7 Configuring High Availability for Oracle Access Manager Components
An introduction to Oracle Access Manager and description of how to design and deploy a high availability environment for Access Manager.
Access Manager provides a single authoritative source for all authentication and authorization services. See Introduction to Oracle Access Manager in Oracle Fusion Middleware Administrator's Guide for Oracle Access Management.
- Access Manager Component Architecture
An introduction to primary Access Manager components and architecture. - Access Manager High Availability Concepts
- High Availability Directory Structure Prerequisites
- Access Manager High Availability Configuration Steps
- Deploying Oracle Identity and Access Management Cluster with Unicast Configuration
If multicast IP is disabled in deployment environment then you can deploy Oracle Identity and Access Management cluster with Unicast configuration.
Access Manager Component Architecture
An introduction to primary Access Manager components and architecture.
Figure 7-1 shows the Access Manager component architecture.
Figure 7-1 Access Manager Single Instance Architecture

Description of "Figure 7-1 Access Manager Single Instance Architecture"
Following are the components discussed in the Access Manager Single Instance Architecture:
-
User agents: Include web browsers, Java applications, and Web services applications. User agents access the Access Server and administration and configuration tools using HTTP.
-
Protected resources: Application or web page to which access is restricted. WebGates or Custom Agents control access to protected resources.
-
Administration and configuration tools: Administer and configure Access Manager with Oracle Access Management Console, Oracle Enterprise Manager Fusion Middleware Control and Oracle Enterprise Manager Grid Control, and WebLogic Scripting Tool (WLST).
-
Access Server: Includes Credential Collector and OAM Proxy components.
- Access Manager Component Characteristics
A typical Access Manager deployment consists of system entities such as user agents, protected resources, and access server. - Access Manager Configuration Artifacts
- Access Manager External Dependencies
Access Manager Component Characteristics
A typical Access Manager deployment consists of system entities such as user agents, protected resources, and access server.
A list of system entities and the characteristics required for an Access Manager deployment:
-
Access Manager Agents - Access Server extensions that ensure access is controlled according to policies that Access Server manages. Agents require the Access Server component to perform their functions. If Access Server is unavailable, access to protected servers is denied; users are locked out of the system.
-
Protected Resources (partnered applications) - Applications that Access Manager protects. Access to these resources depends on access control policies in Access Manager and enforced by Access Manager agents deployed in the protected resource's access path.
-
Access Server - Server side component. Provides core runtime access management services.
-
JMX Mbeans - Runtime Mbeans are packaged as part of the Access Server package. Config Mbeans are packaged as standalone WAR files.
-
WebLogic SSPI providers consist of Java classes that implement the SSPI interface along with Access Java Access JDK. AccessGates are built using pure Java Access JDK.
-
Oracle Access Management Console - Application that hosts Administration Console and provides services to manage Access Manager deployment.
-
WebLogic Scripting Tool - Java classes included in Access Server package. Limited administration of Access Manager deployment is supported via the command line.
-
Fusion Middleware Control and Enterprise Manager Grid Control - Access Manager integrates with Enterprise Manager Grid Control to show performance metrics and deployment topology.
-
Access Manager Proxy - Custom version of Apache MINA server. Includes MessageDrivenBeans and ResourceAdapters in addition to Java Server classes.
-
Data Repositories - Access Manager handles different types of information including Identity, Policy, Partner, Session and Transient data:
-
LDAP for Identity data
-
Files for Configuration and Partner data
-
Policy data will be stored in files or in an RDBMS
-
-
Oracle Access Manager WebGates are C-based agents that are intended to be deployed in web servers.
-
Oracle Single Sign-On Apache modules are C-based agents that are intended to be deployed in Oracle HTTP Server web servers.
