Privileged Access Management Integration
Introduction
Privileged Access Management (PAM) solutions eliminate the need for hard-coded application credentials embedded in applications, scripts, or configuration files, and allow highly sensitive passwords to be centrally stored, logged, and managed within the Vault. This unique approach enables organizations to comply with internal and regulatory compliance requirements of periodic password replacement, and monitor and audit privileged access across all systems, databases, and applications.
PAM solutions help provide secure privileged access to critical assets like database and hosts by centrally managing account passwords. PAM solutions provide access rules for both privileged and non-privileged accounts to control who can use those accounts to log on to your assets. As Enterprise Manager (EM) customers incorporate different PAM providers like CyberArk, Centrify, HashiCorp, Oracle Key Vault, etc. Now, we have an extensible Enterprise Manager credential framework that is integrated with PAM providers. This integration allows you to perform tasks such as active database management, database patching, and running host commands in a manner that is compliant with security compliance policies.
The PAM integration with EM provides:
-
PAM solutions provide an external store where credentials are stored and can serve to extend EM’s credentials framework, thereby offering an abstraction layer through the integration.
-
The database or host credentials that are either stored in the repository or in PAM Store need to be supplied to the subsystems in EM using methods such as Jobs and deployment procedures as required.
-
PAM is a secure system so the integration with EM should support token-based authorization for secure access.
-
Since the credentials for database and hosts are stored in PAM and there are multiple PAM providers in the market, EM provides the ability to register the PAM script to securely retrieve the credentials.
-
A data model to create a mapping that allows to create an EM Credential type out of the attributes of the credential fetched from the credential store.
-
This integration allows you to either create a new PAM based named credentials for EM to retrieve the credentials from an external store or modify an existing named credentials to retrieve the credentials from an external store.
-
EM provides the ability to effectively retrieve the password for databases or hosts from PAM to perform activities such as executing jobs and patching databases using fleet maintenance through EM in a manner compliant with their security policies.
Note:
PAM integration with Enterprise Manager only works with Names Credentials.
The diagram below depicts how EM interacts with PAM to retrieve the credentials for database or host from an external store to carry out functionalities in EM such as executing jobs on host or database and database patching using Fleet Maintenance.

Using the PAM integration, EM retrieves database and host credentials that are now stored in the external PAM store. To accomplish this, you need to write the integration script that will be registered in EM with all the PAM attributes. When EM requires the database or hosts credentials for using in workflows like database patching or running jobs, the credential framework interacts with the external PAM provider and retrieves the password for database or hosts and passes that credential object to the underlying workflows.
PAM integration with EM consists of three simple steps for all PAM providers.

Understanding the User Roles
Two types of administrators are involved in the integration of the PAM solution: EM Administrator and PAM Security Administrator. The shared ownership of the PAM integration solution with EM is depicted below:

PAM Security Administrator Role
A PAM security team should guide the EM administrator team to build a script and provide the necessary parameters required for the script execution. This script is required in order to access the PAM provider using REST end points and retrieve credentials for databases or hosts at runtime. The script can be written in Shell or Perl.
EM Administrator Role
An EM Administrator, predefined in EM, configures the PAM script in Enterprise Manager by running the emcli commands.
Configuration
Step 1: Develop a script to access PAM credentials
As a PAM Security Administrator, work with your Security or PAM team to develop a script for PAM tools such as CyberArk, and HashiCorp. This custom script connects to a PAM system and retrieves the necessary credentials. The script must meet the following requirements:
-
Written in Shell or Perl. Binary files are not supported.
-
Can use any method to fetch credentials like REST or command line tool.
-
Each credential stored in the PAM system can be referred to using a unique identifier, called a Credential Key. The Credential Key should also be passed on as an argument to the script. You can decide how the argument should be passed, for example any of the formats listed below:
sh getcreds.sh -k CredKey
sh getcreds.sh -credkey CredKey
sh getcreds.sh CredKey
-
Credentials or authentication tokens required to authenticate a PAM system should be passed through STDIN as
key:value
pair, not specified in the script. Use one of the ways as shown below:-
Script requires just auth token to authenticate with PAM system: On execution of script it should prompt for auth token which is then passed through STDIN:
sh getcreds.sh -k CredKey authtoken:token
-
Script requires PAM user and password to authenticate with PAM system: On execution of script it should prompt for PAM User & Password which is then passed through STDIN:
pamuser:user pampassword:password
-
Script requires PAM user, password, certificate path and certificate key to authenticate with PAM system: On execution of script it should prompt for PAM user & password with certificate details:
pamuser:user pampassword:password pamcertpath:path pamcertkey:key
A script built to accept certain input parameters securely through STDIN can be configured as is in Enterprise Manager, so when EM executes the script it passes values for such input parameters through STDIN.
