10 Performing Post-Deployment Configuration

This chapter describes tasks you must perform after Deployment.

It contains the following sections:

10.1 Post-Deployment Steps for OPSS

In this release of Identity and Access Management, an optimized OPSS is available. In order to use this optimized OPSS, you must upgrade the OPSS schema. The deployment tool does not do this, so you must perform this step manually, by using Patch Set Assistant, at the end of provisioning.

To upgrade the OPSS schema for EDGIAD and EDGIGD:

  1. Start the patch set assistant by running the command psa from the location IAD_MW_HOME/oracle_common/bin, for example:

    ./psa
    
  2. On the Welcome Screen click Next.

  3. On the Select Component Screen select Oracle Platform Security Services ONLY and click Next.

  4. On the Prerequisites screen, specify whether or not you have a database backup and that the database version is certified.

    Click Next.

  5. On the Schema Page, Enter:

    • Schema User Name: For example: EDGIAD_OPSS

    • Password: Password supplied when RCU was run.

    • Database Type: Oracle Database

    • Connect String: IDMDB-SCANOAM :DB_LSNR_PORT/OAM_DB_SERVICENAME for example: IAMDB-SCAN.mycompany.com:1521/oamedg.mycompany.com

    • DBA User Name: sys as sysdba

    • DBA Password: PASSWORD

    Click Connect.

    Click Next.

  6. On the Examine Page, verify that Successful is displayed and click Next.

  7. On the Upgrade Summary Page verify that the information is correct and click Upgrade.

  8. Once the upgrade is finished, click Next.

  9. On the Upgrade Success page, click Close

  10. Verify that the schema upgrade has been successful by checking the log files located in

    IAD_MW_HOME/oracle_common/upgrade/logs/psa/psatimestamp.log
    
  11. Restart the domain.

  12. After upgrading the OPSS schema, run the following command:

    SELECT VERSION, STATUS, UPGRADED FROM SCHEMA_VERSION_REGISTRY WHERE OWNER='<RCU_Prefix>_OPSS';
    

    The version should now be 11.1.1.7.2 and the Upgrade flag is Yes.

10.2 Post-Deployment Steps for Oracle Unified Directory

Perform the following steps for Oracle Unified Directory.

10.2.1 Update Oracle Unified Directory Change Log Access

If you are using Oracle Unified Directory and Oracle Identity Manager, grant access to the change log by performing the following steps on all OUD hosts (LDAPHOST1 and LDAPHOST2).

To grant access to the change log:

  1. Remove the existing change log permission by issuing this command on one of the replicated OUD hosts:

    OUD_ORACLE_INSTANCE/bin/dsconfig set-access-control-handler-prop \
    --remove global-aci:"(target=\"ldap:///cn=changelog\")(targetattr=\"*\")(version 3.0; acl \"External changelog access\"; deny (all) userdn=\"ldap:///anyone\";)" \
            --hostname OUD_HOST \
            --port OUD_ADMIN_PORT \
            --trustAll \
            --bindDN cn=oudadmin \
            --bindPasswordFile passwordfile \
            --no-prompt 
    

    For example:

    OUD_ORACLE_INSTANCE/bin/dsconfig set-access-control-handler-prop \
    --remove global-aci:"(target=\"ldap:///cn=changelog\")(targetattr=\"*\")(version 3.0; acl \"External changelog access\"; deny (all) userdn=\"ldap:///anyone\";)" \
            --hostname LDAPHOST1.mycompany.com \
            --port 4444 \
            --trustAll  \
            --bindDN cn=oudadmin \
            --bindPasswordFile mypasswordfile \
            --no-prompt
    
  2. Then add the following new ACI:

    OUD_ORACLE_INSTANCE/bin/dsconfig set-access-control-handler-prop \
    --add global-aci:"(target=\"ldap:///cn=changelog\")(targetattr=\"*\")(version 3.0; acl \"External changelog access\"; allow (read,search,compare,add,write,delete,export) groupdn=\"ldap:///cn=OIMAdministrators,cn=groups,dc=mycompany,dc=com\";)" \
            --hostname OUD_HOST \
            --port OUD_ADMIN_PORT \
            --trustAll \
            --bindDN cn=oudadmin \
            --bindPasswordFile passwordfile \
            --no-prompt
    

