Skip to main content

Plug-ins and Plug-in points in OIM 11g R2


Plug-ins are used to customize the default functionality of Oracle Identity Manager and to add extra features based on business requirement  (Like Random password/UserID generation, Generating company code based on organization, Prepopulating values from user data while raising request) .  There is already a defined and constrained set of plug-ins which can be extended to provide desired functionality. Below is the list of all the supported plug-ins:-

Plug-in Point
 Functionality
oracle.iam.ldapsync.LDAPContainerMapper
This is used by LDAP synchronization to determine which user/role container should be used to create the user/role in LDAP.
oracle.iam.platform.kernel.spi.EventHandler
This plug-in point is extended in case of creating Event Handlers. By extending this plug-in point Event handlers can be written at the various Orchestration stages of OIM like Preprocess, Postprocess, Validation etc.
oracle.iam.platform.auth.api.LoginMapper
This plug-in point is used to override the default mapping of JAAS user principal name to Oracle Identity Manager username for SSO scenarios.
oracle.iam.identity.usermgmt.api.PasswordVerifier
This plug-in is extended where the verification of old password is required while changing the password.  It uses ‘OIM.OldPasswordValidator’ system property to configure the class used for validation.
oracle.iam.request.plugins.StatusChangeEvent
This plug-in is extended to trigger events on change of status of a request in OIM.
oracle.iam.request.plugins.RequestDataValidator
This plugin is used in case where validation of request data is required (Like validation of user organization or company code in request data set). It gives a validation exception to user in case of any failure of validation.
oracle.iam.request.plugins.PrePopulationAdapter
This is used to populate existing attributes on run time during request creation.  
oracle.iam.scheduler.vo.TaskSupport
This is used to run the job in context. Execute method of the task is retrieved through the plug-in and is loaded.
oracle.iam.identity.usermgmt.api.UserNamePolicy
This plug-in is used to generate the userid of user based on business requirement (like First three + Last three letters of name). It is also used to validate the username on defined rules.
oracle.iam.identity.usermgmt.api.ReservationInLDAP
This is an implementation for reservation of user attributes in LDAP.

Comments

Popular posts from this blog

Developing Prepopulate Adapter with OIM 11g R2

1.      Prepopulate Adapter in OIM uses the plugin point oracle.iam.request.plugins.PrePopulationAdapte r. 2.      Write the Java code which returns the value which has to be populated on the form. 3.      This code will implement the plugin point oracle.iam.request.plugins.PrePopulationAdapte r. Code Snippet: - package com.oracle.oim.utility.eventhandler; import java.io.Serializable; import java.util.Iterator; import java.util.List; import java.util.logging.Logger; import oracle.iam.identity.exception.NoSuchUserException; import oracle.iam.identity.exception.UserLookupException; import oracle.iam.identity.usermgmt.api.UserManager; import oracle.iam.identity.usermgmt.vo.User; import oracle.iam.platform.Platform; import oracle.iam.platform.authz.exception.AccessDeniedException; import oracle.iam.request.exception.RequestServiceException; import oracle.iam.request.vo.Beneficiary; ...

Custom Login Page Protection- OAM 11g R2

Create a login page with fields having username,password and requestid. Below is the sample login page : <%@page language="java" session="true" contentType="text/html;charset=ISO-8859-1"  %> <% String path = request.getContextPath(); String basePath = request.getScheme()+"://"+request.getServerName()+":"+request. getServerPort()+path+"/"; String requestID = request.getParameter("request_id"); %> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <font color="blue">Login Page </font><br><br> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> <title>Implementing css and javascript</title> <meta http-equi...

Oracle Traffic Director (OTD) configuration

Download the OTD software and install it on a server by running runInstaller command from <Binaries>/Disk1. Preferred is to configure the OTD as root user because when the administration server is configured as root, then Oracle Traffic Director starts the keepalived daemon automatically when you start instances that are part of a failover group, and stops the daemon when you stop the instances. Set Oracle_Home as the new Installed OTD Home. Run below command to configure the Admin server: <OTD_HOME>/otd/bin/tadm configure-server --port=8989 --user=admin --server-user=root --instance- home= <OTD_HOME> /otd/instance_name/otd_instance1 This command will ask for admin password and will create the admin server. Run Below command to start the admin server: <OTD_HOME> /otd/instance_name/otd_instance1/admin-server/bin/startserv Login to the OTD console on http://<host>:8989 as admin user.  Click New configuration: Click Next and create ne...