Parent topic: Access Manager Component Architecture
Access Manager Configuration Artifacts
Access Manager configuration artifacts include:
Table 7-1 Access Manager Configuration Artifacts
Configuration Artifact | Description |
---|---|
DOMAIN_HOME/config/fmwconfig/oam-config.xml |
Configuration file which contains instance specific information. |
DOMAIN_HOME/config/fmwconfig/oam-policy.xml |
Policy store information. |
DOMAIN_HOME/config/fmwconfig/.oamkeystore |
Stores symmetric and asymmetric keys. |
DOMAIN_HOME/config/fmwconfig/component_events.xml |
Used for audit definition. |
DOMAIN_HOME/config/fmwconfig/jazn-data.xml |
Administration Console permissions |
DOMAIN_HOME/config/fmwconfig/servers/instanceName/logging.xml |
Logging configuration. Do not edit this file manually. |
DOMAIN_HOME/config/fmwconfig/servers/instanceName/dms_config.xml |
Tracing logging. Do not edit this file manually. |
DOMAIN_HOME/config/fmwconfig/cwallet.sso |
Stores passwords that OAM uses to connect to identity stores, database, and other entities. This is not for end user passwords. |
DOMAIN_HOME/output |
Stores agent configuration files. |
Parent topic: Access Manager Component Architecture
Access Manager External Dependencies
The following table describes Access Manager external runtime dependencies.
Table 7-2 Access Manager External Dependencies
Dependency | Description |
---|---|
LDAP based Identity Store |
|
OCSP Responder Service |
Real-time X.509 Certification Validation |
RDBMS Policy Store |
|
Oracle Identity Manager Policy Store (when Oracle Identity Manager-based password management is enabled) |
LDAP Repository containing Oblix Schema elements that are used to store Configuration, Metadata, and so on |
Identity Federation |
Dependency when Identity Federation Authentication Scheme is selected |
OCSP Responder Service |
Real-time X.509 Certification Validation |
Access Manager Log File Location
You deploy Access Manager on WebLogic Server. Log messages go to the server log file of the WebLogic Server that you deploy it on. The default server log location is:
Domain_HOME/servers/serverName/logs/ serverName-diagnostic.log
Parent topic: Access Manager External Dependencies
Access Manager High Availability Concepts
This following sections provide conceptual information about using Access Manager in a high availability two-node cluster.
Access Manager High Availability Architecture
Figure 7-2 shows an Access Manager high availability architecture:
Figure 7-2 Access Manager High Availability Architecture

Description of "Figure 7-2 Access Manager High Availability Architecture"
In Figure 7-2, the hardware load balancer receives incoming authentication requests and routes them to WEBHOST1 or WEBHOST2 in the web tier. These hosts have Oracle HTTP Server installed. Oracle HTTP Server then forwards requests on to the WebLogic managed servers using the WebLogic plugin mod_wl_ohs.conf
. See Oracle HTTP Server Configuration.
The load balancing router should use session stickiness for HTTP traffic only. OAP traffic does not use a load balancing router, so session stickiness is not required for OAP traffic.
Applications that other Oracle HTTP Servers access, that in turn have resources with restricted access, must have a WebGate and a custom agent configured. The WebGate on WEBHOST3 communicates with the Access Servers on OAMHOST1 and OAMHOST2 in the application tier using OAP. WEBHOST3 is an application web server, and for authentication, HTTP redirect routes requests to the load balancer and WEBHOST1 and WEBHOST2. For a high availability deployment, you can configure another host (for example, WEBHOST4) with the same components as WEBHOST3.
OAMHOST1 and OAMHOST2 deploy managed servers which host the Oracle Access Server application. These managed servers are configured in a cluster which enables the Access Servers to work in an active-active manner.
The Administration Server runs on OAMHOST1 and deploys the WebLogic Administration Console, Oracle Enterprise Manager Fusion Middleware Control, and the Oracle Access Management Console.
In the directory tier, the virtual IP idstore.example.com
routes the IDstore requests to LDAPHOST1 and LDAPHOST2, which comprise an active-active IDStore cluster. For example the virtual IP oud.example.com
is set up to route Oracle Unified Directory requests to OUDHOST1 and OUDHOST2, which comprise an active-active Oracle Unified Directory cluster.