    For example:

    OUD_ORACLE_INSTANCE/bin/dsconfig set-access-control-handler-prop \
    --add global-aci:"(target=\"ldap:///cn=changelog\")(targetattr=\"*\")(version 3.0; acl \"External changelog access\"; allow (read,search,compare,add,write,delete,export) groupdn=\"ldap:///cn=OIMAdministrators,cn=groups,dc=mycompany,dc=com\";)" \
            --hostname LDAPHOST1.mycompany.com \
            --port 4444 \
            --trustAll \
            --bindDN cn=oudadmin \
            --bindPasswordFile mypasswordfile \
            --no-prompt
    

10.2.2 Update Oracle Unified Directory ACIs for LDAP Synchronization

The following is a workaround for an Oracle Unified Directory operations failure when LDAP synchronization is enabled

In an environment in which LDAP synchronization is enabled, certain operations against Oracle Unified Directory fail with the following error in Oracle Unified Directory logs:

The request control with Object Identifier (OID) "1.2.840.113556.1.4.319" cannot be used due to insufficient access rights

To work around this issue, you must edit a configuration file on both instances of Oracle Unified Directory.

  1. Change the ACIs on control 1.2.840.113556.1.4.319 from ldap://all to ldap://anyone in the Oracle Unified Directory config file OUD_ORACLE_INSTANCE/OUD/config/config.ldif, as shown:

    Change:

    ds-cfg-global-aci: (targetcontrol="1.3.6.1.1.12 || 1.3.6.1.1.13.1 || 1.3.6.1.1.13.2 || 1.2.840.113556.1.4.319 || 1.2.826.0.1.3344810.2.3 || 2.16.840.1.113730.3.4.18 || 2.16.840.1.113730.3.4.9 || 1.2.840.113556.1.4.473 || 1.3.6.1.4.1.42.2.27.9.5.9") (version 3.0; acl "Authenticated users control access"; allow(read) userdn="ldap:///all";)
    

    To:

    ds-cfg-global-aci: (targetcontrol="2.16.840.1.113730.3.4.2 || 2.16.840.1.113730.3.4.17 || 2.16.840.1.113730.3.4.19 || 1.3.6.1.4.1.4203.1.10.2 || 1.3.6.1.4.1.42.2.27.8.5.1 || 2.16.840.1.113730.3.4.16 || 2.16.840.1.113894.1.8.31 || 1.2.840.113556.1.4.319") (version 3.0; acl "Anonymous control access"; allow(read) userdn="ldap:///anyone";)
    
  2. Restart the Oracle Unified Directory server as described in Section 15.1, "Starting and Stopping Components."

10.3 Post-Deployment Steps for Oracle Identity Manager

Perform the following post-deployment steps.

10.3.1 Post Deployment Steps to Address Known Issue

Due to a known issue, node manager SSL is not configured fully. The workaround is to perform the following steps for each administration and managed server in the deployment, in each domain.

  1. Login to the WebLogic console for the domain using at the URL listed in Section 15.2, "About Identity and Access Management Console URLs."

  2. Click Lock and Edit.

  3. Navigate to Environment > Servers

  4. Click on a server name, for example: wls_oam1

  5. Click on the SSL tab

  6. Expand the Advanced Options and change Hostname Verification to BEA Host Name Verifier

  7. Click Save.

  8. Repeat for each server in the domain.

  9. Click Activate Changes

  10. Restart the domain.

  11. Repeat for the second domain

10.3.2 Update Server Start Parameters

As a workaround for a known issue in the Identity and Access Management Deployment tools, you must add an Oracle Identity Manager property. Perform the following steps:

  1. Log in to the WebLogic Console in the IAMGovernanceDomain. (The Console URLs are provided in Section 15.2, "About Identity and Access Management Console URLs.")

