Introduction This blog post describes how to create accounts on Exalogic. Main Article Once we have created our Users and Networks we will want to enable the...
Introduction This blog post describes how to create accounts on Exalogic. Main Article Once we have created our Users and Networks we will want to enable the Virtual Data Centre (vDC) for access by the Cloud Users. To facilitate this we will need to create Accounts within the vDC / Cloud and allocate the users to these accounts. Once a Cloud User has been allocated to an account they will be able to access that account and hence create / manage Virtual Servers within that...
Introduction This blog post describes how to create accounts on Exalogic. Main Article Once we have created our Users and Networks we will want to enable the Virtual Data Centre (vDC) for access by...
Introduction This blog entry describes how to create cloud users on Exalogic. Main Article Creating Cloud Users and Administrators will be one of the first...
Introduction This blog entry describes how to create cloud users on Exalogic. Main Article Creating Cloud Users and Administrators will be one of the first tasks when setting up a new Exalogic 2.1 environment. We will step through the simple process of creating users and describe a few key user types. Initially we will need to login as either the root user or the exl-admin user. Before adding users to the Exalogic 2.1 environment they must exist as either local users on the...
Introduction This blog entry describes how to create cloud users on Exalogic. Main Article Creating Cloud Users and Administrators will be one of the first tasks when setting up a new Exalogic...
Introduction New versions of OIM connectors have been released in the past few months(version number is 11.1.1.x). These new releases bring an important change...
Introduction New versions of OIM connectors have been released in the past few months(version number is 11.1.1.x). These new releases bring an important change to OIM connectors: they are based on the Identity Connector Framework (IFC). The 11.1.1.5 documentation for the ICF is available at here Main Article One of the things that ICF brings is the capability of deploying connectors to an ‘Identity Connector Server’(but keep in mind you still need to deploy the connector to...
Introduction New versions of OIM connectors have been released in the past few months(version number is 11.1.1.x). These new releases bring an important change to OIM connectors: they are based on...
Introduction This is the first one in a series of posts dedicated to the design of tools that have the common goal of simplifying or enhancing the functionality...
Introduction This is the first one in a series of posts dedicated to the design of tools that have the common goal of simplifying or enhancing the functionality provided by OIM 11g. As more and more customers implement OIM 11g, new challenges arise and new issues are uncovered. OIM 11g is a very powerful platform but given the complexity of the problems OIM tries to solve, we have to admit that the product itself is sometimes not the easiest to implement by customers. The...
Introduction This is the first one in a series of posts dedicated to the design of tools that have the common goal of simplifying or enhancing the functionality provided by OIM 11g. As more and...
Introduction LibOVD, introduced in FMW 11.1.1.4, is a java library providing virtualization capabilities over LDAP authentication providers in Oracle Fusion...
Introduction LibOVD, introduced in FMW 11.1.1.4, is a java library providing virtualization capabilities over LDAP authentication providers in Oracle Fusion Middleware. It is delivered as part of OPSS (Oracle Platform Security Services), who is available as part of the portability layer (also known as JRF – Java Required Files). In other words, if you are a JDeveloper, WebCenter, SOA or IAM customer, you already have libOVD. LibOVD provides limited virtualization capabilities...
Introduction LibOVD, introduced in FMW 11.1.1.4, is a java library providing virtualization capabilities over LDAP authentication providers in Oracle Fusion Middleware. It is delivered as part of OPSS...
Introduction There are several types of administrative passwords that can be changed periodically based upon an organizations security requirements and standard...
Introduction There are several types of administrative passwords that can be changed periodically based upon an organizations security requirements and standard operating procedures. The scope of this document is to reflect how password changes in external components such as databases, Identity Management Systems (IDMs), etc., impacts the Fusion Applications tier and how to reconfigure them. This document covers critical password changes such as Fusion Applications...
Introduction There are several types of administrative passwords that can be changed periodically based upon an organizations security requirements and standard operating procedures. The scope of this...
I’ve written this short post as just a note to myself quite some time back. Since I had to rely on it quite a couple of times, I thought it would be worth...
I’ve written this short post as just a note to myself quite some time back. Since I had to rely on it quite a couple of times, I thought it would be worth sharing it with our readers. It may be too basic to some people, but I am sure others out there had, are having or will have issues when running searches with LDAP filters against OID (Oracle Internet Directory), especially if those filters refer to custom attributes. The information presented here is certainly available in...
I’ve written this short post as just a note to myself quite some time back. Since I had to rely on it quite a couple of times, I thought it would be worth sharing it with our readers. It may be too...
I’d better do it now, otherwise I will forget the details. Quite some people think that all an IdP-initiated flow requires is the target application URL in the...
I’d better do it now, otherwise I will forget the details. Quite some people think that all an IdP-initiated flow requires is the target application URL in the consumer side. This is actually nothing more than a SP-initiated flow. In this way, you’ll hit the Service Provider with no SAML Assertion, will be redirected back to the IdP for the SAML assertion and then sent back to the Service Provider. An IdP-initiated flow actually first needs to get a hold of a SAML assertion...
I’d better do it now, otherwise I will forget the details. Quite some people think that all an IdP-initiated flow requires is the target application URL in the consumer side. This is actually nothing...
Introduction SAML is a way to convey identity information across systems. It is an industry-accepted standard and especially interesting when you need to...
Introduction SAML is a way to convey identity information across systems. It is an industry-accepted standard and especially interesting when you need to propagate user information between different security domains, because it can overcome the HTTP cookie limitations in cross-domain scenarios (although there are ways to solve that with OAM today) and implement the concept of transient federation (also known as virtual users), where the user base is not shared between...
Introduction SAML is a way to convey identity information across systems. It is an industry-accepted standard and especially interesting when you need to propagate user information between different...