2.3 Oracle Identity and Access Management Health Checks

Oracle Identity and Access Management (IAM) health check tool is a single health check solution for IAM customers to proactively identify areas where preventive and actions can be taken to keep a system healthy on an ongoing basis.

IAM health check tool includes checks that cover the entire deployment stack from application tier to database tier providing a very simplistic, value-added, and easy-to-use solution.

2.3.1 Supported Platforms and Databases

Review the platforms and databases requirements for deploying IAM health check tool.

Only Linux is currently supported and in these combinations:


Table 2-3 Operating System and Database Requirements for IAM Healthcheck Tool

Operating System Database

Linux(Oracle Enterprise Linux/RedHat 5, 6, 7 and SuSE 9,10, 11, 12)

10g R1

Linux on System Z (RedHat 6, 7 and SuSE 12)

11g R1

11g R2

12c

12c R2


2.3.2 Supported Components and Topologies

Review the following for supported components and topologies.

Oracle IAM health checks support the following components:

  • Oracle Identity Manager (11.1.2.2.x and 11.1.2.3.x)

  • Oracle Access Manager (11.1.2.2.x and 11.1.2.3.x)

  • Oracle Unified Directory (11.1.2.2.x and 11.1.2.3.x)

Based on the above components, the supported topologies are as follows:

  • Oracle Identity Manager in single node as well as in multi-node setups

  • Oracle Access Manager + (Any directory)* in single node as well as in multi-node setups

    IAM health checks run on Oracle Unified Directory (OUD) only. If other directories are there as well, then Oracle IAM health checks skips those directories and performs health checks on Oracle Access Manager. Also, Oracle Access Manager configured in embedded LDAP mode is not supported.

  • Oracle Identity Manager + Oracle Access Manager + (Any directory)** in single node as well as in multi-node setups

    IAM health checks run on Oracle Unified Directory (OUD) only. If other directories are there as well, then Oracle IAM health checks skips those directories and performs health checks on Oracle Access Manager. Also, Oracle Access Manager configured in embedded LDAP mode is not supported.

2.3.3 Introduction to IAM Health Checks

Oracle IAM health checks inspect the entire deployment stack from application tier to database tier providing a very simplistic, value-added, and easy-to-use solution. Run IAM health checks before and after installing the product, and while running the product.


Table 2-4 IAM Healthckeck Tool Use Cases

Use Cases Description

Post-install health checks

Includes checks that are run just after a product is installed. These are mostly product focused checks, for example, for Oracle Identity Manager, Oracle Access Manager, and Oracle Unified Directory respective post-install checks.

Runtime health checks

Show the health of the system on a regular basis and helps you take proactive corrective actions.


2.3.3.1 Use Cases for IAM Healthcheck Tool

Review the use cases covered in the IAM Healthcheck tool.

2.3.3.2 Features of IAM Healthcheck Tool

Health checks are run both at product install time as well as runtime.

Product install time checks cover the following areas:

  • System Resources

  • System Configuration

  • Software Configuration

  • Database Configuration

Runtime checks for Oracle Identity Manager cover the following areas:

  • OIM Modules

    • Access Request and Catalog

    • Certification Engine

    • UI Category

    • Provisioning Engine

    • Reconciliation Engine

    • IT Admin (User/Role/Org)

    • Connector Framework

    • Identify Audit Engine

    • Identify Analytics Engine

    • Role Engine

  • Common Services

    • Audit and Reports/Embedded BIP

    • Scheduler

    • Policy/Rule Engine

    • Workflow Engine (SOA/BPEL)

    • Authorization Layer

    • Notification Engine

  • Data Tier

    • Database

  • General

    • Overall Performance

    • Application Readiness

Runtime checks for OAM cover the following areas:

  • OAM Modules

    • UI Category

    • Federation (Single Sign On) Engine

    • Authentication Engine

    • Admin Console

    • Policy Engine

    • oAuth

    • Token Processing

    • Session Management

    • Config Services

    • Authorization Services

    • Oracle Platform Security Services

    • Webgates

  • Data Tier

    • Database

  • General

    • Overall Performance

    • Application Readiness

Runtime checks for OUD cover the following areas:

  • OUD Modules

    • Basic Sanity

    • OUD Replication

    • Performance

2.3.3.3 Auto-discovery of Oracle IAM Environment

Oracle ORAchk framework automatically runs the Discovery tool while running IAM health checks.

