15 Configuring Oracle Identity Governance
The following topics describe how to install and configure an initial domain, which can be used as the starting point for an enterprise deployment. Later chapters in this guide describe how to extend this initial domain with the various products and components that comprise the enterprise topology you are deploying.
A complete Oracle Identity and Access Management uses a split domain deployment, where there is a single domain for Oracle Access Management and a different one for Oracle Identity Governance. You must create a separate infrastructures for Access and Governance.
- Synchronizing the System Clocks
Before you deploy Oracle Identity Governance, verify that the system clocks on each host computer are synchronized. You can do this by running thedate
command simultaneously on all the hosts in each cluster. - About the Initial Infrastructure Domain
Before you create the initial Infrastructure domain, ensure that you review the key concepts. - Variables Used When Creating the Infrastructure Domain
As you perform the tasks in this chapter, you will be referencing the variables listed in this section. - Setting Environment Variables
Set environment variables used in this chapter. - URLs Used in This Chapter
This section describes the URLs used in this chapter. - Installing the Oracle Fusion Middleware
Install the Oracle Fusion Middleware software in preparation for configuring a new domain for Oracle Identity Governance. - Verifying the Installation
After you complete the installation, you nust verify it. - Downloading the Oracle Connector Bundle
Download the Oracle Connector bundle. - Installing the Oracle Identity Governance Connector
After you download the Oracle Connector for LDAP, install it into the ORACLE_HOME directory. - Creating the Database Schemas for Oracle Identity Governance
Oracle Fusion Middleware components require the existence of schemas in a database before you configure a Fusion Middleware Infrastructure domain. Install the schemas listed in this topic in a certified database for use with this release of Oracle Fusion Middleware. - Configuring the Oracle Identity Governance Domain
The following topics provide instructions for creating an Oracle Identity Governance domain using the Fusion Middleware Configuration wizard. - Creating Oracle Identity Manager Authenticator
Before you start the domain, you have to run a script which creates the Oracle Identity Manager (OIM) Authenticator in the domain. - Enabling SSL
If you are configuring End to End SSL, you must perform additional steps. - Configuring a Per Host Node Manager for an Enterprise Deployment
For specific enterprise deployments, Oracle recommends that you configure a per-host Node Manager, as opposed to the default per-domain Node Manager. - Tuning JMS Queues
You need to tune the JMS queues to ensure maximum throughput. - Configuring the Domain Directories and Starting the Servers
After you have configured the domain and configured the Node Manager, you can start the Administration Server by using the Node Manager. In an enterprise deployment, the Node Manager is used to start and stop the Administration Server and all the Managed Servers in the domain. - Creating the New Authentication Provider
After creating the new domain, if you are using LDAP and want to log in using LDAP, then you must create an authentication provider for the directory inside the OIG domain. - Adding a Load Balancer Certificate to Oracle Keystore Service
Some OIG Products require that the SSL certificate used by the load balancer be added to the Oracle Keystore Service Trusted Certificates. - Configuring the WebLogic Proxy Plug-In
Before you can validate that requests are routed correctly through the Oracle HTTP Server instances, you must set theWebLogic Plug-In Enabled
parameter. - Modifying the Upload and Stage Directories to an Absolute Path
- Starting and Validating the Oracle Identity Governance Managed Servers
Now that you have extended the domain, started the Administration Server, and propagated the domain to the other hosts, you can start the newly configured Oracle Identity Governance Managed Servers. - Analyzing the Bootstrap Report
When you start the Oracle Identity Governance server, the bootstrap report is generated at$IGD_ASERVER_HOME/servers/oim_server1/logs/BootStrapReportPreStart.html
. - Creating a Separate Domain Directory for Managed Servers
When you initially create the domain for enterprise deployment, the domain directory resides on a shared disk. This default domain directory is used to run the Administration Server. You can now create a copy of the domain on the local storage for each of your managed server hosts. The domain directory on the local (or private) storage is used to run the Managed Servers. - Validating the Fusion Middleware Control Application
After the bootstrap process has been executed and validated, access to the Fusion Middleware Control application should be available. - Configuring the Web Tier for the Domain
Configure the web server instances on the web tier so that the instances route requests for both public and internal URLs to the proper clusters in the extended domain. - Integrating Oracle Identity Governance with Oracle SOA Suite
Oralce Identity Governance invokes Oracle SOA Suite using a number of URLs, which out of the box are wired to individual managed servers. In a High Availibility environment you need to update these URLs to use a load balancer. - Managing the Notification Service
An event is an operation that occurs in Oracle Identity Manager, such as user creation, request initiation, or any custom event created by the user. These events are generated as part of the business operations or through the generation of errors. Event definition is the metadata that describes the event. - Configuring the Messaging Drivers
Each messaging driver needs to be configured. You have to configure this service if you want to enable OAM's forgotten password functionality. - Forcing Oracle Identity Governance to use Correct Multicast Address
Oracle Identity Governance uses multicast for certain functions. By default, the managed servers communicate using the multi cast address assigned to the primary host name. If you wish multicast to use a different network, for example, of the internal network, you must complete additional steps. - Integrating Oracle Identity Governance with LDAP
Integrate Oracle Identity Governance with LDAP. - Integrating Oracle Identity Governance and Oracle Access Manager
You have to complete several tasks to integrate Oracle Identity Governance and Oracle Access Manager. These tasks include creating the WLS authentication providers, deleting OIMSignatureAuthenticator and recreating OUDAuthenticator, adding the administration role to the new administration group, and so on. - Propagating the Domain and Starting the Servers on OIGHOST2
After you start and validate the Administration Server on OIGHOST1, you can then you must propagate the domain and start the servers on OIGHOST2. - Configuring OIG Workflow Notifications to be Sent by Email
OIG uses the human workflow, which is integrated with the SOA workflow. The SOA server configures email to receive the notifications that are delivered to the user mailbox. The user can accept or reject the notifications. - Adding the wsm-pm Role to the Administrators Group
After you configure a new LDAP-based Authorization Provider and restart the Administration Server, add the enterprise deployment administration LDAP group (OIMAdministrators) as a member to thepolicy.Updater
role in thewsm-pm
application stripe. - Adding the Oracle Access Manager Load Balancer Certificate to the Oracle Keystore Service
The Oracle Identity Governance to Business Intelligence Reports link inside of the Self Service application requires that the SSL certificate used by the load balancer be added to the Oracle Keystore Service Trusted Certificates. - Restarting the IAMGovernanceDomain
Restart the domain for the configuration steps to take effect. - Setting Challenge Questions
If you have integrated OAM and OIG, then after the environment is ready, you need to set up the challenge questions for your system users. - Replacing Connect Strings with the Appropriate TNS Alias
Oracle recommends using TNS Alias in the connection strings used by FMW components instead of repeating long JDBC strings across multiple connections pools. - Integrating Oracle Identity Manager with Oracle Business Intelligence Publisher
Oracle Identity Manager comes with a number of prebuilt reports that can be used to provide information about Oracle Identity and Access Management. - Verification of Manual Failover of the Administration Server
After you configure the domain, you must test failover is working correctly. - Backing Up the Configuration
It is an Oracle best practices recommendation to create a backup after you successfully extended a domain or at another logical point. Create a backup after you verify that the installation so far is successful. This is a quick backup for the express purpose of immediate restoration in case of problems in later steps.
Parent topic: Configuring the Enterprise Deployment
Synchronizing the System Clocks
Before you deploy Oracle Identity Governance, verify
that the system clocks on each host computer are synchronized. You can do this by running
the date
command simultaneously on all the hosts in each
cluster.
Alternatively, there are third-party and open-source utilities you can use for this purpose.
Parent topic: Configuring Oracle Identity Governance
About the Initial Infrastructure Domain
Before you create the initial Infrastructure domain, ensure that you review the key concepts.
Parent topic: Configuring Oracle Identity Governance
About the Infrastructure Distribution
You create the initial Infrastructure domain for an enterprise deployment by using the Oracle Fusion Middleware Infrastructure distribution. This distribution contains both the Oracle WebLogic Server software and the Oracle JRF software.
The Oracle JRF software consists of Oracle Web Services Manager, Oracle Application Development Framework (Oracle ADF), Oracle Enterprise Manager Fusion Middleware Control, the Repository Creation Utility (RCU), and other libraries and technologies that are required to support the Oracle Fusion Middleware products.
Note:
The Access infrastructure does not use the Web Services Manager.
See Understanding Oracle Fusion Middleware Infrastructure in Understanding Oracle Fusion Middleware.
Parent topic: About the Initial Infrastructure Domain
Characteristics of the Domain
The following table lists some of the key characteristics of the domain that you are about to create. Reviewing these characteristics helps you to understand the purpose and context of the procedures that are used to configure the domain.
Many of these characteristics are described in more detail in Understanding a Typical Enterprise Deployment.
Characteristic of the Domain | More Information |
---|---|
Uses a separate virtual IP (VIP) address for the Administration Server. |
Configuration of the Administration Server and Managed Servers Domain Directories |
Uses separate domain directories for the Administration Server and the Managed Servers in the domain. |
Configuration of the Administration Server and Managed Servers Domain Directories |
Uses a per domain Node Manager configuration. |
About the Node Manager Configuration in a Typical Enterprise Deployment |
Requires a separately installed LDAP-based authentication provider. |
Understanding OPSS and Requests to the Authentication and Authorization Stores |
Parent topic: About the Initial Infrastructure Domain
Variables Used When Creating the Infrastructure Domain
As you perform the tasks in this chapter, you will be referencing the variables listed in this section.
The following table explains the configuration file property values required in this section.
Table 15-1 LDAP Variables Used in This Chapter
Variable | Sample Value | Description |
---|---|---|
IDSTORE_HOST |
|
The host and port of your Identity Store directory. When preparing the Identity Store these should point to one of the LDAP instances. When configuring components such as OAM or OIG they should point to the load balancer entry point. |
IDSTORE_PORT |
|
The port of your Identity Store directory. When preparing the Identity Store these should point to one of the LDAP instances. When configuring components such as OAM or OIG they should point to the load balancer entry point. |
IDSTORE_DIRECTORYTYPE |
|
The type of directory you are using. Valid value is OUD. |
IDSTORE_BINDDN |
|
An administrative user in the Identity Store Directory. |
IDSTORE_BINDDN_PWD |
|
The the password of IDSTORE_BINDDN. You will be prompted for the value if not supplied. |
IDSTORE_SEARCHBASE |
|
The location in the directory where Users and Groups are stored. |
IDSTORE_SSL_ENABLED |
|
Whether SSL to the identity store is enabled.
