Skip to main content

Custom Login Page Protection- OAM 11g R2


  • Create a login page with fields having username,password and requestid. Below is the sample login page :

<%@page language="java" session="true" contentType="text/html;charset=ISO-8859-1"  %>

<%
String path = request.getContextPath();
String basePath = request.getScheme()+"://"+request.getServerName()+":"+request.
getServerPort()+path+"/";
String requestID = request.getParameter("request_id");
%>

<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Transitional//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-transitional.dtd">
<html xmlns="http://www.w3.org/1999/xhtml">

<font color="blue">Login Page </font><br><br>
<head>
<meta http-equiv="Content-Type" content="text/html; charset=iso-8859-1">
<title>Implementing css and javascript</title>

<meta http-equiv="pragma" content="no-cache">
<meta http-equiv="cache-control" content="no-cache">

<link rel="stylesheet" href="style.css" type="text/css"></link>
<script language="JavaScript" type="text/JavaScript" src="validate.js"></script>
</head>

<form onSubmit="return validate(this)" action="http://<oam_host>:14100/oam/server/auth_cred_submit" method="post">
<center>
<table border = "0">
      <tr align="left" valign="top">
            <td>User Name:</td>
            <td><input type="text" name ="username" class="inputbox"/></td>
      </tr>
      <tr align="left" valign="top">
            <td>Password:</td>
            <td><input type="password" name ="password" class="inputbox"/></td>
      </tr>
      <tr align="left" valign="top">
            <td> </td>
            <td><input type="hidden" name="request_id" value="<%=requestID%>"></td>
      </tr>
      <tr align="left" valign="top">
            <td></td>
            <td><input type="submit" name="submit" value="submit" class="submitButton"/></td>
      </tr>
</table>
</center>
</form>

  • This page can be deployed on a external server or on oam server it self.If it is deployed on external server then authentication scheme should look as below:

  • If page is deployed on oam server it self then authentication scheme should look as below:

  • Attach one of these authentication scheme with the already protected resource through a webgate. The webgate configuration should look as below:

  • The protected resource will display the custom login page instead of OAM default login page now. User can be authenticated from this custom page now.







Comments

  1. Is there any other configuration to be performed if this is done for federation?

    ReplyDelete
  2. Nope. Just attach your Identity Provider generated with the Authentication Scheme.

    ReplyDelete
  3. This works well with just OAM-OIM. If we have OAM-OAAM-OIM integrated, how can we create external login page with TAPScheme? Can we keep Challenge Method=DAP, Authentication Module=TAPScheme, Challenge URL=extenalloginpage.html (same as in example) and content type=external? Our objective is to use external login page in OAM-OAAM-OIM env. Thanks in advance.

    ReplyDelete

Post a Comment

Popular posts from this blog

Adding UDF (User Defined Field) on create user page OIM 11g R2 PS1:-

    Login to Sysadmin console and create a Sandbox and activate it. Click on Form Designer and search for user form. 2.      Create a new field of desired type. 3.      Provide the Required Values for UDF creation and click save and close. UDF field will be added then publish the sand box. 4.      Login to Identity console now and create another sandbox and activate it. After sandbox is activated click on users link and the click on create user. 5.      Provide the mandatory values on the form and then click the customize button on top. Select source from the view. 6.      Select the panel where the field has to be added. Select panel form lay out click add content. Select Data component Catalog from the box. 7.      Select UserVO from the bottom. ...

OIM Tuning

Application Module tuning is a critical setting which will affect the UI performance. Following are the recommended application module settings for OIM and these are already set out-of-box (OOB) in later releases of OIM 11g R2. Ensure that these settings are implemented as recommended in your environment. -Djbo.ampool.doampooling=true -Djbo.ampool.minavailablesize=1 -Djbo.ampool.maxavailablesize=120 -Djbo.recyclethreshold=60 - Djbo.ampool.timetolive=-1 -Djbo.load.components.lazily=true - Djbo.doconnectionpooling=true -Djbo.txn.disconnect_level=1 - Djbo.connectfailover=false -Djbo.max.cursors=5 - Doracle.jdbc.implicitStatementCacheSize=5 - Doracle.jdbc.maxCachedBufferSize=19 open DOMAIN_HOME/bin/setDomainEnv.sh file for the WebLogic Server instance.find these lines: JAVA_OPTIONS="${JAVA_OPTIONS}" export JAVA_OPTIONS and change it to: JAVA_OPTIONS="-Djbo.ampool.doampooling=true -Djbo.ampool.minavailablesize=1 -Djbo.ampool.maxavailablesize=120 -D...

Oracle Traffic Director (OTD) configuration

Download the OTD software and install it on a server by running runInstaller command from <Binaries>/Disk1. Preferred is to configure the OTD as root user because when the administration server is configured as root, then Oracle Traffic Director starts the keepalived daemon automatically when you start instances that are part of a failover group, and stops the daemon when you stop the instances. Set Oracle_Home as the new Installed OTD Home. Run below command to configure the Admin server: <OTD_HOME>/otd/bin/tadm configure-server --port=8989 --user=admin --server-user=root --instance- home= <OTD_HOME> /otd/instance_name/otd_instance1 This command will ask for admin password and will create the admin server. Run Below command to start the admin server: <OTD_HOME> /otd/instance_name/otd_instance1/admin-server/bin/startserv Login to the OTD console on http://<host>:8989 as admin user.  Click New configuration: Click Next and create ne...