15 Configuring Single Sign-On for an Enterprise Deployment
You need to configure the Oracle HTTP Server WebGate in order to enable single sign-on with Oracle Access Manager.
- About Oracle HTTP Server Webgate
Oracle HTTP Server WebGate is a web server plug-in that intercepts HTTP requests and forwards them to an existing Oracle Access Manager instance for authentication and authorization. - General Prerequisites for Configuring Oracle HTTP Server WebGate
Before you can configure Oracle HTTP Server WebGate, you must have installed and configured a certified version of Oracle Access Manager. - Enterprise Deployment Prerequisites for Configuring OHS 12c Webgate
When you are configuring Oracle HTTP Server Webgate to enable single sign-on for an enterprise deployment, consider the prerequisites mentioned in this section. - Configuring Oracle HTTP Server 12c WebGate for an Enterprise Deployment
You need to perform the following steps in order to configure Oracle HTTP Server 12c WebGate for Oracle Access Manager on both WEBHOST1 and WEBHOST2. - Registering the Oracle HTTP Server WebGate with Oracle Access Manager
You can register the WebGate agent with Oracle Access Manager using the Oracle Access Manager Administration console. - Setting Up the WebLogic Server Authentication Providers
To set up the WebLogic Server authentication providers, back up the configuration files, set up the Oracle Access Manager Identity Assertion Provider and set the order of providers. - Configuring Oracle ADF and OPSS Security with Oracle Access Manager
Some Oracle Fusion Middleware management consoles use Oracle Application Development Framework (Oracle ADF) security, which can integrate with Oracle Access Manager Single Sign On (SSO). These applications can take advantage of Oracle Platform Security Services (OPSS) SSO for user authentication, but you must first configure the domain-leveljps-config.xml
file to enable these capabilities. - Configuring Single Sign-On for Applications
This section describes how to enable single sign-on (SSO) for Oracle Analytics Server applications.
About Oracle HTTP Server Webgate
Oracle HTTP Server WebGate is a web server plug-in that intercepts HTTP requests and forwards them to an existing Oracle Access Manager instance for authentication and authorization.
For Oracle Fusion Middleware 12c, the Oracle WebGate software is installed as part of the Oracle HTTP Server 12c software installation. See Registering and Managing OAM 11g Agents in Adminstrator’s Guide for Oracle Access Management.
Parent topic: Configuring Single Sign-On for an Enterprise Deployment
General Prerequisites for Configuring Oracle HTTP Server WebGate
Before you can configure Oracle HTTP Server WebGate, you must have installed and configured a certified version of Oracle Access Manager.
For the most up-to-date information, see the certification document for your release on the Oracle Fusion Middleware Supported System Configurations page.
For WebGate certification matrix, click and open http://www.oracle.com/technetwork/middleware/id-mgmt/downloads/oam-webgates-2147084.html, then click the Certification Matrix for 12c Access Management WebGates link to download the certification matrix spreadsheet.
Note:
For production environments, it is highly recommended that you install Oracle Access Manager in its own environment and not on the machines that are hosting the enterprise deployment.
For more information about Oracle Access Manager, see the latest Oracle Identity and Access Management documentation, which you can find in the Middleware documentation on the Oracle Help Center.
Parent topic: Configuring Single Sign-On for an Enterprise Deployment
Enterprise Deployment Prerequisites for Configuring OHS 12c Webgate
When you are configuring Oracle HTTP Server Webgate to enable single sign-on for an enterprise deployment, consider the prerequisites mentioned in this section.
-
Oracle recommends that you deploy Oracle Access Manager as part of a highly available, secure, production environment. For more information about deploying Oracle Access Manager in an enterprise environment, see the Enterprise Deployment Guide for your version of Oracle Identity and Access Mangement.
