Oracle® Retail Integration Bus Installation Guide
Release 13.0.1 Patch
  Go To Table Of Contents
Contents

Previous
Previous
 
Next
Next
 

D Creating an OC4J RIB Admin Role

This section details the process of creating a separate RIB related OC4J admin role and user. This is an optional, but recommended step that will allow the RIB installation and administration by a user other that the oc4jadmin.

General steps to create the roles and user:

These steps have to be performed on each rib-<app>-oc4j-instance where a RIB (rib-app>) will be deployed.

Role and User Creation

This section describes how the Oracle Application Server Enterprise Manager can be used to create the role and users.


Note:

For details on security and information on creation of roles and users refer to the Oracle® Application Server Administrator's Guide 10g Release 3 (10.1.3.3).

These steps require a user that has ascontrol_admin role. By default this is the oc4jadmin user and role.

  1. Open a browser and go to the Oracle Application asconsole url:

    http://<hostname>:<port>/em

    where hostname - is the hostname on which the OAS is running.

    port - is the port in which the OAS is listening for http request.

    e.g: http://localhost:7777/em

    e.g: http://localhost:7777/em

  2. Make sure that the rib-<app>-oc4j-instance is up and running.

  3. Select the oc4j instance for which the role and user needs to be created.

    e.g. rib-rms-oc4j-instance

  4. Select the Administration tab.

    Surrounding text describes image012.png.

    This displays a page with Administration tasks like "Properties", "Services", "Security," etc.

  5. Under "Security" option, choose Security Providers and select the icon present under the Go to task column of the table.

    Surrounding text describes image014.png.

    On the Security Providers screen, select the Instance Level Security.

  6. Select the Realms tab on the Instance Level Security.

    Surrounding text describes image014.png.
  7. Choose the jazn.com realm and click the number in roles column to create roles.

    Surrounding text describes image020.png.
  8. Select Create.

    Surrounding text describes image022.png.
  9. Provide the name of the role as "rib-oc4j-administrators" and choose Grant RMI login Permissions check box option and create the role.

    Surrounding text describes image024.png.
  10. Return to the "Instance Level Security" screen and select Users column to display the "Users" page.

  11. On the "Users" page, use the Create button to create a user with name "riboc4jadmin" and a suitable password. Move the previously created role "rib-oc4j-administrators" to the "Selected Roles" text selection box.

    Surrounding text describes image026.png.

Security Role Mapping

The new "rib-oc4j-administrators" role has to be added to the <security-role-mapping> in the appropriate oc4j-instance XML files. This requires using a text editor to directly edit the content of these files.


Note:

Create a backup of the files before editing.

All of the files are located in the <rib-app-oc4j-instance> home directory in the $ORACLE_HOME/j2ee sub-directories.

e.g. /home/wsadmin/product/10.1.3.3/OracleAS_6/j2ee/rib-rms-oc4j-instance

system-application.xml

In the system-application.xml file under the <oc4j-instance-home>/config directory, the role has to be added in the <security-role-mapping> node.

e.g. /home/wsadmin/product/10.1.3.3/OracleAS_6/j2ee/rib-rms-oc4j-instance/config

Example D-1

<namespace-access>
    <read-access>
      <namespace-resource root="">
        <security-role-mapping>
         <group name="administrators" />
         <group name="oc4j-administrators"/>
         <group name="ascontrol_admin"/>
         <group name="rib-oc4j-administrators"/>
         <group name="users"/>
       </security-role-mapping>
     </namespace-resource>
   </read-access>
   <write-access>
     <namespace-resource root="">
       <security-role-mapping>
         <group name="administrators" />
         <group name="oc4j-administrators"/>
         <group name="ascontrol_admin"/>
         <group name="rib-oc4j-administrators"/>
         <group name="users"/>
       </security-role-mapping>
     </namespace-resource>
   </write-access>
 </namespace-access>

orion-application.xml

In the orion-application.xml file under the <oc4j-instance-home>/application-deployment/ascontrol directory, the role has to be added in the <security-role-mapping> node.

e.g. /home/wsadmin/product/10.1.3.3/OracleAS_6/j2ee/rib-rms-oc4j-instance/>/application-deployment/ascontrol

Example D-2

<security-role-mapping name="rib-oc4j-administrators">
    <group name="rib-oc4j-administrators" />
</security-role-mapping>

This step maps the deployment role to the J2EE role.

orion-ejb-jar.xml

To allow the J2EE role to be used inside the application, edit the orion-ejb-jar.xml file present under <oc4j-instance-home>/application-deployments/admin_ejb directory.

e.g. /home/wsadmin/product/10.1.3.3/OracleAS_6/j2ee/rib-rms-oc4j-instance/>/application-deployment/ admin_ejb

This completes the creation and mapping of the users and roles. Restart the oc4j instance after these changes.