Valid values: |
OAM_IDSTORE_NAME |
|
Name of the IDStore to create. |
IDSTORE_USERSEARCHBASE |
|
The location in the directory where Users are Stored. |
IDSTORE_GROUPSEARCHBASE |
|
The location in the directory where Groups are Stored. |
IDSTORE_SYSTEMIDBASE |
|
The location of a container in the directory where system users can be placed when you do not want them in the main user container. |
IDSTORE_KEYSTORE_FILE |
|
The location of the Truststore for OIG. |
KEYSTORE_HOME |
|
The location of the keystore home on shared storage for OIG. |
LOCAL_KEYSTORE_HOME |
|
The location of the keystore home on shared storage for OIG. |
IDSTORE_KEYSTORE_PASSWORD |
|
The password of the IDSTORE_KEYSTORE_FILE. |
Table 15-2 Variables Used in This Chapter
Variable | Sample Value | Description |
---|---|---|
IGD_ORACLE_HOME |
|
The read-only location for the OIG product binaries stored on shared disk. |
ASERVER_HOME |
|
The Administration Server domain home, which is installed on a shared disk. |
IGD_ASERVER_HOME |
|
Should be the same value as IGD_ASERVER_HOME. |
IGD_MSERVER_HOME |
|
The Managed Server domain home, which is created by using the unpack command on the local disk of each application tier host. |
MSERVER_HOME |
|
Should be the same value as IGD_MSERVER_HOME. |
APPLICATION_HOME |
|
The Application home directory, which is installed on shared disk, so the directory is accessible by all the application tier host computers. |
MS_APPLICATION_HOME |
|
The Application home directory, which is installed on local disk, so the directory is accessible by all the application tier host computers. |
JAVA_HOME |
|
The location where you install the supported Java Development Kit (JDK). |
ADMINVHN |
|
The virtual host name used as the listen address for the Administration Server used by the IAMGovernanceDomain and fails over with manual failover of the Administration Server. It is enabled on the node where the Administration Server process is running. |
OIGHOST1 |
|
The hostname of OIGHOST1. |
OIGHOST2 |
|
The hostname of OIGHOST2. |
SCAN_ADDRESS |
|
Address for the Oracle RAC Database. |
WEBGATE_TYPE |
|
The type of webgate profile to create. This
should always be |
COOKIE_DOMAIN |
|
The domain you wish to associate the OAM cookie with this is normally the same as the IDSTORE_SEARCH_BASE in domain format. The search base can be found in the worksheet (REALM_DN). |
OAM_TRANSFER_MODE |
|
The type of OAM security transport to be used. This should be the same as OAM_OAM_SERVER_TRANSPORT_MODE. |
OAM_OIM_OHS_URL |
|
If you are planning on using OIM for Forgotten
Password functionality then you need to specify the external
entry point for OIG. This is the OIG URL to which OAM
directs the requests. This URL is made up of the following
values from the worksheet:
|
IDSTORE_PWD_OAMADMINUSER |
|
The password of the Admin user account
( |
IDSTORE_PWD_OAMSOFTWAREUSER |
|
The password of the account
( |
OAM_WLS_ADMIN_PASSWD |
|
The password of the WLS Admin account
( |
OIM_WLSHOST |
|
Virtual Host name for Admin Server on OIGHOST1. |
OIM_WLSPORT |
|
Corresponding port number for Admin Server on OIGHOST1. |
OIM_WLSADMIN |
|
The weblogic administrator user in OIM domain. |
OIM_WLSADMIN_PWD |
|
Password for OIM_WLSADMIN. |
OIM_IDSTORE_ROLE_SECURITY_ADMIN |
|
The group in your LDAP directory which has WebLogic administration access. |
WLS_IS_SSLENABLED |
|
Whether SSL to the identity store is enabled.
Valid values: |
WLS_SSL_HOST_VERIFICATION |
|
Whether the WLS SSL host verfication is enabled
or not. Valid values: |
WLS_TRUSTSTORE |
|
The location of the WLS truststore on shared storage. |
LOCAL_WLS_TRUSTSTORE |
|
The location of the WLS truststore on local storage. |
WLS_TRUSTSTORE_PASSWORD |
|
Password for the WLS truststore. |
Parent topic: Configuring Oracle Identity Governance
Setting Environment Variables
Set environment variables used in this chapter.
To help navigate this guide, to be able to copy sample commands without modification you can set the following environment variables, replacing the values with values appropriate to your environment.
export IGD_ORACLE_HOME=/u01/oracle/products/oig
export ORACLE_HOME=$IGD_ORACLE_HOME
export ORACLE_COMMON_HOME=$IGD_ORACLE_HOME/oracle_common
export JAVA_HOME=/u01/oracle/products/jdk
export PATH=$JAVA_HOME/bin:$PATH
export IGD_ASERVER_HOME=/u01/oracle/config/domains/oig
export DOMAIN_HOME=$IGD_ASERVER_HOME
export IGD_MSERVER_HOME=/u02/oracle/config/domains/oig
export WL_HOME=$IGD_ORACLE_HOME/wlserver
export NM_HOME=/u02/oracle/config/nodemanager
export APPLICATION_HOME=/u01/oracle/config/applications/oig
export MS_APPLICATION_HOME=/u02/oracle/config/applications/oig
export DB_HOST=db-scan.example.com
export DB_PORT=1521
export DB_SERVICE=oigsvc.example.com
export SHARED_CONFIG_DIR=/u01/oracle/config
export LOCAL_CONFIG_DIR=/u02/oracle/config
Parent topic: Configuring Oracle Identity Governance
URLs Used in This Chapter
This section describes the URLs used in this chapter.
Table 15-3 SSL Termination
Function | Component URL | Load Balancer URL |
---|---|---|
Remote Console connection |
http://igdadminvhn.example.com:7001/ |
http://igdadmin.example.com |
Enterprise Manager |
http://igdadminvhn.example.com:7001/em |
http://igdadmin.example.com/em |
OIG System Administration console |
http://igdadminvhn.example.com:14000/sysadmin |
http://igdadmin.example.com/sysadmin |
Identity Console |
http://igdadminvhn.example.com:14000/identity |
https://oig.example.com/identity |
Table 15-4 End to End SSL Termination
Function | Component URL | Load Balancer URL |
---|---|---|
Remote Console connection |
https://igdadminvhn.example.com:9002/ |
https://igdadmin.example.com |
Enterprise Manager |
https://igdadminvhn.example.com:9002/em |
https://igdadmin.example.com/em |
OIG System Administration console |
https://igdadminvhn.example.com:14001/sysadmin |
https://igdadmin.example.com/sysadmin |
Identity Console |
https://igdadminvhn.example.com:14001/identity |
https://oig.example.com/identity |
Parent topic: Configuring Oracle Identity Governance
Installing the Oracle Fusion Middleware
Install the Oracle Fusion Middleware software in preparation for configuring a new domain for Oracle Identity Governance.
- Installing the Oracle Fusion Middleware Infrastructure, SOA Suite, and Oracle Identity Governance on OIGHOST1
Use the following sections to install the Oracle Fusion Middleware Infrastructure software in preparation for configuring a new domain for an enterprise deployment.
Parent topic: Configuring Oracle Identity Governance
Installing the Oracle Fusion Middleware Infrastructure, SOA Suite, and Oracle Identity Governance on OIGHOST1
Use the following sections to install the Oracle Fusion Middleware Infrastructure software in preparation for configuring a new domain for an enterprise deployment.
- Installing a Supported JDK
- Starting the Oracle Identity Management Quick Installer
- Navigating the Installation Screens
- Installing the Stack Bundle Patch
- Installing Oracle Fusion Middleware Infrastructure on the Other Host Computers
Parent topic: Installing the Oracle Fusion Middleware
Installing a Supported JDK
- Locating and Downloading the JDK Software
- Installing the JDK Software
Oracle Fusion Middleware requires you to install a certified Java Development Kit (JDK) on your system.
Locating and Downloading the JDK Software
To find a certified JDK, see the certification document for your release on the Oracle Fusion Middleware Supported System Configurations page.
After you identify the Oracle JDK for the current Oracle Fusion Middleware release, you can download an Oracle JDK from the following location on Oracle Technology Network:
https://www.oracle.com/java/technologies/downloads/
Be sure to navigate to the download for the Java SE JDK.
Parent topic: Installing a Supported JDK
Installing the JDK Software
Oracle Fusion Middleware requires you to install a certified Java Development Kit (JDK) on your system.
For more information about the recommended location for the JDK software, see Understanding the Recommended Directory Structure for an Enterprise Deployment.
Parent topic: Installing a Supported JDK
Starting the Oracle Identity Management Quick Installer
The Quick Installer installs the Oracle Fusion Middleware Infrastructure, Oracle SOA Suite, and Oracle Identity and Access Management.
To start the installation program, perform the following steps.
When the installation program appears, you are ready to begin the installation. See Navigating the Installation Screens for a description of each installation program screen.
Navigating the Installation Screens
The installation program displays a series of screens, in the order listed in the following table.
If you need additional help with any of the installation screens, click the screen name or click the Help button on the screen.
Table 15-5 Navigating the Infrastructure Installation Screens
Screen | Description |
---|---|
On UNIX operating systems, this screen appears if you are installing any Oracle product on this host for the first time. Specify the location where you want to create your central inventory. Ensure that the operating system group name selected on this screen has write permissions to the central inventory location. See Understanding the Oracle Central Inventory in Installing Software with the Oracle Universal Installer. Note: Oracle recommends that you configure the central inventory directory on the products shared volume. Example: You may also need to execute the |
|
This screen introduces you to the product installer. |
|
Use this screen to search My Oracle Support automatically for available patches or automatically search a local directory for patches that you have already downloaded for your organization. |
|
Use this screen to specify the location of your Oracle home directory. For the purposes of an enterprise deployment, enter the value of the $ORACLE_HOME variable for the product listed in Table 8-2. For example,
|
|
This screen verifies that your system meets the minimum requirements. If there are any warning or error messages, refer to the Oracle Fusion Middleware System Requirements and Specifications document on the Oracle Technology Network (OTN). |
|
Use this screen to verify the installation options that you have selected. If you want to save these options to a response file, click Save Response File and provide the location and name of the response file. Response files can be used later in a silent installation situation. For more information about silent or command-line installation, see Using the Oracle Universal Installer in Silent Mode in Installing Software with the Oracle Universal Installer. |
|
This screen allows you to see the progress of the installation. |
|
This screen appears when the installation is complete. Review the information on this screen, then click Finish to dismiss the installer. |
Installing the Stack Bundle Patch
After installing the software binaries, you must apply the latest Stack Bundle Patch.
For an enterprise deployment you must download and apply the July 2025 Stack Bundle Patch or later. For more details, see Identifying and Obtaining Software Distributions for an Enterprise Deployment.
- After downloading the patch, unzip it to your preferred location.
For
example:
unzip p38184742_141210_Linux-x86-64.zip
This location will be known as $PATCH_DIR.
- Navigate to the
$PATCH_DIR:
cd $PATCH_DIR/tools/spbat/generic/SPBAT/
- Apply the patch using the
command:
./spbat.sh -type oig -phase downtime -mw_home $IGD_ORACLE_HOME -spb_download_dir $PATCH_DIR
Installing Oracle Fusion Middleware Infrastructure on the Other Host Computers
If you have configured a separate shared storage volume or partition for secondary hosts, then you must install the Infrastructure on one of those hosts.
See Shared Storage Recommendations When Installing and Configuring an Enterprise Deployment.
To install the software on the other host computers in the topology, log in to each host, and use the instructions in Starting the Oracle Identity Management Quick Installer and Navigating the Installation Screens to create the Oracle home on the appropriate storage device.
You must install the Stack Bundle Patch and any other mandatory patches outlined in Identifying and Obtaining Software Distributions for an Enterprise Deployment.
Verifying the Installation
After you complete the installation, you nust verify it.
Perform the following tasks:
- Reviewing the Installation Log Files
- Checking the Directory Structure
- Viewing the Contents of Your Oracle Home
Parent topic: Configuring Oracle Identity Governance
Reviewing the Installation Log Files
Review the contents of the installation log files to make sure that no problems were encountered. For a description of the log files and where to find them, see Understanding Installation Log Files in Installing Software with the Oracle Universal Installer.
Parent topic: Verifying the Installation
Checking the Directory Structure
The contents of your installation vary based on the options that you select during the installation.