-
To enable single sign-on for the WebLogic Server Administration Console and the Oracle Enterprise Manager Fusion Middleware Control, you must add a central LDAP-provisioned administration user to the directory service that Oracle Access Manager is using (for example, Oracle Internet Directory or Oracle Unified Directory). For more information about the required user and groups to add to the LDAP directory, follow the instructions in Creating a New LDAP Authenticator and Provisioning Enterprise Deployment Users and Group.
Note:
It is recommended that you use the WebGate version that is certified with your Oracle Access Manager deployment.Parent topic: Configuring Single Sign-On for an Enterprise Deployment
Configuring Oracle HTTP Server 12c WebGate for an Enterprise Deployment
You need to perform the following steps in order to configure Oracle HTTP Server 12c WebGate for Oracle Access Manager on both WEBHOST1 and WEBHOST2.
In the following procedure, replace the directory variables, such as WEB_ORACLE_HOME and WEB_CONFIG_DIR, with the values, as defined in File System and Directory Variables Used in This Guide.
-
Perform a complete backup of the web tier domain.
-
Change directory to the following location in the Oracle HTTP Server Oracle home:
cd
WEB_ORACLE_HOME
/webgate/ohs/tools/deployWebGate/
-
Run the following command to create the WebGate Instance directory and enable WebGate logging on OHS Instance:
./deployWebGateInstance.sh -w WEB_CONFIG_DIR -oh WEB_ORACLE_HOME
-
Verify that a
webgate
directory and subdirectories was created by thedeployWebGateInstance
command:ls -lat WEB_CONFIG_DIR/webgate/ total 16 drwxr-x---+ 8 orcl oinstall 20 Oct 2 07:14 .. drwxr-xr-x+ 4 orcl oinstall 4 Oct 2 07:14 . drwxr-xr-x+ 3 orcl oinstall 3 Oct 2 07:14 tools drwxr-xr-x+ 3 orcl oinstall 4 Oct 2 07:14 config
-
Run the following command to ensure that the
LD_LIBRARY_PATH
environment variable containsWEB_ORACLE_HOME/lib
directory path:export LD_LIBRARY_PATH=$LD_LIBRARY_PATH:WEB_ORACLE_HOME/lib
-
Change directory to the following directory
WEB_ORACLE_HOME/webgate/ohs/tools/setup/InstallTools
-
Run the following command from the
InstallTools
directory../EditHttpConf -w WEB_CONFIG_DIR -oh WEB_ORACLE_HOME -o output_file_name
Note:
The
-oh WEB_ORACLE_HOME
and-o output_file_name
parameters are optional.This command:
-
Copies the
apache_webgate.template
file from the Oracle HTTP Server Oracle home to a newwebgate.conf
file in the Oracle HTTP Server configuration directory. -
Updates the
httpd.conf
file to add one line, so it includes thewebgate.conf
. -
Generates a WebGate configuration file. The default name of the file is
webgate.conf
, but you can use a custom name by using the-o output_file_name
argument to the command.
-
Parent topic: Configuring Single Sign-On for an Enterprise Deployment
Registering the Oracle HTTP Server WebGate with Oracle Access Manager
You can register the WebGate agent with Oracle Access Manager using the Oracle Access Manager Administration console.
See Registering an OAM Agent Using the Console in Administrator's Guide for Oracle Access Management.
- About RREG In-Band and Out-of-Band Mode
- Updating the Standard Properties in the OAM11gRequest.xml File
- Updating the Protected, Public, and Excluded Resources for an Enterprise Deployment
- Running the RREG Tool
- Files and Artifacts Generated by RREG
- Copying Generated Artifacts to the Oracle HTTP Server WebGate Instance Location
- Insert OHS SimpleCA Certificate into the Wallet Artifact
- Enable MD5 Certificate Signatures for the Oracle HTTP Server Instances
- Restarting the Oracle HTTP Server Instance
Parent topic: Configuring Single Sign-On for an Enterprise Deployment
About RREG In-Band and Out-of-Band Mode
You can run the RREG Tool in one of the two modes: in-band and out-of-band.
