Configure Oracle Access Management 12c Sandbox Environment
Introduction
This tutorial shows you how to run the Repository Creation Utility to load the Oracle Access Management (OAM) database schemas. It also shows how to create the Oracle Access Management 12c domain.
This is the sixth tutorial in the series Creating an Oracle Access Management 12c Sandbox Environment for Oracle Advanced Authentication and they should be read sequentially.
- Creating an Oracle Access Management 12c Sandbox Environment for Oracle Advanced Authentication - Overview
- Install Oracle Database for Oracle Access Management 12c Sandbox Environment
- Create an Oracle Database for Oracle Access Management 12c Sandbox Environment
- Install Oracle Access Management 12c Sandbox Environment
- Configure Oracle Unified Directory for Oracle Access Management 12c Sandbox Environment
- Configure Oracle Access Management 12c Sandbox Environment
- Install and Configure Oracle HTTP Server for Oracle Access Management 12c Sandbox Environment
- Create and Configure a WebGate in Oracle Access Management 12c Sandbox Environment
Objective
To load the OAM schemas into the Oracle Database, and create the Oracle Access Management 12c domain.
Prerequisites
To have followed Configure Oracle Unified Directory for Oracle Access Management 12c Sandbox Environment.
All the tasks in this tutorial should be performed on the OAM linux server (oam.example.com
). Where hostnames (db.example.com,oam.example.com,ohs.example.com
) or domain names (example.com
) are referenced, change to match your environment.
Run the Repository Creation Utility
-
Launch a terminal window as
oracle
and enter the following commands:cd /u01/app/oracle/product/middlewareidm/oracle_common/bin ./rcu
-
Follow the table below to guide you through the installation screens:
Step Window Description Choice or Values 1 Welcome Click Next 2 Create Repository System Load and Product Load 3 Database Connection Details Database Type: Oracle Database
Host Name:db.example.com
Port:1521
Service Name:orcl.example.com
Username:sys
Password:<password>
Role:SYSDBA
Click OK in Checking Prerequisites window4 Select Components Create a new prefix: DEV
Under IDM Schemas selectOracle Access Manager
Click OK in Checking Prerequisites window5 Schema Passwords Use same passwords for all schemas
Password:<password>
Confirm Password:<password>
6 Map Tablespaces Click Next
Click OK in Confirmation and Creating Tablespaces windows7 Summary Click Create 8 Completion Summary Click Close
Configure the Oracle Access Management 12c Domain
-
Launch a terminal window as
oracle
and enter the following commands:cd /u01/app/oracle/product/middlewareidm/oracle_common/common/bin ./config.sh
-
Follow the table below to guide you through the configuration screens:
Step Window Description Choice or Values 1 Create Domain Select Create a new domain
Domain Location:/u01/app/oracle/admin/domains/oam_domain
2 Templates Select: Oracle Access Management Suite 3 Application Location Application Location: /u01/app/oracle/admin/applications/oam_domain
4 Administrator Account Name: weblogic
Password:<password>
Confirm:<password>
5 Domain Mode and JDK Domain Mode: Production
JDK:Oracle Hotspot
6 Database Configuration Type Host Name: db.example.com
DBMS/Service:orcl.example.com
Port:1521
Schema Owner:DEV_STB
Schema Password:<password>
Click Get RCU Configuration
If successful, click Next7 Component Datasources Click Next 8 JDBC Component Schema Test Click Next 9 Advanced Configuration Select Node Manager, and Topology 10 Node Manager Node Manager Type: Per Domain Default Location
Username:weblogic
Password:<password>
Confirm Password:<password>
11 Managed Servers Click Next 12 Clusters Click Add, Cluster Name: OAM_Cluster
, Frontend Host:ohs.example.com
, Frontend HTTPS:443
. Repeat these steps for Cluster Name:OAM_Policy
13 Server Templates Click Next 14 Dynamic Servers Click Next 15 Assign Servers to Clusters Select oam_server1 and OAM_Cluster and click the right arrow to move oam_server1
underOAM_cluster
. Select oam_policy_mgr1 and Policy_Cluster and click the right arrow to moveoam_policy_mgr1
