Oidag Oracle Fusion Middleware Administrator Guide For Internet Directors
User Manual:
Open the PDF directly: View PDF
Page Count: 806 [warning: Documents this large are best viewed by clicking the View PDF Link!]
- Contents
- 1 Introduction to Directory Services
- 2 Understanding Oracle Internet Directory in Oracle Fusion Middleware
- 3 Understanding Oracle Internet Directory Concepts and Architecture
- 4 Understanding Process Control of Oracle Internet Directory Components
- 5 Understanding Oracle Internet Directory Organization
- 6 Understanding Oracle Internet Directory Replication
- 7 Getting Started With Oracle Internet Directory
- 8 Managing Oracle Internet Directory Instances
- 9 Managing System Configuration Attributes
- 10 Managing IP Addresses
- 11 Managing Naming Contexts
- 12 Managing Accounts and Passwords
- 13 Managing Directory Entries
- 14 Managing Dynamic and Static Groups
- 15 Performing Bulk Operations
- 16 Managing Collective Attributes
- 17 Managing Alias Entries
- 18 Managing Attribute Uniqueness Constraint Entries
- 19 Managing Knowledge References and Referrals
- 20 Managing Directory Schema
- 21 Configuring Referential Integrity
- 22 Managing Auditing
- 23 Managing Logging
- 24 Monitoring Oracle Internet Directory
- 25 Backing Up and Restoring Oracle Internet Directory
- 26 Configuring Secure Sockets Layer (SSL)
- 27 Configuring Data Privacy
- 28 Managing Password Policies
- 29 Managing Directory Access Control
- 30 Managing Password Verifiers
- 31 Delegating Privileges for Oracle Identity Management
- 32 Managing Authentication
- 33 Planning, Deploying and Managing Realms
- 34 Tuning and Sizing Oracle Internet Directory
- 35 Managing Garbage Collection
- 36 Migrating Data from Other Data Repositories
- 37 Configuring Server Chaining
- 38 Managing DIT Masking
- 39 Setting Up Replication
- 40 Setting Up Replication Failover
- 41 Managing Replication Configuration Attributes
- 42 Managing and Monitoring Replication
- 43 Configuring a Customized Password Policy Plug-In
- 44 Developing Plug-ins for the Oracle Internet Directory Server
- 45 Configuring a Customized External Authentication Plug-in
- A Differences Between 10g and 11g
- B Managing Oracle Internet Directory Instances by Using OIDCTL
- C Setting Up Oracle Database Advanced Replication-Based Replication
- D How Replication Works
- E Java Server Plug-in Developer's Reference
- F PL/SQL Server Plug-in Developer's Reference
- G The LDAP Filter Definition
- H The Access Control Directive Format
- I Globalization Support in the Directory
- J Setting up Access Controls for Creation and Search Bases for Users and Groups
- K Searching the Directory for User Certificates
- L Adding a Directory Node by Using the Database Copy Procedure
- M Oracle Authentication Services for Operating Systems
- N RFCs Supported by Oracle Internet Directory
- O Managing Oracle Directory Services Manager's Java Key Store
- P Starting and Stopping the Oracle Stack
- Q Performing a Rolling Upgrade
- R Using the Oracle Internet Directory VM Template
- S Troubleshooting Oracle Internet Directory
- Preface
- Audience
- Documentation Accessibility
- Related Documents
- Conventions
- New Features Introduced with Oracle Internet Directory 11g Release 1 (11.1.1.6.0)
- New Features Introduced with Oracle Internet Directory 11g Release 1 (11.1.1.4.0)
- New Features Introduced with Oracle Internet Directory 11g Release 1 (11.1.1)
- New Features Introduced with Oracle Internet Directory 10g (10.1.4.1)
- New Features Introduced with Oracle Internet Directory 10g Release 2 (10.1.2)
- Part I Understanding Directory Services
- 1 Introduction to Directory Services
- 1.1 What Is a Directory?
- 1.2 What Is the Lightweight Directory Access Protocol (LDAP)?
- 1.3 What Is Oracle Internet Directory?
- 1.4 How Oracle Products Use Oracle Internet Directory
- 2.1 WebLogic Server Domain
- 2.2 Oracle Internet Directory as a System Component
- 2.3 Oracle Internet Directory Deployment Options
- 1. Create New Domain-Oracle Internet Directory with a local Oracle WebLogic Server Domain. Oracle WebLogic Server is installed locally with Oracle Internet Directory and an admin domain is created for Oracle Internet Directory.
- 2. Extend Existing Domain-Oracle Internet Directory with a remote Oracle WebLogic Server Domain. Oracle WebLogic Server admin server and domain have been installed and created separately and Oracle Internet Directory registers with the Domain remotely.
- 3. Expand Cluster-Oracle Internet Directory in an Oracle WebLogic Server cluster for High Availability. This option will not be discussed here.
- 4. Configure Without Domain-Oracle Internet Directory without a Oracle WebLogic Server Domain. Oracle Internet Directory can be ...
- 2.4 Middleware Home
- 2.5 WebLogic Server Home
- 2.6 Oracle Common Home
- 2.7 Oracle Home
- 2.8 Oracle Instance
- 2.9 Oracle Enterprise Manager Fusion Middleware Control
- 2.10 Logging, Auditing, and Diagnostics
- 2.11 MBeans and the WebLogic Scripting Tool
- 3.1 Oracle Internet Directory Architecture
- 3.2 How Oracle Internet Directory Processes a Search Request
- 1. The user or client enters a search request that is conditioned by one or more of the following options:
- 2. The C API, using the LDAP protocol, sends a request to a directory server instance to connect to the directory.
- 3. The directory server authenticates the user, a process called binding. The directory server also checks the Access Control Lists (ACLs) to verify that the user is authorized to perform the requested search.
- 4. The directory server converts the search request from LDAP to Oracle Call Interface (OCI)/Oracle Net Services and sends it to the Oracle Database.
- 5. The Oracle Database retrieves the information and passes it back through the chain-to the directory server, then to the C API, and, finally, to the client.
- 3.3 Directory Entries
- 3.4 Attributes
- 3.5 Object Classes
- 3.6 Naming Contexts
- 3.7 Security
- 3.8 Globalization Support
- 3.9 Distributed Directories
- 3.10 Knowledge References and Referrals
- 3.11 Oracle Delegated Administration Services and the Oracle Internet Directory Self-Service Console
- 3.12 The Service Registry and Service to Service Authentication
- 3.13 Oracle Directory Integration Platform
- 3.14 Oracle Internet Directory and Identity Management
- 3.15 Resource Information
- 4.1 Oracle Internet Directory Process Control Architecture
- 4.2 The ODS_PROCESS_STATUS Table
- 4.3 Starting, Stopping, and Monitoring of Oracle Internet Directory Processes
- 4.4 Oracle Internet Directory Process Control-Best Practices
- 5.1 The Directory Information Tree
- 5.2 Planning the Overall Directory Structure
- 5.3 Planning the Names and Organization of Users and Groups
- 5.4 Migrating a DIT from a Third-Party Directory
- 6.1 Why Use Replication?
