F OPSS System and Configuration Properties
It includes the following sections:
All OPSS system and configuration changes require server restart to take effect.
See also:
OPSS System Properties
A system property that has been introduced or modified is not in effect until the server is restarted. To set a system property, edit setDomainEnv.sh
and add the property to the EXTRA_JAVA_PROPERTIES
variable.
Table F-1 lists the system properties available with OPSS.
Table F-1 OPSS System Properties
System Property Name | Specifies |
---|---|
|
The location of the common components home. Required for both Java EE and SE applications. No default value. |
|
The permission failure when Setting Optional. |
|
The location of the Java security policy file. |
|
The number of permission collection map entries kept in memory. Each entry corresponds with a set of permissions. It requires that you set Optional. Valid values: a positive integer. Default value: 512. |
|
The delegation of calls to the Optional. Valid values: No default value. |
|
The server logging output. Default value: Optional. |
|
The server logging output. Default value: Optional. |
|
The caching of a subject's protection domain. Optional. Valid values: Default value: |
|
The evaluation of a subject's protection domain when a check permission is triggered. Optional. Valid values: Default value: |
|
The number of combiner map entries kept in memory. Each entry corresponds with a set of principals. It requires that you set Optional. Valid values: a positive integer. Default value: |
|
The migration of policies and credentials for applications deployed on a WebLogic Server. Valid only for WebLogic Server. Set to Optional. Valid values: Default value: |
|
The hybrid mode. When it is enabled, the policy provider reads from the Optional. Valid values: Default value: |
|
The use of the map type. The map type is used to hold some structures in a special cache so that they are not garbage-collected by the Java Virtual Machine. If If See related Optional. Valid values: Default value: |
|
The number of milliseconds after which group membership changes are in effect. This value must be kept synchronized with the value Optional. Valid values: any positive integer. Default value: |
|
The number of subject map entries kept in memory. Each entry corresponds with TTL information about a subject. For this setting to take effect, the Optional. Valid values: a positive integer. Default value: 128. |
|
The path to the domain configuration Required. No default value. |
|
The path to the directory of a codesource URL. Optional. No default value. For an example of use, see <url>. |
|
The extension of codesource URL. Optional. No default value. For an example of use, see <url>. |
|
The name of an application role that contains a specified substring. If the substring to match is unspecified, then it logs all application role names. Optional. No default value. |
|
The grant that was granted or denied. If the value is unspecified, then it logs all grants (regardless whether they were granted or denied). Optional. No default value. |
|
The name of the permission class that matches exactly a specified name. If the name to match is unspecified, then it logs all permission class names. Optional. No default value. |
|
The name of a permission target that contains a specified substring. If the substring to match is unspecified, then it logs all permission targets. Optional. No default value. |
|
The name of the principal (enterprise user or enterprise role) that matches exactly a specified name. If the name to match is unspecified, then it logs all principal names. Optional. No default value. |
|
The location of the audit log files for SE applications if it is not set in the Optional. No default value. Valid values: any writeable directory. |
|
The location of the log file when running offline WLST. Optional. No default value. Valid values: <filename>, stdout, strerr, disable. |
|
The level of the notification. Optional. No default value. Valid values: OFF, SEVERE, WARNING, INFO, CONFIG, FINE, FINER, FINEST, ALL, debug, info, warn, error, fatal. |
|
The number of resources kept in the resource cache for one application policy. Valid in Java EE and Java SE applications. Applies to Oracle Internet Directory and database stores. Optional. Default value: 1000. |
Parent topic: OPSS System and Configuration Properties
OPSS Configuration Properties
The following sections describe service properties:
- Properties Common to OPSS Services
- Policy Store Service Properties
- Credential Service Properties
- LDAP Identity Properties
- Properties Common to All LDAP Servers
- Trust Service Properties
- Audit Service Properties
- Keystore Service Properties
- Anonymous and Authenticated Roles Properties
Parent topic: OPSS System and Configuration Properties
Properties Common to OPSS Services
The following tables describe the OPSS properties common to all services except for the trust store service. For information about trust store service properties, see Trust Service Properties.