underPolicy_cluster
. Click Next16 Coherence Clusters Click Next 17 Machines Click Add
Name:oam_machine
18 Assign Servers to Machines Select Admin Server, oam_server1 and oam_policy_mgr1.
Select oam_machine and click the right arrow to move the servers underoam_machine
19 Virtual Targets Click Next 10 Partitions Click Next 21 Configuration Summary Click Create 22 Configuration Progress Click Next 23 End of Configuration Click Finish
Start the Servers
-
Launch a terminal window as
oracle
and enter the following commands to start the Oracle Access Management 12c Administration server:cd /u01/app/oracle/admin/domains/oam_domain/ ./startWebLogic.sh
When prompted enter the WebLogic administrator credentials (
weblogic
/<password
>):Enter username to boot WebLogic server:weblogic Enter password to boot WebLogic server: ********
Wait until the terminal displays the message
The server started in RUNNING mode
, then minimize the window:<DATE> <Notice> <WebLogicServer> <BEA-000360> <The server started in RUNNING mode.> <DATE> <Notice> <WebLogicServer> <BEA-000365> <Server state changed to RUNNING.>
-
In another terminal window start Node Manager by running the following command:
cd /u01/app/oracle/admin/domains/oam_domain/bin ./startNodeManager.sh
Wait until the terminal displays that node manager is running, then minmize the window:
<DATE> <INFO> <Secure socket listener started on port 5556, host localhost/127.0.0.1>
-
Launch a terminal window as
oracle
and enter the following commands to start the OAM Managed Server:cd /u01/app/oracle/admin/domains/oam_domain/bin ./startManagedWebLogic.sh oam_server1
When prompted enter the WebLogic administrator credentials (
weblogic
/<password
>):Enter username to boot WebLogic server:weblogic Enter password to boot WebLogic server: ********
Wait until the terminal displays the message
server started in RUNNING mode
, then minmize the window:<DATE> <Notice> <WebLogicServer> <BEA-000360> <The server started in RUNNING mode.> <DATE> <Notice> <WebLogicServer> <BEA-000365> <Server state changed to RUNNING.>
-
Launch a terminal window as
oracle
and enter the following commands to start the OAM Policy Manager Managed Server:cd /u01/app/oracle/admin/domains/oam_domain/bin ./startManagedWebLogic.sh oam_policy_mgr1
When prompted enter the WebLogic administrator credentials (
weblogic
/<password
>):Enter username to boot WebLogic server:weblogic Enter password to boot WebLogic server: ********
Wait until the terminal displays the message
server started in RUNNING mode
, then minmize the window:<DATE> <Notice> <WebLogicServer> <BEA-000360> <The server started in RUNNING mode.> <DATE> <Notice> <WebLogicServer> <BEA-000365> <Server state changed to RUNNING.>
Validate the installation
Access the WebLogic Server Console
-
Launch a browser and access the WebLogic Server Console at
http://oam.example.com:7001/console
. Login asweblogic
/<password>
. -
In the Domain Structure pane, under
oam_domain
navigate toEnvironment
>Servers
. Make sure all the servers show as running:
Access the OAM Console
-
Launch a browser and access the Oracle Access Management Console at
http://oam.example.com:7001/oamconsole
. Login asweblogic
/<password>
. The OAM console should be displayed:
Access the OAM Policy Manager Console
-
Launch a browser and access the OAM Policy Manager Console at
http://oam.example.com:14150/access
. Login asweblogic
/<password>
. The OAM Policy Manager console should be displayed.Note: The OAM Policy Manager console looks the same as the Oracle Access Management Console, however it does not contain the full functionality available in the Oracle Access Management Console deployed on the AdminServer. The Policy Manager Console has only the policy administration functionality.