- Navigate to the $ORACLE_HOME:
cd $ORACLE_HOME
- Enter the following
command:
ls --format=single-column
The directory structure on your system must match the structure shown in the following example:bin cfgtoollogs coherence domain-registry.xml em envPropertiesCache idm install inventory jdeveloper jlib lib mft OPatch opmn oracle_common oraInst.loc osb oui root.sh soa wlserver
For more information about the directory structure you should see after installation, see What are the Key Oracle Fusion Middleware Directories? in Understanding Oracle Fusion Middleware.
Parent topic: Verifying the Installation
Viewing the Contents of Your Oracle Home
You can also view the contents of your Oracle home by using the viewInventory
script. See Viewing the contents of an Oracle home in Installing Software with the Oracle Universal Installer.
Parent topic: Verifying the Installation
Downloading the Oracle Connector Bundle
Download the Oracle Connector bundle.
Download the Oracle Connector bundle from the following location:
http://www.oracle.com/technetwork/middleware/id-mgmt/downloads/connectors-101674.html
Copy the connector bundle for Oracle Internet Directory (it covers OUD as well) to the following directory:
$IGD_ORACLE_HOME/idm/server/ConnectorDefaultDirectory
Parent topic: Configuring Oracle Identity Governance
Installing the Oracle Identity Governance Connector
After you download the Oracle Connector for LDAP, install it into the ORACLE_HOME directory.
Parent topic: Configuring Oracle Identity Governance
Creating the Database Schemas for Oracle Identity Governance
Oracle Fusion Middleware components require the existence of schemas in a database before you configure a Fusion Middleware Infrastructure domain. Install the schemas listed in this topic in a certified database for use with this release of Oracle Fusion Middleware.
-
Oracle Identity Manager
This automatically selects Oracle SOA Suite schemas along with the following ones:
-
Metadata Services (MDS)
-
Audit Services (IAU)
-
Audit Services Append (IAU_APPEND)
-
Audit Services Viewer (IAU_VIEWER)
-
Oracle Platform Security Services (OPSS)
-
User Messaging Service (UMS)
-
WebLogic Services (WLS)
-
Common Infrastructure Services (STB)
-
Use the Repository Creation Utility (RCU) to create the schemas. This utility is installed in the Oracle home for each Oracle Fusion Middleware product. For more information about RCU and how the schemas are created and stored in the database, see Preparing for Schema Creation in Creating Schemas with the Repository Creation Utility.
Complete the following steps to install the required schemas:
- Installing and Configuring a Certified Database
- Verifying Schema Access
- Creating the Database Schemas Using GUI
- Creating the Database Schemas Using CLI
Parent topic: Configuring Oracle Identity Governance
Installing and Configuring a Certified Database
Make sure that you have installed and configured a certified database, and that the database is up and running.
See the Preparing the Database for an Enterprise Deployment.
Verifying Schema Access
Verify schema access by connecting to the database as the new schema users created by the RCU. Use SQL*Plus or another utility to connect, and provide the appropriate schema names and passwords entered in the RCU.
For example:
sqlplus <RCU_PREFIX>_OIM/<PASSWORD>@//<SCAN_ADDRESS>:<PORT>/<SERVICE_NAME>
sqplus IGDEDG_OIM/<password>@//db-scan.example.com:1521/oigpdb_s.example.com
SQL*Plus: Release 23.0.0.0.0 - for Oracle Cloud and Engineered Systems on Wed Sep 11 14:20:00 2024 Version 23.5.0.24.07
Copyright (c) 1982, 2024, Oracle. All rights reserved.
Connected to:
Oracle Database 23ai EE Extreme Perf Release 23.0.0.0.0 - for Oracle Cloud and Engineered Systems
Version 23.5.0.24.07
SQL>
Creating the Database Schemas Using GUI
Starting the Repository Creation Utility (RCU)
To start the Repository Creation Utility (RCU):
Parent topic: Creating the Database Schemas Using GUI
Navigating the RCU Screens to Create the Schemas
Schema creation involves the following tasks:
Screen | Description |
---|---|
Introducing RCU |
Review the Welcome screen and verify the version number for RCU. Click Next to begin. |
Selecting a Method of Schema Creation |
If you have the necessary permission and privileges to perform DBA activities on your database, select System Load and Product Load on the Create Repository screen. The procedure in this document assumes that you have the necessary privileges. If you do not have the necessary permission or privileges to perform DBA activities in the database, you must select Prepare Scripts for System Load on this screen. This option will generate a SQL script, which can be provided to your database administrator. See Understanding System Load and Product Load in Creating Schemas with the Repository Creation Utility. Click Next. Tip: For more information about the options on this screen, see Create repository in Creating Schemas with the Repository Creation Utility. |
Providing Database Connection Details |
Provide the database connection details for RCU to connect to your database.
Tip: For more information about the options on this screen, see Database Connection Details in Creating Schemas with the Repository Creation Utility. |
Specifying a Custom Prefix and Selecting Schemas |
There are two mandatory schemas that are selected by default. You cannot deselect them: Common Infrastructure Services (the STB schema) and WebLogic Services (the WLS schema). The Common Infrastructure Services schema enables you to retrieve information from RCU during domain configuration. See Understanding the Service Table Schema in Creating Schemas with the Repository Creation Utility. Tip: For more information about how to organize your schemas in a multi-domain environment, see Planning Your Schema Creation in Creating Schemas with the Repository Creation Utility. Click Next to proceed, then click OK on the dialog window confirming that prerequisite checking for schema creation was successful. |
Specifying Schema Passwords |
Specify how you want to set the schema passwords on your database, then specify and confirm your passwords. Ensure that the complexity of the passwords meet the database security requirements before you continue. RCU will proceed at this point even if you do not meet the password polices. Hence, perform this check outside RCU itself.. Click Next. Tip: You must make a note of the passwords you set on this screen; you will need them later on during the domain creation process. |
Verifying the Tablespaces for the Required Schemas |
You can accept the default settings on the remaining screens, or you can customize how RCU creates and uses the required tablespaces for the Oracle Fusion Middleware schemas. Note: You can configure a Fusion Middleware component to use JDBC stores for JMS servers and Transaction Logs, by using the Configuration Wizard. These JDBC stores are placed in the WebLogic Services component tablespace. If your environment expects to have a high level of transactions and/or JMS activity, you can increase the default size of the <PREFIX>_WLS tablespace to better suit the environment load. Click Next to continue, and then click OK on the dialog window to confirm the tablespace creation. For more information about RCU and its features and concepts, see About the Repository Creation Utility in Creating Schemas with the Repository Creation Utility. |
Creating Schemas |
Review the summary of the schemas to be loaded and click Create to complete schema creation. Note: If failures occurred, review the listed log files to identify the root cause, resolve the defects, and then use RCU to drop and re-create the schemas before you continue. |
Reviewing Completion Summary and Completing RCU Execution |
When you reach the Completion Summary screen, verify that all schema creations have been completed successfully, and then click Close to dismiss RCU. |
Parent topic: Creating the Database Schemas Using GUI
Creating the Database Schemas Using CLI
Run the following commands to create the database schemas using the Repository Creation Assistant CLI in silent mode:
- Create a password file
pwd.txt
that contains the the password for the database sysdba account and password assigned for the database schemas. This file should contain two lines as shown in the following example:sysdba_password schema_password
- Run the following command to execute the RCU in silent
mode:
cd $ORACLE_COMMON_HOME/bin
./rcu -silent -createRepository -databaseType ORACLE -connectString $DB_HOST:$DB_PORT/$DB_SERVICE -dbUser sys -dbRole sysdba -selectDependentsForComponents true -useSamePasswordForAllSchemaUsers true -schemaPrefix $RCU_PREFIX --component MDS -component IAU -component SOAINFRA -component IAU_APPEND -component IAU_VIEWER -component OPSS -component WLS -component STB -component OIM -component UCSUMS -f < /pwd.txt
Configuring the Oracle Identity Governance Domain
The following topics provide instructions for creating an Oracle Identity Governance domain using the Fusion Middleware Configuration wizard.
For more information on the other methods that are available for creating a domain, see Additional Tools for Creating, Extending, and Managing WebLogic Domains in Creating WebLogic Domains Using the Configuration Wizard.
- Starting the Configuration Wizard
- Navigating the Configuration Wizard Screens to Configure the Oracle Identity Governance Domain
Parent topic: Configuring Oracle Identity Governance
Starting the Configuration Wizard
To begin domain configuration, run the following command in the Oracle Fusion Middleware Oracle home.
$ORACLE_COMMON_HOME/common/bin/config.sh
Parent topic: Configuring the Oracle Identity Governance Domain
Navigating the Configuration Wizard Screens to Configure the Oracle Identity Governance Domain
Table 15-6 Navigating the Infrastructure Installation Screens
Screen | Description | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Selecting the Domain Type and Domain Home Location |
On the Configuration Type screen, select Create a new domain. In the Domain Location field, specify the value of the IGD_ASERVER_HOME variable, as defined in File System and Directory Variables Used in This Guide. For example,
Tip: More information about the other options on this screen of the Configuration Wizard, see Configuration Type in Creating WebLogic Domains Using the Configuration Wizard. Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Selecting the Configuration Templates |
On the Templates screen, make sure Create Domain Using Product Templates is selected, then select the following templates:
Tip: More information about the options on this screen can be found in Templates in Creating WebLogic Domains Using the Configuration Wizard. Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Configuring High Availability Options |
This screen appears for the first time when you create a cluster that uses Automatic Service Migration or JDBC stores or both. After you select HA Options for a cluster, all subsequent clusters that are added to the domain by using the Configuration Wizard, automatically apply HA options (that is, the Configuration Wizard creates the JDBC stores and configures ASM for them). On the High Availability Options screen:
Note: Oracle recommends that you use JDBC stores, which leverage the consistency, data protection, and high availability features of an oracle database and makes resources available for all the servers in the cluster. So, the Configuration Wizard steps assume that the JDBC persistent stores are used along with Automatic Service Migration. When you choose JDBC persistent stores, additional unused File Stores are automatically created but are not targeted to your clusters. Ignore these File Stores. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Selecting the Application Home Location |
On the Application Location screen, specify the value of the APPLICATION_HOME variable, as defined in File System and Directory Variables Used in This Guide. For example,
Tip: More information about the options on this screen can be found in Application Location in Creating WebLogic Domains Using the Configuration Wizard. Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Configuring the Administrator Account |
On the Administrator Account screen, specify the user name (Oracle recommends using a different name from “WebLogic”) and password for the default WebLogic Administrator account for the domain. Make a note of the user name and password specified on this screen; you will need these credentials later to boot and connect to the domain's Administration Server. Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Specifying the Domain Mode and JDK |
On the Domain Mode and JDK screen:
Selecting Production Mode on this screen gives your environment a higher degree of security, requiring a user name and password to deploy applications and to start the Administration Server. Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Specifying the Database Configuration Type |
On the Database Configuration Type screen:
Note: If you choose to select Manual Configuration on this screen, you will have to manually fill in the parameters for your schema on the JDBC Component Schema screen. After you select RCU Data, fill in the fields as shown below:
Click Get RCU Configuration when you are finished specifying the database connection information. The following output in the Connection Result Log indicates that the operating succeeded: Connecting to the database server...OK Retrieving schema data from database server...OK Binding local schema components with retrieved data...OK Successfully Done. Click Next if the connection to the database is successful. Tip: More information about the RCU Data option can be found in Understanding the Service Table Schema in Creating Schemas with the Repository Creation Utility. More information about the other options on this screen can be found in Datasource Defaults in Creating WebLogic Domains Using the Configuration Wizard. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Specifying JDBC Component Schema Information |
Verify that the values on the JDBC Component Schema screen are correct for all schemas. The schema table should be populated, because you selected Get RCU Data on the previous screen. As a result, the Configuration Wizard locates the database connection values for all the schemas required for this domain. At this point, the values are configured to connect to a single-instance database. However, for an enterprise deployment, you should use a highly available Real Application Clusters (RAC) database, as described in Preparing the Database for an Enterprise Deployment. In addition, Oracle recommends that you use an Active GridLink datasource for each of the component schemas. For more information about the advantages of using GridLink data sources to connect to a RAC database, see Database Considerations in the High Availability Guide. To convert the data sources to GridLink:
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Providing the GridLink Oracle RAC Database Connection Details |
On the GridLink Oracle RAC Component Schema screen,
provide the information required to connect to the RAC database
and component schemas, as shown below:
For more information about specifying the information on this screen, as well as information about how to identify the correct SCAN address, see Configuring Active GridLink Data Sources with Oracle RAC in the High Availability Guide. You can also click Help to display a brief description of each field on the screen. Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Testing the JDBC Connections |
Use the JDBC Component Schema Test screen to test the data source connections you have just configured. A green check mark in the Status column indicates a successful test. If you encounter any issues, see the error message in the Connection Result Log section of the screen, fix the problem, then try to test the connection again. Tip: More information about the other options on this screen can be found in Test Component Schema in Creating WebLogic Domains Using the Configuration Wizard Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Entering Credentials |
Enter the credentials you wish to use for the Oracle Identity Governance components. You have the choice of choosing both a username and a password for the various objects.
Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Keystore |
Use this screen to specify details about the keystore to be used in the domain. For a typical enterprise deployment, you can leave the default values. See Keystore in Creating WebLogic Domains Using the Configuration Wizard. Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Selecting Advanced Configuration |
To complete domain configuration for the topology, select the following options on the Advanced Configuration screen:
Note: When using the Advanced Configuration screen in the Configuration Wizard, if any of the above options are not available on the screen, then return to the Templates screen, and be sure you selected the required templates for this topology. Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Configuring the Administration Server Listen Address |
On the Administration Server screen:
Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Configuring Node Manager |
Select Manual Node Manager Setup as the Node Manager type. WARNING: You can ignore the warning in the bottom pane. This guide provides the required steps for the Manual Node Manager configuration.Tip: For more information about the options on this screen, see Node Manager in Creating WebLogic Domains Using the Configuration Wizard. For more information about per domain and per host Node Manager implementations, see About the Node Manager Configuration in a Typical Enterprise Deployment. For information about Node Manager configurations, see Configuring Node Manager on Multiple Machines in Administering Node Manager for Oracle WebLogic Server. Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Configuring Managed Servers |
Use the Managed Servers screen to create two new Managed Servers:
Table 15-7 SSL Terminated Deployments
Table 15-8 End to End SSL Deployments
The Managed Server names suggested in this procedure are referenced throughout this document, if you choose different names then ensure to replace them as needed. Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Configuring a Cluster |
In this task, you create a cluster for each set of Managed Servers. You can then target the Oracle Identity Governance and Oracle SOA Suite components to the relevant cluster. Create the following clusters:
Use the Clusters screen to create a new cluster:
Note: By default, server instances in a cluster communicate with one another using unicast. If you want to change your cluster communications to use multicast, refer to Considerations for Choosing Unicast or Multicast in Administering Clusters for Oracle WebLogic Server. Click Next. For more information about the options on this screen, see Clusters in Creating WebLogic Domains Using the Configuration Wizard. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigning Server Templates |
Click Next to proceed to the next screen. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Configuring Dynamic Servers |
Verify that all dynamic server options are disabled for clusters that are to remain as static clusters.
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigning Managed Servers to the Cluster |
Use the Assign Servers to Clusters screen to assign your managed servers to the clusters you have just created. At the end of this you will have the following assignments:
Tip: More information about the options on this screen can be found in Assign Servers to Clusters in Creating WebLogic Domains Using the Configuration Wizard. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Configuring Coherence Clusters |
Use the Coherence Clusters screen to configure the Coherence cluster that is automatically added to the domain. In the Cluster Listen Port, enter
Note: For Coherence licensing information, Oracle Coherence Products in Oracle Fusion Middleware Licensing Information User Manual. Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Creating Machines |
Use the Machines screen to create new machines in the domain. A machine is required in order for the Node Manager to be able to start and stop the servers. You must create a machine even if your topology contains just the Administration Server.
Table 15-9 Values to Use When Creating Unix Machines
Note: If you are installing OIG on the same host as Oracle Access Management (OAM), ensure that the Node Manager ports are unique to each deployment.Tip: More information about the options on this screen can be found in Machines in Creating WebLogic Domains Using the Configuration Wizard. Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Assigning Servers to Machines |
Use the Assign Servers to Machines screen to assign the Oracle Identity Governance Managed Servers to the corresponding machines in the domain. Assign the machines as shown in the following table:
For more information about the options on this screen, see Assign Servers to Machines in Creating WebLogic Domains Using the Configuration Wizard. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Creating Virtual Targets |
Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Creating Partitions |
Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Configuring Domain Front End Host |
In the Domain Front End host screen you specify the
main entry point for OIG. This will equate to the name on the
load balancer. For example, set Plain to
Note: Even though you are specifying this value it will never be used.SSL: Default: SSL Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Reviewing Your Configuration Specifications and Configuring the Domain |
The Configuration Summary screen contains the detailed configuration information for the domain you are about to create. Review the details of each item on the screen and verify that the information is correct. You can go back to any previous screen if you need to make any changes, either by using the Back button or by selecting the screen in the navigation pane. Domain creation will not begin until you click Create. Tip: More information about the options on this screen can be found in Configuration Summary in Creating WebLogic Domains Using the Configuration Wizard. Click Next. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Writing Down Your Domain Home and Administration Server URL |
The Configuration Success screen will show the following items about the domain you just configured:
You must make a note of both items as you will need them later; the domain location is needed to access the scripts used to start the Administration Server. Click Finish to dismiss the Configuration Wizard. |
Parent topic: Configuring the Oracle Identity Governance Domain
Creating Oracle Identity Manager Authenticator
Before you start the domain, you have to run a script which creates the Oracle Identity Manager (OIM) Authenticator in the domain.
Parent topic: Configuring Oracle Identity Governance
Enabling SSL
If you are configuring End to End SSL, you must perform additional steps.
The steps are as follows:
- Adding Certificate Stores Location to the WebLogic Servers Start Scripts
- Update Server's Security Settings Using the Remote Console
Parent topic: Configuring Oracle Identity Governance
Adding Certificate Stores Location to the WebLogic Servers Start Scripts
Once the Identity and Trust Stores are created for the domain some Java
properties must be added to the WebLogic start scripts. These properties are added to
the file setUserOverridesLate.sh
in
$IGD_ASERVER_HOME/bin
. Any customizations you add to this file
are preserved during domain upgrade operations and are carried over to remote servers
when using the pack and unpack commands.
setUserOverridesLate.sh
in
$IGD_ASERVER_HOME/bin
. Edit the file and add the variable
EXTRA_JAVA_PROPERTIES
to set the
javax.net.ssl.trustStore
and
javax.net.ssl.trustStorePassword
properties with the values used by
your EDG system. For
example:EXTRA_JAVA_PROPERTIES="${EXTRA_JAVA_PROPERTIES}
-Djavax.net.ssl.trustStore=/u01/oracle/config/keystores/idmTruststore.p12
-Djavax.net.ssl.trustStorePassword=password"
export EXTRA_JAVA_PROPERTIES
The order of the extra java properties is relevant. In case that the same property is defined more than once, the later value is used. The custom values must be defined as in the example provided.
Parent topic: Enabling SSL
Update Server's Security Settings Using the Remote Console
- Connecting to the Remote Console Using the Administration Server’s Virtual Hostname as Provider
- Updating the WebLogic Servers Security Settings
Parent topic: Enabling SSL
Connecting to the Remote Console Using the Administration Server’s Virtual Hostname as Provider
Note:
For this Remote Console initial access to the Administration Server, it is required that the machine that runs the Remote Console can resolve and connect to the Admin Server's Listen Address. This can be done by starting the Remote Console directly in the node where the Admin Server runs or creating a tunnel to this address from the node where the remote Console is executed.- Using the following default start script to start the Administration
Server:
- Create a new provider in the WebLogic Remote Console as follows:
Configuring a Per Host Node Manager for an Enterprise Deployment
For specific enterprise deployments, Oracle recommends that you configure a per-host Node Manager, as opposed to the default per-domain Node Manager.
For more information about the advantages of a per host Node Manager, see About the Node Manager Configuration in a Typical Enterprise Deployment
- Creating a Per Host Node Manager Configuration
- Starting the Node Manager on OIGHOST1
- Configuring the Node Manager Credentials
- Enrolling the Domain with NM
- Adding Truststore Configuration to Node Manager
Parent topic: Configuring Oracle Identity Governance
Creating a Per Host Node Manager Configuration
startNodeManager.sh
file.
To create a per-host Node Manager configuration, perform the following tasks, first on OIGHOST1, and then on OIGHOST2:
Starting the Node Manager on OIGHOST1
startNodeManager.sh
script.
Configuring the Node Manager Credentials
Perform the following steps to set the Node Manager credentials using the Remote Console:
- Access the Domain provider in the Remote Console.
- Click Edit Tree.
- Click Environment > Domain> Security.
- Check the Show Advanced Fields field.
- Set Node Manager Username to the same as the Weblogic Administrator, since this username will be used in other tasks mentioned in this guide.
- Change the NM password. Ensure the Node Manager password is set to the same as the Weblogic Administrator since this password will be used in other tasks mentioned in this guide.
- Click Save. The cart on the top right part of the screen will show full with a yellow bag inside.
- Click the Cart Icon on the top right and select Commit Changes.
Enrolling the Domain with NM
Perform the following steps in a new terminal window to enroll the domain with Node manager.
Note:
You will be unable to connect to the Node Manager and use it to start the servers in the domain without performing this step.Adding Truststore Configuration to Node Manager
It is required to add the corresponding truststore configuration for Node
Manager communication with the different WebLogic Server listeners. To do this, edit
Node Manager's start script startNodeManager.sh
located at
$NM_HOME
and add the variable JAVA_OPTIONS to set the
javax.net.ssl.trustStore
and
javax.net.ssl.trustStorePassword
properties with the values used by
your EDG system. For example:
export JAVA_OPTIONS="${JAVA_OPTIONS} -Djavax.net.ssl.trustStore=/u02/oracle/config/keystores/idmTrustStore.pkcs12 -Djavax.net.ssl.trustStorePassword=mypassword"
Tuning JMS Queues
You need to tune the JMS queues to ensure maximum throughput.
Perform the following steps from the WebLogic Remote Console to tune the JMS queues:
Parent topic: Configuring Oracle Identity Governance
Configuring the Domain Directories and Starting the Servers
After you have configured the domain and configured the Node Manager, you can start the Administration Server by using the Node Manager. In an enterprise deployment, the Node Manager is used to start and stop the Administration Server and all the Managed Servers in the domain.
- Create a ServerOverrides File
- Starting the Administration Server Using the Node Manager
After you have configured the domain and configured the Node Manager, you can start the Administration Server by using the Node Manager. In an enterprise deployment, the Node Manager is used to start and stop the Administration Server and all the Managed Servers in the domain. - Validating the Administration Server
Before you proceed with the configuration steps, validate that the Administration Server has started successfully by making sure that you have access to the Oracle Enterprise Manager Fusion Middleware Control; this is installed and configured on the Administration Servers. - Starting and Validating the soa_server1 Managed Server on OIGHOST1
After you have configured Node Manager and created the Managed Server domain directory, you can use WebLogic Administration Console to start the soa_server1 Managed Server on OIGHOST1.