Table F-2 Common Properties — Properties valid in both Java EE and SE applications
Property Name | Specifies |
---|---|
|
The key for the password credentials to access the LDAP store, stored in the Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Required. No default value. The ready-to-use value is |
|
The map for the password credentials to access the LDAP store, stored in the Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Required. Default value: |
|
The URL of the JBDC. Valid in Java SE and Java EE applications. Applies to only DB security stores. Required. No default value. Value example: |
|
The URL of the LDAP security store, with the format Valid in Java EE and SE applications. Applies only to LDAP stores. Required. No default value. |
|
The relative distinguished name format of the domain node in the LDAP store. Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Required. No default value. |
|
The relative distinguished name format of the root node in the LDAP store. Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Required. No default value. |
|
The maximum number of permission collections allowed in the cache per protection domain and request permission class. Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Optional. Default value: 5000 |
|
The type of the security store. Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Required. No default value. Values: |
Table F-3 Common Properties — Properties valid in Java EE applications
Property Name | Specifies |
---|---|
|
The Java Naming and Directory Interface (JNDI) name of the Java Database Connectivity (JDBC) data source instance. Valid in Java EE applications only. Applies to only DB security stores. Required. No default value. |
|
The number of retry attempts. Valid in Java EE applications only. Applies to only DB security stores. Optional. Default value: 3 |
|
The number of seconds between retry attempts. Valid in Java EE applications only. Applies to only DB security stores. Optional. Default value: 15 |
|
The credential's map and key for the WebLogic DB user/password. They apply only when Valid in Java EE applications only. Applies to only DB security stores. Optional. Default value: none. |
|
Where to find the map and key for the WebLogic DB user/password. This property is automatically set when reassociating to a DB security store. Valid in Java EE applications only. Applies to only DB security stores. Optional. Valid values: Default value: If Otherwise, if |
Table F-4 Common Properties — Properties valid in Java SE applications
Property Name | Specifies |
---|---|
|
The clear text name of the principal to use instead of the user name specified in the bootstrap. Used in developments environments only. Valid in Java SE applications only. Applies to LDAP and DB security stores. Optional. No default value. |
|
The clear text password for the security principal to use instead of the password specified in the bootstrap. Not recommended. Valid in Java SE applications only. Applies to LDAP and DB security stores. Optional. No default value. |
|
The JDBC driver. Valid in Java SE applications only. Applies to only DB security stores. Required. No default value. Value example: |
See also:
Parent topic: OPSS Configuration Properties
Policy Store Service Properties
The following sections describe the policy store service properties:
See also:
Parent topic: OPSS Configuration Properties
Policy Store Service Configuration
The policy store provider class to use with LDAP or DB security stores is the oracle.security.jps.internal.policystore.ldap.LdapPolicyStoreProvider
class.
Table F-5 describes the properties specific to policy store. Additional properties are listed in Properties Common to OPSS Services.
Table F-5 Policy Properties
Property Name | Specifies |
---|---|
|
Throwing exceptions if any of the following checks fail:
If set to If set to Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Optional. Default value: Valid values: |
Example 1
The following example illustrates the configuration of a policy store instance for a Java EE application:
<propertySet name="props.ldap.1"> <property name="java.naming.ldap.derefAliases" value="never"/> <property name="bootstrap.security.principal.key" value="bootstrap_6aCNhgRM3zF04ToliwecdF6K3oo="/> <property name="oracle.security.jps.farm.name" value="cn=compact1_oid26008"/> <property name="server.type" value="OID"/> <property name="oracle.security.jps.ldap.root.name" value="cn=jpsTestNode"/> <property name="ldap.url" value="ldap://myComp.com:2020"/> </propertySet> <serviceProvider type="POLICY_STORE" name="policystore.provider" class="oracle.security.jps.internal.policystore.ldap.LdapPolicyStoreProvider"/> <serviceInstance name="policystore.ldap" provider="policystore.provider"> <propertySetRef ref="props.ldap.1"/> </serviceInstance>
