The document discusses implementing single sign-on for Oracle E-Business Suite using an external LDAP directory like Novell eDirectory for authentication. It covers installing Oracle Identity Management, registering E-Business Suite with Oracle Internet Directory and Single Sign-On, configuring synchronization between the LDAP directory and OID/SSO, and enabling authentication using an external plug-in so users stored in the LDAP directory can sign-on.
OpenAM can be valid alternative in an Oracle stack. It can tie together Oracle 9i/10g OSSO based midtiers with newer 11g WLS fusion application tiers and even SAML based authentication.
With a complete new Identity/Access Management Suite on the Oracle market,
one might forget the good old SSO server, bundled with each and every IAS server.
Although it has some out-of-the-box capabilities like WNA and X509 certificate support,
it can be quite hard to set up an authentication scheme just the way you (or your customers) like it.
Using a case study, this presentation discusses how you can extend Oracle’s Single
Sign On (SSO) server to your needs. It will discuss :
- Integration & authentication with smartcard passports (eID)
- Authentication with digital certificates
- Implementing fallback authentication schemes
- Integration with SSL terminators and reverse proxies
- DIY federated authentication
- writing your own SSO plugin
The solutions presented are part of AXI NV/BV's portfolio.
Nagios Conference 2012 - Eric Loyd - Nagios Implementation Case Eastman Kodak...Nagios
Eric Loyd's presentation Case Study on Nagios Implementation Case Eastman Kodak Company.
The presentation was given during the Nagios World Conference North America held Sept 25-28th, 2012 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/nwcna
This document covers the processes required to create a self-signed certificate or to import a 3rd party certificate using the Oracle Certificate Authority. In addition, the steps to configure the App Server for SSL and Certificate Base Authentication are included.
OpenAM can be valid alternative in an Oracle stack. It can tie together Oracle 9i/10g OSSO based midtiers with newer 11g WLS fusion application tiers and even SAML based authentication.
With a complete new Identity/Access Management Suite on the Oracle market,
one might forget the good old SSO server, bundled with each and every IAS server.
Although it has some out-of-the-box capabilities like WNA and X509 certificate support,
it can be quite hard to set up an authentication scheme just the way you (or your customers) like it.
Using a case study, this presentation discusses how you can extend Oracle’s Single
Sign On (SSO) server to your needs. It will discuss :
- Integration & authentication with smartcard passports (eID)
- Authentication with digital certificates
- Implementing fallback authentication schemes
- Integration with SSL terminators and reverse proxies
- DIY federated authentication
- writing your own SSO plugin
The solutions presented are part of AXI NV/BV's portfolio.
Nagios Conference 2012 - Eric Loyd - Nagios Implementation Case Eastman Kodak...Nagios
Eric Loyd's presentation Case Study on Nagios Implementation Case Eastman Kodak Company.
The presentation was given during the Nagios World Conference North America held Sept 25-28th, 2012 in Saint Paul, MN. For more information on the conference (including photos and videos), visit: http://go.nagios.com/nwcna
This document covers the processes required to create a self-signed certificate or to import a 3rd party certificate using the Oracle Certificate Authority. In addition, the steps to configure the App Server for SSL and Certificate Base Authentication are included.
The presentation in Oracle Technical Carnival China 2016, this is the second presentation about Oracle sharding function that will release in 12.2. In this presentation, described in real case how Oracle construct the sharding table and duplicated table.
IBI Open Visualizations provides access from any visualization or other tool that uses ODBC or JDBC to virtually any data source.
This is an update of a presentation from IBI (Information Builders) Virtual Summit (Users Group Meeting) in June 2020
Oracle Unified Directory. Lessons learnt. Is it ready for a move from OID? (O...Andrejs Prokopjevs
This presentation covers a real life experience of implementing latest OUD 11gR2 integrated with Oracle E-Business Suite R12.2.5.
We will talk about:
- Introduction to OUD. What is different if we compare it with Oracle Internet Directory topology.
- Implementation process. Issues faced and what does not work out-of-the-box.
- Performance tuning considerations.
Wes Leonardo - Putting AIR into your Application360|Conferences
The session will cover the unique aspects of taking your applications to the next level with AIR. The session will cover using the SQL Lite database, detecting online/offine, customize the skin of the application and working with the local file system. If you are just getting started and want a great primer to AIR, this is the session for you.
Docker on a local machine and Docker in production — are two big differences. It's easy to play with technology but it's hard to do something real for many customers.
