Last year I wrote an article on OAM and ADF Applications with Anonymous access. This week I did some work with another A-Team guy building on that previous...
Last year I wrote an article on OAM and ADF Applications with Anonymous access. This week I did some work with another A-Team guy building on that previous work. The new requirement was that the customer wanted two different portions of the app to be protected by different login pages. In other words a user would start on an unprotected page and then choose to go to "A" or "B". If you click on "A" you see one login page and then (after logging in) you see page A. If you click...
Last year I wrote an article on OAM and ADF Applications with Anonymous access. This week I did some work with another A-Team guy building on that previous work. The new requirement was that...
Introduction Over a year ago I wrote a couple important posts about the domain architectures used in Oracle Identity Management deployments. You can find these...
Introduction Over a year ago I wrote a couple important posts about the domain architectures used in Oracle Identity Management deployments. You can find these posts here and here. These posts have been very popular. I’ve received lots of positive feedback on them but also a fair number of questions. So, I thought that it would be worth revisiting the topic now. Main Article Let’s Review My First Post So, the central premise of my first post was that it is a good idea to...
Introduction Over a year ago I wrote a couple important posts about the domain architectures used in Oracle Identity Management deployments. You can find these posts here and here. These posts have...
Introduction Here is a post that integrates OAM 11g with IPM. This integration is implemented on top of the OAM/UCM integration I did back in December. Main...
Introduction Here is a post that integrates OAM 11g with IPM. This integration is implemented on top of the OAM/UCM integration I did back in December. Main Article Prerequisites Install, configure and integrate UCM with OAM. Click here for the post I did for OAM/UCM. Install and configure IPM with the same OHS proxy used to proxy the UCM application. High Level Steps/Checklist Configure an OHS server to proxy all request to IPM (/imaging). Register a webgate with the...
Introduction Here is a post that integrates OAM 11g with IPM. This integration is implemented on top of the OAM/UCM integration I did back in December. Main Article Prerequisites Install,...
Introduction GTC based connector is one of the most used approaches for reconciling data into OIM, specially through the use of flat files. A common issue is...
Introduction GTC based connector is one of the most used approaches for reconciling data into OIM, specially through the use of flat files. A common issue is that some customers do not allow direct communication between OIM and the HR system (for different reasons like outsourced HR system, security constraints and others), hence a flat file is made available to OIM so that it reconcile users. Very often, there is a need to manipulate the data to be reconciled in OIM through...
Introduction GTC based connector is one of the most used approaches for reconciling data into OIM, specially through the use of flat files. A common issue is that some customers do not allow...
In a previous post I talked a little about protecting only a part of an application with OAM. I included this bit of text describing the use case: But what if...
In a previous post I talked a little about protecting only a part of an application with OAM. I included this bit of text describing the use case: But what if you want to let users access part of the app anonymously, but require them to log in to access some of the apps features? I don't know what anyone else calls this sort of flow, but I call it the shopping cart model (browse around tossing stuff in your card, then sign in to check out). That post talked about how to...
In a previous post I talked a little about protecting only a part of an application with OAM. I included this bit of text describing the use case: But what if you want to let users access part of...
Introduction In this post I walk you through how to validate an Oracle Identity Management build out containing OID, OVD, OIM, and OAM. This post was motivated...
Introduction In this post I walk you through how to validate an Oracle Identity Management build out containing OID, OVD, OIM, and OAM. This post was motivated by work I have done with Fusion Apps. It is important to validate the IDM build out for Fusion Apps before you move on to the provisioning of Fusion Apps itself. Problems detected during the IDM build out are much easier to diagnose and fix than problems detected during FA provisioning, FA functional setup or FA...
Introduction In this post I walk you through how to validate an Oracle Identity Management build out containing OID, OVD, OIM, and OAM. This post was motivated by work I have done with Fusion Apps. It...
On the internal mailing lists there's often a question that goes something like: I want to deploy OAM like this: Is this supported? The answer is "If you really...
On the internal mailing lists there's often a question that goes something like: I want to deploy OAM like this: Is this supported? The answer is "If you really want to do that then yes. But you probably shouldn't do it that way." Read on for why. The first thing to think about is how you are going to deploy OAM "for real". Consider a company like Oracle who uses OAM to protect basically everything. If you go to http://support.oracle.com/ to open or look at a support case, or...
On the internal mailing lists there's often a question that goes something like: I want to deploy OAM like this: Is this supported? The answer is "If you really want to do that then yes. But...
Introduction This document describes how to encapsulate OIM API calls in a Web Service for use in a custom SOA composite to be included as an approval process...
Introduction This document describes how to encapsulate OIM API calls in a Web Service for use in a custom SOA composite to be included as an approval process in a request template. We always recommend customers to follow this approach when trying to invoke OIM’s APIs inside SOA composites used as approval processes for the following reasons: A web service implementation allows the instantiation of all related APIs once at service startup as opposed to getting a remote...
Introduction This document describes how to encapsulate OIM API calls in a Web Service for use in a custom SOA composite to be included as an approval process in a request template. We...
Introduction Complexity and delay can occur during deployments of Oracle Identity and Access Management products (including the IDM build out for Fusion Apps)...
Introduction Complexity and delay can occur during deployments of Oracle Identity and Access Management products (including the IDM build out for Fusion Apps) due to the fact that certain tasks required for the build out can sometimes only be performed by individuals that are not a part of the core team doing the deployment. Main Article In many organizations IT responsibilities are very siloed. Some tasks during an IAM deployment may require assistance from individuals that...
Introduction Complexity and delay can occur during deployments of Oracle Identity and Access Management products (including the IDM build out for Fusion Apps) due to the fact that certain...