An Oracle RAC database provides high availability in the data tier. The Oracle RAC database is configured in a JDBC multi data source or GridLink data source to protect the instance from Oracle RAC node failure.
In Access Manager, only one Access Manager cluster is supported per WebLogic Server domain. Access Manager clusters cannot span WebLogic Server domains.
A single instance Access Manager deployment satisfies the following high availability requirements:
-
Load handling
-
External connection management and monitoring
-
Recovery
-
Fault containment
-
Fault diagnostics
-
Administration Server offline
A multiple instance Access Manager deployment satisfies the following additional high availability requirements:
-
Redundancy
-
Client connection failover/continuity
-
Client load balancing
-
State management
Oracle recommends using an external load balancing router for inbound HTTP connections. Outbound external connections to LDAP Servers (or OAM policy engine PDP/PIP) are load balanced with support for connection failover. Therefore, a load balancer is not required. Access Manager agents, typically WebGates, can load balance connections across multiple Access Servers.
Access Manager agents open persistent TCP connections to the Access Servers. This requires firewall connection timeouts to be sufficiently large to avoid premature termination of TCP connections.
The Access Server and Access Manager Administration Console interface with the OAM policy engine for policy evaluation and management. The OAM policy engine internally depends on a database as the policy repository. The database interactions are encapsulated within the OAM policy engine, with only the connectivity configuration information managed by Access Manager. The high availability characteristics of the interaction between Access Manager and the OAM policy engine are:
-
The database connection information is configured in the Access Manager configuration file synchronized among the Access Manager instances.
-
Database communication is managed within the OAM policy engine, and generally decoupled from Access Manager and OAM policy engine interactions. The very first startup of an OAM server instance will fail, however, if the database is unreachable. An OAM policy engine bootstrap failure is treated as fatal by Access Manager, and the startup operation is aborted.
-
Access Manager policy management interfaces (in the Oracle Access Management Console and the CLI tool) fail if the database is unreachable, as seen by the OAM policy engine management service interfaces. The operation may be retried at a later point in time, but no automated retry is provided for management operations.
-
Following a successful policy modification in the database repository, the OAM policy engine layer in the OAM server runtimes retrieves and activates the changes within a configurable OAM policy engine database poll interval (configured through Access Manager configuration). A positive acknowledgement of a policy change must be received from each OAM server runtime, otherwise the policy change cannot be considered successfully activated. The administrator can use the Oracle Access Management Console to remove any Access Manager instance with a policy activation failure from service.
Parent topic: Access Manager High Availability Concepts
Protection from Failures and Expected Behaviors
The WebLogic Server infrastructure protects the Identity Management Service Infrastructure system from all process failures. These features protect an Access Manager high availability configuration from failure
-
Back channel OAP bindings use a primary/secondary model for failover. Front Channel HTTP bindings use a load balancing router for failover.
-
If an Access Server fails, a WebGate with a persistent connection to that server waits for the connection to timeout, then it switches over to the secondary (backup) Access Server. Outstanding requests fail over to the secondary server.
-
Access Manager Access Servers support a heartbeat check. Also, the WebLogic Node Manager on the Managed Server can monitor the application and restart it.
-
If a WebLogic Server node fails, external connection failover is based on the configuration, the retry timeout, and the number of retries. Access Manager Agent-Access Server failover is based on a timeout.
-
If the load balancing router or proxy server detects a WebLogic Server node failure, subsequent client connections route to the active instance, which picks up the session state and carries on with processing.
-
When the lifetime of a connection expires, pending requests complete before the connection terminates. The connection object returns to the pool.
-
When it receives an exception from another service, Access Manager retries external connection requests. You can configure the number of retries.
Parent topic: Access Manager High Availability Concepts
WebLogic Server Crash
If a Managed Server fails, Node Manager attempts to restart it locally
Ongoing requests from Oracle HTTP Server timeout and new requests are directed to the other Managed Server. After the server's restart completes on the failed node, Oracle HTTP Server resumes routing any incoming requests to the server.