Parent topic: Configuring Oracle Identity Governance
Create a ServerOverrides File
The following prerequisites must be completed before starting the Servers:
-
Disable the Derby Database - Disable the embedded Derby database, which is a file-based database, packaged with Oracle WebLogic Server. The Derby database is used primarily for development environments. Therefore, you must disable it when you are configuring a production-ready enterprise deployment environment. Otherwise, the Derby database process starts automatically when you start the Managed servers.
-
Enable IPv6 Networking if required - If the Managed Server is configured to use IPv6 networking, then you may encounter issues when you start the Managed Server.
-
Adjust the Memory Parameters for your installation - The initial startup parameter in the IAMGovernanceDomain, which defines the memory usage, is insufficient. You must increase the value of this parameter and set the Java initial memory allocation pool (Xms) to 1024m, and the maximum memory allocation pool (Xmx) to 8192m.
$IGD_ASERVER_HOME/bin/setUserOverrides.sh
file with the following
contents:DERBY_FLAG=false
JAVA_OPTIONS="${JAVA_OPTIONS} -Djava.net.preferIPv4Stack=true"
MEM_ARGS="-Xms4096m -Xmx8192m"
Starting the Administration Server Using the Node Manager
After you have configured the domain and configured the Node Manager, you can start the Administration Server by using the Node Manager. In an enterprise deployment, the Node Manager is used to start and stop the Administration Server and all the Managed Servers in the domain.
To start the Administration Server by using the Node Manager:
Validating the Administration Server
Before you proceed with the configuration steps, validate that the Administration Server has started successfully by making sure that you have access to the Oracle Enterprise Manager Fusion Middleware Control; this is installed and configured on the Administration Servers.
To navigate to Fusion Middleware Control use the URL in URLs Used in This Chapter. Log in with the Oracle WebLogic Server administrator credentials.
You should be able to connect to the Admin Server from the Remote Console as before.
Creating the New Authentication Provider
After creating the new domain, if you are using LDAP and want to log in using LDAP, then you must create an authentication provider for the directory inside the OIG domain.
To create a new LDAP-based authentication provider:
- Change directory to
$IGD_ORACLE_HOME/idm/server/ssointg/config
- Edit the
configureWLSAuthnProviders.config
file as shown below. For more details on these parameters, see Variables Used When Creating the Infrastructure Domain:OIM_WLSHOST: IGDADMINVHN.example.com OIM_WLSPORT: 9102 OIM_WLSADMIN: weblogic OIM_IDSTORE_ROLE_SECURITY_ADMIN: WLSAdministrators WLS_IS_SSLENABLED: true WLS_TRUSTSTORE: /u01/oracle/config/keystores/idmTrustStore.p12 WLS_SSL_HOST_VERIFICATION: true IDSTORE_DIRECTORYTYPE: OUD IDSTORE_HOST: idstore.example.com IDSTORE_PORT: 1636 IDSTORE_SSL_ENABLED: true IDSTORE_KEYSTORE_FILE: /u01/oracle/config/keystores/idmTrustStore.p12 IDSTORE_BINDDN: cn=oimLDAP,cn=systemids,dc=example,dc=com IDSTORE_USERSEARCHBASE: cn=Users,dc=example,dc=com IDSTORE_GROUPSEARCHBASE: cn=Groups,dc=example,dc=com
Note:
You can also specify the passwords directly in the file, if required. If you do not specify the passwords, you will be prompted for them at runtime. The parameters are:- IDSTORE_BINDDN_PWD
- IDSTORE_KEYSTORE_PASSWORD
- OIM_WLSADMIN_PWD
- WLS_TRUSTSTORE_PASSWORD
Save the file when done.
- Before you can use the integration scripts, you must grant execute
permissions on the file by running the following
commands:
chmod 750 $IGD_ORACLE_HOME/idm/server/ssointg/bin/OIGOAMIntegration.sh
chmod 750 $IGD_ORACLE_HOME/idm/server/ssointg/bin/OIGOAMIntegration.sh
- Execute the
OIGOAMIntegration.sh
script for creating the authenticator. For example:cd $IGD_ORACLE_HOME/idm/server/ssointg/bin
- Make sure the environment variables are set as per Setting Environment Variables
- Execute the
OIGOAMIntegration.sh
script for configuring the authentication provider. For example:./OIGOAMIntegration.sh -configureWLSAuthnProviders
- Verify that there are no errors.
Parent topic: Configuring Oracle Identity Governance
Adding a Load Balancer Certificate to Oracle Keystore Service
Some OIG Products require that the SSL certificate used by the load balancer be added to the Oracle Keystore Service Trusted Certificates.
Parent topic: Configuring Oracle Identity Governance
Configuring the WebLogic Proxy Plug-In
Before you can validate that requests are routed correctly through the Oracle HTTP
Server instances, you must set the WebLogic Plug-In Enabled
parameter.
It is recommended to set the WebLogic Plug-In Enabled
parameter at
the domain level. Any clusters or servers not using the plugin via the web-tier can
have their WebLogic Plug-In Enabled
parameter value set to
no
on an exception basis as needed.
Parent topic: Configuring Oracle Identity Governance
Modifying the Upload and Stage Directories to an Absolute Path
After you configure the domain and unpack it to the Managed Server domain directories on all the hosts, verify and update the upload and stage directories for Managed Servers in the new clusters. See Modifying the Upload and Stage Directories to an Absolute Path in an Enterprise Deployment.
Parent topic: Configuring Oracle Identity Governance
Starting and Validating the Oracle Identity Governance Managed Servers
Now that you have extended the domain, started the Administration Server, and propagated the domain to the other hosts, you can start the newly configured Oracle Identity Governance Managed Servers.
This process involves three tasks as described in the following sections.
- Starting the Oracle Identity Governance Managed Servers and Bootstrapping the Domain
You are required to boot strap the OIG domain to deploy the OIG artifacts into the domain. - Starting the soa_server1 and oim_server1 Managed Servers
- Validating the Managed Server by Logging in to the Identity Console
- Starting and Validating soa_server2 and oim_server2 Managed Servers
Parent topic: Configuring Oracle Identity Governance
Starting the Oracle Identity Governance Managed Servers and Bootstrapping the Domain
You are required to boot strap the OIG domain to deploy the OIG artifacts into the domain.
IGD_ASERVER_HOME
directory. However, the Node Manager that runs out of the IGD_ASERVER_HOME
communicates using the igdadmin
address. Rather than temporarily reconfiguring the Managed Servers to use this address, the Managed Servers can be started outside of Node Manager for the bootstrap process. Once the process is complete, the Managed Servers will be moved to local storage and Node Manager configured will be able to start and stop them.
Starting the soa_server1 and oim_server1 Managed Servers
To start the soa_server1 and oim_server1 Managed Servers:
- Access Fusion Middleware Control using the URLs in URLs Used in This Chapter. Log in using the Administration Server credentials.
- In the Target Navigation pane, expand the domain to view the Managed Servers in the domain.
- Select only the soa_server1 Managed Server and click Start Up on the Oracle WebLogic Server toolbar.
- When the startup operation is complete, navigate to the Domain home page and verify that the soa_server1 Managed Server is up and running.
- Repeat for oim_server1.
Validating the Managed Server by Logging in to the Identity Console
Validate the Oracle Identity Manager Server instance by accessing the Oracle Identity Manager Consoles in a Web browser. See URLs Used in This Chapter. Log in using the xelsysadm username and password.
Validate the SOA configuration:
- Component URL:
http://oighost1.example.com:7003/soa-infra
- Load Balancer URL:
http://igdinternal.example.com:7777/soa-infra
- Component URL:
https://oighost1.example.com:7004/soa-infra
- Load Balancer URL:
https://igdinternal.example.com/soa-infra
Starting and Validating soa_server2 and oim_server2 Managed Servers
After validating the successful configuration and startup of the soa_server1 and oim_server1 Managed Servers, you can start and validate the soa_server2 and oim_server2 Managed Servers.
To start and validate the soa_server2 Managed Server, use the procedure in Starting and Validating the soa_server1 Managed Server on OIGHOST1 for soa_server2 Managed Server. Use the procedure to start and validate the oim_server2 Managed Servers too.
For the validation URL, enter the following URL into the Identity your web browser and log in using the enterprise deployment administrator user:
http://oighost2.example.com:14000/identity
https://oighost2.example.com:14001/identity
Analyzing the Bootstrap Report
When you start the Oracle Identity Governance
server, the bootstrap report is generated at
$IGD_ASERVER_HOME/servers/oim_server1/logs/BootStrapReportPreStart.html
.
BootStrapReportPreStart.html
is an html file that contains information about the topology that you have deployed, the system level details, the connection details like the URLs to be used, the connectivity check, and the task execution details. You can use this report to check if the system is up, and also to troubleshoot the issues, post-configuration.
Every time you start the Oracle Identity Governance server, the bootstrap report is updated.
Sections in the Bootstrap Report
-
Topology Details
This section contains information about your deployment. It shows whether you have configured a cluster setup, SSL enabled, or upgraded an Oracle Identity Manager environment from an earlier release.
-
System Level Details
This section contains information about the JDK version, Database version, JAVA_HOME, DOMAIN_HOME and OIG_HOME.
-
Connection Details
This section contains information about the connect details like the Administration URL, OIM Front End URL, SOA URL, and RMI URL.
This also shows whether the Administration Server, Database, and SOA server is up or not.
-
Execution Details
This section lists the various tasks and their statuses.
Parent topic: Configuring Oracle Identity Governance
Creating a Separate Domain Directory for Managed Servers
When you initially create the domain for enterprise deployment, the domain directory resides on a shared disk. This default domain directory is used to run the Administration Server. You can now create a copy of the domain on the local storage for each of your managed server hosts. The domain directory on the local (or private) storage is used to run the Managed Servers.
Parent topic: Configuring Oracle Identity Governance
Stopping the Managed Servers
Before you move the managed servers to a separate directory you must first stop any managed servers which are currently running.
Perform the following tasks:
- Login to Fusion Middleware Control as an Administrator using the URL outlined in URLs Used in This Chapter.
- In the Target Navigation pane, expand the domain to view the Managed Servers in the domain.
- Select any running Managed Servers and click Shutdown on the Oracle WebLogic Server toolbar.
- Wait for the shutdown operation to complete.
- Repeat the above for all other managed servers.
Parent topic: Creating a Separate Domain Directory for Managed Servers
Packing the Domain
Placing the IGD_MSERVER_HOME on local storage is recommended to eliminate the potential contention and overhead caused by servers writing logs to shared storage. It is also faster to load classes and jars need from the domain directory, so any temporary or cache data that the Managed Servers use from the domain directory is processed quicker.
As described in Preparing the File System for an Enterprise Deployment, the path to the Administration Server domain home is represented by the IGD_ASERVER_HOME variable, and the path to the Managed Server domain home is represented by the IGD_MSERVER_HOME variable.
To create the Managed Server domain directory:
Parent topic: Creating a Separate Domain Directory for Managed Servers
Unpacking the Domain
To unpack the domain on local storage:
Parent topic: Creating a Separate Domain Directory for Managed Servers
Validating the Fusion Middleware Control Application
After the bootstrap process has been executed and validated, access to the Fusion Middleware Control application should be available.