Use in-band mode when you have the privileges to access the Oracle Access Manager server and run the RREG tool yourself from the Oracle Access Manager Oracle home. You can then copy the generated artifacts and files to the web server configuration directory after you run the RREG Tool.
Use out-of-band mode if you do not have privileges or access to the Oracle Access Manager server. For example, in some organizations, only the Oracle Access Manager server administrators have privileges to access the server directories and perform administration tasks on the server. In out-of-band mode, the process can work as follows:
-
The Oracle Access Manager server administrator provides you with a copy of the RREG archive file (RREG.tar.gz).
-
Untar the
RREG.tar.gz
file that was provided to you by the server administrator.For example:
gunzip RREG.tar.gz
tar -xvf RREG.tar
After you unpack the RREG archive, you can find the tool for registering the agent in the following location:
RREG_HOME
/bin/oamreg.sh
In this example,
RREG_Home
is the directory in which you extracted the contents of RREG archive. -
Use the instructions in Updating the Standard Properties in the OAM11gRequest.xml File to update the
OAM11GRequest.xml
file, and send the completedOAM11GRequest.xml
file to the Oracle Access Manager server administrator. -
The Oracle Access Manager server administrator then uses the instructions in Running the RREG Tool in Out-Of-Band Mode to run the RREG Tool and generate the
AgentID_response.xml
file. -
The Oracle Access Manager server administrator sends the
AgentID_response.xml
file to you. -
Use the instructions in Running the RREG Tool in Out-Of-Band Mode to run the RREG Tool with the
AgentID_response.xml
file and generate the required artifacts and files on the client system.
Updating the Standard Properties in the OAM11gRequest.xml File
Before you can register the Webgate agent with Oracle Access Manager, you must update some required properties in the OAM11gRequest.xml
file.
Note:
-
If you plan to use the default values for most of the parameters in the provided XML file, then you can use the shorter version (
OAM11gRequest_short.xml
, in which all non-listed fields take a default value. -
In the primary server list, the default names are mentioned as OAM_SERVER1 and OAM_SERVER2 for OAM servers. Rename these names in the list if the server names are changed in your environment.
To perform this task:
-
If you are using in-band mode, then change directory to the following location on one of the OAM Servers:
OAM_ORACLE_HOME/oam/server/rreg/input
If you are using out-of-band mode, then change directory to the location where you unpacked the RREG archive on the WEBHOST1 server.
-
Make a copy of the
OAM11GRequest.xml
file template with an environment-specific name.cp OAM11GRequest.xml OAM11GRequest_edg.xml
-
Review the properties listed in the file, and then update your copy of the
OAM11GRequest.xml
file to make sure that the properties reference the host names and other values specific to your environment.
Table 15-1 Fields in the OAM11GRequest.xml file.
OAM11gRequest.xml Property | Set to... |
---|---|
serverAddress |
The host and the port of the Administration Server for the Oracle Access Manager domain. |
agentName |
Any custom name for the agent. Typically, you use a name that identifies the Fusion Middleware product that you are configuring for single sign-on. |
applicationDomain |
A value that identifies the web tier host and the FMW component you are configuring for single sign-on. |
security |
Must be set to the security mode configured on the Oracle Access Management server. This is one of the three modes: open, simple, or certificate. Note: For an enterprise deployment, Oracle recommends simple mode, unless additional requirements exist to implement custom security certificates for the encryption of authentication and authorization traffic. In most cases, avoid using open mode, because in open mode, traffic to and from the Oracle Access Manager server is not encrypted. For more information using certificate mode or about Oracle Access Manager supported security modes in general, see Securing Communication Between OAM Servers and WebGates in Administrator's Guide for Oracle Access Management. |