Note:
Access Manager servers support a heartbeat check to determine if the access server can service its requests. It checks:
-
Whether the LDAP store can be accessed
-
Whether the policy store can be accessed
If the heartbeat succeeds, the Access Server can service requests and requests are sent to it. If the heartbeat fails, requests do not route to the Access Server.
Parent topic: Protection from Failures and Expected Behaviors
Node Failure
Node failures are treated in the same way as WebLogic Server fails.
Parent topic: Protection from Failures and Expected Behaviors
Database Failure
Multi data sources protect Access Manager service Infrastructure against failures. When an Oracle RAC database instance fails, connections are reestablished with available database instances. The multi data source enables you to configure connections to multiple instances in an Oracle RAC database.
For more on multi data source configuration, see Section 4.1.3, "Using Multi Data Sources with Oracle RAC".
Parent topic: Protection from Failures and Expected Behaviors
High Availability Directory Structure Prerequisites
A high availability deployment requires product installations and files to reside in specific directories. A standard directory structure facilitates configuration across nodes and product integration.
The following table describes high availability directory structure prerequisites.
Table 7-3 Directory Structure Prerequisites
Directory | Requirements |
---|---|
ORACLE_HOME |
Each product must have its own ORACLE_HOME. For example, OAM and OIM must go in separate ORACLE_HOME locations. ORACLE_HOME contents must be identical across all nodes. Across all nodes, ORACLE_HOME must:
|
DOMAIN_HOME and APPLICATION_DIRECTORY |
These directories must have the same path on all nodes. Put these directories in a separate file system location from ORACLE_HOME; do not put these directories in the ORACLE_HOME/ |
|
Each OAM and OIM installation requires its own, separate WebLogic Server installation. |
You have three options to set up the high availability directory structure:
-
Use shared storage to store ORACLE_HOME directories. Oracle recommends this option. Use a NFS exported by a NAS, or a cluster file system pointing to a SAN/NAS.
-
Use local storage and run all installation, upgrade, and patching procedures on one node, then replicate to other nodes (using rsync, for example.)
-
Use local storage and repeat all installation and patch procedures on each node.
Access Manager High Availability Configuration Steps
This section provides high-level instructions to set up a high availability deployment for Access Manager. This deployment includes two Oracle HTTP Servers, which distribute requests to two OAM servers. These OAM servers interact with an Oracle Real Application Clusters (Oracle RAC) database and, optionally, an external LDAP store. If any single component fails, the remaining components continue to function.
- Access Manager Configuration Prerequisites
- Running the Repository Creation Utility to Create the Database Schemas
- Installing Oracle WebLogic Server
- Installing and Configuring the Access Manager Application Tier
- Creating boot.properties for the Administration Server on OAMHOST1
- Starting OAMHOST1
- Validating OAMHOST1
- Configuring OAM on OAMHOST2
- Starting OAMHOST2
- Validating OAMHOST2
- Configuring Access Manager to Work with Oracle HTTP Server
- Configuring Access Manager to use an External LDAP Store
- Validating the Access Manager Configuration
- Scaling Up Access Manager Topology
- Scaling Out Access Manager
Access Manager Configuration Prerequisites
Before you configure Access Manager for high availability, you must:
-
Install Oracle WebLogic Server on OAMHOST1 and OAMHOST2. See Installing Oracle WebLogic Server.
-
Install the Oracle Identity Management executables on OAMHOST1 and OAMHOST2. See the Installing and Configuring the Access Manager Application Tier.
-
Run the Repository Creation Utility to create the Access Manager schemas in a database. See Running the Repository Creation Utility to Create the Database Schemas.
-
Ensure that a highly available LDAP implementation is available.
