are based on one or more result codes.
You cannot configure result codes for pre plug-ins.
When a new HTTP Result Code row displays, enter an enabled HTTP response code into the blank field. For example, type
200 to execute a post plug-in when the response status is a successful request.
To delete a Filter Rule, select that rule row in the applicable table, and then click Remove.
After setting all of the necessary plug-in configuration parameters, click Test to verify that the configuration is valid.
This test checks whether Oracle Privileged Account Manager can load the configured plug-in and whether it implements the required plug-in interface. Testing catches common issues, such as plug-in jars that are configured with the wrong file paths, plug-ins that implement the wrong interface, pre plug-ins that implement a post plug-in interface or vice versa, etc.
This test does not execute the plug-in or validate any plug-in custom attributes, which are only used by the custom plug-in logic itself.
If the configuration is valid, a "
Test Succeeded" message displays.
Click Save to create the new configuration.
Oracle Privileged Account Manager automatically assigns a Plug-In GUID, which is displayed in the Configuration Settings section.
Resource Type (All, account, server, or target)
Status (All, Active, or Disabled)
Timing (All, pre, or post)
Operation (All, accountpasswordchange, add, autocheckin, checkin, checkout, passwordcycle, remove, resetpassword, retrieve, sessioncheckout, showpassword, showpasswordhistory, test, or update)
You must be an Oracle Privileged Account Manager administrator with the Security Administrator Admin Role or the Application Configurator Admin Role to search for and view plug-ins.
To search for a plug-in,
Select Plug-in Configuration in the Configuration accordion.
When the Plug-in Configuration page displays, use the Search portlet parameters to configure your search.
For example, to search for a list of all active plug-ins, select Active from the Status menu.
To search for all available plug-ins, do not specify any search parameters.
Review your search results in the Search Results table, which contains a column for all of the search fields and a column for the Plug-In Order.
To perform another search, click Reset.
You must be an Oracle Privileged Account Manager administrator with the Security Administrator Admin Role or the Application Configurator Admin Role to view plug-ins.
To open a plug-in, open the Plug-in Configuration page and perform one of the following actions:
Click the Plug-in Name (an active link) in the Search Results table.
Select the plug-in Row and then click Open.
The Plug-in Configuration: Plug-in Name page opens where you can access the plug-in's configuration settings, custom attributes, users or groups, and current status (active or disabled).
If you edited any of these settings, click Test to validate your changes. When you see the "
Test Succeeded" message, click Save.
Locate the plug-in to remove.
Select Plug-in Configuration in the Configuration accordion.
Click Search in the Search portlet to populate the Search Results table with a list of all available plug-ins.
To narrow the results or to locate a particular plug-in, enter search criteria in one or more the Search fields, and then click Search.
In the Search Results table, select the plug-in to be removed and then click Delete.
When you are prompted to confirm the deletion, click Delete to continue or Cancel.