  2. Navigate to Environment -> Servers.

  3. Click Lock and Edit.

  4. Click on the server WLS_OIM1.

  5. Click on the Server Start subtab.

  6. Add the following to the Arguments field:

     -Djava.net.preferIPv4Stack=true
    
  7. Click Save.

  8. Repeat Steps 4-7 for the managed server WLS_OIM2.

  9. Click Activate Changes.

10.4 Post-Deployment Steps for the Email Server

If you configured an email server in Section 8.12, "Configure Oracle Identity Manager" and the mail server security is SSL, follow these additional steps:

  1. Ensure that the proxy is set for the environment

    1. Stop the IAMGovernanceDomain admin server and the OIM Managed Servers (wls_oim1/2).

    2. Back up the IGD_MSERVER_HOME/bin/setDomainEnv.sh

    3. Modify the IGD_MSERVER_HOME/bin/setDomainEnv.sh to include the proxy settings

    4. Include this command as part of the environment setup in the setDomainEnv.sh file:

      export PROXY_SETTINGS="-Dhttp.proxySet=true -Dhttp.proxyHost=www-proxy.mycompany.com -Dhttp.proxyPort=80 -Dhttp.nonProxyHosts=localhost|$.mycompany.com|.mycompany.com|.oracle.com"
      

      For example:

      export JAVA_PROPERTIES
      export PROXY_SETTINGS="-Dhttp.proxySet=true -Dhttp.proxyHost=www-proxy.mycompany.com -Dhttp.proxyPort=80 -Dhttp.nonProxyHosts=localhost|${HOST}|*.mycompany.com"ARDIR="${WL_HOME}/server/lib"
      export ARDIR
      
  2. Remove DemoTrust store references from SOA environment. This would run SOA in non-ssl mode.

    1. Modify the IGD_MSERVER_HOME to remove the DemoTrust references

    2. Remove this references from setDomainEnv.sh:

      -Djavax.net.ssl.trustStore=$<WL_HOME>/server/lib/DemoTrust.jks from EXTRA_JAVA_PROPERTIES
      
    3. Restart both the Administration and the Managed server.

10.5 Post-Deployment Steps for Access Manager

This section contains the following topics

10.5.1 Update Idle Timeout Value

By default the Access Manager idle timeout is set to two hours. This can cause issues with not being logged out after a session has timed out. Update this value to 15 minutes.

To update the idle timeout value:

  1. Log in to the Access Management Console at the URL listed in Section 15.2, "About Identity and Access Management Console URLs."

  2. Log in as the Access Manager administrator user you created in Section 8.9, "Set User Names and Passwords" for example: oamadmin.

  3. Click on Common Settings under Configuration.

  4. Change Idle Time out (minutes) to 15.

  5. Click Apply.

10.5.2 Update WebGate Agents

After deployment, update existing WebGate Agents. The Identity and Access Management Console URLs are provided in Section 15.2, "About Identity and Access Management Console URLs."

Update the Access Manager Security Model of all WebGate profiles, with the exception of Webgate_IDM and Webgate_IDM_11g, which should already be set. In addition, set a password for the IAMSuiteAgent profile so that it can be used for OAAM for integration. (The IAMSuiteAgent was created when Access Manager was installed.)

To update these WebGate agents:

  1. Log in to the Access Management Console as the Access Management administrator user identified by the entry in Section 8.9, "Set User Names and Passwords."

  2. Click SSO Agents in the Access Manager box.

  3. Ensure that the WebGates tab is selected.

  4. Click Search.

  5. Click an Agent, for example: IAMSuiteAgent.

  6. Set the Security value to the same value defined to OAM Transfer Mode on the Access Manager Configuration screen in Section 8.15, "Configure Oracle Access Manager."

    Click Apply.