Half a year ago inside of Alpha Laboratory (division of Alfa-Bank) we've started building new microservices architecture for one of our pilot projects. We've almost completely changed a stack of the used technologies on a frontend and significantly changed it on a middle layer. For package and distribution we have choosen Docker. Two months ago we've deployed project to production and have opened service for clients.
In the report the following topics will be covered:
- reasons of a choice Docker;
- why Docker without other tools is not enough for a production;
- what stack of technologies we used in our solution;
- what advantages we've got;
- what problems have been faced and how we've solved them.
Single Sign-On for APEX apps (Important: latest version on edocr!)Niels de Bruijn
IMPORTANT: As Slideshare won't let me update the content without breaking the URL, I was forced to use a new platform for my documents. Please use the following link to get the latest version:
https://www.edocr.com/v/4gyjo7me/nielsdebruijn/Ultimate-Technical-Guide-to-Single-Sign-On-for-you
Presentation about how to setup your APEX environment to enable single sign-on with kerberos.
The presentation in Oracle Technical Carnival China 2016, this is the second presentation about Oracle sharding function that will release in 12.2. In this presentation, described in real case how Oracle construct the sharding table and duplicated table.
IBI Open Visualizations provides access from any visualization or other tool that uses ODBC or JDBC to virtually any data source.
This is an update of a presentation from IBI (Information Builders) Virtual Summit (Users Group Meeting) in June 2020
Oracle Unified Directory. Lessons learnt. Is it ready for a move from OID? (O...Andrejs Prokopjevs
This presentation covers a real life experience of implementing latest OUD 11gR2 integrated with Oracle E-Business Suite R12.2.5.
We will talk about:
- Introduction to OUD. What is different if we compare it with Oracle Internet Directory topology.
- Implementation process. Issues faced and what does not work out-of-the-box.
- Performance tuning considerations.
Wes Leonardo - Putting AIR into your Application360|Conferences
The session will cover the unique aspects of taking your applications to the next level with AIR. The session will cover using the SQL Lite database, detecting online/offine, customize the skin of the application and working with the local file system. If you are just getting started and want a great primer to AIR, this is the session for you.
Docker on a local machine and Docker in production — are two big differences. It's easy to play with technology but it's hard to do something real for many customers.
Half a year ago inside of Alpha Laboratory (division of Alfa-Bank) we've started building new microservices architecture for one of our pilot projects. We've almost completely changed a stack of the used technologies on a frontend and significantly changed it on a middle layer. For package and distribution we have choosen Docker. Two months ago we've deployed project to production and have opened service for clients.
In the report the following topics will be covered:
- reasons of a choice Docker;
- why Docker without other tools is not enough for a production;
- what stack of technologies we used in our solution;
- what advantages we've got;
- what problems have been faced and how we've solved them.
Single Sign-On for APEX apps (Important: latest version on edocr!)Niels de Bruijn
IMPORTANT: As Slideshare won't let me update the content without breaking the URL, I was forced to use a new platform for my documents. Please use the following link to get the latest version:
https://www.edocr.com/v/4gyjo7me/nielsdebruijn/Ultimate-Technical-Guide-to-Single-Sign-On-for-you
Presentation about how to setup your APEX environment to enable single sign-on with kerberos.
Externally Testing Modern AD Domains - ArcticconKarl Fosaaen
Externally federated domain endpoints are an exciting target for Red Team assessments. While often overlooked, externally federated domain services can provide multiple access points to an internal network, from the internet. This talk will cover enumeration of federated domains (ADFS and AzureAD), the enumeration of federated services (Office365, Skype for Business, etc.), and attacks that you can leverage against these endpoints to gain access to an internal network. Additional PowerShell tools will be included in the talk to help you automate these attacks.
Presentation on Oracle Identity Management from Insync10 conference in Melbourne August 2010. Looks at OID and some of the potential issues around installation and configuration
Red Hat and Oracle: Delivering on the Promise of Interoperability in Java EE 7Max Andersen
This session discusses the promise of interoperability in the Java EE 7 platform and what has been done—even now, at its time of release—to maintain this. The session shows how a Java EE 7 application can be easily built using NetBeans and JBoss development tools. This application can then be deployed on JBoss, GlassFish, and Oracle WebLogic, showing the promise of interoperability. The state of Java EE 7 compliance for different application servers is discussed and demonstrated.
Oracle Identity Management presentation for 2010 Conference presented by Peter McLarty, looks at installation issues, planning and design, overall view of 11g Identity Management, more detailed look at installation and configuration of the Oracle Internet Directory.
