Implement Logging and Intrusion Detection

Application logging should not be an afterthought or limited to debugging and troubleshooting. Logging is also used in other important activities:

  • Application monitoring
  • Business analytics and insight
  • Activity auditing and compliance monitoring
  • System intrusion detection
  • Forensics

Validating Identity Management Installation

Validating Oracle Access Manager Configuration

  1. Access OAM console at http://hostname:7001/oamconsole
  2. Click on the System Configuration tab
  3. Expand Access Manager Settings – SSO Agents – OAM Agents.
  4. Click the open folder icon, then click Search.
  5. You should see the WebGate agents Webgate_IDM, Webgate_IDM_11g and IAMSuiteAgent