cachePragmaHeader |
private |
cacheControlHeader |
private |
ipValidation |
0
If ipValidation is set to ‘1’, the IP address stored in the cookie must match the client's IP address, otherwise, the SSO cookie is rejected and the user must reauthenticate. This can cause problems with certain Web applications. For example, Web applications managed by a proxy server typically change the user's IP address, substituting the IP address of the proxy. Setting to ‘0’ Disables IP validation. |
ipValidationExceptions |
Can be empty when ipValidation is ‘0’. If IP Validation is true, the IP address is compared to the IP Validation Exceptions list. If the address is found on the exceptions list, it does not need to match the IP address stored in the cookie. You can add as many IP addresses as needed. For example, the IP address of the front end load balancer:
|
agentBaseUrl |
Fully-qualified URL with the host and the port of the front-end Load Balancer VIP in front of the WEBHOSTn machines on which Oracle HTTP 12c WebGates are installed. For example:
|
virtualHost |
Set to true when protecting more than the |
hostPortVariationsList
|
Add For example:
|
logOutUrls |
The Logout URL triggers the logout handler, which removes the cookie and requires the user to re-authenticate the next time the user accesses a resource protected by Access Manager. If Logout URL is not configured, the request URL is checked for
|
primaryServerList |
Verify that the host and the port of the OAM Managed Servers matches with this list. Example:
|
Updating the Protected, Public, and Excluded Resources for an Enterprise Deployment
OAM11gRequest.xml
file. To identify the URLs:
Running the RREG Tool
The following topics provide information about running the RREG tool to register your Oracle HTTP Server Webgate with Oracle Access Manager.
Running the RREG Tool in In-Band Mode
To run the RREG Tool in in-band mode:
-
Change to the RREG home directory.
If you are using in-band mode, the RREG directory is inside the Oracle Access Manager Oracle home:
OAM_ORACLE_HOME/oam/server/rreg
If you are using out-of-band mode, then the RREG home directory is the location where you unpacked the RREG archive.
-
Change to the following directory:
-
(UNIX)
RREG_HOME/bin
-
(Windows)
RREG_HOME\bin
cd RREG_HOME/bin/
-
-
Set the permissions of the
oamreg.sh
command so that you can process the file:chmod +x oamreg.sh
-
Enter the following command:
./oamreg.sh inband RREG_HOME/input/OAM11GRequest_edg.xml
In this example:
-
It is assumed that the edited
OAM11GRequest.xml
file is located in theRREG_HOME/input
directory. -
The output from this command is saved to the following directory:
RREG_HOME/output/
The following example shows a sample RREG session:
Welcome to OAM Remote Registration Tool!
Parameters passed to the registration tool are:
Mode: inband
Filename: /u01/oracle/products/fmw/iam_home/oam/server/rreg/client/rreg/input/OAM11GRequest_edg.xml
Enter admin username: [USERNAME_OF_OAM_CONSOLE]
Username: [USERNAME_OF_OAM_CONSOLE]
Enter admin password:
Do you want to enter a Webgate password?(y/n):
n
Do you want to import an URIs file?(y/n):
n
----------------------------------------
Request summary:
OAM11G Agent Name: OAS_EDG_AGENT
Base URL: https://bi.example.com
:443
URL String: https://bi.example.com
:443
Registering in Mode:inband
Your registration request is being sent to the Admin server at: http://host1.example.com:7001
----------------------------------------
Jul 08, 2015 7:18:13 PM oracle.security.jps.util.JpsUtil disableAudit
INFO: JpsUtil: isAuditDisabled set to true
Jul 08, 2015 7:18:14 PM oracle.security.jps.util.JpsUtil disableAudit
INFO: JpsUtil: isAuditDisabled set to true
Inband registration process completed successfully! Output artifacts are created in the output folder.
Parent topic: Running the RREG Tool
Running the RREG Tool in Out-Of-Band Mode
To run the RREG Tool in out-of-band mode on the WEBHOST server, the administrator uses the following command:
RREG_HOME/bin/oamreg.sh outofband input/OAM11GRequest.xml
In this example:
-
Replace RREG_HOME with the location where the RREG archive file was unpacked on the server.