Configure boot.properties
In this section you create boot.properties
files to prevent having to enter the weblogic username and password on startup.
-
Launch a terminal window as
oracle
and enter the following commands:mkdir /u01/app/oracle/admin/domains/oam_domain/servers/AdminServer/security mkdir /u01/app/oracle/admin/domains/oam_domain/servers/oam_server1/security mkdir /u01/app/oracle/admin/domains/oam_domain/servers/oam_policy_mgr1/security cd /u01/app/oracle/admin/domains/oam_domain/servers/AdminServer/security echo -e "username=weblogic\npassword=<password>" >boot.properties cp boot.properties ../../oam_server1/security/ cp boot.properties ../../oam_policy_mgr1/security/
where
<password>
is yourweblogic
password.
Configure WebLogic-Plugin Enabled
Before you can validate that requests are routed correctly through the Oracle HTTP Server instances, you must set the WebLogic Plug-In Enabled parameter. It is recommended to set the WebLogic Plug-In Enabled parameter at the domain level. Any clusters or servers not using the plugin via the web-tier can have their WebLogic Plug-In Enabled parameter value set to no on an exception basis as needed.
-
Log in to the WebLogic Server Console
http://oam.example.com:7001/console
. Login asweblogic
/<password>
. -
In the Domain Structure pane, click on
oam_domain
. -
Click Lock & Edit in the Change Center.
-
Click on the Domain Name
oam_domain
. -
Click on the Web Applications tab.
-
Locate and select the WebLogic PlugIn Enabled option.
-
Click Save.
-
Click Activate Changes in the Change Center.
-
Restart the Administration Server. Launch a terminal window as
oracle
and enter the following commands to restart the Oracle Access Management 12c Administration server:cd /u01/app/oracle/admin/domains/oam_domain/bin ./stopWebLogic.sh ./startWebLogic.sh
Configuring Oracle Access Manager to Use the LDAP Directory
In this section you associate Oracle Access Manager with the OUD.
-
Create a file called
/stage/OAM12c/oam.props
with the following information:#IDSTORE PROPERTIES IDSTORE_HOST: oam.example.com IDSTORE_PORT: 1389 IDSTORE_BINDDN: cn=oudadmin IDSTORE_SEARCHBASE: dc=example,dc=com IDSTORE_GROUPSEARCHBASE: cn=Groups,dc=example,dc=com IDSTORE_USERNAMEATTRIBUTE: cn IDSTORE_LOGINATTRIBUTE: uid IDSTORE_USERSEARCHBASE: cn=Users,dc=example,dc=com IDSTORE_SYSTEMIDBASE: cn=SystemIDs,dc=example,dc=com IDSTORE_NEW_SETUP: true IDSTORE_DIRECTORYTYPE: OUD IDSTORE_WLSADMINUSER: weblogic_iam IDSTORE_WLSADMINGROUP: WLSAdministrators IDSTORE_OAMADMINUSER: oamadmin IDSTORE_OAMSOFTWAREUSER: oamLDAP # OAM Properties OAM11G_IDSTORE_NAME: OUDStore OAM11G_IDSTORE_ROLE_SECURITY_ADMIN: OAMAdministrators PRIMARY_OAM_SERVERS: oam.example.com:5575 WEBGATE_TYPE: ohsWebgate12c ACCESS_GATE_ID: Webgate_IDM OAM11G_OIM_WEBGATE_PASSWD: <password> COOKIE_DOMAIN: .example.com COOKIE_EXPIRY_INTERVAL: 120 OAM11G_WG_DENY_ON_NOT_PROTECTED: true OAM11G_IDM_DOMAIN_OHS_HOST: ohs.example.com OAM11G_IDM_DOMAIN_OHS_PORT: 443 OAM11G_IDM_DOMAIN_OHS_PROTOCOL: https OAM11G_SERVER_LBR_HOST: ohs.example.com OAM11G_SERVER_LBR_PORT: 443 OAM11G_SERVER_LBR_PROTOCOL: https OAM11G_OAM_SERVER_TRANSFER_MODE: open OAM_TRANSFER_MODE: open OAM11G_SSO_ONLY_FLAG: false OAM11G_IMPERSONATION_FLAG: false OAM11G_IDM_DOMAIN_LOGOUT_URLS: /console/jsp/common/logout.jsp,/em/targetauth/emaslogout.jsp OAM11G_OIM_INTEGRATION_REQ: false OAM11G_OIM_OHS_URL: https://ohs.example.com:443/ # WebLogic Properties WLSHOST: oam.example.com WLSPORT: 7001 WLSADMIN: weblogic
