Skip to main content

OAM 11g R2 - Mobile and Social - Protecting Application with Google

  1. Login to OAM Console and Go to System Configuration > Common Configuration and double click on Available Services. Enable Mobile and social.
  2.  Go to Mobile And Social and double click Internet Identity Services.On the right hand side select Google click Edit.Verify the details and close the tab.
  3. Now Select OAMApplication under Application Profiles and click on Edit.
  4. Ensure that a Shared Secret is entered. 
  5. Scroll down, and ensure that User Registration is enabled.
     
  6.  Scroll down to the bottom, and ensure that Google is checked. Click on Apply.
  7. Go to System Configuration > Access Manager > Access Manager Settings.
    Set host to <OAM_HOST>.Set port to 14100.Set protocol to HTTP and apply the changes.
  8. Go to Mobile and Social and click "User Profile Service providers". Click create and create a new User Profile Service Provider.
  9. Provide the repository details like Bind DN, Root Context, User Base, Group Base and test the connection.
  10. Under the Attributes section add the attribute "proxyAuth" to false. Which is required for some of the Directory servers like OUD.
  11. Under the Entities tab provide the user and group Create and search base correctly.
  12. Click on save. Then click User Profile Service providers again. Under Service profiles click create User Profile Service.
  13. Provide name and service end point and select service provider as recently created Service Provider.
  14. Go to Policy Configuration > Authentication Schemes > OICScheme and double click it. Set challenge URL to use the above parameters. e.g. http://<OAM_HOST>:14100/oic_rp/login.jsp.
  15. Go to System Configuration > Mobile and Social >  Internet Identity Services > OAMApplication.
  16. Set Registration URL = http://<OAM_HOST>:14100/oic_rp/register.jsp.
  17. Go to Registration Service Details with Application User Attribute Mapping.
    Uncheck read only checkbox for first and lastname.
  18. Go to Policy Configuration > Application Domains > click on Search.
  19. Either create new Application Domain (OAMApplication) or change existing domain name as OAM Application.
  20. Open OAMApplication domain > Authentication Policies tab.
    Open Protected Resource Policy and set Authentication Scheme as OICScheme and Click on Apply.
  21. Restart the OAM managed server and Webserver.
  22. For Some directories we even need to provide the Admin user privilege of Proxy Authorization.
  23. Login to ODSM and select Configuration tab. Under root users select Directory Manager. then select privilege and enable the Proxied Authorization.

Comments

  1. This comment has been removed by the author.

    ReplyDelete
  2. Hi, Thanks for your useful post.
    I am getting the following error after following all your steps. Using OAM 11.1.2.2.
    OpenID auth request contains an unregistered domain: http://demo02.com:14100/oic_rp

    Looks like new OpenId providers cannot be registered per google, any workarounds you know of ?

    ReplyDelete

Post a Comment

Popular posts from this blog

Developing Prepopulate Adapter with OIM 11g R2

1.      Prepopulate Adapter in OIM uses the plugin point oracle.iam.request.plugins.PrePopulationAdapte r. 2.      Write the Java code which returns the value which has to be populated on the form. 3.      This code will implement the plugin point oracle.iam.request.plugins.PrePopulationAdapte r. Code Snippet: - package com.oracle.oim.utility.eventhandler; import java.io.Serializable; import java.util.Iterator; import java.util.List; import java.util.logging.Logger; import oracle.iam.identity.exception.NoSuchUserException; import oracle.iam.identity.exception.UserLookupException; import oracle.iam.identity.usermgmt.api.UserManager; import oracle.iam.identity.usermgmt.vo.User; import oracle.iam.platform.Platform; import oracle.iam.platform.authz.exception.AccessDeniedException; import oracle.iam.request.exception.RequestServiceException; import oracle.iam.request.vo.Beneficiary; ...

Oracle Traffic Director (OTD) configuration

Download the OTD software and install it on a server by running runInstaller command from <Binaries>/Disk1. Preferred is to configure the OTD as root user because when the administration server is configured as root, then Oracle Traffic Director starts the keepalived daemon automatically when you start instances that are part of a failover group, and stops the daemon when you stop the instances. Set Oracle_Home as the new Installed OTD Home. Run below command to configure the Admin server: <OTD_HOME>/otd/bin/tadm configure-server --port=8989 --user=admin --server-user=root --instance- home= <OTD_HOME> /otd/instance_name/otd_instance1 This command will ask for admin password and will create the admin server. Run Below command to start the admin server: <OTD_HOME> /otd/instance_name/otd_instance1/admin-server/bin/startserv Login to the OTD console on http://<host>:8989 as admin user.  Click New configuration: Click Next and create ne...

Custom Login Page Protection- OAM 11g R2

Create a login page with fields having username,password and requestid. Below is the sample login page : <%@page language="java" session="true" contentType="text/html;charset=ISO-8859-1"  %> <% String path = request.getContextPath(); String basePath = request.getScheme()+"://"+request.getServerName()+":"+request. getServerPort()+path+"/"; String requestID = request.getParameter("request_id"); %> <!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd"> <html xmlns="http://www.w3.org/1999/xhtml"> <font color="blue">Login Page </font><br><br> <head> <meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1"> <title>Implementing css and javascript</title> <meta http-equi...