Example 2
The following example illustrates the configuration of an LDAP policy store instance for a Java SE application:
<serviceInstance name="policystore.oid" provider="policy.oid"> <property value="OID" name="server.type"/> <property value="bootstrap" name="bootstrap.security.principal.key"/> <property name="ldap.url" value="ldap://myHost.com:1234"/> <property name="oracle.security.jps.ldap.root.name" value="cn=jpsNode"/> <property name="oracle.security.jps.farm.name" value="cn=domain1"/> </serviceInstance>
Example 3
The following example illustrates the configuration of DB security stores for a Java EE application:
<jpsConfig> ... <propertySets> <!-- property set props.db.1 common to all DB services --> <propertySet name="props.db.1"> <property name="jdbc.url" value="jdbc:oracle:thin@xxx.com:1521:orcl"/> <property name="datasource.jndi.name" value="opssds"/> <property value="cn=farm" name="oracle.security.jps.farm.name"/> <property value="cn=jpsroot" name="oracle.security.jps.ldap.root.name"/> <property value="dsrc_lookup_key" name="bootstrap.security.principal.key"/> <property value="credential_map" name="bootstrap.security.principal.map"/> </propertySet> </propertySets> <serviceProviders> <serviceProvider class="oracle.security.jps.internal.policystore.ldap.LdapPolicyStoreProvider" type="POLICY_STORE" name="rdbms.policystore.provider" > <description>RDBMS based PolicyStore provider</description> </serviceProvider> <serviceProvider type="KEY_STORE" name="keystore.provider" class="oracle.security.jps.internal.keystore.KeyStoreProvider"> <description>PKI Based Keystore Provider</description> <property name="provider.property.name" value="owsm"/> </serviceProvider> <serviceProvider name="pdp.service.provider" type="PDP" class="oracle.security.jps.az.internal.runtime.provider.PDPServiceProvider"> <description>OPSS Runtime Service provider</description> </serviceProvider> </serviceProviders> <serviceInstances> <serviceInstance name="policystore.rdbms" provider="rdbms.policystore.provider"> <property value="DB_ORACLE" name="server.type"/> <propertySetRef ref = "props.db.1"/> <property name="session_expiration_sec" value="60"/> <property name="failover.retry.times" value="5"/> </serviceInstance> <serviceInstance name="credstore.rdbms" provider="rdbms.credstore.provider"> <propertySetRef ref = "props.db.1"/> </serviceInstance> <serviceInstance name="keystore.rdbms" provider="rdbms.keystore.provider"> <propertySetRef ref = "props.db.1"/> <property name="server.type" value="DB_ORACLE"/> </serviceInstance> <serviceInstance name="pdp.service" provider="pdp.service.provider"> <property name="oracle.security.jps.runtime.pd.client.sm_name" value="permissionSm"/> <property name="oracle.security.jps.pdp.AuthorizationDecisionCacheEnabled" value="true"/> <property name="oracle.security.jps.pdp.AuthorizationDecisionCacheEvictionCapacity" value="500"/> <property name="oracle.security.jps.pdp.AuthorizationDecisionCacheEvictionPercentage" value="10"/> <property name="failover.retry.times" value="5"/> <property name="failover.retry.interval" value="20"/> <property name="oracle.security.jps.policystore.refresh.purge.timeout", value="30000"/> <propertySetRef ref = "props.db.1"/> </serviceInstance> </serviceInstances> <jpsContexts default="default"> <jpsContext name="default"> <serviceInstanceRef ref="pdp.service"/> <serviceInstanceRef ref="policystore.rdbms"/> <serviceInstanceRef ref="credstore.rdbms"/> <serviceInstanceRef ref="keystore.rdbms"/> </jpsContext> </jpsContexts> ... </jpsConfig>
Example 4
The following example illustrates the configuration of a DB policy store for a Java SE application:
<serviceInstance name="policystore.rdbms" provider="policy.rdbms"> <property name="server.type" value="DB_ORACLE"/> <property name="jdbc.url" value="jdbc:oracle:thin:@xxx.com:1722:orcl"/> <property name="jdbc.driver" value="oracle.jdbc.driver.OracleDriver"/> <property name="bootstrap.security.principal.key" value="bootstrap_DWgpEJgXwhDIoLYVZ2OWd4R8wOA=" /> <property name="oracle.security.jps.ldap.root.name" value="cn=jpsTestNode"/> <property name="oracle.security.jps.farm.name" value="cn=view_steph.atz"/> </serviceInstance>
Parent topic: Policy Store Service Properties
Runtime Policy Configuration
The runtime policy store provider class you use with LDAP or DB security stores is the oracle.security.jps.az.internal.runtime.provider.PDPServiceProvider
class.
Table F-6 lists the runtime properties of policy store instances.