For example,
- Install the Infrastructure jar, jdk17.0.12
/bin/java -jar fmw_14.1.2.0.0_infrastructure.jar
and change the default installation directory path manually from/tmp/Middleware/ORACLE_HOME
to/tmp/Middleware/
-
Install IDM jar, jdk17.0.12
/bin/java -jar fmw_14.1.2.1.0_idm_generic.jar
and choose/tmp/Middleware/
as the installation directory. -
Run RCU located at
/tmp/Middleware/oracle_common/bin/rcu
Parent topic: Access Manager High Availability Configuration Steps
Running the Repository Creation Utility to Create the Database Schemas
The schemas you create depend on the products you want to install and configure. See Starting the Repository Creation Utility to run RCU.
For more information, see Planning an Installation of Oracle Fusion Middleware and Creating Schemas with the Repository Creation Utility.
Parent topic: Access Manager High Availability Configuration Steps
Installing Oracle WebLogic Server
To install Oracle WebLogic Server, see Installing and Configuring Oracle WebLogic Server and Coherence.
Note:
On 64-bit platforms, when you install Oracle WebLogic Server using the generic jar file, JDK is not installed with Oracle WebLogic Server. You must install JDK separately, before installing Oracle WebLogic Server.
Parent topic: Access Manager High Availability Configuration Steps
Installing and Configuring the Access Manager Application Tier
See Installing and Configuring the Oracle Access Management Software in Installing and Configuring Oracle Identity and Access Management.
Parent topic: Access Manager High Availability Configuration Steps
Creating boot.properties for the Administration Server on OAMHOST1
The boot.properties
file enables the Administration Server to start without prompting for the administrator’s username and password.
To create the boot.properties
file:
Parent topic: Access Manager High Availability Configuration Steps
Starting OAMHOST1
The following sections describe the steps for starting OAMHOST1.
Parent topic: Access Manager High Availability Configuration Steps
Start Node Manager
-
If Node Manager is not running, start it with the following command:
OAMHOST1>ORACLE_HOME/user_projects/domains/domainName/bin/startNodeManager.sh
Parent topic: Starting OAMHOST1
Start Access Manager on OAMHOST1
To start Access Manager on OAMHOST1, follow these steps:
Parent topic: Starting OAMHOST1
Validating OAMHOST1
Validate the implementation by connecting to the OAM server:
http://OAMHOST1.example.com:14150/access http://OAMHOST1.example.com:14100/oam/server/logout
The implementation is valid if an OAM logout successful page opens.
Parent topic: Access Manager High Availability Configuration Steps
Configuring OAM on OAMHOST2
After configuration succeeds on OAMHOST1, propagate it to OAMHOST2. Pack the domain using the pack
script on OAMHOST1 and unpack it with the unpack
script on OAMHOST2.
Both scripts reside in the ORACLE_HOME/oracle_common/common/bin
directory.
On OAMHOST1, enter:
pack.sh -domain=$ORACLE_HOME/user_projects/domains/IDM_Domain \
-template=/tmp/idm_domain.jar -template_name="OAM Domain" -managed=true
This creates a file called idm_domain.jar
in the /tmp
directory. Copy this file to OAMHOST2.
On OAMHOST2, enter:
unpack.sh -domain=$ORACLE_HOME/user_projects/domains/IDM_Domain \
-template=/tmp/idm_domain.jar
Parent topic: Access Manager High Availability Configuration Steps
Starting OAMHOST2
This following sections describe the steps for starting OAMHOST2. Steps include the following:
Parent topic: Access Manager High Availability Configuration Steps
Start Node Manager
Start Node Manager by issuing the following command:
OAMHOST2>ORACLE_HOME/user_projects/domains/domainName/bin/startNodeManager.sh
Parent topic: Starting OAMHOST2
Start Access Manager on OAMHOST2
To start Access Manager on OAMHOST2:
Parent topic: Starting OAMHOST2
Validating OAMHOST2
Validate the implementation by connecting to the OAM server:
http://OAMHOST2.example.com:14150/access http://OAMHOST2.example.com:14100/oam/server/logout
The implementation is valid if an OAM logout successful page opens.