-
-
The script should fetch and print the credentials in a name:value format as shown below.
sh getcreds.sh -k EMDB/sysman pamuser:user pampassword:password
In above example, EMDB/sysman is the Credential key and user/password is the credential fetched from the PAM system.
-
Script should capture error/exception during execution. The errors should be formatted as string, and should be written to STDERR for EM to read and show it in GUI and in calling subsystem processes.
- The script will be run in any of the OMS hosts in a multi-oms setup, so all the required software installation and configuration required for script execution should be done on all the OMS hosts.
Step 2: Register the PAM Provider with EM
As an EM Administrator, register the PAM provider with EM using the EM CLI command emcli config_cred_provider
.
This is a new verb that allows the credential provider to be configured with the required attributes.
emcli config_cred_provider
[-provider_name=\"provider name\"]
[-provider_type=\"provider type\"]
[-access_cred_type=\"cred type\"]
-params="params"
[-refparams="params"]
[-input_file="FILE:file_path"]
[-separator="separator:attribute_name:character"]
[-subseparator="subseparator:attribute_name:character"]
Options:
-
-provider_name
: Name of the provider to configure and should contain only alphabets, numbers, hyphen(-) and underscore(_) and not exceed 64 characters. -provider_type
: Credential provider type. Current allowed value isScriptProvider
.-
-access_cred_type
: The type of credential that is required to authenticate against this credential provider.Example: In case of using PAM user credentials to authenticate with PAM system then create named credentials of type "Host Credentials using the PAM user and password and provide
-access_cred_type="HostCreds"
and then map the named credential to PAM provider created usingset_credprovider_cred
. -
-params
: Comma separated set of name=value pairs. It can be used in conjunction with- input_file
to specify tags to file paths that contain longer content.Example:
-params="Command:sh %ScriptFile% -key %CredKey%;StdInVars:CACertLoc,AuthToken;ScriptFileExt:sh;Script:getCyberArkPassword"
-
Example commands that need to be run to fetch credential from PAM depending on the script type being used:
sh %ScriptFile% -key %CredKey%
perl %ScriptFile% -k %CredKey%
ScriptFile
andCredKey
are mandatory keywords, while%ScriptFile%
will be replaced by the script file name (in OMS file system), and%CredKey%
will be replaced by the credential key provided while creating the named credential. -
StdInVars
: list of input parameters separated by comma that needs to be passed through standard inputExample:
StdInVars:AuthToken; StdInVars:CACertLoc,AuthToken;
-
ScriptFileExt
: supported script file extensions:sh
pl
Script
: tag pointing to the actual script file path which will be defined in the parameterinput_file
.
-
-
-input_file
: to specify tag pointing to actual file path.Example:
-input_file="getCyberArkPassword:/u01/app/pam_scripts/getcreds.sh"
-
-refparams
: Comma separated set of name=value pairs. Can be used to map input parameters to integration script to any of three below mentioned OMS properties:- "oracle.sysman.core.security.auth.cred_provider_prop1"
- "oracle.sysman.core.security.auth.cred_provider_prop2"
- "oracle.sysman.core.security.auth.cred_provider_prop3"
Example:
sh getcreds.sh -k CredKey
pamuser:user
pampassword:password
authtoken:token
./emcli config_cred_provider
-provider_name="CyberArk"
-provider_type=ScriptProvider \
-params="Command:sh %ScriptFile% -k %CredKey%;StdInVars:CACertLoc,AuthToken;ScriptFileExt:sh;Script:getCyberArkPassword"\
-input_file="getCyberArkPassToken:/u01/app/pam_scripts/getcreds.sh"\
-refparams="AuthToken:oracle.sysman.core.security.auth.cred_provider_prop1,CACertLoc:oracle.sysman.core.security.auth.cred_provider_prop2"
Once the script is registered in EM, it is stored in the repository table EM_NC_CREDPROVIDER_PARAMS and you can run a select
query to see the data. Here is an example of a query:
SELECT * FROM EM_NC_CREDPROVIDER_PARAMS;
Note:
If you would like to re-create the PAM provider registration with EM, you can use the emcli delete_cred_provider
command and then execute the emcli config_cred_provider
command to re-create it.
