When you install Oracle Entitlement Server (OES) and login to OES Policy Administration Console (http://WebLogicAdminHost:AdminPort/apm), you use user weblogic created during OES domain configuration. OES by default uses WebLogic’s Servers embedded LDAP Server to login to OES Administration Console (/apm). This post covers steps to integrate OES with external LDAP server (OID) so that user in OID can login to OES Administration Server console (APM) to define/manage policies & configuration.
High Level Steps to integarte OES wth OID (LDAP) Server
1. Create User & Group in OID:
First step is to create user (In this example I created user atul), group OESAdmins, and add user (Atul) as member of group OESAdmin. Use ODSM or command line tool ldapadd to create user and group
2. Add OID as Authentication Provider in WebLogic Domain hosting Oracle Entitleemnt Server.
Use steps mentioned here to add OID as additional Authentication Provider in WebLogic .
Note the following points
Host : hostname where OID is running
Port : OID listen port
Principal : DN of the user connecting from OES server to OID to extract users/groups (I am using cn=orcladmin)
Credential : Password of user used above
User Base DN : container from which users are retrieved and authenticated for OES (In my case value is cn=Users, dc=focusthread,dc=com)
User From Name Filter : change cn to uid (or mail) (This is the username user will use to login to OES Administration Console)
User Name Attribute = uid (or mail) (This is the username user will use to login to OES Administration Console)
Group Base DN = container from which Groups are retrieved and authenticated for OES (In my case value is cn=Groups, dc=focusthread,dc=com)
<property name=”virtualize” value=”true”/>
to the section
<serviceInstance name=”idstore.ldap” provider=”idstore.ldap.provider”> <property name=”idstore.config.provider” value=”oracle.security.jps.wls.internal.idstore.WlsLdapIdStoreConfigProvider”/> <property name=”CONNECTION_POOL_CLASS” value=”oracle.security.idm.providers.stdldap.JNDIPool”/> </serviceInstance>
It shoul look like this:
<serviceInstance name=”idstore.ldap” provider=”idstore.ldap.provider”> <property name=”idstore.config.provider” value=”oracle.security.jps.wls.internal.idstore.WlsLdapIdStoreConfigProvider”/> <property name=”CONNECTION_POOL_CLASS” value=”oracle.security.idm.providers.stdldap.JNDIPool”/> <property name=”virtualize” value=”true”/> </serviceInstance>
.
Related/References