Parent topic: Access Manager High Availability Configuration Steps
Configuring Access Manager to Work with Oracle HTTP Server
Complete the subsequent procedures to configure Access Manager to work with Oracle HTTP Server.
- Update Oracle HTTP Server Configuration
- Restart Oracle HTTP Server
- Make OAM Server Aware of the Load Balancer
Parent topic: Access Manager High Availability Configuration Steps
Update Oracle HTTP Server Configuration
On WEBHOST1 and WEBHOST2, create a file named oam.conf
in this directory:
OHSDomain/config/fmwconfig/components/OHS/<instancename>/moduleconf/
Create the file and add the following lines:
NameVirtualHost *:7777 <VirtualHost *:7777> ServerName login.example.com:7777 ServerAdmin you@your.address RewriteEngine On RewriteOptions inherit <Location /oam> SetHandler weblogic-handler Debug ON WLLogFile /tmp/weblogic.log WLProxySSL ON WLProxySSLPassThrough ON WLCookieName OAM_JSESSIONID WebLogicCluster OAMHOST1.example.com:14100,OAMHOST2.example.com:14100 </Location> <Location /oamfed> SetHandler weblogic-handler Debug ON WLLogFile /tmp/weblogic.log WLProxySSL ON WLProxySSLPassThrough ON WLCookieName OAM_JSESSIONID WebLogicCluster OAMHOST1.example.com:14100,OAMHOST2.example.com:14100 </Location> <Location /sts> SetHandler weblogic-handler WLLogFile /tmp/weblogic.log WLProxySSL ON WLProxySSLPassThrough ON WLCookieName OAM_JSESSIONID WebLogicCluster OAMHOST1.example.com:14100,OAMHOST2.example.com:14100 </Location> <Location /access> SetHandler weblogic-handler Debug ON WLLogFile /tmp/weblogic.log WLProxySSL ON WLProxySSLPassThrough ON WLCookieName OAM_JSESSIONID WebLogicCluster amahost1.example.com:14150,amahost2.example.com:14150 <Location /oamsso> SetHandler weblogic-handler Debug ON WLLogFile /tmp/weblogic.log WLProxySSL ON WLProxySSLPassThrough ON WLCookieName OAM_JSESSIONID WebLogicCluster oam_policy_mgr1.example.com:14100,oam_policy_ mgr2.example.com:14100 </Location> </VirtualHost>
Restart Oracle HTTP Server
Restart the Oracle HTTP Server on WEBHOST1:
OHSDomain/bin/stopComponent.sh ohs1 OHSDomain/bin/startComponent.sh ohs1
Restart the Oracle HTTP Server on WEBHOST2:
OHSDomain/bin/stopComponent.sh ohs2 OHSDomain/bin/startComponent.sh ohs2
Configuring Access Manager to use an External LDAP Store
By default, Access Manager uses its own in built-in LDAP server. In a highly available environment, Oracle recommends an external LDAP directory as the directory store.
Note:
Oracle recommends that you back up the environment and LDAP store before following this procedure.
- Extending Directory Schema for Access Manager
- Creating Users and Groups in LDAP
- Creating a User Identity Store
- Setting LDAP to System and Default Store
- Setting Authentication to Use External LDAP
- Adding LDAP Groups to WebLogic Administrators
Access Manager requires access to MBeans stored within the administration server. In order for LDAP users to be able to log in to the WebLogic Remote Console and Fusion Middleware control, they must be assigned the WebLogic Administration rights. In order for Access Manager to invoke these Mbeans, users in the IAMAdministrators group must have WebLogic Administration rights.
Parent topic: Access Manager High Availability Configuration Steps
Extending Directory Schema for Access Manager
Pre-configuring the Identity Store extends the schema in the backend directory regardless of directory type.
To extend the directory schema for Access Manager, perform these steps on OAMHOST1:
Parent topic: Configuring Access Manager to use an External LDAP Store
Creating Users and Groups in LDAP
To add users that Access Manager requires to the Identity Store, follow these steps:
Parent topic: Configuring Access Manager to use an External LDAP Store
Creating a User Identity Store
To create a user identity store:
Parent topic: Configuring Access Manager to use an External LDAP Store
Setting LDAP to System and Default Store
After you define the LDAP identity store, you must set it as the primary authentication store. Follow these steps in the Oracle Access Management Console:
- From the Configuration tab, click User Identity Stores.