- 6.2 Replication Concepts
- 6.2.1 Content to be Replicated: Full or Partial
- 6.2.2 Direction: One-Way, Two-Way, or Peer to Peer
- 6.2.3 Transport Mechanism: LDAP or Oracle Database Advanced Replication
- 6.2.4 Directory Replication Group (DRG) Type: Single-master, Multimaster, or Fan-out
- 6.2.5 Loose Consistency Model
- 6.2.6 How the Replication Concepts Fit Together
- 6.2.7 Multimaster Replication with Fan-Out
- 6.3 What Kind of Replication Do You Need?
- 7.1 Patching Your System to 11g Release 1 (11.1.1.6.0)
- 7.2 Postinstallation Tasks and Information
- 7.2.1 Setting Up the Environment
- 7.2.2 Adding Datafiles to the OLTS_CT_STORE and OLTS_ATTRSTORE Tablespaces
- 7.2.3 Changing Settings of Windows Services
- 7.2.4 Starting and Stopping the Oracle Stack
- 7.2.5 Identifying Default URLs and Ports
- 7.2.6 Tuning Oracle Internet Directory
- 7.2.7 Enabling Anonymous Binds
- 7.2.8 Enabling Oracle Internet Directory to run on Privileged Ports
- 1. As the root user, execute ORACLE_HOME/oidRoot.sh.
- 2. Reassign the port numbers in one of the following ways:
- 3. Run opmnctl updatecomponentregistration, as described in Section 8.3.4, "Updating the Component Registration of an Oracle Ins...
- 4. Restart Oracle Internet Directory, as described inSection 8.2.4, "Restarting the Oracle Internet Directory Server by Using Fusion Middleware Control" or Section 8.3.9, "Restarting the Oracle Internet Directory Server by Using opmnctl."
- 7.2.9 Verifying Oracle Database Time Zone
- 7.3 Using Fusion Middleware Control to Manage Oracle Internet Directory
- 7.4 Using Oracle Directory Services Manager
- 7.4.1 Introduction to Oracle Directory Services Manager
- 7.4.2 Configuring ODSM for SSO Integration
- 1. Select Non-SSL or SSL from the Port Type list.
- 2. Select OID or OVD from the Directory Type list.
- 3. Provide the following information:
- 4. Click Validate to verify your directory connection details.
- 5. Click Apply to apply your selections.
- 6. Specify the SSO server's Logout URL in the SSO Logout URL text box.
- 7.4.3 Configuring the SSO Server for ODSM Integration
- 7.4.4 Configuring the Oracle HTTP Server for ODSM-SSO Integration
- 7.4.5 Invoking Oracle Directory Services Manager
- 7.4.6 Connecting to the Server from Oracle Directory Services Manager
- 7.4.6.1 Logging in to the Directory Server from Oracle Directory Services Manager
- 1. Click the small arrow to the right of the label Click to connect to a directory. It opens a dialog box containing the following sections:
- 2. To reconnect to a live connection, click it.
- 3. Select OID or OVD.
- 4. Optionally, enter an alias name to identify this entry on the Disconnected Connections list.
- 5. Enter the server and non-SSL port for the Oracle Internet Directory or Oracle Virtual Directory instance you want to manage.
- 6. Deselect SSL Enabled.
- 7. Enter the user (usually cn=orcladmin) and password.
- 8. Select the Start Page you want to go to after logging in.
- 9. Click Connect.
- 7.4.6.2 Logging Into the Directory Server from Oracle Directory Services Manager Using SSL
- 7.4.6.3 Connecting to an SSO-Enabled Directory as an SSO-Authenticated User
- 7.4.6.1 Logging in to the Directory Server from Oracle Directory Services Manager
- 7.4.7 Configuring Oracle Directory Services Manager Session Timeout
- 7.4.8 Configuring Oracle HTTP Server to Support Oracle Directory Services Manager in an Oracle WebLogic Server Cluster
- 1. Create a backup copy of the Oracle HTTP Server's httpd.conf file. The backup copy provides a source to revert to if you encounter problems after performing this procedure.
- 2. Add the following text to the end of the Oracle HTTP Server's httpd.conf file and replace the variable placeholder values wit...
- 3. Stop, then start the Oracle HTTP Server to activate the configuration change.
- 7.5 Using Command-Line Utilities to Manage Oracle Internet Directory
- 7.6 Basic Tasks for Configuring and Managing Oracle Internet Directory
- 1. Start and stop the LDAP server. See Chapter 8
- 2. Manage system configuration attributes. See Chapter 9.
- 3. Manage directory entries. See Chapter 13.
- 4. Manage directory schema. See Chapter 20.
- 5. Configure auditing. Chapter 22.
- 6. Manage log files. See Chapter 23.
- 7. Configure SSL. See Chapter 26.
- 8. Configure password policies. See Chapter 28.
- 9. Configure access control. See Chapter 29.
- 10. Get sizing and tuning recommendations for Oracle Internet Directory deployments. See the "Obtaining Recommendations by Using...
- 11. Set up replication. See Chapter 39 and Appendix C.
- 12. Convert an Advanced Replication-based replication agreement to an LDAP-based replication agreement. See Section 39.2, "Converting an Advanced Replication-Based Agreement to an LDAP-Based Agreement."
- 13. Modify an existing replication setup. See Chapter 42.
- 8 Managing Oracle Internet Directory Instances
- 8.1 Introduction to Managing Oracle Internet Directory Instances
- 8.2 Managing Oracle Internet Directory Components by Using Fusion Middleware Control
- 8.2.1 Viewing Active Server Information by Using Fusion Middleware Control
- 1. Connect to Oracle Enterprise Manager Fusion Middleware Control as described in Section 7.3, "Using Fusion Middleware Control to Manage Oracle Internet Directory."
- 2. The Domain Home Page displays the status of components, including Oracle Internet Directory.
- 3. Select the Oracle Internet Directory component you want to view.
- 4. View the status information on the Oracle Internet Directory Home page.
