Part III Configuring the Enterprise Deployment
Configuring the enterprise deployment includes a series of procedures. Configuring LDAP, installing the WebLogic Kubernetes Operator, creating infrastructure for Oracle Access Management (OAM) and Oracle Identity Governance (OIG), and configuring Oracle HTTP Server, OAM, and OIG are the required procedures.
This part of the guide contains the following chapters:
- Installing the Monitoring and Visualization Software
If you want to deploy your own Monitoring and Visualization software on the Kubernetes cluster, you can use the steps described in this chapter. - Installing and Configuring Ingress Controller
An Ingress controller is a load balancer that enables simple host or URL-based HTTO routing. - Installing and Configuring Oracle Unified Directory
Create a new, highly available Oracle Unified Directory (OUD) deployment inside a Kubernetes cluster. - Installing and Configuring Oracle Unified Directory Services Manager
Oracle Unified Directory Service Manager (OUDSM) is a Graphical User Interface (GUI) tool that is used to manage Oracle Unified Directory. It is not mandatory to install OUDSM in the production environments. However, OUDSM makes managing Oracle Unified Directory easier. - Installing and Configuring WebLogic Kubernetes Operator
The WebLogic Operator for Kubernetes facilitates the creation and management of WebLogic domains in a Kubernetes cluster. - Installing and Configuring Oracle HTTP Server
For an enterprise deployment, Oracle HTTP Server must be installed on each of the web tier hosts and configured as Oracle HTTP standalone domains on each host. - Configuring Oracle Access Manager Using WDT
Install and configure an initial domain, which can be used as the starting point for an enterprise deployment. Later, configure the domain. - Configuring Oracle Identity Governance Using WDT
Install and configure an initial domain to use as the starting point for an enterprise deployment. Later, configure this domain. - Installing and Configuring Oracle Identity Role Intelligence
Oracle Identity Role Intelligence (OIRI) authenticates using users and groups defined in Oracle Identity Governance. Therefore, you have to install and configure Oracle Identity Governance first. - Installing and Configuring Oracle Advanced Authentication, Oracle Adaptive Risk Management, and Oracle Universal Authenticator
Oracle Advanced Authentication and Risk Management (OAA and OARM) authenticates users by using multi-factor authentication. It integrates with Oracle Access Manager for OAuth authentication. - Configuring Disaster Recovery
In the past, disaster recovery plans often involved syncing a file system between the main and backup systems. The most effective method for syncing is through disk replication.