Parent topic: Configuring Oracle Identity Governance
Configuring the Web Tier for the Domain
Configure the web server instances on the web tier so that the instances route requests for both public and internal URLs to the proper clusters in the extended domain.
For additional steps in preparation for possible scale-out scenarios, see Updating Cross Component Wiring Information.
Parent topic: Configuring Oracle Identity Governance
Validating the Oracle SOA Suite URLs Through the Load Balancer
To validate the configuration of the Oracle HTTP Server virtual hosts and to verify that the external load balancer can route requests through the Oracle HTTP Server instances to the application tier:
Parent topic: Configuring the Web Tier for the Domain
Integrating Oracle Identity Governance with Oracle SOA Suite
Oralce Identity Governance invokes Oracle SOA Suite using a number of URLs, which out of the box are wired to individual managed servers. In a High Availibility environment you need to update these URLs to use a load balancer.
Parent topic: Configuring Oracle Identity Governance
Managing the Notification Service
An event is an operation that occurs in Oracle Identity Manager, such as user creation, request initiation, or any custom event created by the user. These events are generated as part of the business operations or through the generation of errors. Event definition is the metadata that describes the event.
To define the metadata for events, you must identify all event types supported by a functional component. For example, as a part of the scheduler component, metadata is defined for a scheduled job execution failure and shutting down of the scheduler. Every time a job fails or the scheduler shuts down, the associated events get triggered, and the notifications associated with the event get sent.
The data available in the event is used to create the content of the notification. The different parameters defined for an event help the system to select the appropriate notification template. The various parameters defined for an event help the system decide which event variables should be made available at template design time.
A notification template is used to send notifications. These templates contain variables that refer to available data to provide more context to the notifications. The notification is sent through a notification provider. Examples of such channels are e-mail, Instant Messaging (IM), Short Message Service (SMS), and voice. To use these notification providers, Oracle Identity Manager uses Oracle User Messaging Service (UMS).
At the back end, the notification engine is responsible for generating the notification and utilizing the notification provider to send the notification.
Using SMTP for Notification
Using SMTP for notification involves configuring the SMTP email notification provider properties and adding the CSF key.
Configuring the SMTP Email Notification Provider Properties
To configure SMTP Email Notification Provider properties by using the EmailNotificationProviderMBean MBean :
Parent topic: Managing the Notification Service
Configuring the Messaging Drivers
Each messaging driver needs to be configured. You have to configure this service if you want to enable OAM's forgotten password functionality.
Configuring the Email Driver
To configure the driver to send and emails then you need to perform the following steps:
Parent topic: Configuring the Messaging Drivers
Forcing Oracle Identity Governance to use Correct Multicast Address
Oracle Identity Governance uses multicast for certain functions. By default, the managed servers communicate using the multi cast address assigned to the primary host name. If you wish multicast to use a different network, for example, of the internal network, you must complete additional steps.
Parent topic: Configuring Oracle Identity Governance
Integrating Oracle Identity Governance with LDAP
Integrate Oracle Identity Governance with LDAP.
This section includes the following topics:
- Variables Used in OIG Integration with LDAP
- Installing the Connector Bundle
- Configuring the Oracle Connector for LDAP
- Restarting the Domains
Parent topic: Configuring Oracle Identity Governance
Variables Used in OIG Integration with LDAP
As you perform the tasks in this section, you will be referencing the variables listed below.
The following table explains the configuration file property values required in this section.
Table 15-13 OIG Integration with LDAP Variables Used in This Chapter
Variable | Sample Value | Description |
---|---|---|
IDSTORE_DIRECTORYTYPE |
|
The type of directory you are using. Valid value is OUD. |
IDSTORE_HOST |
|
The host and port of your Identity Store directory. When preparing the Identity Store these should point to one of the LDAP instances. When configuring components such as OAM or OIG they should point to the load balancer entry point. |
IDSTORE_PORT |
|
The port of your Identity Store directory. When preparing the Identity Store these should point to one of the LDAP instances. When configuring components such as OAM or OIG they should point to the load balancer entry point. |
IDSTORE_BINDDN |
|
An administrative user in the Identity Store Directory. |
IDSTORE_BINDDN_PASSWD |
|
The the password of IDSTORE_BINDDN. You will be prompted for the value if not supplied. |
IDSTORE_SSL_ENABLED |
|
Whether SSL to the identity store is enabled.
Valid values: |
IDSTORE_KEYSTORE_FILE |
|
The location of the LDAP Truststore for LDAP connections. |
IDSTORE_KEYSTORE_PASSWORD |
|
The password of the IDSTORE_KEYSTORE_FILE. |
IDSTORE_OIMADMINUSERDN |
|
The location of a container in the directory where system-operations users are stored. There are only a few system-operations users and are kept separate from enterprise users stored in the main user container. For example, the Oracle Identity Governance reconciliation user which is also used for the bind DN user in Oracle Virtual Directory adapters. |
IDSTORE_SEARCHBASE |
|
The location in the directory where Users and Groups are stored. |
IDSTORE_USERSEARCHBASE |
|
The location in the directory where Users are Stored. |
IDSTORE_GROUPSEARCHBASE |
|
The location in the directory where Groups are Stored. |
IDSTORE_USERSEARCHBASE_DESCRIPTION |
|
Description for the directory user search base. |
IDSTORE_GROUPSEARCHBASE_DESCRIPTION |
|
Description for the directory group search base. |
IIDSTORE_EMAIL_DOMAIN |
|
The domain used for e-mail For example,
|
OIM_HOST |
|
Host name for oim_server1 on OIGHOST1. |
OIM_PORT |
|
Port number for oim_server1 on OIGHOST1. |
WLS_OIM_SYSADMIN_USER |
|
The system admin user to be used to connect to OIG while configuring SSO. This user needs to have system admin role. |
WLS_OIM_SYSADMIN_USER_PWD |
|
Enter the password for OIG system administrator user. |
OIM_WLSHOST |
|
Virtual Host name for Admin Server on OIGHOST1. |
OIM_WLSPORT |
|
Corresponding port number for Admin Server on OIGHOST1. |
WLS_IS_SSLENABLED |
|
Whether SSL to the identity store is enabled.
Valid values: |
WLS_TRUSTSTORE |
|
The location of the WLS truststore. |
WLS_TRUSTSTORE_PASSWORD |
|
Password for the WLS truststore. |
OIM_WLSADMIN |
|
The weblogic administrator user in OIM domain. |
OIM_SERVER_NAME |
|
The OIG server name. |
CONNECTOR_MEDIA_PATH |
OID/OUD
= AD =
|
The location of the Connector bundle downloaded and unzipped. Oracle Identity Governance would use this location to pick the Connector bundle to be installed. |
IS_LDAP_SECURE |
|
It indicates the usage of SSL for LDAP Communication. Use yes or no for ActiveDirectory. |
LOG_FILE |
|
Location of log file to be created. |
SSO_TARGET_APPINSTANCE_NAME |
|
The Target application instance name used for provisioning account to target LDAP. |
Table 15-14 Active Directory Variables
Variable | Sample Value | Description |
---|---|---|
AD_CONNECTORSERVER_HOST |
|
the host name or IP address of the computer hosting the connector server. |
AD_CONNECTORSERVER_KEY |
|
Enter the key for the connector server. |
AD_CONNECTORSERVER_PORT |
|
Enter the number of the port at which the connector server is listening. |
AD_CONNECTORSERVER_TIMEOUT |
|
Enter an integer value that specifies the number of milliseconds after which the connection between the connector server and the Oracle Identity Governance times out. A value of 0 means that the connection never times out. |
AD_CONNECTORSERVER_USESSL |
|
Enter true to specify that you will configure SSL between Oracle Identity Governance or Oracle Unified Directory and the Connector Server. Otherwise, enter false. For Active Directory, the value should be yes or no. The default value is false Note: It is recommended that you configure SSL to secure communication with the connector server. |
AD_DOMAIN_NAME |
|
Enter the domain name configured in Microsoft Active Directory. |
Parent topic: Integrating Oracle Identity Governance with LDAP
Installing the Connector Bundle
-
Download the Connector bundle from the artifactory: Download Connector Bundle
-
For OID or OUD, download the Connector bundle corresponding to Oracle Internet Directory.
Note:
For all directory types, the required Connector version for OIG-OAM integration is 12.2.1.3.0. -
-
Unzip the Connector bundle to the desired connector path under
$ORACLE_HOME/idm/server/ConnectorDefaultDirectory
.For example:
$IGD_ORACLE_HOME/idm/server/ConnectorDefaultDirectory
Parent topic: Integrating Oracle Identity Governance with LDAP
Configuring the Oracle Connector for LDAP
The Oracle Connector for LDAP allows you to store users and passwords in a certified LDAP directory. Configure the connector before using it. Perform the following steps to configure the connector:
-
Change directory to
$IGD_ORACLE_HOME/idm/server/ssointg/config
. -
Edit the file
configureLDAPConnector.config
as shown below. For an explanation of the parameters, see Variables Used in OIG Integration with LDAP:##-----------------------------------------------------------## ## [configureLDAPConnector] IDSTORE_DIRECTORYTYPE=OUD IDSTORE_HOST=idstore.example.com IDSTORE_PORT=1636 IDSTORE_BINDDN=cn=oudadmin IDSTORE_SSL_ENABLED: true IDSTORE_KEYSTORE_FILE: /u02/oracle/config/keystores/idmTrustStore.p12 IDSTORE_OIMADMINUSERDN=cn=oimLDAP,cn=systemids,dc=example,dc=com IDSTORE_SEARCHBASE=dc=example,dc=com IDSTORE_USERSEARCHBASE=cn=Users,dc=example,dc=com IDSTORE_GROUPSEARCHBASE=cn=Groups,dc=example,dc=com IDSTORE_USERSEARCHBASE_DESCRIPTION=Default user container IDSTORE_GROUPSEARCHBASE_DESCRIPTION=Default group container IDSTORE_EMAIL_DOMAIN=example.com OIM_HOST=oighost1.example.com OIM_PORT=14000 WLS_OIM_SYSADMIN_USER=xelsysadm WLS_IS_SSLENABLED: true WLS_TRUSTSTORE: /u02/oracle/config/keystores/idmTrustStore.p12 OIM_WLSHOST=igdadminvhn.example.com OIM_WLSPORT=9102 OIM_WLSADMIN=weblogic OIM_SERVER_NAME=oim_server1 CONNECTOR_MEDIA_PATH=IGD_ORACLE_HOME/idm/server/ConnectorDefaultDirectory/OID-12.2.1.3.0 IS_LDAP_SECURE: true LOG_FILE: /home/oracle/workdir/logs/configure_ldap.log SSO_TARGET_APPINSTANCE_NAME: SSOTarget
Note:
You can also specify the passwords directly in the file, if required. If you do not specify the passwords, you will be prompted for them at runtime. The parameters are:- IDSTORE_BINDDN_PWD
- IDSTORE_KEYSTORE_PASSWORD
- IDSTORE_OIMADMINUSER_PWD
- WLS_OIM_SYSADMIN_USER_PWD
- OIM_WLSADMIN_PWD
- WLS_TRUSTSTORE_PASSWORD
Save the file when done.
- Make sure the environment variables are set as per Setting Environment Variables.
- Execute the
OIGOAMIntegration.sh
script for configuring the connector. For example:cd $IGD_ORACLE_HOME/idm/server/ssointg/bin
./OIGOAMIntegration.sh -configureLDAPConnector
Parent topic: Integrating Oracle Identity Governance with LDAP
Restarting the Domains
Parent topic: Integrating Oracle Identity Governance with LDAP
Integrating Oracle Identity Governance and Oracle Access Manager
You have to complete several tasks to integrate Oracle Identity Governance and Oracle Access Manager. These tasks include creating the WLS authentication providers, deleting OIMSignatureAuthenticator and recreating OUDAuthenticator, adding the administration role to the new administration group, and so on.