- 8.2.2 Starting the Oracle Internet Directory Server by Using Fusion Middleware Control
- 8.2.3 Stopping the Oracle Internet Directory Server by Using Fusion Middleware Control
- 8.2.4 Restarting the Oracle Internet Directory Server by Using Fusion Middleware Control
- 8.2.1 Viewing Active Server Information by Using Fusion Middleware Control
- 8.3 Managing Oracle Internet Directory Components by Using opmnctl
- 8.3.1 Creating an Oracle Internet Directory Component by Using opmnctl
- 8.3.2 Registering an Oracle Instance by Using opmnctl
- 8.3.3 Unregistering an Oracle Instance by Using opmnctl
- 8.3.4 Updating the Component Registration of an Oracle Instance by Using opmnctl
- 8.3.5 Deleting an Oracle Internet Directory Component by Using opmnctl
- 8.3.6 Viewing Active Server Instance Information by Using opmnctl
- 8.3.7 Starting the Oracle Internet Directory Server by Using opmnctl
- 8.3.8 Stopping the Oracle Internet Directory Server by Using opmnctl
- 8.3.9 Restarting the Oracle Internet Directory Server by Using opmnctl
- 8.3.10 Changing the Oracle Database Information in opmn.xml
- 8.4 Starting an Instance of the Replication Server by Using OIDCTL
- 9.1 Introduction to Managing System Configuration Attributes
- 9.2 Managing System Configuration Attributes by Using Fusion Middleware Control
- 9.2.1 Configuring Server Properties
- 9.2.2 Configuring Shared Properties
- 9.2.3 Configuring Other Parameters
- 9.3 Managing System Configuration Attributes by Using WLST
- 1. Invoke WLST
- 2. Connect to the WebLogic server
- 3. To navigate to the custom mbean tree, type:
- 4. To get a one-level list of the MBean in the custom MBean tree, type:
- 5. To get to a domain, use the cd() command. For example:
- 6. To get to a specific MBean, type:
- 7. Once you have navigated to the desired MBean, you can get the current value for an attribute by typing:
- 8. Before you make any changes to attributes, you must ensure that the MBean has the current server configuration. To do that, load the configuration from Oracle Internet Directory server to the mbean. Type:
- 9. Then you can use the set command to set a specific attribute. Type:
- 10. After making changes, you must save the MBean configuration to the Oracle Internet Directory server. Type:
- 9.4 Managing System Configuration Attributes by Using LDAP Tools
- 9.5 Managing System Configuration Attributes by Using ODSM Data Browser
- 10.1 Introduction to Managing IP Addresses
- 10.2 Configuring an IP Address for IP V6, Cold Failover Cluster, or Virtual IP
- 1. Create an LDIF file similar to this:
- 2. Execute the following ldapmodify command:
- 3. Restart Oracle Internet Directory by using opmnctl, as follows:
- 4. Update the registration of the Oracle Internet Directory component, as described in Section 8.3.4, "Updating the Component Registration of an Oracle Instance by Using opmnctl." For example:
- 11 Managing Naming Contexts
- 11.1 Introduction to Managing Naming Contexts
- 11.2 Searching for Published Naming Contexts
- 11.3 Publishing a Naming Context
- 12.1 Introduction to Managing Accounts and Passwords
- 12.2 Managing Accounts and Passwords by Using Command-Line Tools
- 12.3 Managing Accounts and Passwords by Using the Self-Service Console
- 12.4 Listing and Unlocking Locked Accounts by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Data Browser.
- 3. Perform a simple search, as described in Section 13.2.2, "Searching for Entries by Using Oracle Directory Services Manager," using the search string (pwdaccountlockedtime=*). A list of entries with locked accounts appears.
- 4. Select the entry whose account you want to unlock.
- 5. When an account is locked, Unlock Account appears before the Apply and Revert buttons. Click Unlock Account.
- 12.5 Changing the Superuser Password by Using Fusion Middleware Control
- 12.6 Creating Another Account With Superuser Privileges
- 12.7 Managing the Superuser Password by Using ldapmodify
- 12.8 Changing the Oracle Internet Directory Database Password
- 12.9 Resetting the Superuser Password
- 12.10 Changing the Password for the EMD Administrator Account
- 1. Change the userpassword of the account "cn=emd admin,cn=oracle internet directory" in Oracle Internet Directory by using ldapmodify.
- 2. Invoke wlst and connect to the WebLogic server.
- 3. Run the following WLST command:
- 4. On each Oracle instance in the WebLogic domain, execute the following command line:
- 5. Update the component registration of the Oracle instance, as described in Section 8.3.4, "Updating the Component Registration of an Oracle Instance by Using opmnctl."
- 12.11 Changing the Password for the ODSSM Administrator Account
- 1. Use SQLPlus or a similar tool to alter the password in the database.
- 2. Go to ORACLE_HOME/common/bin and run the following command:
- 3. Connect to the WebLogic Administration Server:
- 4. Run the updateCred() command:
- 5. On each Oracle instance in the WebLogic domain, execute the following command line:
- 6. Update the component registration of the Oracle instance, as described in Section 8.3.4, "Updating the Component Registration of an Oracle Instance by Using opmnctl."
- 1. Log in to the WebLogic Administration console at: http://host:port/console
- 2. Select Data Sources -> schedulerDS -> Connection Pool.
- 3. Click Lock & Edit in the top left corner of the screen.
- 4. Enter the new password in the Password and Confirm Password fields.
- 5. Click Activate Changes.
- 13 Managing Directory Entries
- 13.1 Introduction to Managing Directory Entries
- 13.2 Managing Entries by Using Oracle Directory Services Manager
- 13.2.1 Displaying Entries by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Data Browser.
- 3. If desired, expand items in the data tree in the left panel to view the entries in each subtree.
- 4. If desired, mouse over each icon in the tool bar to read the icon's action.
- 5. Select the Refresh the entry icon to refresh only the entry in the right pane. Select the Refresh subtree entries icon to refresh child entries of the selected entry.
- 6. To limit the number of entries displayed in a subtree, select the entry at the root of the subtree, then click the Filter child entries icon and specify a filter, as follows:
- a. In the Max Results field, specify a number from 1 to 1000, indicating the maximum number of entries to return.
- b. From the list at the left end of the search criteria bar, select an attribute of the entries you want to view.
- c. From the list in the middle of the search criteria bar, select a filter.
- d. In the text box at the right end of the search criteria bar, type the value for the attribute you just selected. For example, if the attribute you selected was cn, you could type the particular common name you want to find.
- e. Click + to add this search criterion to the LDAP Query field.
- f. To view the LDAP filter you have selected, select Show LDAP filter.
- g. To further refine your search, use the list of conjunctions (AND, OR, NOT AND, and NOT OR) and the lists and text fields on t...
- 7. When you have finished configuring the search criteria, click OK. The child entries that match the filter are shown under the...
- 13.2.2 Searching for Entries by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Data Browser.
- 3. To perform a simple keyword search, enter text in the field next to the Search icon to specify keywords to search for in the attributes cn, uid, sn, givenname, mail and initials.
- 4. Click the Simple Search arrow to the right of the text field or press the Enter key. Search results, if any, are displayed be...
- 5. To perform a more complex search, click Advanced. The Search Dialog appears.
- 6. In the Root of the Search field, enter the DN of the root of your search.
- a. Click Browse to the right of the Root of the Search field. The Select Distinguished Name (DN) Path: Tree View dialog box appears.
- b. Expand an item in the tree view to display its entries.
- c. Continue navigating to the entry that represents the level you want for the root of your search.
- d. Select that entry, then click OK. The DN for the root of your search appears in the Root of the Search text box in the right pane.
- 7. In the Max Results (entries) box, type the maximum number of entries you want your search to retrieve. The default is 200. The directory server retrieves the value you set, up to 1000.
- 8. In the Max Search Time (seconds) box, type the maximum number of seconds for the duration of your search. The value you enter...
- 9. In the Search Depth list, select the level in the DIT to which you want to search.
- 10. Set search criteria.
- a. From the list at the left end of the search criteria bar, select an attribute of the entry for which you want to search. Beca...
- b. From the list in the middle of the search criteria bar, select a filter.
- c. In the text box at the right end of the search criteria bar, type the value for the attribute you just selected. For example, if the attribute you selected was cn, you could type the particular common name you want to find.
- d. Click + to add this search criterion to the LDAP Query field.
- e. To view the LDAP filter you have selected, select Show LDAP filter.
- f. To further refine your search, use the list of conjunctions (AND, OR, NOT AND, and NOT OR) and the lists and text fields on t...