Table F-6 Runtime Policy Properties
Property Name | Specifies |
---|---|
|
The type of the role member cache. Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Optional. Valid values:
Default value: |
|
The type of strategy used in the role member cache. Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Optional. Valid values:
Default value: |
|
The number of the roles kept in the member cache. Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Optional. Default value: 1000. |
|
The policy lazy load. Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Optional. Valid values: Default value: |
|
The type of strategy used in the permission cache. Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Optional. Valid values:
Default value: |
|
The number of grants kept in the permission cache. Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Optional. Default value: 1000. |
|
The policy store refresh. If this property is set, then Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Optional. Valid values: Default value: |
|
The refresh of the cache. If this property is set, then Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Optional. Valid values: Default value: |
|
The number of milliseconds after which the security store cache is purged. Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Optional. Default value: 43200000 (12 hours). |
|
The number of milliseconds at which the security store is polled for changes. Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Optional. Default value: 600000 (10 minutes). |
|
The way the ApplicationRole membership cache is created. If Set to Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Optional. Valid values: Default value: |
|
The folder for temporary storage. Valid in Java EE and SE applications. Applies to file, LDAP, and DB security stores. Optional. Default value: the system temporary folder. |
|
The authorization cache is enabled. Valid in Java EE and SE applications. Applies to file, LDAP, and DB security stores. Optional. Valid values: Default value: |
|
The percentage of sessions to drop when the eviction capacity is reached. Valid in Java EE and SE applications. Applies to file, LDAP, and DB security stores. Optional. Default value: 10 |
|
The maximum number of authorization and role mapping sessions to maintain. When the maximum is reached, old sessions are dropped and reestablished when it is needed. Valid in Java EE and SE applications. Applies to file, LDAP, and DB security stores. Optional. Default value: 500 |
|
The number of seconds during which session data is cached. Valid in Java EE and SE applications. Applies to file, LDAP, and DB security stores. Optional. Default value: 60 |
|
Throwing exceptions if any of the following checks fail:
If set to If set to Valid in Java EE and SE applications. Applies to LDAP and DB security stores. Optional. Default value: Valid values: |
Parent topic: Policy Store Service Properties
Credential Service Properties
Table F-7 lists the properties specific to credential store instances. Additional properties are listed in Properties Common to OPSS Services.
Table F-7 Credential Store Properties
Property Name | Specifies |
---|---|
|
To encrypt credentials. Valid in Java EE and SE applications. Applies only to file and LDAP stores. Valid values: Optional. Default value: |
The following example illustrates the configuration of a credential store for a Java EE application:
<propertySet name="props.ldap.1"> <property name="java.naming.ldap.derefAliases" value="never"/> <property name="bootstrap.security.principal.key" value="bootstrap_6aCNhgRM3zF04ToliwecdF6K3oo="/> <property name="oracle.security.jps.farm.name" value="cn=compact1_oid26008"/> <property name="server.type" value="OID"/> <property name="oracle.security.jps.ldap.root.name" value="cn=jpsTestNode"/> <property name="ldap.url" value="ldap://myComp.com:2020"/> </propertySet> <serviceProvider type="CREDENTIAL_STORE" name="ldap.credentialstore.provider" class="oracle.security.jps.internal.credstore.ldap.LdapCredentialStoreProvider"/> <serviceInstance name="credstore.ldap" provider="ldap.credentialstore.provider"> <propertySetRef ref="props.ldap.1"/> </serviceInstance>
See also:
Parent topic: OPSS Configuration Properties
LDAP Identity Properties
Table F-8 lists the properties of LDAP identity stores, and states extended properties are and User and Role API properties.