-
The edited
OAM11GRequest.xml
file is located in theRREG_HOME/input
directory. -
The RREG Tool saves the output from this command (the
AgentID_response.xml
file) to the following directory:RREG_HOME/output/
The Oracle Access Manager server administrator can then send the
AgentID_response.xml
to the user who provided theOAM11GRequest.xml
file.
To run the RREG Tool in out-of-band mode on the web server client machine, use the following command:
RREG_HOME/bin/oamreg.sh outofband input/AgentID_response.xml
In this example:
-
Replace RREG_HOME with the location where you unpacked the RREG archive file on the client system.
-
The
AgentID_response.xml
file, which was provided by the Oracle Access Manager server administrator, is located in the RREG_HOME/input directory. -
The RREG Tool saves the output from this command (the artifacts and files required to register the Webgate software) to the following directory on the client machine:
RREG_HOME/output/
Parent topic: Running the RREG Tool
Files and Artifacts Generated by RREG
The files that are generated by the RREG Tool vary, depending on the security level that you are using for communications between the WebGate and the Oracle Access Manager server. See Securing Communication Between OAM Servers and WebGates in Administrator's Guide for Oracle Access Management.
Note that in this topic any references to RREG_HOME
should be replaced with the path to the directory where you ran the RREG tool. This is typically the following directory on the Oracle Access Manager server, or (if you are using out-of-band mode) the directory where you unpacked the RREG archive:
OAM_ORACLE_HOME/oam/server/rreg/client
The following table lists the artifacts that are always generated by the RREG Tool, regardless of the Oracle Access Manager security level.
File | Location |
---|---|
cwallet.sso |
RREG_HOME/output/Agent_ID/
Note: This is for OHS 12.2.1.3. For earlier releases of OHS, see Oracle IDM documentation. |
ObAccessClient.xml |
RREG_HOME/output/Agent_ID/ |
The following table lists the additional files that are created if you are using the SIMPLE or CERT security level for Oracle Access Manager:
File | Location |
---|---|
|
|
|
|
|
|
|
|
Note that the password.xml
file contains the obfuscated global passphrase to encrypt the private key used in SSL. This passphrase can be different than the passphrase used on the server.
You can use the files generated by RREG to generate a certificate request and get it signed by a third-party Certification Authority. To install an existing certificate, you must use the existing aaa_cert.pem
and aaa_chain.pem
files along with password.xml
and aaa_key.pem
.
Copying Generated Artifacts to the Oracle HTTP Server WebGate Instance Location
After the RREG Tool generates the required artifacts, manually copy the artifacts from the RREG_Home/output/agent_ID
directory to the Oracle HTTP Server configuration directory on the web tier host.
The location of the files in the Oracle HTTP Server configuration directory depends upon the Oracle Access Manager security mode setting (OPEN, SIMPLE, or CERT).
The following table lists the required location of each generated artifact in the Oracle HTTP Server configuration directory, based on the security mode setting for Oracle Access Manager. In some cases, you might have to create the directories if they do not exist already. For example, the wallet directory might not exist in the configuration directory.
Note:
For an enterprise deployment, Oracle recommends simple mode, unless additional requirements exist to implement custom security certificates for the encryption of authentication and authorization traffic. The information about using open or certification mode is provided here as a convenience.
Avoid using open mode, because in open mode, traffic to and from the Oracle Access Manager server is not encrypted.
For more information about using certificate mode or about Oracle Access Manager supported security modes in general, see Securing Communication Between OAM Servers and WebGates in Administrator's Guide for Oracle Access Management.