- 11. Click Search. Search results, if any, are displayed below the data tree. If an LDAP error icon appears, mouse over it to see...
- 13.2.3 Importing Entries from an LDIF File by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. Click the Data Browser tab.
- 3. Click the Import LDIF icon. The Import File dialog appears.
- 4. Enter the path to the LDIF file you want to import, or click Browse and navigate to the file, then click Open in the browser window.
- 5. Click OK in the Import File dialog. The LDIF Import Progress window shows the progress of the operation. Expand View Import Progress Table to see detailed progress.
- 13.2.4 Exporting Entries to an LDIF File by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. Click the Data Browser tab.
- 3. Navigate to the top level DN of the subtree you want to export.
- 4. Click the Export LDIF icon. The Export File dialog appears. Select Export Operational Attributes if you want to export them.
- 5. Click OK. The Download LDIF File dialog appears. By default, the entries are exported to a temporary file on the machine wher...
- 13.2.5 Viewing Attributes for a Specific Entry by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. Locate the entry by navigating to it in the data tree or by searching for it, as described in Section 13.2.2, "Searching for Entries by Using Oracle Directory Services Manager."
- 3. Click the entry. Attributes for that entry are displayed in the right pane. The display for the entry has at least the three ...
- 4. To view the attributes of an entry, click the Attributes tab.
- 5. You can switch between Managed Attributes and Show All by using the Views list.
- 6. To change the list of attributes shown as managed attributes, click the icon under Optional Attributes. Select attributes you...
- 7. For information on using the Subtree Access and Local Access tabs to view access control settings, see Section 29.2.4, "Adding or Modifying an ACP by Using the Data Browser in ODSM."
- 13.2.6 Adding a New Entry by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Data Browser.
- 3. On the toolbar, select the Create a new entry icon. Alternatively, right click any entry and choose Create.
- 4. Specify the object classes for the new entry. Click the Add icon and use the Add Object Class dialog to select object class e...
- 5. In the Parent of the entry field, you can specify the full DN of the parent entry of the entry you are creating. You can also...
- 6. Click Next.
- 7. Choose an attribute which will be the Relative Distinguished Name value for this entry and enter a value for that attribute. ...
- 8. Click Next. The next page of the wizard appears. (Alternatively, you can click Back to return to the previous page.)
- 9. Click Finish.
- 10. To manage optional attributes, navigate to the entry you have just created in the Data Tree
- 11. If the entry is a person, click the Person tab and use it to manage basic user attributes. Click Apply to save your changes or Revert to discard them.
- 12. If this is a person entry, you can upload a photograph. Click Browse, navigate to the photograph, then click Open. To update the photograph, click Update and follow the same procedure. Click the Delete icon to delete the photograph.
- 13. To manage object classes, as well as attributes that are not specific to a person or group entry, click the Attributes tab.
- 14. To add an object class:
- 15. To delete an object class,
- 16. By default, only non-empty attributes are shown. You can switch between Managed Attributes and Show All by using the Views list.
- 17. To change the list of attributes shown as managed attributes, click the icon under Optional Attributes. Select attributes yo...
- 18. Specify values for the optional properties. You can also modify the values of the mandatory properties. For multivalued attributes, you can use the Add and Delete icons to add and delete multiple values.
- 19. Click Apply to save your changes or Revert to discard them.
- 20. For information on using the Subtree Access and Local Access tabs to set access control, see Section 29.2.4, "Adding or Modifying an ACP by Using the Data Browser in ODSM."
- 13.2.7 Deleting an Entry or Subtree by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Data Browser.
- 3. Navigate to the entry you want to delete.
- 4. To delete only the entry, click the Delete icon. When the Delete dialog appears, click Yes. If the entry has no subentries, d...
- 13.2.8 Adding an Entry by Copying an Existing Entry in Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Data Browser.
- 3. In the data tree, navigate to the entry you want to use as a template. Alternatively, click Advanced Search, and use it to search for an entry that you want to use as a template.
- 4. In the left panel, click the Create a new entry like this one icon. Alternatively, click the entry you want to use as a templ...
- 5. To add an object class:
- 6. To delete an object class,
- 7. Specify the DN of the parent entry, either by changing the content in the text box or by using the Browse button to locate a different DN.
- 8. Click Next. The next page of the wizard appears.
- 9. Choose an attribute which will be the Relative Distinguished Name value for this entry and enter a value for that attribute. ...
- 10. Click Next.
- 11. Click Finish.
- 12. To manage optional attributes, navigate to the entry you have just created in the Data Tree, then proceed to Step 11 in Section 13.2.6, "Adding a New Entry by Using Oracle Directory Services Manager."
- 13.2.9 Modifying an Entry by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Data Browser.
- 3. Navigate to an entry in the data tree. Alternatively, perform a search for the entry you want to modify as described inSectio...
- 4. To edit the RDN, select the Edit RDN icon above the Data Tree. Alternatively, you can select the entry in the Data Tree, right click, and select Edit RDN.
- 5. To add an object class:
- 6. To delete an object class,
- 7. If the entry is a person, click the Person tab and use it to manage basic user attributes. Click Apply to save your changes or Revert to discard them.
- 8. If this is a person entry, you can upload a photograph. Click Browse, navigate to the photograph, then click Open. To update the photograph, click Update and follow the same procedure. Click the Delete icon to delete the photograph.
- 9. To modify the values of attributes that are not specific to a person or group, click the Attributes tab in the right pane and make the desired changes.
- 10. To change the list of attributes shown as managed attributes, click the icon under Optional Attributes. Select attributes yo...
- 11. Specify values for the optional properties. You can also modify the values of the mandatory properties. For multivalued attributes, you can use the Add and Delete icons to add and delete multiple values.
- 12. When you have completed all your changes, click Apply to make them take effect. Alternatively, click Revert to abandon your changes.
- 13. You can set an access control point (ACP) on this entry by using the Subtree Access and Local Access tabs. The procedures ar...
- 13.2.1 Displaying Entries by Using Oracle Directory Services Manager
- 13.3 Managing Entries by Using LDAP Command-Line Tools
- 13.3.1 Listing All the Attributes in the Directory by Using ldapsearch
- 13.3.2 Listing Operational Attributes by Using ldapsearch
- 13.3.3 Attribute Case in ldapsearch Output
- 13.3.4 Adding a User Entry by Using ldapadd
- 13.3.5 Modifying a User Entry by Using ldapmodify
- 13.3.6 Adding an Attribute Option by Using ldapmodify
- 13.3.7 Deleting an Attribute Option by Using ldapmodify
- 13.3.8 Searching for Entries with Attribute Options by Using ldapsearch
- 14.1 Introduction to Managing Dynamic and Static Groups
- 14.1.1 Static Groups
- 14.1.2 Dynamic Groups
- 14.1.3 Hierarchies
- 14.1.4 Querying Group Entries
- 14.1.5 orclMemberOf Attribute
- 14.1.6 When to Use Each Kind of Group
- 14.2 Managing Group Entries by Using Oracle Directory Services Manager
- 14.2.1 Creating Static Group Entries by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Data Browser.
- 3. On the toolbar, choose the Create a new entry icon. Alternatively, right click any entry and choose Create.