Table F-8 LDAP Identity Store Properties
Property Name | Specifies |
---|---|
|
The type of the identity store. Valid in Java SE and Java EE applications. Required Valid values:
If using a custom authentication provider, then the service instance configuration must include one of the following properties: <property name="idstore.type" value="<your-idstore-type>" <property name="ADF_IM_FACTORY_CLASS" value="<your-IDM-FACTOY_CLASS_NAME>" Corresponding User and Role API property: ADF_IM_FACTORY_CLASS |
|
The LDAP URL value. Valid in Java SE and Java EE applications. Required. No default value. Value example: Corresponding User and Role API property: ADF_IM_PROVIDER_URL |
|
The user search base for the LDAP server in DN format. Extended property. Valid in Java SE and Java EE applications. Required. No default value. Value example: Corresponding User and Role API property: USER_SEARCH_BASES |
|
The group or enterprise search base for the LDAP server in DN format. Extended property. Valid in Java SE and Java EE applications. Required No default value. Value example: Corresponding User and Role API property: ROLE_SEARCH_BASES |
|
The Valid only in Java EE applications. Required The only supported value is: oracle.security.jps.wls.internal.idstore.WlsLdapIdStoreConfigProvider |
|
The base DNs used to create groups. Extended property. Valid in Java EE and SE applications. Required to allow writing operations with the User and Role API. Otherwise, optional. Value example of a single DN: <extendedProperty> <name>group.create.bases</name> <values> <value>cn=groups,dc=us,dc=oracle,dc=com</value> </values> </extendedProperty> Corresponding User and Role API property: ROLE_CREATE_BASES |
|
The base DNs used to create users. Extended property. Valid in Java EE and SE applications. Required to allow writing operations with the User and Role API. Otherwise, optional. Value example of a single DN: <extendedProperty> <name>user.create.bases</name> <values> <value>cn=users,dc=us,dc=oracle,dc=com</value> </values> </extendedProperty> Corresponding User and Role API property: USER_CREATE_BASES |
|
The fully qualified names of object classes used to search groups. Extended property. Valid in Java EE and SE applications. Optional. Value example: Corresponding User and Role API property: ROLE_FILTER_OBJECT_CLASSES |
|
The attributes that must be specified when creating groups. Extended property. Valid in Java EE and SE applications. Optional. Value example: <extendedProperty> <name>group.mandatory.attrs</name> <values> <value>cn</value> <value>objectClass</value> </values> </extendedProperty> Corresponding User and Role API property: ROLE_MANDATORY_ATTRS |
|
The attribute of a static role that specifies the distinguished names (DNs) of the members of a group. Extended property. Valid in Java EE and SE applications. Optional. Value example: <extendedProperty> <name>group.member.attrs</name> <values> <value>uniqueMember</value> </values> </extendedProperty> Corresponding User and Role API property: ROLE_MEMBER_ATTRS |
|
The fully qualified names of one or more schema object classes used to represent groups. Extended property. Valid in Java EE and SE applications. Optional. Value example: <extendedProperty> <name>group.object.classes</name> <values> <value>top</value> <value>groupOfUniqueNames</value> </values> </extendedProperty> Corresponding User and Role API property: ROLE_OBJECT_CLASSES |
|
The base DNs for creating groups. Valid in Java EE and SE applications. Optional. Value example: Corresponding User and Role API property: ROLE_SELECTED_CREATEBASE |
|
The attribute that uniquely identifies the name of the group. Valid in Java EE and SE applications. Optional. Value example: Corresponding User and Role API property: ROLE_NAME_ATTR |
|
The base DNs for searching groups. Valid in Java EE and SE applications. Optional. Value example: |
|
The maximum number of characters of the search filter. Valid in Java EE and SE applications. Optional. Value: a positive integer. Corresponding User and Role API property: MAX_SEARCHFILTER_LENGTH |
|
The type of search to employ when the repository is queried. Valid in Java EE and SE applications. Optional. Valid values: Corresponding User and Role API property: IDENTITY_SEARCH_TYPE |
|
The fully qualified names of object classes used to search users. Extended property. Valid in Java EE and SE applications. Optional. Value example: Corresponding User and Role API property: USER_FILTER_OBJECT_CLASSES |
|
The login identity of the user. Valid in Java EE and SE applications. Optional. Value example: Corresponding User and Role API property: USER_LOGIN_ATTR |
|
The attributes that must be specified when you create a user. Extended property. Valid in Java EE and SE applications. Optional. Value example: <extendedProperty> <name>user.mandatory.attrs</name> <values> <value>cn</value> <value>objectClass</value> <value>sn</value> </values> </extendedProperty> Corresponding User and Role API property: USER_MANDATORY_ATTRS |
|
The fully qualified names of the schema classes used to represent users. Extended property. Valid in Java EE and SE applications. Optional. Corresponding User and Role API property: USER_OBJECT_CLASSES |
|
The LDAP attribute that uniquely identifies the name of the user. Valid in Java EE and SE applications. Optional. Corresponding User and Role API property: USER_NAME_ATTR Note that if you reset the attribute |
|
The name of the system hosting the identity store. Valid in Java EE and SE applications. Optional. |
|
The default realm for the identity store. Valid in Java EE and SE applications. Optional. Value example: Corresponding User and Role API property: ADF_IM_SUBSCRIBER_NAME |
|
Where search and modifications are performed. If Set to Valid in Java EE and SE applications. Optional. Valid values: Default value: Value example: |
The following example illustrates the configuration of an LDAP identity store for a Java SE application:
<serviceInstance name="idstore.ldap" provider="idstore.ldap.provider"> <property name="idstore.type" value="OID"/> <property name="ldap.url" value="ldap://myHost.com:1234"/> <extendedProperty> <name>user.search.bases</name> <values> <value>cn=users,dc=us,dc=oracle,dc=com</value> </values> </extendedProperty> <extendedProperty> <name>group.search.bases</name> <values> <value>cn=groups,dc=us,dc=oracle,dc=com</value> </values> </extendedProperty> </serviceInstance>
See also:
Parent topic: OPSS Configuration Properties
Properties Common to All LDAP Servers
Table F-9 lists properties common to LDAP servers.