Change
<password
to the password you wish to assign to the webgate agent you will be creating. -
Run the following command to create the required object classes. Enter the password for
cn=oudadmin
, and the passwords you want to set forOAM11G_WLS_ADMIN_PASSWD
,OAM11G_IDM_DOMAIN_WEBGATE_PASSWD
,IDSTORE_PWD_OAMSOFTWAREUSER
, andIDSTORE_PWD_OAMADMINUSER
when prompted:export MW_HOME=/u01/app/oracle/product/middlewareidm export JAVA_HOME=/u01/app/oracle/product/jdk export ORACLE_HOME=/u01/app/oracle/product/middlewareidm/idm cd $ORACLE_HOME/idmtools/bin ./idmConfigTool.sh -configOAM input_file=/stage/OAM12c/oam.props
The output will look similar to the following:
Enter ID Store Bind DN Password : Enter User Password for OAM11G_WLS_ADMIN_PASSWD: Confirm User Password for OAM11G_WLS_ADMIN_PASSWD: Enter User Password for OAM11G_IDM_DOMAIN_WEBGATE_PASSWD: Confirm User Password for OAM11G_IDM_DOMAIN_WEBGATE_PASSWD: Enter User Password for IDSTORE_PWD_OAMSOFTWAREUSER: Confirm User Password for IDSTORE_PWD_OAMSOFTWAREUSER: Enter User Password for IDSTORE_PWD_OAMADMINUSER: Confirm User Password for IDSTORE_PWD_OAMADMINUSER: Connecting to t3://oam.example.com:7001 Connection to domain runtime mbean server established Starting edit session Edit session started Connected to security realm. Validating provider configuration Validated desired authentication providers Created OAMIDAsserter successfuly Created OUDAuthenticator successfuly Setting attributes for OUDAuthenticator All attributes set. Configured inOUDAuthenticatornow LDAP details configured in OUDAuthenticator Control flags for authenticators set sucessfully Reordering of authenticators done sucessfully Saving the transaction Transaction saved Activating the changes Changes Activated. Edit session ended. Connection closed sucessfully The tool has completed its operation. Details have been logged to automation.log
Check the
$ORACLE_HOME/idmtools/bin/automation.log
log file for any errors or warnings, and correct them. -
Restart the OAM Administration Server:
cd /u01/app/oracle/admin/domains/oam_domain/bin ./stopWebLogic.sh ./startWebLogic.sh
-
After running the idmConfigTool, several files are created in
/u01/app/oracle/admin/domains/oam_domain/output/Webgate_IDM
that you will need in later tutorials. Run the following commands to create a backup:cd /u01/app/oracle/admin/domains/oam_domain/output/Webgate_IDM tar -cvzf webgate.tar * cp webgate.tar /stage/OAM12c/
Validating the OAM LDAP Integration
To validate that the OAM LDAP integration has completed correctly:
-
Launch a browser and access the Oracle Access Management Console at
http://oam.example.com:7001/oamconsole
. Log in as the Access Manager administration user you created when you prepared the ID Store. For exampleoamadmin
. -
Click Agents from the Application Security screen.
-
When the Search SSO Agents screen appears, click Search.