Table 15-2 Web Tier Host Location to Copy the Generated Artifacts
File | Location When Using OPEN Mode | Location When Using SIMPLE Mode | Location When Using CERT Mode |
---|---|---|---|
wallet/cwallet.sso Foot 1 |
WEB_CONFIG_DIR/webgate/config/wallet |
WEB_CONFIG_DIR/webgate/config/wallet/ By default the wallet folder is not available. Create the wallet folder under |
WEB_CONFIG_DIR/webgate/config/wallet/ |
ObAccessClient.xml |
WEB_CONFIG_DIR/webgate/config |
WEB_CONFIG_DIR/webgate/config/ |
WEB_CONFIG_DIR/webgate/config/ |
password.xml |
N/A | WEB_CONFIG_DIR/webgate/config/ |
WEB_CONFIG_DIR/webgate/config/ |
aaa_key.pem |
N/A | WEB_CONFIG_DIR/webgate/config/simple/ |
WEB_CONFIG_DIR/webgate/config/ |
aaa_cert.pem |
N/A | WEB_CONFIG_DIR/webgate/config/simple/ |
WEB_CONFIG_DIR/webgate/config/ |
Footnote 1 Copy cwallet.sso
from the wallet folder and not from the output folder. Even though there are 2 files with the same name they are different. The one in the wallet sub directory is the correct one.
Note:
If you need to redeploy theObAccessClient.xml
to WEBHOST1
and WEBHOST2
, delete the cached copy of ObAccessClient.xml
and its lock file, ObAccessClient.xml.lck
from the servers. The cache location on WEBHOST1
is:WEB_DOMAIN_HOME/servers/ohs1/cache/
And you must perform the similar step for the second Oracle HTTP Server instance on WEBHOST2
:
WEB_DOMAIN_HOME/servers/ohs2/cache/
Insert OHS SimpleCA Certificate into the Wallet Artifact
If the OHS servers have been configured with an 11g or earlier version of the OAM server, there is a need to insert the OHS SimpleCA certificate into the wallet file artifact that was deployed in Copying Generated Artifacts to the Oracle HTTP Server WebGate Instance Location.
-
On WEBHOST1, go to the following directory:
WEB_CONFIG_DIR/webgate/config/wallet
-
Run the following command to insert the SimpleCA certificate into the wallet file:
WEB_ORACLE_HOME/oracle_common/bin/orapki wallet add -wallet ./ -trusted_cert -cert WEB_ORACLE_HOME/webgate/ohs/tools/openssl/simpleCA/cacert.pem -auto_login_only
The following output is displayed:simpleCA/cacert.pem -auto_login_only Oracle PKI Tool : Version 12.2.1.3.0 Copyright (c) 2004, 2017, Oracle and/or its affiliates. All rights reserved. Operation is successfully completed.
-
Validate the certificate insertion with the following command:
WEB_ORACLE_HOME/oracle_common/bin/orapki wallet display -wallet ./
The following output is displayed:Oracle PKI Tool : Version 12.2.1.3.0 Copyright (c) 2004, 2017, Oracle and/or its affiliates. All rights reserved. Requested Certificates: User Certificates: Oracle Secret Store entries: OAMAgent@#3#@wcedgRwse01Env1Ps3_Key Trusted Certificates: Subject: CN=NetPoint Simple Security CA - Not for General Use,OU=NetPoint,O=Oblix\, Inc.,L=Cupertino,ST=California,C=US
Enable MD5 Certificate Signatures for the Oracle HTTP Server Instances
Some releases of Oracle Access Management Server implement simple mode security certificates by using MD5 signatures unless upgraded or patched appropriately. Oracle Recommends that, if possible, the OAM certificates are upgraded to SHA-2 certificates. This might not be possible for customers who have several versions of Oracle HTTP server to contend with.
If upgrading the certificates is not possible, support for MD5 signatures must be enabled manually to make Oracle HTTP server 12.2.1.x work with Oracle Access Manager 11g's MD5 certificates when you use a webgate in simple security mode.
-
On WEBHOST1, change to the following directory:
WEB_DOMAIN_HOME/config/fmwconfig/components/OHS/ohs1
-
Open the
ohs.plugins.nodemanager.properties
file, add the following line, and save the file.environment.ORACLE_SSL_ALLOW_MD5_CERT_SIGNATURES = 1
-
Repeat steps 1 and 2 for all other instances on the WEBHOSTn servers.