Step 3: Create the Credentials Attributes Mappings
Credentials mappings map the keys in the script output (user and password in this example) to credential attributes like HostUserName
and HostPassword
. Store an attribute mapping to convert stored attributes to those required by credential type. In order to find the credential type attribute names, run the following command:
emcli get_credtype_metadata -authtargettype=<authenticating target type> -credtype=<credential type>
For example, the following command lists the attribute names for HostCreds
credential type and host target type.
emcli get_credtype_metadata -authtargettype=host -credtype=HostCreds
Run the following command to create the credentials mappings:
emcli store_cred_mapping
-mapper_name="mapper name"
-mapper_desc="mapper description"
-cred_type="cred type"
-attributesmap="attributes map"
Options:
-mapper_name
: Name of mapper.-mapper_desc
: Description of mapper-cred_type
: Type of credential that this mapping is intended for.-attributesmap
: Comma separated set ofname=value
pairs that maps attributes stored in the credential provider to attributes of the specified credential type.
Here are some examples of mappings for a host and a database:
-
Host
emcli store_cred_mapping -mapper_name="PAMtoHostCreds" -mapper_desc="Map PAM credential attributes to HostCreds type" -auth_target_type=host -cred_type="HostCreds" -attributesmap="user:HostUserName;pass:HostPassword"
-
Database
emcli store_cred_mapping -mapper_name="PAMtoDBCreds" -mapper_desc="Map PAM credential attributes to DBCreds type" -auth_target_type=oracle_database -cred_type="DBCreds" -attributesmap="user:DBUserName;pass:DBpassword"
Once the credential mapping is created this information is stored in the EM repository tables EM_NC_CRED_MAPPERS and EM_NC_CRED_MAPPER_COLUMNS.
Here is an example to check in repository database:
SELECT m.mapper_name, m.cred_type_name, mc.storage_attr, mc.cred_attr FROM EM_NC_CRED_MAPPERS m, EM_NC_CRED_MAPPER_COLUMNS mc WHERE mc.mapper_guid = m.mapper_guid ORDER BY m.mapper_name;
Note:
If you would like to re-create the credential mapping, you can use the emcli delete_cred_mapping
command and then execute the emcli store_cred_mapping
command to re-create it.
Case 1: If the username is not passed while creating the PAM based named credentials, then it should be returned in the script output as shown below.
Example: If you don’t pass the database username in the attributes while creating PAM based named credentials, then it should be returned in the script and mapped using the store_cred_mapping
command for Enterprise Manager to understand.
./emcli create_named_credential
-cred_name=OEM_SYSPAM -auth_target_type=oracle_database
-cred_type=DBCreds
-alt_cred_storage
-cred_provider=PAM360
-cred_key="HRDB/sys"
-cred_mapping=PAM360toDBCreds
-attributes="DBRole:SYSDBA"

./emcli store_cred_mapping
-mapper_name="PAM360toDBCreds"
-mapper_desc="Map PAM 360 credential attributes to DBCreds type"
-auth_target_type=oracle_database
-cred_type="DBCreds"
-attributesmap="user:DBUserName;pass:DBpassword"
Case 2: If the username is passed while creating the PAM based named credential, then the script can be built just to return the password as shown below:
Example: If you pass the DB username in the attributes while creating PAM based named credentials, then only the password can be returned in the script and maped using the store_cred_mapping
command for Enterprise Manager to understand.
./emcli create_named_credential
-cred_name=OEM_SYSPAMD
-auth_target_type=oracle_database
-cred_type=DBCreds
-alt_cred_storage
-cred_provider=PAM360
-cred_key="HRDB/sys"
-cred_mapping=PAM360toDBCreds
-attributes="DBUserName:sys;DBRole:SYSDBA"

./emcli store_cred_mapping
-mapper_name="PAM360toDBCreds"
-mapper_desc="Map PAM 360 credential attributes to DBCreds type"
-auth_target_type=oracle_database
-cred_type="DBCreds"
-attributesmap="pass:DBpassword"
Step 4: Create or Modify the Named Credentials
Starting with Oracle Enterprise Manager 13c Release 5 Update 20 (13.5.0.20) credentials can be created using the CLI or the UI.
To create credentials using the UI, from the Settings drop-down menu, go to Security, and click Named Credentials. Click Create, and select the PAM radio button for the Credential Properties options.