-
You should see the WebGate agent
Webgate_IDM
.Note: If you discover that the
Webgate_IDM
Agent does not exist, you can create it manually in the next section Creating the Webgate_IDM Agent. -
Access the WebLogic Server Console
http://oam.example.com:7001/console
. Login asweblogic
/<password>
. -
Click Security Realms on the left navigation pane.
-
On the Summary of Security Realms page, click myrealm under the Realms table.
-
On the Settings page for myrealm, go to the Users and Groups tab.
-
Go to the Users tab and check to see that LDAP users are displayed from the directory connector. For example, Provider: OUDAuthenticator.
-
Go to the Groups tab and check to see that LDAP groups are displayed from the directory connector. For example, Provider: OUDAuthenticator.
Creating the Webgate_IDM Agent
You should only follow this section if the Webgate_IDM Agent was not shown in the OAM Console.
-
Create a file called
/stage/OAM12c/Webgate_IDM.xml
with the following information:<?xml version="1.0" encoding="UTF-8"?> <!-- Copyright (c) 2009, 2015, Oracle and/or its affiliates. All rights reserved. NAME: OAM11GRequest_short.xml - Template for OAM 11G Agent Registration Request file (Shorter version - Only mandatory values - Default values will be used for all other fields) DESCRIPTION: Modify with specific values and pass file as input to the tool. --> <OAM11GRegRequest> <serverAddress>http://oam.example.com:7001</serverAddress> <hostIdentifier>IAMSuiteAgent</hostIdentifier> <agentName>Webgate_IDM</agentName> <autoCreatePolicy>false</autoCreatePolicy> <protectedResourcesList> <resource>/**</resource> </protectedResourcesList> <publicResourcesList> <resource>/public/**</resource> </publicResourcesList> <excludedResourcesList> <resource>/excluded/**</resource> </excludedResourcesList> </OAM11GRegRequest>
-
Run the following command to create the webgate:
cd /u01/app/oracle/product/middlewareidm/idm/oam/server/rreg/bin ./oamreg.sh inband /stage/OAM12c/Webgate_IDM.xml
You are prompted to enter your administrative credentials. Provide the name of the OAM Administration User (
oamadmin
) and the Password. In addition, you are asked whether you want to create a WebGate password which is optional.The output will look similar to the following:
Welcome to OAM Remote Registration Tool! Parameters passed to the registration tool are: Mode: inband Filename: /stage/OAM12c/Webgate_IDM.xml Enter admin username:oamadmin Username: oamadmin Enter admin password: Do you want to enter a Webgate password?(y/n): n Request summary: OAM11G Agent Name:Webgate_IDM URL String:IAMSuiteAgent Registering in Mode:inband Your registration request is being sent to the Admin server at: http://oam.example:7001 <DATE> oracle.security.jps.util.JpsUtil disableAudit INFO: JpsUtil: isAuditDisabled set to true Inband registration process completed successfully! Output artifacts are created in the output folder.
-
Navigate to the
/u01/app/oracle/product/middlewareidm/idm/oam/server/rreg/output/Webgate_IDM
directory and create a backup of the webgate files created:cd /u01/app/oracle/product/middlewareidm/idm/oam/server/rreg/output/Webgate_IDM tar -cvzf webgate.tar * cp webgate.tar /stage/OAM12c/
-
Launch a browser and access the Oracle Access Management Console at
http://oam.example.com:7001/oamconsole
. Log in as the Access Manager administration user you created when you prepared the ID Store. For exampleoamadmin
. -
Click Agents from the Application Security screen.
-
When the Search SSO Agents screen appears, click Search.
-
You should see the WebGate agent
Webgate_IDM
.
Adding LDAP Groups to WebLogic Administrators
Oracle Access Manager requires access to the MBeans stored within the Administration Server. To enable the LDAP users to log in to the WebLogic Console and Fusion Middleware Control, you must assign them the WebLogic administration rights. For Oracle Access Manager to invoke these Mbeans, users in the OAMAdministrators
group must have the WebLogic administration rights.