Auto-discovery process includes the following:
  1. Discovery tool Identifies the host name of the following:

    1. OIM Admin server

    2. OAM Admin server

    3. One OUD host from user ID store and system ID store OUD clusters. If both ID stores are same, then pick one OUD host.

  2. Discovery tool stores the discovered information in a topology file and the user credentials in a wallet file.

  3. Oracle ORAchk copies the discovery executables to the target machine and runs the Discovery tool on all required machines.

  4. Discovery tool runs serially on all the required machines.

  5. Oracle ORAchk passes the same topology.xml and cwallet files to the Discovery tool on all IAM machines.

    That is, if Oracle ORAchk runs the Discovery tool on the first machine, then the Discovery tool creates thetopology.xml and cwallet.sso  files. Oracle ORAchk copies the same xml and wallet while running the Discovery tool on other IAM machines.

  6. At the end of the discovery, the topology file contains the complete information of the entire environment and the wallet file contains the encrypted user credentials.

  7. Oracle ORAchk uses the topology file and the wallet file to run the health checks on multiple nodes.

  8. The Discovery tool validates the user credentials that it collected. If the credentials are not valid, then the tool prompts the user to enter the details again. After three unsuccessful attempts, the discovery process exits.

2.3.4 Running IAM Heath Checks

Crosscheck the prerequisites before you install Oracle ORAchk for IAM. Provide the information that is required while running the Discovery tool for the first time.

2.3.4.1 Download Oracle ORAchk for IAM

Oracle ORAchk for IAM uses a different distribution than standard Oracle ORAchk.

Download orachk_idm.zip for Oracle ORAchk with IAM support, which is available from My Oracle Support:

ORAchk - Health Checks for the Oracle Stack (Doc ID 1268927.2)

2.3.4.2 Prerequisites for Installing Oracle ORAchk for Oracle Identity and Access Management

Review the list of prerequisites for running Oracle Identity and Access Management (IAM) health checks.

  1. Ensure that JDK 6 or later is set in the system path. If it is not set, then set the environment variable RAT_JAVA_HOME to the correct Java home location.

  2. You must run Oracle ORAchk on the machine where the WebLogic admin server for IAM is installed.

  3. Oracle ORAchk uses $HOME directory as the temporary destination.

    Oracle recommends to set the environment variable RAT_TMPDIR, for example, export RAT_TMPDIR=/scratch, if Oracle ORAchk picks the root location and enough space is not available, then errors can occur.

  4. If the oraInst.loc file is not in the default directory, for example, /u01/app/oraInventory, then specify the exact location of the oraInventory directory using the RAC_INV_LOCAL environment variable. For example:
    export RAT_INV_LOC=/scratch/shared/oracle/oraInventory
    
  5. You must run Oracle ORAchk as the same user that installed the IAM software components.

  6. Each server that is part of the IAM topology must have secure shell (SSH) enabled. If SSH is disabled, then Oracle ORAchk cannot remotely run checks on those servers. On servers without SSH enabled you must run Oracle ORAchk individually and then combine the results.

  7. Oracle ORAchk can only detect local database installations. It cannot detect databases that are installed on remote machines. In such cases, run Oracle ORAchk explicitly on the database machine and combine the results.

2.3.4.3 Inputs Required by Discovery Tool (First Time Only)

The first time your run the Discovery tool you are prompted to answer a series of questions about your configuration.


Table 2-5 Inputs Required by Directory Tool (First Time Only)

Input Description

Is this a Single Node Identity Management System (idm) [Y|N] [N] :

Checks whether your IDM environment is a single node or multi-node setup.

How many Oracle Unified Directory (OUD) clusters present[0] :1

Checks for the number of OUD clusters present.