For example, the
ohs2
instance on WEBHOST2Note:
The change takes effect when the instances are restarted in the next topic.
Restarting the Oracle HTTP Server Instance
For information about restarting the Oracle HTTP Server instance, see Restarting Oracle HTTP Server Instances by Using WLST in Administering Oracle HTTP Server.
If you have configured Oracle HTTP Server in a WebLogic Server domain, you can also use Oracle Fusion Middleware Control to restart the Oracle HTTP Server instances. See Restarting Oracle HTTP Server Instances by Using Fusion Middleware Control in Administering Oracle HTTP Server.
Setting Up the WebLogic Server Authentication Providers
To set up the WebLogic Server authentication providers, back up the configuration files, set up the Oracle Access Manager Identity Assertion Provider and set the order of providers.
The following topics assumes that you have already configured the LDAP authenticator by following the steps in Creating a New LDAP Authenticator and Provisioning Enterprise Deployment Users and Group. If you have not already created the LDAP authenticator, then do so before you continue with this section.
- Backing Up Configuration Files
- Setting Up the Oracle Access Manager Identity Assertion Provider
- Updating the Default Authenticator and Setting the Order of Providers
Parent topic: Configuring Single Sign-On for an Enterprise Deployment
Backing Up Configuration Files
To be safe, you should first back up the relevant configuration files:
ASERVER_HOME/config/config.xml ASERVER_HOME/config/fmwconfig/jps-config.xml ASERVER_HOME/config/fmwconfig/system-jazn-data.xml
Also back up the boot.properties
file for the Administration Server:
ASERVER_HOME/servers/AdminServer/security/boot.properties
Parent topic: Setting Up the WebLogic Server Authentication Providers
Setting Up the Oracle Access Manager Identity Assertion Provider
Set up an Oracle Access Manager identity assertion provider in the Oracle WebLogic Server Administration Console.
- Log in to the WebLogic Server Administration Console, if not already logged in.
- Click Lock & Edit.
- Click Security Realms in the left navigation bar.
- Click the myrealm default realm entry.
- Click the Providers tab.
- Click New, and select the asserter type OAMIdentityAsserter from the drop-down menu.
- Name the asserter (for example, OAM ID Asserter) and click OK.
- Click the newly added asserter to see the configuration screen for the Oracle Access Manager identity assertion provider.
- Set the control flag to REQUIRED.
- Under Chosen types, select both the ObSSOCookie and OAM_REMOTE_USER options, if they are not selected by default.
- Click Save to save the settings.
- Click Activate Changes to propagate the changes.
Parent topic: Setting Up the WebLogic Server Authentication Providers
Updating the Default Authenticator and Setting the Order of Providers
Set the order of identity assertion and authentication providers in the WebLogic Server Administration console.
Parent topic: Setting Up the WebLogic Server Authentication Providers
Configuring Oracle ADF and OPSS Security with Oracle Access Manager
Some Oracle Fusion Middleware management consoles use Oracle Application Development Framework (Oracle ADF) security, which can integrate with Oracle Access Manager Single Sign On (SSO). These applications can take advantage of Oracle Platform Security Services (OPSS) SSO for user authentication, but you must first configure the domain-level jps-config.xml
file to enable these capabilities.
The domain-level jps-config.xml
file is located in the following location after you create an Oracle Fusion Middleware domain:
ASERVER_HOME/config/fmwconfig/jps-config.xml
Note:
The domain-level jps-config.xml
should not be confused with the jps-config.xml
that is deployed with custom applications.
Parent topic: Configuring Single Sign-On for an Enterprise Deployment
Configuring Single Sign-On for Applications
This section describes how to enable single sign-on (SSO) for Oracle Analytics Server applications.
It includes the following topics.
Parent topic: Configuring Single Sign-On for an Enterprise Deployment
Enabling Single Sign-On and Oracle Access Manager for Oracle Analytics Server
Parent topic: Configuring Single Sign-On for Applications