Skip to main content

Posts

Showing posts from February, 2014

OAM and OAAM TAP Integration (High Level Steps)

Prerequisites : OAM and OAAM servers are installed and running. 1.       Create a directory where OAM and OAAM servers are installed to store the certificate. 2.       Run wlst.sh command from <Middleware_home>/Oracle_IDM1/common/bin location. 3.       Run connect() command to connect to OAM Admin server and provide the OAM Admin server details. 4.       Run the below command to register the OAAM with OAM: registerThirdPartyTAPPartner(partnerName= "OAAMTAPPartner" , keystoreLocation= "<Directory_created_to store_Keystore>/TapKeystore.jks" , password="<Password> " , tapTokenVersion="v2.0" , tapScheme= "TAPScheme" , tapRedirectUrl= "http://<OAM_Host>:14300/oaam_server/oamLoginPage.jsp") 5.       Login to OAM console and open the TAP Scheme. 6.       Add “MatchLDAPAttribute=uid” in challenge Parameter as uid is being used for authentication (in case). 7.       Open OAM agents and click o

OAM 11g R2 - Mobile and Social - Protecting Application with Google

Login to OAM Console and  Go to System Configuration > Common Configuration and double click on Available Services. Enable Mobile and social.   Go to Mobile And Social and double click Internet Identity Services. On the right hand side select Google click Edit. Verify the details and close the tab. Now Select OAMApplication under Application Profiles and click on Edit. Ensure that a Shared Secret is entered.  Scroll down, and ensure that User Registration is enabled .     Scroll down to the bottom, and ensure that Google is checked. Click on Apply. Go to System Configuration > Access Manager > Access Manager Settings. Set host to <OAM_HOST>. Set port to 14100. Set protocol to HTTP and apply the changes. Go to Mobile and Social and click "User Profile Service providers". Click create and create a new User Profile Service Provider. Provide the repository details like Bind DN, Root Context, User Base, Group Base and test the con