- 4. Specify the object classes for the new entry. Click the Add icon and use the Add Object Class dialog to select either groupOfNames or groupOfUniqueNames. (All the superclasses from this object class through top are also added.)
- 5. In the Parent of the entry field, you can specify the full DN of the parent entry of the entry you are creating. You can also click Browse to locate and select the DN of the parent for the entry you want to add, then click Select.
- 6. Click Next.
- 7. Choose an attribute which will be the Relative Distinguished Name value for this entry and enter a value for that attribute. You must enter a value for the cn attribute, even if it is not the RDN value.
- 8. Click Next. The next page of the wizard appears. (Alternatively, you can click Back to return to the previous page.)
- 9. Click Finish.
- 10. To add an owner or member, navigate to the group entry you just created in the Data Tree.
- 11. Select the Group tab.
- 12. To add an owner to the group, click the Add icon next to the Owner box.
- 13. Enter the owner's DN or click the button to select the entry you want to add as owner (usually a user or group entry) in the Select Distinguished Name Path dialog.
- 14. To add a member to the group, click the Add icon next to the Members text box
- 15. Enter the member's DN or click the button to select the entry you want to add as a member (usually a user or group entry) in the Select Distinguished Name Path dialog.
- 16. Optionally, enter a description for the entry.
- 17. Choose Apply to apply your changes or choose Revert to abandon your changes.
- 18. To make other changes to the group entry, see Section 14.2.2, "Modifying a Static Group Entry by Using Oracle Directory Services Manager."
- 14.2.2 Modifying a Static Group Entry by Using Oracle Directory Services Manager
- 1. Select the group in the data tree.
- 2. To add or delete an owner or member, select the Group tab or the Attributes tab.
- 3. To add a member to the group, click the Add icon next to the Members text box.
- 4. Select the entry you want to add as a member (usually a user or group entry) in the Select Distinguished Name Path dialog.
- 5. To add an owner to the group, click the Add icon next to the Owners text box.
- 6. Select the entry you want to add as an owner (usually a user or group entry) in the Select Distinguished Name Path dialog
- 7. To delete an owner or member, select it in the list and click the Delete icon.
- 8. To add or modify an attribute other than an owner or member, select the Attributes tab.
- 9. By default, only non-empty attributes are shown. You can switch between Managed Attributes and Show All by using the Views list.
- 10. To change the list of attributes shown as managed attributes, click the icon under Optional Attributes. Select attributes yo...
- 11. Specify values for the optional properties. You can also modify the values of the mandatory properties. For multivalued attributes, you can use the Add and Delete icons to add and delete multiple values.
- 12. Click Apply to save your changes or Revert to discard them.
- 13. You can set an access control point (ACP) on this entry by using the Subtree Access and Local Access tabs. The procedures ar...
- 14.2.3 Creating Dynamic Group Entries by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Data Browser.
- 3. On the toolbar, choose Create a new entry. The Create New Entry wizard appears.
- 4. Specify the object classes for the new entry. Select at least the following object class entries.
- 5. In the Parent of the entry field, you can specify the full DN of the parent entry of the entry you are creating. You can also click Browse to locate the DN of the parent for the entry you want to add, then click Select.
- 6. Click Next.
- 7. Choose an attribute which will be the Relative Distinguished Name value for this entry and enter a value for that attribute. You must enter a value for the cn attribute, even if it is not the RDN value.
- 8. Click Next. The next page of the wizard appears. (Alternatively, you can click Back to return to the previous page.)
- 9. Click Finish.
- 10. To add an owner or member, navigate to the group entry you just created in the Data Tree. (You might have to click the Refresh icon to see the new entry).
- 11. Select the Group tab.
- 12. To add an owner to the group, click the Add icon next to the Owner box.
- 13. Select the entry you want to add as owner (usually a user or group entry) in the Select Distinguished Name Path dialog.
- 14. To add a member to the group, click the Add icon next to the Members text box
- 15. Select the entry you want to add as a member (usually a user or group entry) in the Select Distinguished Name Path dialog.
- 16. Optionally, enter a description for the entry.
- 17. Choose Apply to apply your changes or choose Revert to abandon your changes.
- 18. Select the Attributes tab.
- 19. You can switch between Managed Attributes and Show All by using the Views list.
- 20. To change the list of attributes shown as managed attributes, click the icon under Optional Attributes. Select attributes yo...
- 21. If you are using the labeledURI method for dynamically computing membership in the group, you must set the labeledURI attrib...
- 22. Click Apply to save your changes or Revert to discard them.
- 23. You can set an access control point (ACP) on this entry by using the Subtree Access and Local Access tabs. The procedures ar...
- 14.2.4 Modifying a Dynamic Group Entry by Using Oracle Directory Services Manager
- 14.2.1 Creating Static Group Entries by Using Oracle Directory Services Manager
- 14.3 Managing Group Entries by Using the Command Line
- 15.1 Introduction to Performing Bulk Operations
- 15.2 Changing Server Mode
- 15.3 Loading Data Into the Schema by Using bulkload
- 15.4 Modifying Attributes of a Large Number of Entries By Using bulkmodify
- 15.5 Deleting Entries or Attributes of Entries by Using bulkdelete
- 15.6 Dumping Data from Oracle Internet Directory to a File by Using ldifwrite
- 15.7 Creating and Dropping Indexes from Existing Attributes by Using catalog
- 16.1 Introduction to Collective Attributes
- 16.2 Managing Collective Attributes by Using the Command Line
- 17.1 Introduction to Managing Alias Entries
- 17.2 Adding an Alias Entry
- 17.3 Searching the Directory with Alias Entries
- 17.4 Modifying Alias Entries
- 17.5 Interpreting Messages Related to Alias Dereferencing
- 18.1 Introduction to Managing Attribute Uniqueness Constraint Entries
- 18.2 Specifying Attribute Uniqueness Constraint Entries
- Figure 18-1 Example of a Directory Information Tree
- 18.2.1 Specifying Multiple Attribute Names in an Attribute Uniqueness Constraint
- 18.2.2 Specifying Multiple Subtrees in an Attribute Uniqueness Constraint
- 18.2.3 Specifying Multiple Scopes in an Attribute Uniqueness Constraint
- 18.2.4 Specifying Multiple Object Classes in an Attribute Uniqueness Constraint
- 18.2.5 Specifying Multiple Subtrees, Scopes, and Object Classes in an Attribute Uniqueness Constraint
- 18.3 Managing an Attribute Uniqueness Constraint Entry by Using Oracle Directory Services Manager
- 18.3.1 Creating an Attribute Uniqueness Constraint Entry by Using ODSM
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. Select Advanced from the task selection bar.
- 3. Expand Attribute Uniqueness in the left pane.
- 4. On the toolbar, choose the Create an attribute uniqueness constraint icon. This displays the New Constraint window.
- 5. In the New Constraint dialog box, enter values in the text fields and select the Unique Attribute Scope. You can click Browse to select the Unique Attribute Subtree.
- 6. If you want to enable the constraint now, click Enable Unique Attribute.
- 7. Choose OK. The entry you just created appears in the list of attribute uniqueness constraint entries in the left panel.
- 8. Click Apply to apply this constraint or Revert to revert to the state before you created the new entry.
