Overview Last year at OOW, I conducted Hands On Lab on Fusion integration with IDCS. We had a full room of audience with loads of questions. That inspired me to...
Overview Last year at OOW, I conducted Hands On Lab on Fusion integration with IDCS. We had a full room of audience with loads of questions. That inspired me to write this blog. One of the most common requirements as Fusion is deployed in OPC is, how to centrally manage users and implement Single Sign-On between Fusion and rest of the OPC services. IDCS (IDentity Cloud Service) is security backbone for all the OPC services. It is Oracle's Identity service in the cloud. It can...
Overview Last year at OOW, I conducted Hands On Lab on Fusion integration with IDCS. We had a full room of audience with loads of questions. That inspired me to write this blog. One of the most common...
Introduction In Part 3 of 4 – SSSD Linux Authentication: Implementation Step-by-Step Guideline I covered all the necessary step-by-step details on deploying...
Introduction In Part 3 of 4 – SSSD Linux Authentication: Implementation Step-by-Step Guideline I covered all the necessary step-by-step details on deploying SSSD, but nothing ever seems to go perfect the first time does it. This is why I have included a final Part 4 that covers known problems I came across, though there could be more, and then troubleshooting tips I learned. These are all things I learned and want to share with you so that your SSSD implementation is...
Introduction In Part 3 of 4 – SSSD Linux Authentication: Implementation Step-by-Step Guideline I covered all the necessary step-by-step details on deploying SSSD, but nothing ever seems to go perfect...
Introduction In Part 2 of 4 – SSSD Linux Authentication: LDAP Identity Store Requirements all the aspects of the LDAP Identity Store requirements were covered....
Introduction In Part 2 of 4 – SSSD Linux Authentication: LDAP Identity Store Requirements all the aspects of the LDAP Identity Store requirements were covered. And before that in article Part 1 of 2 - SSSD Linux Authentication: Introduction and Architecture I covered an introduction and high-level architecture of SSSD, which will be very important for this article. Finally, in Part 3, I will cover all the necessary steps to implement SSSD in order to support the goals pointed...
Introduction In Part 2 of 4 – SSSD Linux Authentication: LDAP Identity Store Requirements all the aspects of the LDAP Identity Store requirements were covered. And before that in article Part 1 of 2 -...
Introduction In Part 1 of 4 - SSSD Linux Authentication: Introduction and Architecture I covered an introduction on SSSD and an architecture overview with...
Introduction In Part 1 of 4 - SSSD Linux Authentication: Introduction and Architecture I covered an introduction on SSSD and an architecture overview with details on the flow of how it all works. In this part I am going to cover the LDAP Identity Store details required for SSSD. LDAP Identity Store Schema Requirements for SSSD A UNIX user account typically requires a uid, a gid, a home directory, a login shell, and a password. Minimally, a uid (User ID) and gid (Group ID)...
Introduction In Part 1 of 4 - SSSD Linux Authentication: Introduction and Architecture I covered an introduction on SSSD and an architecture overview with details on the flow of how it all works. In...
Introduction This article provides the details needed to solve a real use case used to allow a user to authenticate to an Oracle Public Cloud Linux server in...
Introduction This article provides the details needed to solve a real use case used to allow a user to authenticate to an Oracle Public Cloud Linux server in SaaS using a single or multiple LDAP Identity store that could be Active Directory 2012R2 (AD) or better, Oracle Internet Directory (OID), Oracle Unified Directory (OUD), Oracle Directory Services Enterprise Edition (ODSEE), or OpenLDAP. The use case stems from the need to authenticate and authorize users to OPC Linux...
Introduction This article provides the details needed to solve a real use case used to allow a user to authenticate to an Oracle Public Cloud Linux server in SaaS using a single or multiple...
Introduction OK, maybe "Ultimate" could be stretching it, but it caught your eye so you can be the judge. This post is part of a larger series on Oracle Access...
Introduction OK, maybe "Ultimate" could be stretching it, but it caught your eye so you can be the judge. This post is part of a larger series on Oracle Access Manager 11g called Oracle Access Manager Academy. An index to the entire series with links to each of the separate posts is available here. Though OAM11g is in the title, this article should also apply to OAM12c(12.2.1.3.0.) since it still uses 11g Webgates. In my previous post OAM 11g Webgate Tuning, I covered a...
Introduction OK, maybe "Ultimate" could be stretching it, but it caught your eye so you can be the judge. This post is part of a larger series on Oracle Access Manager 11g called Oracle Access Manager...
Introduction OAuth 2.0 has become very popular within the mobile development community mainly because it is simple to implement and the tokens are fairly...
Introduction OAuth 2.0 has become very popular within the mobile development community mainly because it is simple to implement and the tokens are fairly compact. There are various implementation patterns to choose from and it is very important to choose the right one to make sure that the solution is secure. In this blog post I want to describe how mobile clients can get access tokens from Oracle Identity Cloud Service securely so that the identity service protected APIs can...
Introduction OAuth 2.0 has become very popular within the mobile development community mainly because it is simple to implement and the tokens are fairly compact. There are various implementation...
Introduction This article is applicable to Oracle GoldenGate Classic installations, version 19c and prior. Securing platforms, applications, and data from...
Introduction This article is applicable to Oracle GoldenGate Classic installations, version 19c and prior. Securing platforms, applications, and data from unauthorized access is of great importance to IT organizations. In this article we shall detail the product features and best practices for securing your Oracle GoldenGate environment. The concepts presented in this article are for educational purposes only. Before applying any changes presented in this article to your...
Introduction This article is applicable to Oracle GoldenGate Classic installations, version 19c and prior. Securing platforms, applications, and data from unauthorized access is of great importance to...
Overview As you implement IDCS (Oracle IDentity Cloud Service) use cases, you would have started thinking, "how do you integration application X with IDCS?",...
Overview As you implement IDCS (Oracle IDentity Cloud Service) use cases, you would have started thinking, "how do you integration application X with IDCS?", Specially the applications running on-premise or running somewhere other than Oracle public cloud. This blog talks about integration of weblogic hosted applications with IDCS running on-premise or running somewhere other than Oracle public cloud. Integrating weblogic hosted application running on Oracle public cloud with...
Overview As you implement IDCS (Oracle IDentity Cloud Service) use cases, you would have started thinking, "how do you integration application X with IDCS?", Specially the applications...