OHI Value-Based Payments
 PreviousHomeNext 
3.2 Install ApplicationBook Index3.2.3 Testing LDAP Configuration Without Deploying OHI Components Application (Optional)

3.2.2 Configuring Authentication Providers

The application uses a WebLogic Authentication Provider to connect to a user store for authenticating users. Examples of configurable user identity stores are Oracle Internet Directory (OID) or to a third party LDAP server. This section describes the configuration of an OID or third party LDAP Authentication Provider.

Alternatively, for creating a new WebLogic domain for OHI Components use the WLST scripts for setting up the Authentication Provider.

  1. Login to the WebLogic admin console and click the Security Realms link.
  2. Click the myrealm link.
  3. Click the Providers tab.
  4. Click the New button in order to create a New Authentication Provider

In WebLogic Production-mode use the Lock & Edit button before clicking on the New button.

  1. Change Name and Type to OHIAuthenticationProvider and OracleInternetDirectoryAuthenticator (or to LDAPAuthenticator in case a third party LDAP server is used) respectively in Create a new Authentication Provider page and click the OK button.
  2. Click the OHIAuthenticationProvider link.
  3. Change the Control Flag to SUFFICIENT and click the Save button.
  4. Click the Provider Specific tab.
  5. Enter/change the values for various fields as shown below and select the option Propagate Cause For Login Exception.

Field

Value

Host

LDAP hostname or IP address

Port

LDAP Port or SSL Port if the LDAP is SSL enabled. E.g.: 3060. In case LDAPS is used, make sure to check the SSLEnabled flag as well.

Principal

LDAP admin principal: E.g.: cn=orcladmin

Credential

LDAP admin password

Confirm Credential

LDAP admin password

User Base DN

User Base distinguished name. E.g.: ou=Users,dc=healthinsurance,dc=oracle,dc=com

All Users Filter

E.g.: (&(uid=*)(objectclass=person))

User From Name Filter

E.g.: (&(uid=%u)(objectclass=person))

User Name Attribute

E.g.: uid

Group Base DN

If there are no groups in the LDAP, leave this field empty.

There are a few more properties (or fields in the page) which are not mentioned in the table above. Change the values of those fields to suit your LDAP settings.

  1. Click the Save button.
  2. Click the myrealm link and then DefaultAuthenticator link. Change the Control Flag to SUFFICIENT and click the Save button.
  3. Restart the WebLogic Server.

Optionally, verify that the authentication provider is configured successfully (after the WebLogic Server is restarted) by following the steps mentioned below:

Step 1: Login to WLS Admin Console and click on Security Realms

Step 2: Click on myrealm

Step 3: Click on Users and Groups tab

Step 4: You should be able to see the list of users from OHIAuthenticationProvider (in addition to the default users from DefaultAuthenticator).

 PreviousHomeNext 
3.2 Install Application3.2.3 Testing LDAP Configuration Without Deploying OHI Components Application (Optional)