- Select LDAP_DIR as Default Store.
- Select LDAP_DIR as System Store.
- Click the Add [+] icon in Access System Administrators.
- Enter OAM* in the search name field and click Search.
- Select OAMAdministrators from the search results and click Add Selected.
- Click Apply.
- In the Validate System Administrator window, enter the username and password of the OAM administrator, for example, oamadmin.
- Click Validate.
- Test the connection by clicking Test Connection.
Parent topic: Configuring Access Manager to use an External LDAP Store
Setting Authentication to Use External LDAP
By default, Access Manager uses the integrated LDAP store for user validation. You must update the LDAP authentication module so that it can validate users against the new external LDAP store.
To update the LDAP authentication module to use external LDAP:
- Under Application Security tab, select Authentication Modules and click Search.
- Click LDAP.
- Select Open from the Actions menu.
- Set User Identity Store to
LDAP_DIR
. - Click Apply.
- Restart the Managed Servers Admin Server, WLS_OAM1 and WLS_OAM2.
Parent topic: Configuring Access Manager to use an External LDAP Store
Adding LDAP Groups to WebLogic Administrators
Access Manager requires access to MBeans stored within the administration server. In order for LDAP users to be able to log in to the WebLogic Remote Console and Fusion Middleware control, they must be assigned the WebLogic Administration rights. In order for Access Manager to invoke these Mbeans, users in the IAMAdministrators group must have WebLogic Administration rights.
When Single Sign-on is implemented, provide the LDAP group IDM Administrators with WebLogic administration rights, so that you can log in using one of these accounts and perform WebLogic administrative actions.
IAMAdministrators
and WLSAdmins
to the WebLogic Administrators:
- Login to Weblogic Remote Console.
- Click on Security Data Tree.
- From the left pane, expand Realms > myrealm > Role Mappers > XACMLRoleMapper > Global > Roles
- Click the Admin role.
- Click on Add Condition and select Group in Predicate List.
- Specify OAMAdministrators for Group Argument Name and click OK.
- If you have the WLSAdmins LDAP group, then repeat step 5 and 6 for WLSAdmins group.
- If you have the IAMAdministrators LDAP group, then repeat step 5 and 6 for IAMAdministrators group.
- Click Save to finish adding the Admin role(s).
Parent topic: Configuring Access Manager to use an External LDAP Store
Validating the Access Manager Configuration
Validate the configuration by logging into the Oracle Access Management Console at http://OAMHOST1.example.com:7001/oamconsole
as oamadmin
.
Parent topic: Access Manager High Availability Configuration Steps
Scaling Up Access Manager Topology
You scale up to add a new Access Manager managed server to a node already running one or more server instances.
- Scaling Up Access Manager
- Registering the New Managed Server
- Configuring WebGate with the New OAM Managed Server
Parent topic: Access Manager High Availability Configuration Steps
Registering the New Managed Server
To configure the new managed server as an OAM server, use the Oracle Access Management Console:
Parent topic: Scaling Up Access Manager Topology
Configuring WebGate with the New OAM Managed Server
To configure the WebGate with the new OAM Managed Server, take these steps:
- Verify that Node Manager is running on the new Access Server WLS_OAM3.
- Start the Managed Server using the Administration Console. See the Start the Managed Server
- Inform WebGates about the new Managed Server. See Inform WebGates of the New Managed Server
Parent topic: Scaling Up Access Manager Topology
Start the Managed Server
To start the Managed Server using the Administration Console:
-
Change to the directory to OAM Domain HOME. For example,
DOMAIN_HOME/bin
-
Start the Managed Server. For example, enter:
./startManagedWebLogic.sh WLS_OAM3 http://hostname:7001
-
At the prompt, enter the WebLogic username and password. Click Enter.