Note:
To have the PAM option available in the UI, make sure to complete steps 2 and 3:
Follow the steps bellow to create the credentials as an EM Administrator
, using the CLI:
-
Use an EM CLI verb to create the new credentials in EM with an alternate credential storage type. The following example creates the named credential ssh1 based on the SSH key named credentials for host myhost.example.com. It indicates that the credential attributes are stored in the OracleKeyVault credential provider at the location emssh1 and that the mapping named OKVSSHCreds can map the attributes required for the HostSSHCreds credential type.
emcli create_named_credential -cred_name=ssh1 -auth_target_type=host -cred_type=HostSSHCreds -target_name="myhost.example.com" -target_type=host -cred_scope=instance -alt_cred_storage -cred_provider=<PAM Provider> -cred_key=emssh1 -cred_mapping=OKVSSHCreds
-
Modify the Named Credentials as needed. Similar to create_named_cred, the modify_named_credential verb also takes the additional parameters : alt_cred_storage, cred_provider, cred_key, cred_mapping
The following example modifies the named credential ssh1 based on the SSH key named credentials for host myhost.example.com. It indicates that the credential attributes are stored in the OracleKeyVault credential provider at the location emssh1 and that the mapping named OKVSSHCreds can map the attributes required for the HostSSHCreds credential type.
emcli modify_named_credential -cred_name=<credential name> -auth_target_type=host -cred_type=HostSSHCreds -target_name="myhost.example.com" -target_type=host -cred_scope=instance -alt_cred_storage -cred_provider=OracleKeyVault-cred_key=emssh1 -cred_mapping=OKVSSHCreds
Examples:
emcli modify_named_credential -cred_name=ORACLE -cred_type=HostCreds -target_type=host -cred_scope=global -alt_cred_storage -cred_provider=PAM360 -cred_key="DBHost/oracle" -cred_mapping=PAM360toHostCreds
emcli modify_named_credential -cred_name=OEM_SYS -cred_type= DBCreds -auth_target_type=oracle_database -cred_scope=global -alt_cred_storage -cred_provider=PAM360 -cred_key="HRDB/sys" -cred_mapping=PAM360TODBCREDS
The credential name, type and owner, and storage provider and key, and mapper name are stored in the EM repository tables EM_NC_CRED_MAPPERS and EM_NC_CREDS.
Here is an example of a query of this data:
SELECT c.cred_owner, c.cred_type_name, c.cred_name, c.storage_provider, c.storage_key, m.mapper_name FROM EM_NC_CREDS c, EM_NC_CRED_MAPPERS m WHERE c.cred_name IN ('MANIDB_SYSMAN', 'DBSNMP_LOCAL') AND c.storage_cred_mapper_guid = m.mapper_guid (+)
-
Validate the stored credential by querying the registered and configured PAM provider. The list_cred_mappings is a new verb that shows the result of the earlier store_cred_mapping requests. The list_credential_providers is a new verb that shows the result of the earlier config_cred_provider request.
emcli list_credential_providers
Lists the configured credential providers.
emcli list_cred_mappings -cred_type="cred_type" [-cred_owner="cred_owner"]
Lists the configured credential mappings for a given credential type (and optional credential owner).
Options:
-cred_type
: lists the credential type for which the mappings are requested
At the completion of these steps, the PAM provider is registered with EM and either a new credential or a modified existing named credential is set up to use the external storage type.
Configuration of Multi-OMS Environments
PAM integration allows the use of the predefined OMS properties mentioned below to set the input parameters of the integration script. However, these OMS properties are local to each OMS and it is required to set values for the properties on each OMS as needed in the multi-OMS environment.
- oracle.sysman.core.security.auth.cred_provider_prop1
- oracle.sysman.core.security.auth.cred_provider_prop2
- oracle.sysman.core.security.auth.cred_provider_prop3
$ emctl set property
-name "oracle.sysman.core.security.auth.cred_provider_prop1"
-value "<value provided by your internal security team>"
The rest of the setup steps should be executed only once from one of the OMS servers:
config_cred_provider
(Step 2): should be executed only once from one of the OMS servers, and the script content will be stored in the database as a CLOB. The executable script is created in an internal EM directory on each OMS, whenever a PAM credential is invoked.store_cred_mapping
(Step 3): should be executed only once from one of the OMS servers. The contents of the mapping is stored in the EM repository database, and will be used while processing the script output.create_named_credential
/modify_named_credential
(Step 4): should be executed from one of the OMS servers
PAM configurations suported in EM
Case 1
Use global OMS properties to store script input parameters to authenticate with PAM system (In case a dedicated PAM user to be used for authentication with PAM system).