  7. In the Primary Server list, click + and add any missing Access Manager Servers.

  8. If a password has not already been assigned, enter a password into the Access Client Password Field and click Apply.

    Assign an Access Client Password, such as the Common IAM Password (COMMON_IDM_PASSWORD) you used in Section 8.9, "Set User Names and Passwords" or an Access Manager-specific password, if you have set one.

  9. Set Maximum Number of Connections to 20 for all of the Access Manager Servers listed in the primary servers list. (This is the total maximum number of connections for the primary servers, which is 10 x WLS_OAM1 connections plus 10 x WLS_OAM2 connections.)

  10. If you see the following in the User Defined Parameters:

    logoutRedirectUrl=http://OAMHOST1.mycompany.com:14100/oam/server/logout
    

    Change it to:

    logoutRedirectUrl=https://sso.mycompany.com/oam/server/logout
    
  11. Click Apply.

  12. Repeat Steps through for each WebGate.

  13. Check that the security setting matches that of your Access Manager servers.

10.6 Adding a Load Balancer Certificate to Trust Stores

Oracle Privileged Account Manager (OPAM) requires that the SSL certificate used by the load balancer be added to the trusted certificates in the JDK used by OPAM.

To add the certificate:

  1. Obtain the certificate from the load balancer.

    You can obtain the load balancer certificate from the using a browser, such as Firefox. However, the easiest way to obtain the certificate is to use the openssl command. The syntax of the command is as follows:

    openssl s_client -connect LOADBALANCER -showcerts </dev/null 2>/dev/null|openssl x509 -outform PEM > SHARED_CONFIG_DIR/keystores/sso.mycompany.com.pem
    

    For example:

    openssl s_client -connect sso.mycompany.com:443 -showcerts </dev/null 2>/dev/null|openssl x509 -outform PEM > SHARED_CONFIG_DIR/keystores/sso.mycompany.com.pem
    

    This command saves the certificate to a file called sso.mycompany.com.pem in the following directory:

    SHARED_CONFIG_DIR/keystores
    
  2. Load the certificate into the JDK and Node Manager Trust Stores by running the following command to import the CA certificate file, sso.mycompany.com.pem, into the IGD_MW_HOME Java, and Node Manager trust stores:

    set JAVA_HOME to IGD_MW_HOME/jdk6
    set PATH to include JAVA_HOME/bin
     
    keytool -importcert -file SHARED_CONFIG_DIR/keystores/sso.mycompany.com.pem -trustcacerts -keystore $JAVA_HOME/jre/lib/security/cacerts
     
    keytool -importcert -file SHARED_CONFIG_DIR/keystores/sso.mycompany.com.pem -trustcacerts -keystore
    SHARED_CONFIG_DIR/keystores/appTrustKeyStore-oimhost1vhn.mycompany.com.jks
     
    keytool -importcert -file SHARED_CONFIG_DIR/keystores/sso.mycompany.com.pem -trustcacerts -keystore
    SHARED_CONFIG_DIR/keystores/appTrustKeyStore-oimhost2vhn.mycompany.com.jks
     
    keytool -importcert -file SHARED_CONFIG_DIR/keystores/sso.mycompany.com.pem -trustcacerts -keystore
    SHARED_CONFIG_DIR/keystores/appTrustKeyStore-oimhost1.mycompany.com.jks
     
    keytool -importcert -file SHARED_CONFIG_DIR/keystores/sso.mycompany.com.pem -trustcacerts -keystore
    SHARED_CONFIG_DIR/keystores/appTrustKeyStore-oimhost2.mycompany.com.jks
    

    Where JAVA_HOME is set to IGD_MW_HOME/jdk6

    You are prompted to enter a password for the keystore. The default password for the JDK is changeit and the COMMON_IAM_PASSWORD for the node manager keystores. You are also prompted to confirm that the certificate is valid.

    Note:

    The names of the virtual hosts you assigned to your OIM server are oimhost1vhn and oimhost2vhn.

10.7 Restarting All Components

Restart all components, as described in Section 15.1, "Starting and Stopping Components."