Similar to Implementing Oracle Identity Management Using External Authentication Plug-In (20)
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
2. Dinesh Gupta
• 13 Years experience working with various
Oracle Technologies
• Experienced in upgrades and implementations
Currently providing software and infrastructure
solutions, database administration, E-Business
Suite implementations and training.
• Regular presenter at OAUG and local User
Groups
3. Objectives
• Show how to install and integrate Oracle Identity
Management with a standard LDAP directory using External
Authentication Plug-In.
• Configure Directory Integration Services using an LDAP
directory as the source of truth.
• Show how to integrate and setup provisioning of user
information between LDAP directory, Oracle Internet
Directory and E-Business Suite.
• Novell eDirectory will be used as an example but the
solution can be implemented with Microsoft Active Directory
or other LDAP directories.
4. Abbreviations
• SSO – Single Sign-On
• OID – Oracle Internet Directory
• OracleAS - Oracle Application Server
• LDAP - Light Weight Access Protocol
• E-Business Suite – Oracle Apps, Release 11i
• AD - Microsoft Active Directory
• eDir - Novell eDirectory
5. Overview
• Implementing Single Sign-On (SSO) functionality for the E-
Business Suite allows organizations to share one user
definition throughout multiple parts of their enterprise.
• Typically, the common user definition is stored in a
Lightweight Directory Access Protocol (LDAP) repository
such as Novell eDirectory, Microsoft Active Directory or
Oracle Internet Directory.
• If the passwords are stored in third-party LDAP directory
such as Novell eDirectory, then Oracle Internet Directory
can be configured to use an external authentication plug-in
that authenticates users against the third-party directory
server.
6. Overview
• In this configuration, the Oracle Single Sign-On server, the
third-party single sign-on server, and the partner
application form a chain of trust.
• The Oracle Single Sign-On server delegates authentication
to the third-party single sign-on server, becoming
essentially a partner application to it.
• The E-Business Suite and other Oracle products continue
to work only with the Oracle Single Sign-On server, and are
unaware of the third-party single sign-on server. Implicitly,
however, they trust the third-party server.
7. Supported Architectures
• Type of Integration with E-Business Suite
• SSO and OID
• Users are authenticated by:
• External third-party LDAP directory such as Novell
eDirectory.
• Master source-of-truth for user information
• External third-party LDAP directory such as Novell
eDirectory.
8. Supported Architectures
• Direction of synchronization of user information with external
directory
• From third-party user repository to OID
• Method for initial population of user information in OID and
Release 11i
• From third-party user repository to OID to Release 11i
• From third-party user repository to OID, independently in
Release 11i, then link on first sign-on with link-on-the-fly
• Method for ongoing updates to user information
• From third-party user repository to OID to Release 11i
9. Supported Architectures
• OracleAS 10g can be installed on the same machine or each
component can be installed on standalone machines.
• Each Oracle component must be installed under a separate
ORACLE_HOME.
• For the purpose of this discussion following assumptions have
been made:
• Oracle E-Business Suite Release: 11.5.10.2
• Oracle Single Sign-On Release: 10.1.4.0.1
• Oracle Internet Directory: 10.1.4.0.1
• Oracle SSO/OID Admin Name: orcladmin
SuSE Linux 9
• Operating System:
• Novell eDirectory: 8.7.3.9
10. Overview of High Level
Tasks
• Install OracleAS Identity Management
Infrastructure 10g in a separate
ORACLE_HOME
• Register E-Business Suite with OID and SSO
• Synchronize Novell eDirectory with OID and
SSO
• Enable authentication using External Plug-In.
11. Installation Tasks
• Install Oracle Application Server 10g
(10.1.4.0.1)
• Install OracleAS Identity Management Infrastructure
10g in a separate ORACLE_HOME
• On the Install screen, choose Oracle Application
Server Infrastructure 10g.
• Next choose Identity Management and Metadata
Repository.
• Next choose components - Oracle Internet Directory
and Single-Sign-On.
