Table of Contents
- List of Examples
- List of Figures
- List of Tables
- Title and Copyright Information
- Preface
- What's New in This Guide?
- Part I Introduction
-
Part II Developing with Access Manager
-
2
Developing Access Clients
- 2.1 About Developing Access Clients
- 2.2 Installing Access SDK
-
2.3
Developing Access Clients
- 2.3.1 Understanding the Structure of an Access Client
- 2.3.2 Understanding a Typical Access Client Execution Flow
- 2.3.3 Sample Code: Simple Access Client
- 2.3.4 Annotated Sample Code: Simple Access Client
- 2.3.5 Sample Code: Java Login Servlet
- 2.3.6 Annotated Sample Code: Java Login Servlet
- 2.3.7 Sample Code: Additional Methods
- 2.3.8 Annotated Sample Code: Additional Methods
- 2.3.9 Sample Code: Certificate-Based Authentication in Java
- 2.4 Understanding Access SDK Logs
- 2.5 Building an Access Client Program
- 2.6 Deploying Access Clients
- 2.7 Configuring Access Clients
- 2.8 Best Practices
- 3 Developing Custom Authentication Plug-ins
- 4 Developing Custom Pages
-
5
Managing Policy Objects
- 5.1 About the Policy Administration API
- 5.2 Compatibility
- 5.3 Managing Policy Objects
- 5.4 Client Tooling
- 5.5 cURL Command Examples
- 5.6 Retrieve Application Domains cURL Command
- 5.7 Create a New Application Domain cURL Command
- 5.8 Retrieve All Authentication Schemes cURL Command
- 5.9 Create an Authentication Scheme cURL Command
- 5.10 Retrieve a Specific Authentication Scheme cURL Command
- 5.11 Retrieve All Resources in an Application Domain cURL Command
- 5.12 Create a Resource in an Application Domain cURL Command
- 5.13 Retrieve All Policies in an Application Domain cURL Command
-
6
Developing an Application to Manage Impersonation
-
6.1
About the Impersonation feature in Access Manager
- 6.1.1 About Impersonation Terminology
- 6.1.2 Understanding Impersonation Concepts
- 6.1.3 About Impersonation Grant Syntax
- 6.1.4 Understanding Impersonation Trigger Invocation Using the SSO Service
- 6.1.5 Triggering Impersonation Without API Abstraction
- 6.1.6 Impersonator Identity Communication During Impersonation Sessions
- 6.2 Configuring Impersonation Support
- 6.3 Testing SSO Login and Impersonation
-
6.1
About the Impersonation feature in Access Manager
-
7
Customizing Oracle Mobile Authenticator
- 7.1 About Oracle Mobile Authenticator and Customization
- 7.2 Customizing Oracle Mobile Authenticator on iOS
- 7.3 Customizing Oracle Mobile Authenticator on Android
- 7.4 Customizing Oracle Mobile Authenticator on Windows
-
2
Developing Access Clients
-
Part III Developing with Identity Federation
- 8 Developing a Custom User Provisioning Plug-in
- 9 Developing a Message Processing Plug-in
-
10
Using the REST API for Identity Federation
- 10.1 Resource URLs
- 10.2 URL Resources and Supported HTTP Methods
- 10.3 Resources Summary
-
10.4
cURL Command Examples for Identity Federation
- 10.4.1 Configuring SSO Service using POST cURL Command
- 10.4.2 Retrieving SSO Service using GET cURL Command
- 10.4.3 Configuring SSO Service using PUT cURL Command
- 10.4.4 Creating an SP Partner cURL Command
- 10.4.5 Listing all SP Partners cURL Command
- 10.4.6 Retrieving SP Partner Data cURL Command
- 10.4.7 Updating SP Partner Details cURL Command
- 10.4.8 Deleting SP Partner Details cURL Command
- 10.4.9 Enabling Test SP using POST cURL Command
- 10.4.10 Retrieving Test SP Enablement using GET cURL Command
- 10.4.11 Disabling Test SP using PUT cURL Command
- 10.4.12 Configuring SSO Service using POST cURL Command using /fedrest/configuresso
- 10.4.13 Creating an SP Partner cURL Command using /fedrest/createsp
- 10.4.14 Creating an IdP Partner cURL Command using /fedrest/createidp
- 10.4.15 Connecting Federation Servers to remote REST services using /fedrest/orchestrator
- 11 Implementing Custom Authentication Actions
- Part IV Appendices
- A Creating Deployment-Specific Pages