Skip to main content

Posts

Showing posts from 2017

Home Organization Policy- OIM PS3

When an end user submits a request for self-registration, the home organization of the user gets determined by the home organization policy. The organization name (as determined by the home organization policy) is filled in the request submitted. The approver can override the home organization of the user while approving the request. If a pre-process custom handler is defined to determine the home organization during self-registration, then home organization policy will not be evaluated. If workflow pol-icy is defined, then it takes precedence over the Home Organization Policy. In Home Organization Policy, you can define rules based on user attributes. The return value of the rule is the organization name. Rules are evaluated, in the order in which they appear on the Home Organization Policy page, starting from first rule to the last rule. Rules can be re-ordered from Home Organization Policy page. Evaluation of rules is stopped on first rule match and the organization name is re

Self Service Capability- OIM PS3

This is a New feature in OIM PS3 which lets you control the user self service capability based on the user attribute,role, Organization. You can restrict a user’s self-service capabilities in Oracle Identity Manager by defining policies and rules, based on user attributes. You can also set user attributes as denied attributes to the user who satisfies the rule. For this practice, if the user is a Contractor, the Telephone Number and Email fields are denied attributes for this user. As a result, the user cannot modify the values in these fields. Below are all the capabilities which can be provided/denied to the user: To create these rules login to Admin console and click on Self Service Capabilities. Here if we want to give all the capabilities then create a if condition which is always true (like 1==1) and add all the capabilities. But if we want to give capabilities on condition then add this condition in If and add capabilities in Else section. User attributes can

What is CASB - Oracle CASB Cloud Service

What is CASB: Cloud Access Security Brokers is a term coined by Gartner to describe cloud solutions centered around these four main pillars: visibility, compliance, data security, and threat protection. As per Gartner  Cloud access security brokers (CASBs)  are on-premises, or cloud-based security policy enforcement points, placed between cloud service consumers and cloud service providers to combine and interject enterprise security policies as the cloud-based resources are accessed. CASBs consolidate multiple types of security policy enforcement. Example security policies include authentication, single sign-on, authorization, credential mapping, device profiling, encryption, tokenization, logging, alerting, malware detection/prevention and so on.   To Summarize CASB is a service which is used to secure and monitor Cloud and On-Prem applications and to respond with remediation in case of Threats or suspicious events are detected. Key is the analysis of events generated in the

Changing Logo in OIM PS3

Copy the Custom Logo in  $MW_HOME/Oracle_IDM1/server/apps/ oim.ear/iam-consoles-faces.war/images directory. Login to Identity console. Click on Sandbox to create a new Sandbox. Activate the Sandbox. Click on Customize and then Click Structure on top left. Click on the Oracle logo to Edit. Select commandImageLink and click on Properties. Update the ICON option with the logo path :  /../oim/images/ custom_logo.png New logo will reflect immediately. Verify and Publish the Sandbox.

OAM 11g PS3 SSO with Peoplesoft HCM 9.2 (Peopletools 8.55)

Setting up the Environment: It is assumed that Peoplesoft Pre-built VM is used and configured. Peoplesoft is up and running. OAM 11gR2 PS3 is up and running. OHS is protected by OAM webgate and can be reverse proxied to Peoplesoft. To setup the Application designer navigate to the '/opt/oracle/psft/pt/tools_client/' location in the VM. Download the folder on local machine where Application Designer needs to be installed. Install the oracle client and put tnsnames.ora <client_home>\product\12.1.0\client_1\network\admin location. Navigate to the folder and run 'setupPTClient.bat  -t -l' to install the application designer. Navigate to 'C:\PT8.55.06_Client_ORA\bin\client\winx86' and run pside.exe to start the application designer. DB name in this case is 'PSHCMDB and userid/pwd is PS/PS. Configuration on PeopleSoft: Login to the Peoplesoft console http://<host_name>:8000/psp/ps/?cmd=start using credentials PS/PS. Click on

OAM as IDP and SP (2 OAM PS3)

Oracle Access Manager can act as Identity Provider or Service Provider based on requirement.I configured a use case where one OAM is acting as IDP and another one acting as SP. High level steps  are as below:  Download the IDP OAM metadata by accessing the below URL: http://<IDP-OAM>:14100/oamfed/sp/metadata Note that metadata consists both IDP and SP in one file. While importing IDP metadata remove SP metadata from the file. Login to the SP OAM console and  click on federation. Click on Service Provider Management. Import the Idp metadata. Click ‘Create Authentication Scheme and Module’ to create the scheme and module. Now Login to Idp VM and import the Service provide metadata. Remember to modify the metadata to contain only Service Provider metadata. Provide the NameID Value as mail. Access any application protected by SP OAM and it will redirect to the IDP -OAM.

Oracle Identity Cloud Service (IDCS)

   Oracle Identity Cloud Service i s the next generation comprehensive security and identity platform that is cloud-native and designed to be an integral part of the enterprise security fabric, providing modern identity for modern applications.  IDCS is a cloud-based identity management system that works by associating specific rights and restrictions with each user’s established identity. User provisioning, access control, and directory services are critical components of Oracle’s cloud-based security portfolio. Oracle Identity Cloud Service has been designed to meet the needs of organizations in a number of typical use-case scenarios, such as the cloud (allowing both on-premise and cloud resources to be secured from a single set of controls), mobile access (providing sign on for native or browser-based apps), employee-facing intranet and customer-facing extranet solutions.  Key Features: Oracle Identity Cloud Service provides the following functionality, licensed and en

OIM Tuning

Application Module tuning is a critical setting which will affect the UI performance. Following are the recommended application module settings for OIM and these are already set out-of-box (OOB) in later releases of OIM 11g R2. Ensure that these settings are implemented as recommended in your environment. -Djbo.ampool.doampooling=true -Djbo.ampool.minavailablesize=1 -Djbo.ampool.maxavailablesize=120 -Djbo.recyclethreshold=60 - Djbo.ampool.timetolive=-1 -Djbo.load.components.lazily=true - Djbo.doconnectionpooling=true -Djbo.txn.disconnect_level=1 - Djbo.connectfailover=false -Djbo.max.cursors=5 - Doracle.jdbc.implicitStatementCacheSize=5 - Doracle.jdbc.maxCachedBufferSize=19 open DOMAIN_HOME/bin/setDomainEnv.sh file for the WebLogic Server instance.find these lines: JAVA_OPTIONS="${JAVA_OPTIONS}" export JAVA_OPTIONS and change it to: JAVA_OPTIONS="-Djbo.ampool.doampooling=true -Djbo.ampool.minavailablesize=1 -Djbo.ampool.maxavailablesize=120 -D