In case of an LDAP identity store and to ensure that the User and Role API picks up the connection pool properties when it is using the JNDI connection factory, the identity store instance must include the following property:
<property name="INITIAL_CONTEXT_FACTORY" value="com.sun.jndi.ldap.LdapCtxFactory"/>
Table F-9 Generic LDAP Properties
Property Name | Specifies |
---|---|
|
The type of LDAP connection that the JNDI connection pool uses. Valid in Java EE and SE applications. Optional. Values: Default value: |
|
The maximum number of connections in the LDAP connection pool. Valid in Java EE and SE applications. Optional. Value example: 30 |
|
The minimum number of connections in the LDAP connection pool. Valid in Java EE and SE applications. Optional. Value example: 5 |
|
The protocol to use for the LDAP connection. Valid in Java EE and SE applications. Optional. Values: Default value: |
|
The connection pool to use. Valid in Java EE and SE applications. Optional. Values: Default value: |
|
The number of milliseconds that an idle connection can remain in the pool. After time-out, the connection is closed and removed from the pool. Valid in Java EE and SE applications. Optional. Default value: 300000 (5 minutes) |
|
The maximum number of retry attempts if there are problems with the LDAP connection. Valid in Java EE and SE applications. Optional. Value example: 5 |
The following example illustrates a configuration of several properties:
<!-- common properties used by all LDAPs --> <property name="oracle.security.jps.farm.name" value="cn=OracleFarmContainer"/> <property name="oracle.security.jps.ldap.root.name" value="cn=OracleJpsContainer"/> <property name="oracle.security.jps.ldap.max.retry" value="5"/>
See also:
Parent topic: OPSS Configuration Properties
Trust Service Properties
Table F-10 lists the properties specific to the trust service.
Table F-10 Truststore Properties
Property Name | Specifies |
---|---|
|
Whether to return public CA certificates in the keystore Valid in Java EE and SE applications. Values: Optional. Default: |
|
The type of the truststore: Java Keystore (JKS) or keystore service (KSS) keystore. Valid in Java EE and SE applications. Optional. Valid values: Default: none. If unspecified and KSS is provisioned, then the value is |
|
The store name with the format: kss://<stripeName>/<keyStoreName> Applies only when Valid in Java EE and SE applications. Optional. Default: |
|
The store URL with the format: kss://<stripeName>/<keyStoreName> Applies only when Valid in Java EE and SE applications. Optional. Default: |
|
The alias to use to get an X.509 certificate and private key from the keystore. Valid in Java EE and SE applications. Optional. Default: the name of the Oracle WebLogic Server domain. |
|
The name (included in the token) that the target trust service uses to pick up and validate the token. Valid in Java EE and SE applications. Optional. Default: the name of the WebLogic Server domain. |
|
The fully-qualified name of the trust provider class. Valid in Java EE and SE applications. Required. Value: |
|
The number of seconds the time-gap allowed when verifying time conditions. Valid in Java EE and SE applications. Optional. Default: 0. |
|
The number of seconds that a token remains valid after being issued. Valid in Java EE and SE applications. Required. Default: none. |
|
The map of the credential to access the keystore. Valid in Java EE and SE applications. Optional. Default: the value of the keystore instance property |
|
Applies only when Valid in Java EE and SE applications. Optional. Default: the value of the keystore instance property |
|
The key of the credential to access the keystore (the map is set by Valid in Java EE and SE applications. Optional. Default: the value of the keystore instance property |
|
The Security Assertion Markup Language (SAML) token includes a certificate. Valid in Java EE and SE applications. Required. Valid values: Default: |
The following example illustrates the configuration of a trust service:
<propertySet name="trust.provider.embedded"> <property name="trust.provider.className" value="oracle.security.jps.internal.trust.provider.embedded.EmbeddedProviderImpl"/> <property name="trust.clockSkew" value="60"/> <property name="trust.token.validityPeriod" value="1800"/> <property name="trust.aliasName" value="orakey"/> <property name="trust.issuerName" value="orakey"/> <property name="trust.csf.map " value="my-csf-map"/> <property name="trust.csf.keystorePass" value="my-keystore-csf-key"/> <property name="trust.csf.keypass" value="my-signing-csf-key"/> </propertySet>
See also:
Parent topic: OPSS Configuration Properties
Audit Service Properties
Table F-11 lists the properties specific to audit. Additional properties are listed in Properties Common to OPSS Services.
