3.4 Create Authentication Scheme
Use the Create Authentication Scheme page to create a new Authentication scheme that defines the challenge mechanism required to authenticate a user.
The following table describes the elements on the Create Authentication Scheme page:
Element | Description |
---|---|
Name |
Type a unique name for this scheme, this appears in the navigation tree. |
Description |
Type a short description that explains the use of this scheme, you can enter up to 200 characters. |
Authentication Level |
Enter the trust level of the authentication scheme, the trust level is expressed as an integer value between 0 (no trust) and 99 (highest level of trust). This reflects the challenge method and degree of trust used to protect transport of credentials from the user. Note:
|
Default |
A non-editable box that is checked when the Set as Default button is clicked. |
Challenge Method |
Select any Challenge Method from the following options in the drop-down menu:
|
Challenge URL |
This URL is associated with the selected Challenge Method.
Note: The default Challenge URL is based on the credential collector embedded with the OAM Server (ECC). |
Context Type |
This field is displayed only for Schemes using Challenge Method FORM, X509, or DAP. This is used to build the final URL for the Embedded Credential Collector (ECC only, DCC does not use this) based on the following possible values:
|
Context Value |
Used to build the final URL for the credential collector. The default value is /oam. |
Challenge Redirect URL |
This URL declares the endpoint referencing the Credential Collector (ECC or DCC). For Example: ECC: DCC: |
Authentication Module |
Identifies the pre-configured authentication module to be used to challenge the user for credentials. Following modules or plug-ins specified identifies the exact user identity store to be used:
|
Challenge Parameters |
Type short text strings that are consumed and interpreted by Webgates and Credential Collector modules to operate in the manner indicated by those values. The syntax for specifying any challenge parameter is: <parametername> = <value> Note: This syntax is not specific to any Webgate release. Authentication schemes are independent of Webgate release. |
Set as Default |
Click Set as Defaultbutton to select the non-editable Default check box. |
Apply |
Click to submit this Authentication Scheme. |
Search Authentication Schemes
Use the Search Authentication Schemes page to perform an advanced search for a specific Authentication Scheme. The following table describes the elements in the Search section of the Authentication Scheme page:
Element | Description |
---|---|
Name |
Enter a name of the Authentication Scheme (or a partial name with wild card (*)). |
Search |
Click Search to initiate the search and populate results in the Search Results table. |
Reset |
Click Reset to reset the search criteria. |
Create Authentication Scheme |
Click to create a new Authentication Scheme using theCreate Authentication Scheme page. |
Search Results
Search results are the Authentication Schemes that met the conditions specified in the search fields. The following table describes the elements in the Search Results section of the Authentication Scheme page:
Element | Description |
---|---|
Actions |
Choose options from the menu to perform the following operations:
|
View |
Choose commands from the View menu to control how the columns are displayed:
|
Create |
Click to create a new Authentication Scheme using theCreate Authentication Scheme page. |
Duplicate |
Click to create a copy of the existing record. Select a row and click Duplicate to open the existing record in edit mode, user can make changes and save the record. |
Edit |
Select a row in the table and click Edit to open the record in edit mode. After edit, click OK to save the changes or Cancel to cancel the changes. |
Delete |
Select a row in the table and click Delete, in the confirm pop-up click Yes to remove the row, or click No to retain the row. |
Detach |
Click to expand the Search Results table to a full page. |
Row |
Displays the row number. |
Name |
Displays the searched Authentication Scheme names. |
Description |
Displays the descriptions for the Authentication Scheme searched. |
|
Click to sort the items in the column in ascending order. |
|
Click to sort the items in the column in descending order. |
Related Topics
Managing Authentication and Shared Policy Components in Administrator's Guide for Oracle Access Management