Enter one of the Oracle Unified Directory (OUD) Host in cluster 1

Specify one OUD host name.

Enter Oracle Identity Manager(OIM) Host (Press just ENTER to skip)

Specify one OIM admin server host name.

Enter Oracle Access Manager (OAM) Host (Press just ENTER to skip) :

Specify one OAM admin server host name.

Enter JAVA_HOME:

The Discovery tool does not prompts this question, if you have set the RAT_JAVA_HOME environment variable.

Enter WLS Admin user name for domain IAMGovernanceDomain:

Specify WebLogic admin user name.

Enter password

Specify the password for WebLogic admin user name.

Enter Oracle Identity Manager (OIM) admin user (xelsysadm) password :

Specify the password for xelsysadm.

Enter Oracle Identity Manager (OIM) LDAP Admin user DN:

Specify the entire DN for OIM LDAP admin user, for example,cn=oimLDAP,cn=SystemIDs,dc=us,dc=oracle,dc=com.

Enter password for admin user DN

Specify the password for OIM LDAP DN.

Enter password for schema <OIM Schema>:

Specify the password for OIM schema.

Enter OUD Admin password for cn=oudadmin:

Specify the OUD admin password.

Enter OUD Admin password for cn=oudmanager,cn=Administrators, cn=admin data:

Specify the OUD manager password.

Enter WLS Admin Username for domain IAMAccessDomain:

Specify the OAM admin user name.

Enter password:

Specify the OAM Admin user password.

Enter Oracle Access Manager (OAM) Admin user

Specify the OAM LDAP admin user name.

Enter password for admin user:

Specify the OAM LDAP admin password.

Enter password for schema <OAM Schema>:

Specify the password for OAM schema.

Database Oracle home location

If Oracle database is on the local machine, then the Discovery tool prompts you to specify the Oracle home location.


2.3.4.4 IAM Health Checks

Run IAM health checks as root or the user who owns the IAM setup.

  1. Create a new folder on a location on one of the WebLogic admin machine, for example, healthcheck IAM.
  2. Set the environment variable to run the health checks based on a specific deployment size.

    Oracle ORAchk supports four deployment sizes:


    Table 2-6 Deployment Size

    Deployment Size Directory User Size

    small

    Close to 100 K

    medium

    Close to 1 million

    large

    Close to 15 million

    extralarge

    Close to 250 million


    To specify a deployment size, before running Oracle ORAchk, set the environment variable RAT_IDM_DEPLOYMENT_SIZE.
    $ export RAT_IDM_DEPLOYMENT_SIZE=small
    

    If RAT_IDM_DEPLOYMENT_SIZE is not set, then Oracle ORAchk uses the default deployment size small .

  3. Change directories to the new directory you created in Step 1 and run Oracle ORAchk.

    Oracle ORAchk prompts the discovery questions as described in "Inputs Required by Discovery Tool (First Time Only)".

    If the database is running on the same machine where the core IAM components are installed, then the database checks are run as well.

  4. If database is running on a remote server, then the database checks need to be run manually:
    1. Copy the same orachk_IAM.zip to the remote srver, and unzip it.

    2. Run ./orachk -idmdbruntime either as root or the user who owns the Oracle IAM installation.

      This command generates a new Oracle ORAchk collection, for example, orachk_den00etd_orcl_100915_061616.zip.

    Oracle ORAchk runs checks on all servers that are part of the IAM topology and generates a single report. However, in the following cases Oracle ORAchk cannot generate a single report:
    1. IAM install is multi-node setup and SSH is disabled on machines involved. In such case Oracle ORAchk run on each node and then merge the reports.

    2. Oracle ORAchk is run on machine where Weblogic Admin server is running. If this machine doesn't have the database installed, then Oracle ORAchk does not run the database checks.. In such case run Oracle ORAchk on the database node additionally and then merge the reports.

See Also:

My Oracle Support Note 2070073.1 for the latest known issues specific to Oracle Identity and Access Management (IAM) health checks:

Oracle Identity and Access Management Healthcheck Guide (ORAchk for IDM)