Table F-11 Audit Properties
Property Name | Specifies | Required? | Values | Default Value |
---|---|---|---|---|
|
The audit level. |
no |
None, Low, Medium, or High |
None |
|
The custom events that to audit. The events must be qualified using the component type. Commas separate events and a semicolon separates component types. Example: JPS:CheckAuthorization, CreateCredential; OIF:UserLogin |
no |
NA |
NA |
|
The list of users whose activity is always audited, even if the |
no |
NA |
NA |
|
The size of a bus-stop file where audit events are written. Integer is in Bytes |
no |
NA |
104857600 |
|
The number of seconds with which audit loader uploads to database. |
no |
15 seconds |
|
|
The store type for the audit events. If type is Database (DB), then also define audit.loader.jndi or JDBC property. |
yes |
File, DB |
File |
audit.loader.jndi |
The JNDI name of the data source in application servers for uploading audit events into database. |
no |
NA |
jdbc/AuditAppendDataSource |
|
The map and key for the JDBC user name and password credential in bootstrap credential store, when running a Java SE application and the repository type is DB. |
no |
NA |
NA |
|
The JDBC string for JDBC connection when running a Java SE application and repository type is DB. |
no |
NA |
|
|
The base directory for bus-stop files. |
required for JavaSE |
NA |
jse |
|
Recording events using a specific time zone. |
no |
UTC, local |
UTC |
|
The number of milliseconds after which, the service checks for any changes. |
no |
whole number greater than zero |
60000 (60 seconds) |
The following example illustrates the use of properties in a configuration:
<serviceInstance name="audit" provider="audit.provider" location="./audit-store.xml"> <property name="audit.filterPreset" value="Medium"/> <property name="audit.loader.jndi" value="jdbc/AuditAppendDataSource"/> <property name="audit.loader.repositoryType" value="DB" /> <property name="server.type" value="DB_ORACLE"/> <property name="audit.timezone" value="local" /> </serviceInstance>
See also:
Parent topic: OPSS Configuration Properties
Keystore Service Properties
Table F-12 lists the properties specific to the keystore. Additional properties are listed in Properties Common to OPSS Services.