19. Configure and Register E-
Business with OID and SSO
• Verify if the installation was successful by
logging into the OID and SSO
• http://<host_name>:7777/oiddas
• http://<host_name>:7777/pls/sso
• Prepare the E-Business Suite for integration
with OID:
• ATG RUP 4 or above
• SSO 10g integration patch
• Other possible patches: 5502871, 5589902
20. Configure and Register E-
Business with OID and SSO
• Choose Provisioning profile
• One way Provisioning from OID to E-Business Suite
• Provisioning Attributes from OID to E-Business Suite
• Provisioning Events: Creation, Modification and Deletion
• OID Attributes FND_USER table in E-Business Suite
• UID USER_NAME
• DESCRIPTION DESCRIPTION
• MAIL EMAIL_ADDRESS
• Register E-Business Suite with SSO and OID
• $FND_TOP/11.5.0/admin/template>
txkrun.pl -script=SetSSOReg
-provtmp=ProvOIDToApps.tmp
21. Configure and Register E-
Business with OID and SSO
• Profile Options
• Applications w/SSO (APPS_SSO)
SSWA w/SSO
• Applications SSO Login Types (APPS_SSO_LOCAL_LOGIN)
Local, SSO or Both
• Login with Single Sign-On
• http://<host_name>:port/oa_servlets/AppsLogin
• Login for Local authentication
• http://<host_name>:port/OA_HTML/AppsLocalLogin.jsp
• Any new user created in OID will be provisioned in E-Business
Suite.
• Existing user accounts will be connected via Link-on-the-Fly
using GUID.
22. Synchronize Novell eDirectory
with OID and SSO - Configuration
• Configure Synchronization from Novell eDirectory
OID
• Oracle Internet Directory
• Realm: cn=users, dc=pecousa, dc=com
• Host: oracleap1dev.pecousa.com
• Novell eDirectory
• Tree: PECO_TEST
• Object Context: Peco
• Admin Name: Admin
• Admin Context: O=Peco
• Ldap clear text: 389
• eDirectory Host: 192.168.10.100
23. Synchronize Novell eDirectory
with OID and SSO – Create Profile
• Verify connectivity
• Connect to eDirectory
• ldapbind -h 192.168.10.100 –h 389 -D quot;cn=admin,o=pecoquot; –p
*****
• Connect to OID
• ldapbind -h oracleap1dev -p 13060 -D quot;cn=orcladminquot; -p *****
• Create Synchronization Profiles
• Create a new Import profile to import users from eDirectory to OID
• Use dipassistant and expressconfig option to create the Import
profile
• dipassistant expressconfig -h oracleap1dev -p 13060 -
3rdpartyds eDirectory -configset 1
24. Synchronize Novell eDirectory
with OID and SSO – Verify Profile
• Verify created profile:
• Login to Oracle Directory Manager
• Server Management Integration Server Configuration Set 1
• On the right side, you should see eDirectoryImport
• Disable/Enable created profile using command line
• dipassistant modifyprofile -profile eDirectoryImport -host
oracleap1dev -port 13060 -dn cn=orcladmin -passwd *****
odip.profile.mapfile=$ORACLE_HOME/ldap/odi/conf/eDirectoryIm
port.map odip.profile.status=DISABLE
• dipassistant modifyprofile -profile eDirectoryImport -host
oracleap1dev -port 13060 -dn cn=orcladmin -passwd *****
odip.profile.mapfile=$ORACLE_HOME/ldap/odi/conf/eDirectoryIm
port.map odip.profile.status=ENABLE
28. Synchronize Novell eDirectory
with OID and SSO – Provision
Users
• Once the Import profile has been enabled,
create a new user in Novell eDirectory
• The new user will show up in OID and
eventually in E-Business Suite
• For the existing users from Novell eDirectory
to show up in OID and E-Business, use
bootstrap option of dipassistant
• dipassistant bootstrap -profile l_eDirectoryImport
-host oracleap1dev -port 13060 -dn cn=orcladmin
-passwd *****
30. Enable Authentication using
External Plug-In
• Drop and re-create External Authentication Plug-In for eDirectory
• Create a new user testid with password as edirpass in eDirectory
• The user will be created in OID
• Set password manually in OID as oidpass
• Verify with ldapbind that you can connect as the new user to OID with
oidpass as password
• set the adwhencompare and adwhenbind profiles to DISABLE –
• delete adwhencompare and delete adwhenbind
• $ORACLE_HOME/ldap/admin/oidspediri.sh
• Check that the two plug-ins are enabled.
• Stop and start the OIDLDAPD instances
• Retry the ldapbind as testid user with oidpass as password. It should now
fail because the plug-in is enabled.
• Retry the ldapbind, but substitute the eDirectory password for the OID
password. If this works, test the user can logon to oiddas and that they
can display their profile.
36. Summary
Discussed installation tasks for Oracle Identity
Management in to an existing 11i environment.
Discussed how to register OID and SSO with E-
Business Suite.
Discussed how to synchronize Novell eDirectory with
OID/SSO and E-Business Suite.
Discussed how to enable authentication using
external plug-in.