Introduction In “Part 1: How To Load Test OAM11g using Apache JMeter” I talked about an example plan that could be used to load test OAM11g, which included some...
Introduction In “Part 1: How To Load Test OAM11g using Apache JMeter” I talked about an example plan that could be used to load test OAM11g, which included some common configuration elements, some samplers for login, authorization, logout, and some listeners that provided result analysis. In Part 2, I wanted to expand on an option to make JMeter send random logins and I will explain why, and then cover how to leverage JMeter to load test an LDAP server like OUD, OID, ODSE,...
Introduction In “Part 1: How To Load Test OAM11g using Apache JMeter” I talked about an example plan that could be used to load test OAM11g, which included some common configuration elements, some...
Many Oracle Access Management 11g customers opt to deploy a combination of Oracle Access Manager and Oracle Adaptive Access Manager using the Advanced...
Many Oracle Access Management 11g customers opt to deploy a combination of Oracle Access Manager and Oracle Adaptive Access Manager using the Advanced Integration option. This combination of product features can provide strong, adaptive authentication and fraud mitigation for online applications. In this post, we examine a number of strategies for configuring the connectivity between these components in order to provide scalability and high availability for production...
Many Oracle Access Management 11g customers opt to deploy a combination of Oracle Access Manager and Oracle Adaptive Access Manager using the Advanced Integration option. This combination of product...
Introduction Oracle Access Manager 11gR2 - PS2 is now out! This post will cover some of the new features in PS2. There are six new features I will discuss:...
Introduction Oracle Access Manager 11gR2 - PS2 is now out! This post will cover some of the new features in PS2. There are six new features I will discuss: Dynamic Authentication Persistent Login (Remember Me) Policy Evaluation Ordering Delegated Administration Unified Administration Console Session Management Granular Idle Timeout Client Cookie based Session Main Article Dynamic Authentication Dynamic authentication is the ability to define what authentication scheme should...
Introduction Oracle Access Manager 11gR2 - PS2 is now out! This post will cover some of the new features in PS2. There are six new features I will discuss: Dynamic Authentication Persistent Login...
Introduction Systematic monitoring of OIM deployments helps to reduce risk of both technical and security related issues. It also can help to avoid performance...
Introduction Systematic monitoring of OIM deployments helps to reduce risk of both technical and security related issues. It also can help to avoid performance degradation that can happen because of data growth over time. This post presents a set of topics about OIM and WebLogic monitoring, and it presents tools that can be used for both monitoring and diagnostic.This list is not intended to replace any official product documentation, instead, it should be used in conjunction...
Introduction Systematic monitoring of OIM deployments helps to reduce risk of both technical and security related issues. It also can help to avoid performance degradation that can happen because of...
For obvious reasons, there is a high demand for Multi-Data Center (MDC) topology; which is now supported in Oracle Access Manager (OAM) 11g. This post...
For obvious reasons, there is a high demand for Multi-Data Center (MDC) topology; which is now supported in Oracle Access Manager (OAM) 11g. This post discusses some of the features of MDC as well as provide some detail steps on how to clone a secondary data center. This post is based on R2PS1 code base. With PS2 there are some new features I will cover below. Here is the PS2 document library for reference. Main Article Here is an conceptual topology for an MDC...
For obvious reasons, there is a high demand for Multi-Data Center (MDC) topology; which is now supported in Oracle Access Manager (OAM) 11g. This post discusses some of the features of MDC as well as...
Introduction In a previous post, we discussed some of the complications that can occur when a firewall is placed between WebGates and OAM Servers in a typical...
Introduction In a previous post, we discussed some of the complications that can occur when a firewall is placed between WebGates and OAM Servers in a typical deployment. This post follows on from that discussion, to explore an analogous topic- firewalls between the OAM Server and the LDAP Identity Store. This post is part of a larger series on Oracle Access Manager 11g called Oracle Access Manager Academy. An index to the entire series with links to each of the separate...
Introduction In a previous post, we discussed some of the complications that can occur when a firewall is placed between WebGates and OAM Servers in a typical deployment. This post follows on from...
Introduction It is common to receive permission errors in the capture/extract process of Oracle GoldenGate (OGG) running on Microsoft Windows servers with...
Introduction It is common to receive permission errors in the capture/extract process of Oracle GoldenGate (OGG) running on Microsoft Windows servers with Oracle Database. The capture process reads the Oracle redo and archive logs to find the committed transactions. When an Oracle Database is installed on Windows servers, the redo logs and the archive log directory are created in protected mode, and a standard user will not have permission to read them. To circumvent this...
Introduction It is common to receive permission errors in the capture/extract process of Oracle GoldenGate (OGG) running on Microsoft Windows servers with Oracle Database. The capture process reads...
Introduction Recently, I was helping a customer in an OIM project go live when we ran an “Active Directory User Target Recon Job” with an AD Connector...
Introduction Recently, I was helping a customer in an OIM project go live when we ran an “Active Directory User Target Recon Job” with an AD Connector (11.1.1.6) and a regular expression filter to select just a subset of users. Main Article To our surprise, every time we executed the job, we got a strange error: java.lang.VerifyError: (class: org/codehaus/groovy/runtime/ArrayUtil, method: createArray signature: ()[Ljava/lang/Object;) Illegal type in constant pool. This...
Introduction Recently, I was helping a customer in an OIM project go live when we ran an “Active Directory User Target Recon Job” with an AD Connector (11.1.1.6) and a regular expression filter...
Introduction In this post, we investigate a complication that can occur if you require a firewall between your WebGate agents and your OAM 11g servers within...
Introduction In this post, we investigate a complication that can occur if you require a firewall between your WebGate agents and your OAM 11g servers within your deployment topology. We provide some guidance related to how to configure your WebGates in this case. This post is part of a larger series on Oracle Access Manager 11g called Oracle Access Manager Academy. An index to the entire series with links to each of the separate posts is available. The problem we are trying...
Introduction In this post, we investigate a complication that can occur if you require a firewall between your WebGate agents and your OAM 11g servers within your deployment topology. We provide some...