You can configure Workbench to authenticate users using Oracle Access Management (OAM).

Before configuring Workbench integration with OAM, you must have an OAM server configured. For details, see the Oracle® Fusion Middleware Installation Guide for Oracle Identity and Access Management .

To integrate Workbench with OAM SSO:

  1. Configure proxy settings for the OAM Oracle HTTP Server:

  2. Configure a dynamic Preferred Host for Webgate:

  3. Add the Oracle HTTP Server to the IAMSuiteAgent host identifier:

  4. Create a host identifier for each Workbench instance:

  5. Create the application domain:

  6. Create an authentication policy for protected resources on the new domain:

  7. Create an open authorization policy on the new domain.

    This allows global access to protected resources once the user is authenticated.

  8. Define a protected resource for each instance of Workbench.

    These are the URLs within the application that trigger an authentication challenge if the request is not accompanied by a valid OAM SSO authentication cookie. For Workbench, this includes all URLs.

  9. Configure Workbench to authenticate against the OAM LDAP server.

    Modify the %ENDECA_TOOLS_CONF%\conf\Login.conf file to set the serverInfo property and query templates according to OAM LDAP settings. For detailed information on LDAP configuration, see Syntax of LDAP login profile configuration parameters.

    For example, the following file comments out parameters relating to storage of credentials and plain-text (not recommended) and the use of parameters that support storage of credentials in OCS:

    Webstudio {
    
        com.endeca.workbench.authentication.ldap.WorkbenchLdapLoginModule required
        serverInfo="ldap://myOAMHost.mydomain.com:1234"
    
        // Plain-text storage of credentials is not recommended, so
        // comment ut the following parameters:
        //serviceUsername="cn=myAdminUser"
        //servicePassword="myAdminPassword"
    
        serviceAuthentication="simple"
        authentication="simple"
        useSSL="false"
        keyStoreLocation="C:/Endeca/MDEXEngine/workspace/conf/webstudio.jks"
        // keyStorePassphrase="keypass"
    
        credentialsKey="serviceCredentialKey"
        keyStorePassKey="OAMkeyStorePassKey"
    
    
        // The query used to look up a user in the LDAP directory and
        // templates that extract information from the user object
        userPath="/cn=users,dc=myOAMHost,dc=mydomain,dc=com??sub?(&(objectClass=per¬
        son)(uid=%{#username}))"
        userTemplate="%{#uid}"
        firstNameTemplate="%{#givenName}"
        lastNameTemplate="%{#sn}"
        emailTemplate="%{#mail}"
    
        // The query used to look up a group in the LDAP directory and
        // templates that extract information from the group object
        findGroupPath="/cn=groups,dc=myOAMHost,dc=mydomain,dc=com??sub?(&(object¬
        Class=groupofUniqueNames)(cn=%{#groupname}))"
        findGroupTemplate="%{#dn:0}"
        groupEmailTemplate="%{#mail}"
    
        // The query and template used to fetch the groups associated
        // with a user when the user logs in to Web Studio
        groupPath="/cn=groups,dc=myOAMHost,dc=mydomain,dc=com??sub?(uniquemember=%{#dn})"
        groupTemplate="%{#dn:0}"
    ;
    };

    Note

    To support OCS storage of credentials as illustrated in the preceding sample Loging.conf, add credentials key and key store pass key using the following commands:

         manage_credentials.bat add --user "cn=myAdminUser"	--key serviceCredentialKey 
         manage_credentials.bat add --key OAMkeyStorePassKey	--type generic				
  10. Configure Workbench to use OAM:

  11. in Workbench, create a set of LDAP user profiles that correspond to your OAM users.

    For information, see the section on Integrating LDAP with Oracle Commerce Workbench.

Optionally, you can configure Identity Assertion validation in OAM if your environment requires it.

You can enable Identity Assertion validation to confirm that users passed to Workbench through OAM originate from a trusted instance. This comes with a performance cost, since Workbench must verify each incoming authentication or authorization request.

The steps below assume you have already integrated Workbench with Single Sign-On through OAM.

When OAM passes a request to Workbench, it includes oam_remote_user information on the request header. Optionally, you can configure Workbench to verify that the header originates from a trusted OAM instance by checking that the certificate in the header matches a certificate in the OAM keystore.

To enable Identity Assertion validation with OAM:

  1. Export the OAM Identity Assertion X509 certificate:

  2. Import the OAM Identity Assertion X509 certificate to the oamkeystore.ks file on the Workbench host:

  3. Configure Workbench to use Identity Assertion Validation:

  4. Modify the authentication policy in OAM to enable Identity Assertion:

  5. Modify the authorization policy in OAM to enable Identity Assertion:


Copyright © Legal Notices