Table F-12 Keystore Service Properties
Property Name | Specifies | Required? | Values | Default |
---|---|---|---|---|
|
The location of the file keystores.xml when file provider is configured. |
Yes, if a file keystore provider is configured. |
- |
./ |
|
The key alias of the third party CA used for the keystore service instance. |
No |
- |
- |
|
The absolute or relative path. location of the keystore. |
Yes, if keystore.type is JKS. No, if keystore.type is PKCS11 or HSM (LunaSA) |
Path to keystore |
./default-keystore.jks |
|
The type of keystore. |
No |
KSS, JKS, PKCS11, Luna |
JKS |
|
The credential store map name that OWSM uses. Used by OWSM only. |
No |
Credential store map name |
oracle.wsm.security |
|
The credential store key that points to Keystore password. Used by OWSM only. |
No |
Credential store csf key name |
keystore-csf-key |
|
The credential store key name that points to alias and password of signing key in keystore.For HSM, it is the direct key alias name rather than the credential store key name. Used by OWSM only. |
No |
Credential store csf key name or, for HSM, the direct alias |
sign-csf-key |
|
The credential store key name that points to alias and password of encryption key in keystore.For HSM, it is the direct key alias name rather than the credential store key name. Used by OWSM only. |
No |
Credential store csf key name or, for HSM, the direct alias |
enc-csf-key |
The following example illustrates a keystore configuration:
<propertySet name="props.ldap.1"> <property name="java.naming.ldap.derefAliases" value="never"/> <property name="bootstrap.security.principal.key" value="bootstrap_6aCNhgRM3zF04ToliwecdF6K3oo="/> <property name="oracle.security.jps.farm.name" value="cn=compact1_oid26008"/> <property name="server.type" value="OID"/> <property name="oracle.security.jps.ldap.root.name" value="cn=jpsTestNode"/> <property name="ldap.url" value="ldap://myComp.com:2020"/> </propertySet> <serviceProvider type="KEY_STORE" name="keystore.provider" class="oracle.security.jps.internal.keystore.KeyStoreProvider"> </serviceProvider> <serviceInstance name="keystore.ldap" provider="keystore.provider"> <propertySetRef ref="props.ldap.1"/> </serviceInstance>
The following example illustrates a keystore configuration for an LDAP provider:
<serviceInstance name="keystore" provider="keystore.provider" location="./default-keystore.jks"> <description>Default JPS Keystore Service</description> <property name="server.type" value="OID"/> <property name="keystore.type" value="JKS"/> <property name="keystore.csf.map" value="oracle.wsm.security"/> <property name="keystore.pass.csf.key" value="keystore-csf-key"/> <property name="keystore.sig.csf.key" value="sign-csf-key"/> <property name="keystore.enc.csf.key" value="enc-csf-key"/> <property value="bootstrap" name="bootstrap.security.principal.key"/> <property value="cn=wls-jrfServer" name="oracle.security.jps.farm.name"/> <property value="cn=jpsTestNode" name="oracle.security.jps.ldap.root.name"/> <property value="ldap://myHost.com:1234" name="ldap.url"/> </serviceInstance>
The following example illustrates a keystore configuration for a DB provider:
<propertySet name="props.db.1"> <property name="jdbc.url" value="jdbc:oracle:thin:@host:port:sid"/> <property name="oracle.security.jps.farm.name" value="cn=farm"/> <property name="server.type" value="DB_ORACLE"/> <property name="oracle.security.jps.ldap.root.name" value="cn=jpsroot"/> <property name="jdbc.driver" value="oracle.jdbc.OracleDriver"/> <property name="bootstrap.security.principal.map" value="credendial_map"/> <property name="bootstrap.security.principal.key" value="credential_key"/> </propertySet> <serviceInstance name="keystore.rdbms" provider="keystore.provider" location="./default-keystore.jks"> <propertySetRef ref = "props.db.1"/> <property name="server.type" value="DB_ORACLE"/> <property name="keystore.type" value="JKS"/> <property name="keystore.csf.map" value="oracle.wsm.security"/> <property name="keystore.pass.csf.key" value="keystore-csf-key"/> <property name="keystore.sig.csf.key" value="sign-csf-key"/> <property name="keystore.enc.csf.key" value="enc-csf-key"/> </serviceInstance>
See also:
Parent topic: OPSS Configuration Properties
Anonymous and Authenticated Roles Properties
Table F-13 lists the properties that can be used to configure anonymous users, anonymous roles, and authenticated roles.
Table F-13 Anonymous and Authenticated Roles Properties
Property Name | Specifies |
---|---|
|
The description of the anonymous role. Valid in Java EE and SE applications. Optional. No default value. |
|
The name of the principal in the anonymous role. Valid in Java EE and SE applications. Optional. Default value: |
|
The name of the anonymous role. Valid in Java EE and SE applications. Optional. Default value: |
|
The name of the principal in the anonymous user. Valid in Java EE and SE applications. Optional. Default value: |
|
The description of the authenticated role. Valid in Java EE and SE applications. Optional. No default value. |
|
The name of the principal in authenticated user roles. Valid in Java EE and SE applications. Optional. Default value: |
|
The name of the authenticated role. Valid in Java EE and SE applications. Optional. Default value: |
|
The anonymous role to remove from the subject after a user is authenticated. Valid in Java EE and SE applications. Optional. Valid values: Default value: |
See also:
Parent topic: OPSS Configuration Properties