- "oracle.sysman.core.security.auth.cred_provider_prop1"
- "oracle.sysman.core.security.auth.cred_provider_prop2"
- "oracle.sysman.core.security.auth.cred_provider_prop3"
Example:
sh getcreds.sh -k CredKey
pamuser:user
pampassword:password
authtoken:token
./emcli config_cred_provider-provider_name="CyberArk"\
-provider_type=ScriptProvider\
-params="Command:sh %ScriptFile% -k %CredKey%;StdInVars:CACertLoc,AuthToken;ScriptFileExt:sh;Script:getCyberArkPassword"\
-input_file="getCyberArkPassToken:/u01/app/pam_scripts/getcreds.sh"\
-refparams="AuthToken:oracle.sysman.core.security.auth.cred_provider_prop1,CACertLoc:oracle.sysman.core.security.auth.cred_provider_prop2"
Case 2
Use of named credential to store PAM authentication details like PAM User Credentials (In case an individual PAM credentials to be used to authenticate with PAM system).
-
Script when executed prompts to enter PAM user details:
sh getcreds.sh -k CredKey pamuser:user pampassword:password
-
Create a config cred provider with access cred type as HostCreds:
./emcli config_cred_provider-provider_name="CyberArk"\ -provider_type=ScriptProvider\ -access_cred_type="HostCreds"\ -params="Command:sh %ScriptFile% -k %CredKey%;StdInVars:CACertLoc,AuthToken;ScriptFileExt:sh;Script:getCyberArkPassword"\ -input_file="getCyberArkPassToken:/u01/app/pam_scripts/getcreds.sh"\ -refparams="AuthToken:oracle.sysman.core.security.auth.cred_provider_prop1"
-
Create a named credential to store PAM user details:
emcli create_named_credential -cred_name="PAMCreds" -auth_target_type=host -cred_type=HostCreds -attributes="HostUserName:pam_username;HostPassword:pam_password"
-
Set credential to be used for cred provider:
emcli set_credprovider_cred -provider_name= CyberArk -cred_name="PAMCreds"
Typical Use cases
The PAM integration with EM provides a key benefit for the Database Lifecyle Management capabilities, the patching with Fleet Maintenance in particular. This integration allows the use of named credentials stored with PAM to be used during patching tasks.
Patching with Fleet Maintenance
Here are some examples of use cases you can try using Fleet Maintenance. For more information, see Database Fleet Maintenance
Frequently Asked Questions about PAM Integration with Enterprise Manager
This section provides answers to the following frequently asked questions about PAM Integration with Enterprise Manager
- What are the components of a PAM integration script?
- How does Enterprise Manager read errors occurring in the PAM integration script?
- How does the PAM integration script get stored within EM and how does EM handle tamperings of the script?
- How to map the script output to an Enterprise Manager credential object?
- What are the parameters to be passed in the config_cred_provider emcli command?
- What are the available global parameters to be used with the PAM integration feature in EM?
- What are the file permissions to be set on the script to register a PAM provider in EM?
- How to avoid long running times of the PAM integration script?
- How To Integrate third party PAM Users to OEM Credentials?
- How To Integrate Cyberark PAM Users to OEM Credentials?
- How To Install and config PAM 360 and configure users?
- How To Integrate third party PAM Hashi Crop Users to OEM Credentials?
What are the components of a PAM integration script?
PAM Integration Script Includes: Inputs, processing logic and outputs:
-
Inputs: parameters passed to the script by Enterprise Manager.
-
Body: processing logic depends on PAM product/solution.
-
Outputs: script output for Enterprise Manager to read and map to credential object.
As mentioned above, Enterprise Manager only understands PAM integration script inputs and outputs.
- Inputs to script are configured while creating the PAM credential provider using the
emcli config_cred_provider
command. - Map script output to Enterprise Manager credential object using the
emcli store_cred_mapping
command.
How does Enterprise Manager read errors occurring in the PAM integration script?
Enhance PAM integration script to catch all the errors/exceptions and write all error messages to STDERR for Enterprise Manager to process as shown below:
-
Write to STDERR in the shell script using the syntax:
echo "error message" 1>&2
Enterprise Manager reads the error messages from the STDERR and shows it in the GUI, and in calling sub system process, susch as jobs and deployment procedures.