When you implement single sign-on, you have to provide the LDAP group IDM administrators with the WebLogic administration rights to help them log in and perform the WebLogic administrative actions.
To add the LDAP Groups OAMAdministrators
and WLSAdministrators
to the WebLogic Administrators:
-
Launch a browser and access the WebLogic Console at
http://oam.example.com:7001/console
. Log in as the default administrative userweblogic
. -
In the left pane of the console, click Security Realms.
-
On the Summary of Security Realms page, click myrealm under the Realms table.
-
On the Settings page for myrealm, click the Roles & Policies tab.
-
On the Realm Roles page, expand the Global Roles entry under the Roles table.
-
Click the Roles link to go to the Global Roles page.
-
On the Global Roles page, click the Admin role to go to the Edit Global Roles page.
-
On the Edit Global Roles page, under the Role Conditions table, click the Add Conditions button.
-
On the Choose a Predicate page, select Group from the drop down list for predicates and click Next.
-
On the Edit Arguments Page, Specify OAMAdministrators in the Group Argument field and click Add.
-
Repeat for the Group WLSAdministrators.
-
Click Finish to return to the Edit Global Roles page.
-
The Role Conditions table now shows the groups OAMAdministrators or WLSAdministrators as role conditions.
-
Click Save to finish adding the Admin role to the OAMAdministrators and IDM Administrators Groups.
Updating WebGate Agents
-
Launch a browser and access the Oracle Access Management Console at
http://oam.example.com:7001/oamconsole
. Log in as the Access Manager administration user you created when you prepared the ID Store. For exampleoamadmin
. -
Click the Agents pad on the Application Security screen.
-
Ensure that the WebGates tab is selected.
-
Click Search. This lists all agents.
-
Click an agent.
-
Set Maximum Connections to 10. This is the total maximum number of connections for the primary OAM server.
-
In User Defined Parameters if:
logoutRedirectUrl
is set, make sure it is set tologoutRedirectUrl=https://ohs.example.com/oam/server/logout
.OAMRestEndPointHostName
is set, make sure it is set toOAMRestEndPointHostName=ohs.example.com
.OAMRestEndPointPort
is set, make sure it is set toOAMRestEndPointPort=443
.OAMServerCommunicationMode
is set, make sure it is set toOAMServerCommunicationMode=HTTPS
.
-
Set Logout Redirect URL to
https://ohs.example.com/oam/server/logout
. -
Click Apply.
-
Repeat steps 6-9 for the rest of the agents.
Adding the Missing Policies to OAM
The following policies need adding to the IAM Suite domain if they do not exist:
Resource Type | Host Identifier | Resource URL | Protection Level | Authentication Policy | Authorization Policy |
---|---|---|---|---|---|
HTTP | IAMSuiteAgent | /consolehelp/** |
Excluded | ||
HTTP | IAMSuiteAgent | /management/** |
Excluded | ||
HTTP | IAMSuiteAgent | /otpfp/** |
Excluded | ||
HTTP | IAMSuiteAgent | /dms/** |
Excluded | ||
HTTP | IAMSuiteAgent | /iam/access/binding/api/v10/oap/** |
Excluded | ||
HTTP | IAMSuiteAgent | /iam/admin/config/api/v1/config/** |
Excluded | ||
HTTP | IAMSuiteAgent | /oam/services/rest/** |
Excluded | ||
HTTP | IAMSuiteAgent | /oauth2/rest/** |
Excluded | ||
HTTP | IAMSuiteAgent | /.well-known/openid-configuration |
Excluded | ||
HTTP | IAMSuiteAgent | /oauth2/rest/approval |
Protected | OAuth Authentication Policy | Protected Resource Policy |
HTTP | IAMSuiteAgent | /oam/pages/consent.jsp |
Protected | OAuth Authentication Policy | Protected Resource Policy |
-
Launch a browser and access the Oracle Access Management Console at
http://oam.example.com:7001/oamconsole
. Log in as the Access Manager administration user you created when you prepared the ID Store. For exampleoamadmin
. -
From the Launch pad click Application Domains in the Access Manager section.
-
Click Search on the Search page.
-
Click the domain IAM Suite.
-
Click the Resources tab and click Search.
-
If any of the above do not exist, then click Create and enter the information specified in the table above. Click Apply.
-
Repeat the above for any other missing resources.
Validating the Authentication Providers
Set the order of identity assertion and authentication providers in the WebLogic Server Administration Console:
-
Log in to the WebLogic Server Administration Console, if not already logged in.
-
Click Lock & Edit.
-
From the left navigation, select Security Realms.
-
Click the myrealm default realm entry.
-
Click the Providers tab.
-
From the table of providers, click the DefaultAuthenticator.
-
Set the Control Flag to
SUFFICIENT
. -
Click Save to save the settings.
-
From the navigation breadcrumbs, click Providers to return to the list of providers.
-
Click Reorder.
-
Sort the providers to ensure that the OAM Identity Assertion provider is first, and the DefaultAuthenticator provider is last
Sort Order Provider Control Flag 1 OAMIDAsserter REQUIRED
2 OUDAuthenticator SUFFICIENT
3 DefaultIdentityAsserter N/A
4 Trust Service Identity Asserter N/A
5 DefaultAuthenticator SUFFICIENT
-
Click OK.
-
Click Activate Changes to propagate the changes.
Configuring Oracle ADF and OPSS Security with Oracle Access Manager
Some Oracle Fusion Middleware management consoles use Oracle Application Development Framework (Oracle ADF) security, which can integrate with Oracle Access Manager Single Sign-on (SSO). These applications can take advantage of Oracle Platform Security Services (OPSS) SSO for user authentication, but you must first configure the domain-level jps-config.xml file to enable these capabilities.
To update the OPSS configuration to delegate SSO actions in Oracle Access Manager, complete the following steps:
-
Run the following commands to connect to the WebLogic Administration Server:
cd /u01/app/oracle/product/middlewareidm/oracle_common/common/bin ./wlst.sh connect('weblogic','<password>','t3://oam.example.com:7001')
-
Run the
addOAMSSOProvider
command as follows:addOAMSSOProvider(loginuri="/${app.context}/adfAuthentication", logouturi="/oam/logout.html")
The output should look similar to the following:
Location changed to domainRuntime tree. This is a read-only tree with DomainMBean as the root MBean. For more help, use help('domainRuntime')
-
Exit WLST:
exit()
Restart the Domain.
-
Stop the OAM servers:
cd /u01/app/oracle/admin/domains/oam_domain/bin ./stopManagedWebLogic.sh oam_policy_mgr1 ./stopManagedWebLogic.sh oam_server1 ./stopWebLogic.sh
-
Start the OAM servers:
cd /u01/app/oracle/admin/domains/oam_domain/bin ./startManagedWebLogic.sh oam_server1 ./startManagedWebLogic.sh oam_policy_mgr1 ./startWebLogic.sh
Next Tutorial
Install and Configure Oracle HTTP Server for Oracle Access Management 12c Sandbox Environment.
Feedback
To provide feedback on this tutorial, please contact idm_user_assistance_ww_grp@oracle.com
Acknowledgements
- Author - Russ Hodgson
More Learning Resources
Explore other labs on docs.oracle.com/learn or access more free learning content on the Oracle Learning YouTube channel. Additionally, visit education.oracle.com/learning-explorer to become an Oracle Learning Explorer.
For product documentation, visit Oracle Help Center.
Configure Oracle Access Management 12c Sandbox Environment
G18611-01
January 2025
Copyright © 2025 Oracle and/or its affiliates.