Overview of User Request when OAM is configured

The request flow when a user requests access is as follows:

  1. The user requests access to a protected resource over HTTP or HTTPS.
  2. The WebGate intercepts the request.
  3. The WebGate forwards the request to the Oracle Access Manager server over Oracle Access Protocol to determine if the resource is protected, how, and whether the user is authenticated (if not, there is a challenge).
  4. The Oracle Access Manager server checks the directory server for credentials such as a user ID and password, sends the information back to WebGate over Oracle Access Protocol, and generates an encrypted cookie to authenticate the user.
  5. Following authentication, the WebGate prompts the Oracle Access Manager server over Oracle Access Protocol and the Oracle Access Manager server looks up the appropriate security policies, compares them to the user’s identity, and determines the user’s level of authorization.
    • If the access policy is valid, the user is allowed to access the desired content and/or applications.
    • If the policy is false, the user is denied access and redirected to another URL determined by the organization’s administrator.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.