Example: Error message written to STDERR will be shown in EM GUI and EM Jobs as shown below.


How does the PAM integration script get stored within EM and how does EM handle tamperings of the script?
Step 1: Enterprise Manager supports script in Shell and Perl.
The contents of the script are stored in the repository database as CLOB data when the emcli config_cred_provider
command is executed to register the script in EM.
Step 2: When the PAM based named credential is invoked after executing emcli config_cred_provider
:
- It creates the executable integration script stored as CLOB in the EM repository in the internal EM directory.
- If the script file already exists, EM validates the checksum of the script in the internal directory with the checksum of the script in the form of CLOB data, and if the checksum value is the same for both, then it continues to use the integration script in the path. If not, it creates a new integration script file in the EM internal directory with the new CLOB data for the script execution. Any subsequent PAM credential invocation uses the same integration script file in the path which is already created if it is not tampered by any user, or updated by executing the
emcli config_cred_provider
.
Any tampering or security breach of the script is addressed within Enterprise Manager using checksum validation as explained above.
How to map the script output to an Enterprise Manager credential object?
Case 1
If the username is not passed while creating the PAM based named credential, then the script output should include username as shown below:
Example: If you don’t pass DB username in the attributes while creating PAM based named credential, then it should be included in the script output and map it using store_cred_mapping command for Enterprise Manager to read it from script output and map it to EM credential object.
./emcli create_named_credential
-cred_name=OEM_SYSPAM
-auth_target_type=oracle_database
-cred_type=DBCreds
-alt_cred_storage
-cred_provider=PAM360
-cred_key="HRDB/sys"
-cred_mapping=PAM360toDBCreds
-attributes="DBRole:SYSDBA"
./emcli store_cred_mapping
-mapper_name="PAM360toDBCreds"
-mapper_desc="Map PAM 360 credential attributes to DBCreds type"
-auth_target_type=oracle_database
-cred_type="DBCreds"
-attributesmap="user:DBUserName;pass:DBPassword"
Case 2
If the username is passed while creating the PAM based named credential, then the script can be built just to return the password in the output as shown below:
Example: If you pass the DB username in the attributes while creating the PAM based named credential, then only the password can be returned in the script output, and map it using the store_cred_mapping
command for Enterprise Manager to read it from the script output and map it to the EM credential object.
./emcli create_named_credential
-cred_name=OEM_SYSPAMD
-auth_target_type=oracle_database
-cred_type=DBCreds
-alt_cred_storage
-cred_provider=PAM360
-cred_key="HRDB/sys"
-cred_mapping=PAM360toDBCreds
-attributes="DBUserName:sys;DBRole:SYSDBA"
./emcli store_cred_mapping
-mapper_name="PAM360toDBCreds"
-mapper_desc="Map PAM 360 credential attributes to DBCreds type"
-auth_target_type=oracle_database
-cred_type="DBCreds"
-attributesmap="pass:DBPassword"
What are the parameters to be passed in the config_cred_provider emcli command?
emcli config_cred_provider
[-provider_name=\"provider name\"]
[-provider_type=\"provider type\"]
-params="params"
[-refparams="params"]
[-input_file="FILE:file_path"][-separator="separator:attribute_name:character"]
[-subseparator="subseparator:attribute_name:character"]
Options:
-provider_name
: Name of the provider to configure. Name should contain only alphabets, numbers, hyphen(-) and underscore(_) and not exceed 64 characters.
-provider_type
: Optional. Credential provider type. This must be one of the supported provider types: ScriptProvider
.
-params
: Comma separated set of name=value pairs.
-input_file
: to specify tags to file paths that contain longer content.
-refparams
: Comma separated set of name=value pairs. Can be used to map PAM provider parameters to OMS properties such as: "oracle.sysman.core.security.auth.cred_provider_prop1".
Note:
config_cred_provider
: if executed for the first time, it behaves like a creation, and later executions with the same provider_name
behaves like a modification. To modify any of the provider details, execute the emcli config_cred_provider
command with the same provider name.
What are the available global parameters to be used with the PAM integration feature in EM?
As part of this feature, Enterprise Manager has three global parameters configured to be used for storing PAM parameters, such as authentication token and authentication details.
Customer can use any of the below pre-configured parameters for the PAM integration.
oracle.sysman.core.security.auth.cred_provider_prop1
oracle.sysman.core.security.auth.cred_provider_prop2
oracle.sysman.core.security.auth.cred_provider_prop3