- Variables Used in OIG and OAM Integration
- Configuring SSO Integration in the IAMGovernanceDomain
- Restarting the Domains
- Enable OAM Notifications
Parent topic: Configuring Oracle Identity Governance
Variables Used in OIG and OAM Integration
As you perform the tasks in this section, you will be referencing the variables listed below.
The following tables explains the configuration file property values required in this section.
Table 15-15 OIG and OAM Integration Variables Used in This Section
Variable | Sample Value | Description |
---|---|---|
OAM_HOST |
|
The listen address of the front end load balancer for the OAM cluster. |
OAM_PORT |
|
The port of the front end load balancer for the OAM cluster. |
OAM_SSL_FLAG |
|
Select |
ACCESS_SERVER_HOST |
|
Should be set to the value as OAM_HOST. |
ACCESS_SERVER_PORT |
|
It is the port number for OAM PROXY PORT. |
WEBGATE_PWD |
|
Password for the WebGate. |
COOKIE_DOMAIN |
|
The value assigned for the domain in Creating a Configuration File. |
OAM_TRANSFER_MODE |
|
The value assigned for the transfer mode in Creating a Configuration File. |
OIM_LOGINATTRIBUTE |
|
The LDAP field containing the users login attribute, usually uid or cn. |
SSO_INTEGRATION_MODE |
|
The integration mode with OAM. With Challenge Question Response (CQR) mode, OIG will handle the password policy and password operations. With One Time Password (OTP) mode, any password operations will be handled by OAM itself and there will be no password change or reset in OIG. |
SSO_ENABLED_FLAG |
|
Set it to true to enable OIG-OAM integration is enabled. |
OAM_WLS_ADMIN_HOST |
|
The listen address of the Administration Server in the domain IAMAccessDomain. |
OAM_WLS_ADMIN_PORT |
|
The listen port of the OAM_WLS_ADMIN_HOST. For example: 9002 for End to End SSL, or 7001 for SSL Terminated. |
OAM_WLSHOST |
|
The virtual hostname for the Admin Server on OAMHOST1. |
OAM_WLSPORT |
|
The listen port for the Admin Server on OAMHOST1. |
OAM_WLS_ADMIN_USER |
|
The Administration User of the IAD Administration Server. |
OAM_WLS_ADMIN_PASSWD |
|
Password for OAM_WLS_ADMIN_USER. |
OAM_WLS_IS_SSLENABLED |
|
Whether the OAM domain is SSL enabled. |
OAM_IDSTORE_NAME |
|
The value assigned for the idstore in Creating a Configuration File . |
OIM_WLSHOST |
|
Virtual Host name for Admin Server on OIGHOST1. |
OIM_WLSPORT |
|
Corresponding port number for OIM_WLSHOST. If you have administration ports enabled in your OIG domain then set this to the administration port of the admin server 9102, otherwise set it to the Admin Server port 7101 or 7102 (SSL). |
OIM_WLS_IS_SSLENABLED |
|
Specifies whether the OIM domain is SSL enabled. |
OIM_WLSADMIN |
|
The weblogic administrator user in OIM domain. |
OIM_WLSADMIN_PWD |
|
The password for the OIM_WLSADMIN user. |
OIM_SERVER_NAME |
|
The server name of the oim server. |
IDSTORE_OAMADMINUSER |
|
The user you use to access your Oracle Access Management Console. |
IDSTORE_OAMADMINUSER_PWD |
|
The name of the oim_server1. |
IDSTORE_OAMSOFTWAREUSER |
|
The OAM software user account in LDAP. |
IDSTORE_PWD_OAMSOFTWAREUSER |
|
The password of the account
( |
IDSTORE_HOST |
|
The host and port of your Identity Store directory. When preparing the Identity Store these should point to one of the LDAP instances. When configuring components such as OAM or OIG they should point to the load balancer entry point. |
IDSTORE_PORT |
|
The port of your Identity Store directory. When preparing the Identity Store these should point to one of the LDAP instances. When configuring components such as OAM or OIG they should point to the load balancer entry point. |
IDSTORE_DIRECTORYTYPE |
|
The type of directory you are using. Valid value is OUD. |
IDSTORE_BINDDN |
|
An administrative user in the Identity Store Directory. |
IDSTORE_BINDDN_PASSWD |
|
The the password of IDSTORE_BINDDN. You will be prompted for the value if not supplied. |
IDSTORE_USERSEARCHBASE |
|
The location in the directory where Users are Stored. |
IDSTORE_GROUPSEARCHBASE |
|
The location in the directory where Groups are Stored. |
IDSTORE_SYSTEMIDBASE |
|
The location of a container in the directory where system users can be placed when you do not want them in the main user container. |
IS_LDAP_SECURE |
|
Whether the connection to LDAP uses SSL or not. |
WLS_IS_SSLENABLED |
|
Whether SSL to the identity store is enabled.
Valid values: |
WLS_TRUSTSTORE |
|
The location of the WLS truststore. |
WLS_TRUSTSTORE_PASSWORD |
|
Password for the WLS truststore. |
WLS_SSL_HOST_VERIFICATION |
|
Whether the WLS SSL host verfication is enabled
or not. Valid values: |
OIM_TRUST_LOC |
|
The location of the OIG truststore. |
OIM_TRUST_PWD |
|
Password for the OIG truststore. |
OIM_TRUST_TYPE |
|
JKS or PKCS12. |
OIM_WLS_SSL_IGNORE_HOST_VERIFICATION |
|
Specify whether to ignore SSL Host name verification, this is often the case where wildcard certificates are used. |
Configuring SSO Integration in the IAMGovernanceDomain
Having deployed the connector the next step in the process is the configuration of SSO in the domain. In order to do this you need to perform the following steps:
- Change directory to
$IGD_ORACLE_HOME/idm/server/ssointg/config
: - Edit the file
configureSSOIntegration.config
updating the properties in the section configureSSOIntegration as shown below. For an explanation of the parameters, see Variables Used in OIG and OAM Integration:##-----------------------------------------------------------## ## [configureSSOIntegration] OAM_HOST: login.example.com OAM_PORT: 443 OAM_SSL_FLAG: true ACCESS_SERVER_HOST: oamhost1.example.com ACCESS_SERVER_PORT: 5575 COOKIE_DOMAIN: example.com OAM_TRANSFER_MODE: open OIM_LOGINATTRIBUTE: uid SSO_INTEGRATION_MODE: CQR SSO_ENABLED_FLAG: true OAM_WLS_ADMIN_HOST: igdadminvhn.example.com OAM_WLS_ADMIN_PORT: 9002 OAM_WLSPORT: 7002 OAM_WLS_ADMIN_USER: weblogic OAM_WLS_IS_SSLENABLED: true OAM_IDSTORE_NAME: OAMIDSTORE OIM_WLSHOST: igdadminvhn.example.com OIM_WLS_IS_SSLENABLED: true OIM_WLSPORT: 7102 OIM_WLSADMIN: weblogic OIM_SERVER_NAME: oim_server1 IDSTORE_OAMADMINUSER: oamadmin OIM_TRUST_LOC:/u01/oracle/config/keystores/idmTrustStore.p12 OIM_TRUST_TYPE:PKCS12 OIM_WLS_SSL_IGNORE_HOST_VERIFICATION:true
Note:
You can also specify the passwords directly in the file, if required. If you do not specify the passwords, you will be prompted for them at runtime. The parameters are:- WEBGATE_PWD
- OAM_WLS_ADMIN_PASSWD
- OIM_WLSADMIN_PWD
- IDSTORE_OAMADMINUSER_PWD
- OIM_TRUST_PWD
Save the file when done.
Note:
If required you can also specify the passwords directly in the file. If you do not specify the passwords, you will be prompted for them at runtime. - Make sure the environment variables are set as per Setting Environment Variables.
- Execute the
OIGOAMIntegration.sh
script for configuring the connector. For example:cd $IGD_ORACLE_HOME/idm/server/ssointg/bin
./OIGOAMIntegration.sh -configureSSOIntegration
Enable OAM Notifications
Having deployed the connector the next step in the process is to tell OIG how to interact with OAM for terminating a user session after a user has been expired or terminated. In order to do this you need to perform the following steps:
- Navigate to the following
directory:
$IGD_ORACLE_HOME/idm/server/ssointg/config
- Edit the file
enableOAMSessionDeletion.config
updating the properties in the section enableOAMNotifications as shown below:##-----------------------------------------------------------## ## [enableOAMNotifications] OIM_WLSHOST: oighost1.example.com OIM_WLSPORT: 7002 WLS_IS_SSLENABLED: true WLS_TRUSTSTORE: /u01/oracle/config/keystores/idmTrustStore.p12 WLS_SSL_HOST_VERIFICATION: true OIM_WLSADMIN: weblogic IDSTORE_DIRECTORYTYPE: OUD IDSTORE_HOST:idstore.example.com IDSTORE_PORT: 1636 IDSTORE_KEYSTORE_FILE: /u01/oracle/config/keystores/idmTrustStore.p12 IDSTORE_KEYSTORE_PASSWORD: password IDSTORE_SSL_ENABLED: true IS_LDAP_SECURE: true IDSTORE_BINDDN: cn=oudadmin IDSTORE_GROUPSEARCHBASE: cn=Groups,dc=example,dc=com IDSTORE_SYSTEMIDBASE: cn=systemids,dc=example,dc=com IDSTORE_OAMADMINUSER: oamadmin IDSTORE_OAMSOFTWAREUSER: oamLDAP IDSTORE_USERSEARCHBASE: cn=Users,dc=example,dc=com OIM_SERVER_NAME: oim_server1
Note:
You can also specify the passwords directly in the file, if required. If you do not specify the passwords, you will be prompted for them at runtime. The parameters are:- WLS_TRUSTSTORE_PASSWORD
- OIM_WLSADMIN_PWD
- IDSTORE_KEYSTORE_PASSWORD
- IDSTORE_BINDDN_PWD
- IDSTORE_OIMADMINUSER_PWD
- IDSTORE_OAMSOFTWAREUSER_PWD
Save the file when done.
- Make sure the environment variables are set as per Setting Environment Variables.
Execute the
OIGOAMIntegration
script for enabling notifications. For example:cd $IGD_ORACLE_HOME/idm/server/ssointg/bin
./OIGOAMIntegration.sh -enableOAMSessionDeletion
Propagating the Domain and Starting the Servers on OIGHOST2
After you start and validate the Administration Server on OIGHOST1, you can then you must propagate the domain and start the servers on OIGHOST2.
- Unpacking the Domain Configuration on OIGHOST2
- Starting the Node Manager in the Managed Server Domain Directory OIGHOST2
- Starting and Validating the soa_server2 and oim_server2 Managed Servers on OIGHOST2
Parent topic: Configuring Oracle Identity Governance
Unpacking the Domain Configuration on OIGHOST2
Now that you have the Administration Server running on OIGHOST1, you can configure the domain on OIGHOST2.
Starting the Node Manager in the Managed Server Domain Directory OIGHOST2
After you manually set up the Node Manager to use a per host Node Manager configuration, you can start the Node Manager by using the following commands onOIGHOST2:
Starting and Validating the soa_server2 and oim_server2 Managed Servers on OIGHOST2
- Login to the WebLogic Remote Console.