- 18.3.2 Modifying an Attribute Uniqueness Constraint Entry by Using ODSM
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. Select Advanced from the task selection bar.
- 3. Expand Attribute Uniqueness in the left pane.
- 4. Select an existing uniqueness constraint. This displays the General tab of the Attribute Uniqueness Constraint window.
- 5. Enter or modify values.
- 6. If you want to enable the constraint now, click Enable Unique Attribute.
- 7. Click Apply to apply this change or Revert to revert to the state before you modified the entry.
- 18.3.3 Deleting an Attribute Uniqueness Constraint Entry by Using ODSM
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. Select Advanced from the task selection bar.
- 3. Expand Attribute Uniqueness in the left pane.
- 4. In the left panel, select the attribute uniqueness constraint entry you want to delete.
- 5. Choose the Delete icon, then, when prompted, confirm the deletion. The entry you deleted no longer appears in the list of attribute uniqueness constraint entries in the left panel.
- 6. Click Apply to apply this change or Revert to revert to the state before you deleted the entry.
- 18.3.1 Creating an Attribute Uniqueness Constraint Entry by Using ODSM
- 18.4 Managing an Attribute Uniqueness Constraint Entry by Using the Command Line
- 18.4.1 Creating Attribute Uniqueness Across a Directory by Using Command-Line Tools
- 18.4.2 Creating Attribute Uniqueness Across One Subtree by Using Command-Line Tools
- 18.4.3 Creating Attribute Uniqueness Across One Object Class by Using Command-Line Tools
- 18.4.4 Modifying Attribute Uniqueness Constraint Entries by Using Command-Line Tools
- 18.4.5 Deleting Attribute Uniqueness Constraint Entries by Using Command-Line Tools
- 18.4.6 Enabling and Disabling Attribute Uniqueness by Using Command-Line Tools
- 19.1 Introduction to Managing Knowledge References and Referrals
- 19.2 Configuring Smart Referrals
- 19.3 Configuring Default Referrals
- 20.1 Introduction to Managing Directory Schema
- 20.1.1 Where Schema Information is Stored in the Directory
- 20.1.2 Understanding Object Classes
- 20.1.3 Understanding Attributes
- 20.1.4 Extending the Number of Attributes Associated with Entries
- 20.1.4.1 Extending the Number of Attributes before Creating Entries in the Directory
- 20.1.4.2 Extending the Number of Attributes for Existing Entries by Creating an Auxiliary Object Class
- 20.1.4.3 Extending the Number of Attributes for Existing Entries by Creating a Content Rule
- 20.1.4.4 Rules for Creating and Modifying Content Rules
- 20.1.4.5 Schema Enforcement When Using Content Rules
- 20.1.4.6 Searches for Object Classes Listed in Content Rules
- 20.1.5 Understanding Attribute Aliases
- 20.1.6 Object Identifier Support in LDAP Operations
- 20.2 Managing Directory Schema by Using Oracle Directory Services Manager
- 20.2.1 Searching for Object Classes by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Schema.
- 3. Expand the Object Classes panel on the left.
- 4. Enter a keyword in the Search field and click Go. The list of object classes matching the keyword is displayed in the left panel.
- 20.2.2 Adding Object Classes by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in "Invoking Oracle Directory Services Manager" on page 7-9.
- 2. From the task selection bar, choose Schema.
- 3. Expand the Object Classes panel on the left and, in the toolbar, choose Create. The New Object Class dialog box appears.
- 4. In the New Object Class dialog box, enter the information in the fields.
- 5. Choose Create.
- 20.2.3 Modifying Object Classes by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Schema.
- 3. Expand the Object Classes panel on the left. Use the scroll bar to move through the alphabetical list of object classes. You ...
- 4. Click the object class you want to modify. The Object Class tab appears on the right side of the page.
- 5. To add or delete a superclass or attribute, select it in the Superclass, Mandatory Attributes, or Optional Attributes list and choose Add or Delete in the toolbar above the list
- 6. Choose Apply in the Object Class page to apply changes, or Revert to abandon changes.
- 20.2.4 Deleting Object Classes by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Schema.
- 3. Click + next to Object Classes to expand the Object Classes panel. Use the scroll bar to move through the alphabetical list of Object Classes.
- 4. Select the object class you want to delete.
- 5. Choose Delete from the toolbar, then click Delete in the confirmation dialog.
- 20.2.5 Viewing Properties of Object Classes by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Schema.
- 3. Click + next to Object Classes to expand the Object Classes panel. Use the scroll bar to move through the alphabetical list of Object Classes.
- 4. Click the Object Class you want to view. The Object Class tab appears on the right side of the page.
- 5. To see more detail about a superclass or attribute of the object class, select the item and click Edit. Click Cancel to return to the object class panel
- 20.2.6 Adding a New Attribute by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Schema.
- 3. If necessary, expand the Attributes pane, on the left, then choose the Create button in the toolbar. The New Attribute Type dialog box appears.
- 4. Enter values in each of the fields.
- 5. Choose Apply.
- 20.2.7 Modifying an Attribute by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Schema.
- 3. In the Attributes panel, select an attribute that you would like to modify. The attribute page appears on the right.
- 4. Modify or add information in editable fields, if any, in the attribute tab.
- 5. Choose Apply.
- 20.2.8 Deleting an Attribute by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Schema.
- 3. In the Attributes panel, select an attribute that you would like to delete.
- 4. Choose Delete from the toolbar in the left panel, then click Delete in the confirmation dialog.
- 20.2.9 Viewing All Directory Attributes by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Schema.
- 3. Expand Attributes.
- 4. Use the scrollbar in the Attributes panel to move through the alphabetical list.
- 20.2.10 Searching for Attributes by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Schema.
- 3. Expand the Attributes list in the left pane.
- 4. Enter a search term in the Search field in the left pane. You can use an asterisk (*) or question mark (?) as a wildcard. Click the Go icon or press Enter on your keyboard.
- 5. The results of your search appear in the list in the left pane. To dismiss the search and return to the complete list of attributes, click the Clear search text icon.
- 20.2.11 Adding an Index to a New Attribute by Using Oracle Directory Services Manager
- 20.2.12 Adding an Index to an Existing Attribute by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Schema.
- 3. Select an attribute that is not currently indexed that you want to add the index to.
- 4. Click the The attribute will be cataloged/decataloged icon. When the Confirm Dialog appears, click Confirm.
- 5. The Indexed box indicates that the attribute is indexed.
- 20.2.13 Dropping an Index from an Attribute by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Schema.
- 3. Select an attribute that is currently indexed that you want to drop the index from.
- 4. Click the The attribute will be cataloged/decataloged icon. When the Confirm Dialog appears, click Confirm.
- 5. The Indexed box indicates that the attribute is no longer indexed.
- 20.2.14 Creating a Content Rule by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Schema.
- 3. In the left pane, expand the Content Rules list.
- 4. Choose Create. The New Content Rule dialog box appears.
- 5. In the New Content Rule dialog box, add information in the Structural Object Class and Object ID fields. Optionally, add a label.
- 6. Alternatively, in the Content Rules panel, select a content rule that is similar to one you would like to create, and then ch...
- 7. Choose OK to add the content rule.
- 20.2.15 Modifying a Content Rule by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Schema.
- 3. In the left pane, expand the Content Rules list.
- 4. Select the content rule you want to modify. You can search for a content rule by entering a keyword in the search field, in t...
- 5. Modify values in the appropriate fields in the content rule tab.
- 6. Choose Apply to make the changes effective or choose Revert to abandon the changes.
- 20.2.16 Viewing Matching Rules by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Schema.
- 3. Expand the Matching Rules list. Matching rules are shown in the list.
- 4. You can search for a matching rule by entering a keyword in the search field, in the same way you search for object classes. See Section 20.2.1, "Searching for Object Classes by Using Oracle Directory Services Manager."
- 5. Select a matching rule to see its details in the matching rule tab page on the right.
- 20.2.17 Viewing Syntaxes by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Schema.
- 3. Expand the Syntaxes list. Syntax names are shown in the list.
- 4. Select a syntax to see its details in the syntax tab page on the right.
- 20.2.1 Searching for Object Classes by Using Oracle Directory Services Manager
- 20.3 Managing Directory Schema by Using the Command Line
- 20.3.1 Viewing the Schema by Using ldapsearch
- 20.3.2 Adding a New Object Class by Using Command-Line Tools
- 20.3.3 Adding a New Attribute to an Auxiliary or User-Defined Object Class by Using Command-Line Tools
- 20.3.4 Modifying Object Classes by Using Command-Line Tools
- 20.3.5 Adding and Modifying Attributes by Using ldapmodify
- 20.3.6 Deleting Attributes by Using ldapmodify
- 20.3.7 Indexing an Attribute by Using ldapmodify
- 20.3.8 Dropping an Index from an Attribute by Using ldapmodify
- 20.3.9 Indexing an Attribute by Using the Catalog Management Tool
- 20.3.10 Adding a New Attribute With Attribute Aliases by Using the Command Line
- 20.3.11 Adding or Modifying Attribute Aliases in Existing Attributes by Using the Command Line
- 20.3.12 Deleting Attribute Aliases by Using the Command Line
- 20.3.13 Using Attribute Aliases with LDAP Commands
- 20.3.14 Managing Content Rules by Using Command-Line Tools
- 20.3.15 Viewing Matching Rules by Using ldapsearch
- 20.3.16 Viewing Syntaxes by Using by Using ldapsearch
- 21.1 Introduction to Configuring Referential Integrity
- 21.2 Enabling Referential Integrity by Using Fusion Middleware Control
- 21.3 Disabling Referential Integrity by Using Fusion Middleware Control
- 21.4 Enabling Referential Integrity by Using the Command Line
- 21.5 Configuring Specific Attributes for Referential Integrity by Using the Command Line
- 21.6 Disabling Referential Integrity by Using the Command Line
- 21.7 Detecting and Correcting Referential Integrity Violations
- 22.1 Introduction to Auditing
- 22.2 Managing Auditing by Using Fusion Middleware Control
- 1. From the Oracle Internet Directory menu, select Security, then Audit Policy Settings.
- 2. From the Audit Policy list, select Custom to configure your own filters, or one of the filter presets, None, Low, or Medium. (You cannot set All from Fusion Middleware Control.)
- 3. If you want to audit only failures, click Select Failures Only.
- 4. To configure a filter, click the Edit icon next to its name. The Edit Filter dialog for the filter appears.
- 5. Specify the filter condition using the buttons, selections from the menus, and strings that you enter. Condition subjects inc...
- 6. To add a condition, click the Add icon.
- 7. When you have completed the filter, click Apply to save the changes or Revert to discard the changes.
- 22.3 Managing Auditing by Using WLST
- 22.4 Managing Auditing from the Command Line
- 23.1 Introduction to Logging
- 23.2 Managing Logging by Using Fusion Middleware Control
- 23.2.1 Viewing Log Files by Using Fusion Middleware Control
- 1. From the Oracle Internet Directory menu, select Logs, then View Log Messages. The Log Messages page appears.
- 2. Select the date range for the logs you want to view. You can select Most Recent, by minutes, hours or days. Alternatively, you can select a Time Interval and specify the date and time to start and end.
- 3. Select the Message Types you want to view.
- 4. Specify the Maximum Rows Displayed.
- 5. From the View list, select Columns to change the columns shown. Select Reorder Columns to change the order of the columns.
- 6. Within each column, you can toggle between ascending and descending order by choosing the up or down arrow in the column header.
- 7. From the Show list, choose whether to show all messages, a summary by message type, or a summary by message id.
- 8. To perform a specific search, choose Add Fields and add fields to search on. For each field, select a criterion from the list...
- 9. Use the Broaden Target Scope list to view messages for the Domain.
- 10. Choose Export Messages to File to export the log messages to a file as XML, text, or comma-separated list.
- 11. Click Target Log Files to view information about individual log files.
- 12. You can indicate when to refresh the view. Select Manual Refresh, 30-Second Refresh, or One Minute Refresh from the list on the upper right.
- 13. Use the View list to change the columns listed or to reorder columns.
- 14. Use the Show list to change the grouping of messages.
- 15. Collapse the Search label to view only the list of log messages.
- 16. To view the contents of a log file, double click the file name in the Log File column. The View Log File: filename page is displayed. You can use the up and down arrows in the Time, Message Type, and Message ID to reorder the records in the file.
- 23.2.2 Configuring Logging by Using Fusion Middleware Control
- Table 23-2 Configuration Attributes on Server Properties Page, Logging Tab
- 1. Select Administration, then Server Properties from the Oracle Internet Directory menu, then select Logging.
- 2. Under Debug Level, select the types of activity to be logged.
- 3. Under Operations Enabled for Debug, enable the LDAP operations that you want logged.
- 4. Under Logging, specify values for Maximum log file size (MB) and Maximum number of log files to keep in rotation. The defaults are 1 MB and 100 log files, respectively.
- 23.2.1 Viewing Log Files by Using Fusion Middleware Control
- 23.3 Managing Logging from the Command Line
- 24.1 Introduction to Monitoring Oracle Internet Directory Server
- 24.2 Setting Up Statistics Collection by Using Fusion Middleware Control
- 24.2.1 Configuring Directory Server Statistics Collection by Using Fusion Middleware Control
- 1. Select Administration, then Server Properties from the Oracle Internet Directory menu, then select Statistics.
- 2. In the General section of the page, select Stats Flag to enable statistics collection.
- 3. Specify the number of minutes in the Stats Frequency field to control the frequency of statistics collection.
- 4. Select values from the Bind Security Event Tracking and Compare Security Event Tracking lists.
- 5. To collect statistics about users, select User Statistics Collection in the User Statistics section of the page.
- 6. In the Event Levels section of the page, select the events you want to track.