-
Verify that the Managed Server is running. Check the startManagedWebLogic logs, or click Servers under Environment in the Administration Console to view the Summary page. Refresh the page to see updates.
Parent topic: Configuring WebGate with the New OAM Managed Server
Inform WebGates of the New Managed Server
To inform any WebGates about the new Managed Server:
-
Log in to the Oracle Access Management Console at
http://OAMHOST1.example.com:7001/oamconsole
as theoamadmin
user. -
Click Application Security tab, click Agents to open SSO Agents page.
-
On the SSO Agents page, click Search.
-
Click Search.
-
Click the WebGate you want to change.
-
Add the new server to either the primary or secondary server list by clicking the Add + icon.
-
Select the server name from the list.
-
Click Apply
Note:
Repeat this procedure to inform all the configured WebGate Agents.Parent topic: Configuring WebGate with the New OAM Managed Server
Scaling Out Access Manager
You scale out to add a new Access Manager managed server to a new node. Scale out is very similar to scale up, but requires the software to be installed on the new node.
Parent topic: Access Manager High Availability Configuration Steps
Registering the Managed Server with OAM
To register the new managed server as an OAM server:
Parent topic: Scaling Out Access Manager
Configuring WebGate with the New OAM Access Server
Start the Access Server. To use the server, you must inform any WebGates of its existence:
-
Log in to the Oracle Access Management Console at
http://OAMHOST1.example.com:7001/oamconsole
as theoamadmin
user. -
Click Application Security tab.
-
Click Agents to open SSO Agents page
-
On the SSO Agents page, click Search.
-
Click the WebGate you want to change.
-
Under the Server Lists section, add the new OAM Access Server
WLS_OAM3
to either the primary or secondary server list by clicking the Add [+] icon. -
Select the server name from the list.
-
Click Apply.
Verifying the WebGate Configuration is Updated
To verify the WebGate configuration
- Log into the Web server where the WebGate was updated previously.
- Go to the directory
OHSDomain/config/fmwconfig/components/OHS/<instancename>/webgate/config
- Open
ObAccessClient.xml
with a text editor. Verify thatprimary_server_list
orsecondary_server_list
shows that the new OAM Access Server is updated.
Note:
If the WebGate configuration does not update, recycle the web server, which pulls Webgate Agent profile updates to the ObAccessClient.xml
file.
Editing Oracle HTTP Server Configuration File
Now that you created and started the new Managed Server, the web tier starts to direct requests to it. However, Oracle recommends informing the web server about the new Managed Server.
In the Web tier, there are several configuration files including admin_vh.conf
, sso_vh.conf
and igdinternal_vh.conf
reside in the directory: ORACLE_INSTANCE
/config/OHS/
component name
/moduleconf
. Each contain a number of entries in location blocks. If a block references two server instances and you add a third one, you must update that block with the new server.
Add the new server to the WebLogicCluster
directive in the file. For example, change:
<Location /oam> SetHandler weblogic-handler WebLogicCluster OAMHOST1.example.com:14100,OAMHOST2.example.com:14100 </Location>
to:
<Location /oam> SetHandler weblogic-handler WebLogicCluster OAMHOST1.example.com:14100,OAMHOST2.example.com:14100,OAMHOST1.example.com:14101 </Location>
Parent topic: Scaling Out Access Manager
Deploying Oracle Identity and Access Management Cluster with Unicast Configuration
If multicast IP is disabled in deployment environment then you can deploy Oracle Identity and Access Management cluster with Unicast configuration.
In your deployment environment, if multicast IP is disabled because of security reasons or if you are using cloud Infrastructure for deployment, it is not feasible to deploy Oracle Identity and Access Management with the default configuration (multicast). It is not feasible because Oracle Identity and Access Management uses EH cache, which depends on JavaGroup or JGroup library and supports multicast configuration as default for messages broadcasting.
To perform unicast configuration for EH cache, complete the following steps: