This chapter contains a checklist for deploying Oracle Access Manager with LDAP.
Table 6-1 Oracle Access Manager Deployment Checklist
Requirement | Check when Verified |
---|---|
Ensure that a supported Oracle Database, an Oracle Middleware Home, and a LDAP installation are available. |
|
Ensure that Oracle Access Manager, OPSS, and Audit schemas are created using Repository Creation Utility (RCU). |
|
Ensure that the WebLogic Domain hosting Oracle Access Manager is running in Production mode instead of Development mode. |
|
Ensure that Oracle Access Manager ports are not in use in addition to the HTTP/HTTPS ports used by Oracle Access Manager WebLogic Server Cluster. Oracle Access Manager also uses OAP and Coherence Ports (default value 5575, 9095 respectively). |
|
Ensure that |
|
Ensure that JVM is tuned to make maximum use of machine capacity. Ensure that the XMS and XMX values are set to same level (4-8 GB depending on machine capacity). Note: You can update JVM tuning parameters in the |
|
Ensure that your LDAP is preconfigured as an Identity Store as described in the Installation Guide for Oracle Identity and Access Management. |
|
Ensure that the Identity Store has the required schemas extended. Note: The specific schemas are loaded when the identity store is prepared. They are also present in the |
|
Ensure that the Identity Store is seeded with the required users, groups, and privileges, based on the input properties passed to the |
|
Ensure that the Note: When you configure Oracle Access Manager by using the |
|
Ensure that the LDAP Identity Store is configured in the Oracle Access Management Suite by using the Oracle Access Manager Administration Console. |
|
Ensure that Webgate/Agent communication to Oracle Access Manager servers is in either |
|
Ensure that Oracle HTTP Server is front ending the Oracle Access Manager Administration Console and has a webgate wired to Oracle Access Manager using the WebGate Agent profile created by |
|
Ensure that the Security Store is configured immediately after configuring Oracle Access Management WebLogic domain. You must do this before starting Oracle Access Manager servers. |
|
Ensure that WebLogic Server providers are configured correctly with OUD Authenticator or LDAP Authenticator pointing to the OUD Store or to the LDAP Store, respectively. You must configure WebLogic Server providers in the following sequence:
|
|
Ensure that the |
|
Ensure that Oracle Access Manager performance is tuned based on the tuning guidelines. For more information, see "Oracle Access Management Performance Tuning" in the Performance and Tuning Guide. |
|
Ensure that you have configured a custom login and error pages to meet your deployment requirements. |
|
Ensure that Webgate to Oracle Access Manager connectivity parameters are set to proper values: Threshold Timeout: Set to 10 seconds instead of the default value of -1. Max Session Time: Set to the half of firewall timeout between Webgate and the Oracle Access Manager server. |
|
Ensure that Oracle Access Manager to LDAP connectivity parameters are set to proper values: Connection Refresh time is set to half of the firewall timeout between Oracle Access Manager and LDAP store. Request time out is set to 2 seconds or higher. |
|
Ensure that the load balancer is configured to populate the IS SSL=ssl header if terminating SSL in front of web servers where webgate is installed. |
|
Ensure the Oracle Access Manager front end URL that is collecting user credentials is configured for SSL. |
|
Confirm that Oracle Access Manager-protected applications are not using the |
|
Confirm that common image file patterns are part of the excluded URL list (*.css, *.gif, *.png). |
|
If you have excluded the 'root' patterns, '/*', '/…/*' or '/**' in an Application Domain, ensure that you fully understand the security implications. |
|
If you have set 'DenyOnNotProtected' to false in Webgate profile, ensure that you fully understand the security implications. |
|
If managing password policy in Oracle Access Manager, ensure that the password policy is more restrictive that the policy used at LDAP level. This will ensure that the Directory/LDAP password never supersedes enforcement at the Oracle Access Management level. |
|
Ensure that you have reviewed the amount of Audit data produced for production load and adjusted settings (Low, Medium, High), so that only desired audit data is generated. |
|
Ensure that you have an Audit data purge scheduled that is compliant with your data retention policies. |
|