- Click Monitoring Tree and expand the Environment node, then select Servers.
- From the Servers page, select soa_server2 from the Servers column of the table and click Start.
- Select soa_server2 from the Servers column of the table and click Start.
Configuring OIG Workflow Notifications to be Sent by Email
OIG uses the human workflow, which is integrated with the SOA workflow. The SOA server configures email to receive the notifications that are delivered to the user mailbox. The user can accept or reject the notifications.
Both incoming and outgoing email addresses and mailboxes dedicated to the portal workflow are required for the full functionality. See Configuring Human Workflow Notification Properties in Administering Oracle SOA Suite and Oracle Business Process Management Suite.
To configure the OIG workflow notifications:
- Log in to the Fusion Middleware Control by using the administrators account. For example,
weblogic_iam
. - Expand the Target Navigation panel and navigate to SOA > soa-infra (soa_server1) service.
- From the SOA infrastructure drop-down, select SOA Administration > Workflow Properties.
- Set the Notification mode to Email. Provide the correct e-mail address for the notification service.
- Click Apply and confirm when prompted.
- Verify the changes.
- Expand Target Navigation, select User Messaging Service, and then usermessagingdriver-email (soa_servern). Each SOA Managed Server that is running will have a driver. Only one of these entries should be selected.
- From the User Messaging Email Driver drop-down list, select Email Driver Properties.
- Click Create if the email driver does not exist already.
- Click Test and verify the changes.
- Click OK to save the email driver configuration.
- Restart the SOA cluster. No configuration or restart is required for OIG.
Parent topic: Configuring Oracle Identity Governance
Adding the wsm-pm Role to the Administrators Group
After you configure a new LDAP-based Authorization Provider and restart the Administration Server, add the enterprise deployment administration LDAP group (OIMAdministrators) as a member to the policy.Updater
role in the wsm-pm
application stripe.
Parent topic: Configuring Oracle Identity Governance
Adding the Oracle Access Manager Load Balancer Certificate to the Oracle Keystore Service
The Oracle Identity Governance to Business Intelligence Reports link inside of the Self Service application requires that the SSL certificate used by the load balancer be added to the Oracle Keystore Service Trusted Certificates.
Parent topic: Configuring Oracle Identity Governance
Restarting the IAMGovernanceDomain
Restart the domain for the configuration steps to take effect.
- Shut down the Managed Servers oim_server1 and oim_server2.
- Shut down the Managed Servers soa_server1 and soa_server2.
- Shut down the Administration Server.
- Restart the Administration Server.
- Start the Managed Servers soa_server1 and soa_server2.
- Start the Managed Servers oim_server1 and oim_server2.
Parent topic: Configuring Oracle Identity Governance
Setting Challenge Questions
If you have integrated OAM and OIG, then after the environment is ready, you need to set up the challenge questions for your system users.
To set up the challenge questions, log in to Identity Self Service using the URL outlined in URLs Used in This Chapter.
Log in with your user name and when prompted, add the challenge questions. You should set up these questions for the following users:
xelsysadm
weblogic_iam
oamadmin
Parent topic: Configuring Oracle Identity Governance
Replacing Connect Strings with the Appropriate TNS Alias
Oracle recommends using TNS Alias in the connection strings used by FMW components instead of repeating long JDBC strings across multiple connections pools.
For more information about how to use TNS alias in your Datasources, see Using TNS Alias in Connect Strings in the Common Configuration and Management Tasks for an Enterprise Deployment chapter.
Parent topic: Configuring Oracle Identity Governance
Integrating Oracle Identity Manager with Oracle Business Intelligence Publisher
Oracle Identity Manager comes with a number of prebuilt reports that can be used to provide information about Oracle Identity and Access Management.
Oracle Identity Manager reports are classified based on the functional areas such as Access Policy Reports, Request and Approval Reports, Password Reports, and so on. It is no longer named Operational and Historical. These reports are not generated through Oracle Identity Manager but by the Oracle Business Intelligence Publisher (BIP). Oracle Identity Manager reports provide a restriction for Oracle BI Publisher.
The setup of a highly available enterprise deployment of Oracle BI Publisher is beyond the scope of this document. For more information, see Understanding the Business Intelligence Enterprise Deployment Topology in the Enterprise Deployment Guide for Business Intelligence.
Note:
During BI configuration for Oracle Identity Manager, you must configure only Business Intelligence Publisher. If you select other components during BI Publisher configuration, such as Business Intelligence Enterprise Edition and Essbase, the integration with Oracle Identity Manager may not work. See Configuring Reports in Developing and Customizing Applications for Oracle Identity Manager- Creating a User to Run BI Reports
- Configuring Oracle Identity Manager to Use BI Publisher
- Assigning the BIServiceAdministrator Role to idm_report
- Storing the BI Credentials in Oracle Identity Governance
- Creating OIM and BPEL Data Sources in BIP
- Deploying Oracle Identity Governance Reports to BI
- Enable Certification Reports
- Validating the Reports
Parent topic: Configuring Oracle Identity Governance
Creating a User to Run BI Reports
You may ignore this section if you already have a user to run reports in your Business Intelligence domain.
If you need to create a user in your BI Publisher domain to run reports, use the
following LDIF
command to create a user in the LDAP
directory.
Configuring Oracle Identity Manager to Use BI Publisher
You can set up Oracle BI Publisher to generate Oracle Identity Manager reports.
To configure Oracle Identity Manager to use the BI Publisher:
Assigning the BIServiceAdministrator Role to idm_report
If you are using LDAP as your identity store in the Business Intelligence (BI) domain, you must have created an LDAP authenticator in the BI domain. You can view the user and group names stored within LDAP.
The Oracle Identity Manager (OIM) system administration account (for example,
idm_report
) needs to be assigned the
BIServiceAdministrator
role, to generate reports.
To assign this role:
Storing the BI Credentials in Oracle Identity Governance
Creating OIM and BPEL Data Sources in BIP
Create OIM Datasource
Oracle BIP must be connected to the OIM and SOA database schemas to run a report.
In order to do this you need to create BIP datasources using the following procedure:
-
Login to the BI Publisher Home page using the URL
https://bi.example.com/xmlpserver
-
Click the Administration link on the top of the BI Publisher Home page. The BI Publisher Administration page is displayed.
-
Under Data Sources, click JDBC Connection link. The Data Sources page is displayed.
-
In the JDBC tab, click Add Data Source to create a JDBC connection to your database. The Add Data Source page is displayed.
-
Enter values in the following fields:
Table 15-17 OIM Add Data Source Attributes
Attributes Value Data Source Name
Specify the Oracle Identity Governance JDBC connection name. For example, OIM JDBC.
Driver Type
Select the driver type appropriate to the database version you are using
Database Driver Class
Specify a driver class to suit your database, such as
oracle.jdbc.OracleDriver
Connection String
Specify the database connection details in the format
jdbc:oracle:thin:@HOST_NAME:PORT_NUMBER/SID
.For example,
jdbc:oracle:thin:@igddbscan:1521/oim.example.com
User name
Specify the Oracle Identity Governance database user name for example IGD_OIM
Password
Specify the Oracle Identity Governance database user password.
-
Click Test Connection to verify the connection.
-
Click Apply to establish the connection.
-
If the connection to the database is established, a confirmation message is displayed indicating the success.
-
Click Apply.
In the JDBC page, you can see the newly defined Oracle Identity Governance JDBC connection in the list of JDBC data sources.
Create BPEL Datasource
-
Login to the BI Publisher Home page using the URL
https://bi.example.com/xmlpserver
. -
Click the Administration link on the BI Publisher home page. The BI Publisher Administration page is displayed.
-
Under Data Sources, click JDBC Connection link. The Data Sources page is displayed.
-
In the JDBC tab, click Add Data Source to create a JDBC connection to your database. The Add Data Source page is displayed.
-
Enter values in the following fields:
Table 15-18 JDBC Add Data Source Attributes
Attributes Value Data Source Name
Specify the Oracle Identity Governance JDBC connection name. For example, BPEL JDBC.
Driver Type
Select the Driver for the database version you are using.
Database Driver Class
Specify a driver class to suit your database, such as
oracle.jdbc.OracleDriver
Connection String
Specify the database connection details in the format
jdbc:oracle:thin:@HOST_NAME:PORT_NUMBER/SID
.For example,
jdbc:oracle:thin:@igddbscan:1521/oim.example.com
User name
Specify the Oracle Identity Governance database user name for example IGD_SOAINFRA.
Password
Specify the Oracle Identity Governance database user password.
-
Click Test Connection to verify the connection.
-
Click Apply to establish the connection.
-
If the connection to the database is established, a confirmation message is displayed indicating the success.
-
Click Apply.
In the JDBC page, you can see the newly defined Oracle Identity Governance JDBC connection in the list of JDBC data sources.
Deploying Oracle Identity Governance Reports to BI
Enable Certification Reports
- Log in to the Oracle Identity Self Service using the URL outlined in URLs Used in This Chapter.
- Click the Compliance tab.
- Click the Identity Certification box.
- Select Certification Configuration. The Certification Configuration page is displayed.
- Select the Enable Certification Reports.
- Click Save.
Note:
By default, the Compliance tab is not shown. If you want to enable compliance functionality, you must fist set theOIGIsIdentityAuditorEnabled
property to
true in the Sysadmin Console (located in the
Configuration Properties section).
Validating the Reports
We need to create the sample data source to generate reports against the sample data source.
Creating the Sample Reports
To view an example report data without running a report against the production JDBC Data Source, generate a sample report against the sample data source. Create the sample data source before you can generate the sample reports.
Generating Reports Against the Sample Data Source
- Login to Oracle BI Publisher using the url :
https://bi.example.com/xmlpserver
. - Click Shared Folders.
- In the Templates screen, ensure Create Domain Using Product Templates is selected and then select the Oracle Identity Manager template.
- Select Sample Reports.
- Click View for the sample report you want to generate.
- Select an output format for the sample report and click View.
The sample report is generated.
Parent topic: Validating the Reports
Generating Reports Against the Oracle Identity Manager JDBC Data Source
Parent topic: Validating the Reports
Generating Reports Against the BPEL-Based JDBC Data Source
Reports With Secondary Data Source
The following four reports have a secondary data source, which connects to the BPEL database to retrieve the BPEL data:
-
Task Assignment History
-
Request Details
-
Request Summary
-
Approval Activity
These reports have a secondary data source (BPEL-based JDBC data source) called BPEL JDBC. To generate reports against the BPEL-based JDBC data source:
Parent topic: Validating the Reports
Adding the Business Intelligence Load Balancer Certificate to Oracle Keystore Trust Service
The Oracle Identity Governance to Business Intelligence Reports link inside of the Self Service application requires that the SSL certificate used by the load balancer be added to the Oracle Keystore Service Trusted Certificates.
To add the certificate:
Verification of Manual Failover of the Administration Server
After you configure the domain, you must test failover is working correctly.
Perform the steps described in Verifying Manual Failover of the Administration Server.
Parent topic: Configuring Oracle Identity Governance
Backing Up the Configuration
It is an Oracle best practices recommendation to create a backup after you successfully extended a domain or at another logical point. Create a backup after you verify that the installation so far is successful. This is a quick backup for the express purpose of immediate restoration in case of problems in later steps.
The backup destination is the local disk. You can discard this backup when the enterprise deployment setup is complete. After the enterprise deployment setup is complete, you can initiate the regular deployment-specific Backup and Recovery process.
For information about backing up your configuration, see Performing Backups and Recoveries for an Enterprise Deployment.
Parent topic: Configuring Oracle Identity Governance