Below is the lists all the error message codes sent by the OAM Server and the corresponding primary error message. If a primary error message has been customized for an application, the application must map this custom message to the corresponding standard error message maintained by OAM Server. There is no difference between OAM-1 and OAM-2 error codes. Continue reading “OAM Error Codes”
If you are connecting to the server you need to know where the key stores live, so here is a table with all the default values in:
Continue reading “Default passwords for Demo Truststore and Demo Identitystore in WebLogic”
List of protected, public and excluded resources including WebCenter, SOA and Content. This is for 126.96.36.199.0
When you use the Oracle Access Manager Identity Asserter, all web.xml files in the application EAR file must specify CLIENT-CERT in the element auth-method for the appropriate realm.
You can add comma separated values here when you want applications accessed directly over the WebLogic Server host:port to be authenticated by the container. For instance:
The auth-method can use BASIC, FORM, or CLIENT-CERT values. While these look like similar values in Oracle Access Manager, the auth-method specified in web.xml files are used by Oracle WebLogic Server (not Oracle Access Manager). Continue reading “Application configuration for OAM Integration”
Create a Profile Rule using a “rule activation condition” with a defined Side Effect per the below
- Open the Configuration Manager admin applet.
- Select the Rules tab.
- Select the Add button.
- Enter a desired name and description.
- Select the check-box for “Is global rule with priority” and set its desired priority number.
- Select the check-box for “Use rule activation condition”.
- Select the Edit button.
- Add a condition with a desired name (ex. “1”).
- Select from the condition’s General tab, the checkboxes for Use action of “Check in New” and “Check in Selected”.
- Select from the condition’s Clauses tab, Field of “Type”, Operator of “Matches”, and Value of
- Select from the Clauses tab, the Add button.
- Enter from the condition’s Side Effects tab, paste the following. The conditional statement can be any of the IDOC security checks: userHasRole, userHasAccessToAccount, or userHasGroupPrivilege,or other function suitable for the purpose. This example allows only users with the admin role to set the override format.
<$if not userHasRole("admin")$> <$IsOverrideFormat=false$> <$endif$>
- Select the Side Effect’s tab OK button.
- Select the Rule’s OK button.
When you configure SSL, you must decide how identity and trust will be stored. Although one keystore can be used for both identity and trust, Oracle recommends using separate keystores for both identity and trust because the identity keystore (private key/digital certificate pairs) and the trust keystore (trusted CA certificates) may have different security requirements. For example: Continue reading “Identity and Trust Keystores”
WebLogic Server uses the following algorithm when it loads its trusted CA certificates:
- If the keystore is specified by the
-Dweblogic.security.SSL.trustedCAkeystorecommand-line argument, load the trusted CA certificates from that keystore.
- Else if the keystore is specified in the configuration file (
config.xml), load trusted CA certificates from the specified keystore. If the server is configured with DemoTrust, trusted CA certificates will be loaded from the
\server\lib\DemoTrust.jksand the JDK
- Else if the trusted CA file is specified in the configuration file (
config.xml), load trusted CA certificates from that file (this is only for compatibility with 6.x SSL configurations).
- Else load trusted CA certificates from
Examples for ldapsearch command:
$MW_HOME/oracle_common/bin/orapki wallet display -wallet ~/cwallet.sso
[oracle@wcsoa bin]$ ./orapki wallet display -wallet /webdata/Oracle/admin/wcsoadomain/aserver/wcsoadomain/config/fmwconfig/bootstrap/cwallet.sso
Oracle PKI Tool : Version 188.8.131.52.0
Copyright (c) 2004, 2013, Oracle and/or its affiliates. All rights reserved.
Oracle Secret Store entries:
Subject: OU=Class 2 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US
Subject: OU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US
Subject: CN=GTE CyberTrust Global Root,OU=GTE CyberTrust Solutions\, Inc.,O=GTE Corporation,C=US
Subject: OU=Class 1 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US