- 24.2.2 Configuring a User for Statistics Collection by Using Fusion Middleware Control
- 24.2.1 Configuring Directory Server Statistics Collection by Using Fusion Middleware Control
- 24.3 Viewing Statistics Information with Fusion Middleware Control
- 24.4 Viewing Statistics Information from the Oracle Directory Services Manager Home Page
- 24.5 Setting Up Statistics Collection by Using the Command-Line
- 24.5.1 Configuring Health, General, and Performance Statistics Attributes
- 24.5.2 Configuring Security Events Tracking
- 24.5.3 Configuring User Statistics Collection from the Command Line
- 24.5.4 Configuring Event Levels from the Command Line
- 24.5.5 Configuring a User for Statistics Collection by Using the Command Line
- 24.6 Viewing Information with the OIDDIAG Tool
- 26.1 Introduction to Configuring Secure Sockets Layer (SSL)
- 26.2 Configuring SSL by Using Fusion Middleware Control
- 1. Creating a Wallet by Using Fusion Middleware Control
- 2. Configuring SSL Parameters by Using Fusion Middleware Control
- 3. Restarting Oracle Internet Directory.
- 26.2.1 Creating a Wallet by Using Fusion Middleware Control
- 1. From the Oracle Internet Directory menu, select Security, then Wallets. If any wallets exist, you see a list.
- 2. To create a new wallet, click Create Self-signed Wallet. The Create Self-Signed Wallet page appears.
- 3. On the Create Self-Signed Wallet page, enter a name for the new wallet, using lower-case letters only.
- 4. Select Auto Login for an auto login wallet. Deselect Auto Login for a password-protected wallet.
- 5. If you have deselected Auto Login, enter the password in the two fields.
- 6. For Common Name, enter the hostname of the instance.
- 7. Select a Key Size from the list.
- 8. Click Submit.
- 9. A confirmation message is displayed and the new wallet appears in the list of wallets.
- 26.2.2 Configuring SSL Parameters by Using Fusion Middleware Control
- 26.2.3 Setting SSL Parameters with Fusion Middleware Control
- 26.3 Configuring SSL by Using WLST
- 1. Create an Oracle wallet.
- 2. Configure SSL parameters.
- 3. Restart Oracle Internet Directory.
- 1. Invoke wlst and connect to the host, specifying the username, password, and port of the WebLogic administration server.
- 2. Navigate to the custom mbean tree, then to the specific mbean oracle.as.oid, as described in Section 9.3, "Managing System Configuration Attributes by Using WLST."
- 3. Determine what certificates, if any, you already have in the Key Store MBean. See Table 9-7, " Oracle Internet Directory-Related MBeans".
- 4. If Necessary, create a new self-signed certificate.
- 5. Add a self-signed certificate to the wallet for use as the server certificate.
- 6. Configure the oid1 component node's listener/port for SSL, specifying the appropriate authentication mode:
- 7. Restart Oracle Internet Directory, as described in Chapter 8, "Managing Oracle Internet Directory Instances," to activate the changes
- 8. Run opmnctl updatecomponentregistration, as described in Section 8.3.4, "Updating the Component Registration of an Oracle Instance by Using opmnctl"
- 9. Verify that SSL is enabled by using the methods described in Section 26.5, "Testing SSL Connections by Using Oracle Directory Services Manager" and Section 26.6, "Testing SSL Connections From the Command Line."
- 26.4 Configuring SSL by Using LDAP Commands
- 26.5 Testing SSL Connections by Using Oracle Directory Services Manager
- 26.6 Testing SSL Connections From the Command Line
- 26.7 Configuring SSL Interoperability Mode
- 27.1 Introduction to Table Space Encryption
- 27.2 Enabling and Disabling Table Space Encryption
- 1. Make a cold backup of the Oracle Databases that are used by the Oracle Internet Directory instances.
- 2. Make sure you have the JavaVM and XML developer's Kit packages installed in the database Oracle home.
- 3. Log in to SQL*Plus as a user who has the SYSTEM privilege and execute the following command:
- 4. Create the directory object, log directory object used for dumpfiles, and logfiles of the Oracle DataPump utility. Log in to SQL*Plus as the ODS user and execute the following commands:
- 5. Create directory_path and log_directory_path in the file system.
- 6. Set the database wallet location in the sqlnet.ora of the database Oracle home.
- 7. Shut down all the Oracle Internet Directory instances that are using the Oracle Database Oracle home.
- 8. If you are enabling table space encryption for the first time in the Oracle Database Oracle home, log in to SQL*Plus as a user who has the ALTER SYSTEM privilege and execute the following command:
- 9. Whenever the Oracle Database is shut down and restarted, log in to SQL*Plus as a user who has the ALTER SYSTEM privilege and execute the following command:
- 10. Set the environment variable ORACLE_HOME to the Oracle Database home.
- 11. Set the environment variable NLS_LANG to the character set of the Oracle Database server.
- 12. Edit the path of the perl5 executable in the Perl script ORACLE_ HOME/ldap/datasecurity/oidtbltde.pl so that it matches the location of perl5 on your computer.
- 13. If you have not already done so, install the database independent interface module for Perl (DBI) and the Oracle DBD driver for Perl.
- 14. Run the Perl script oidtbltde.pl to enable or disable TDE for Oracle Internet Directory
- 27.3 Introduction to Using Database Vault With Oracle Internet Directory
- 27.4 Configuring Oracle Database Vault to Protect Oracle Internet Directory Data
- 27.4.1 Registering Oracle Database Vault
- 1. Install Oracle Internet Directory as described in Oracle Fusion Middleware Installation Guide for Oracle Identity Management.
- 2. Register Oracle Database Vault as described in Oracle Database Vault Administrator's Guide.
- 3. If the Oracle Database version is 11.1.0.7, download and install the patch for Bug 7244497. This is not necessary for later versions of Oracle Database.
- 4. If the Oracle Database version is 11.1.0.7, download and install the patch for Bug 7291157. This is not necessary for later versions of Oracle Database.
- 1. Disable Oracle Database Vault, if it is enabled. See the appendix entitled "Disabling and Enabling Oracle Database Vault" in Oracle Database Vault Administrator's Guide.
- 2. Install Oracle Internet Directory as described in Oracle Fusion Middleware Installation Guide for Oracle Identity Management.
- 3. Enable Database Vault as described in the Oracle Database Vault Administrator's Guide.
- 4. Download and install the patch for Bug 7244497 if you are using Oracle Database 11.1.0.7.
- 5. Download and install the patch for Bug 7291157 if you are using Oracle Database 11.1.0.7.
- 27.4.2 Adding a Database Vault Realm and Policies for Oracle Internet Directory
- 1. Open dbv_oid_rule.sql in a text editor and replace the dummy IP address in the Check ods connections and Check ods connections 2 rules with the
- 2. Connect to the database as the Database Vault owner and execute dbv_create_ oid_policies.sql.
- 1. Open dbv_oid_rule_sqlplus.sql in a text editor. Replace the dummy IP address in Check ods connections 3 rule with the IP addresses of the hosts from which to allow SQL*Plus access to Oracle Internet Directory Database.
- 2. Connect to the database as the Database Vault owner and execute dbv_oid_ rule_sqlplus.sql.
- 27.4.3 Managing Oracle Database Vault Configuration for Oracle Internet Directory
- 27.4.4 Deleting Database Vault Policies For Oracle Internet Directory
- 27.4.5 Disabling Oracle Database Vault for the Oracle Internet Directory Database
- 27.4.1 Registering Oracle Database Vault
- 27.5 Best Practices for Using Database Vault with Oracle Internet Directory
- 27.6 Introduction to Sensitive Attributes
- 27.7 Configuring Privacy of Retrieved Sensitive Attributes
- 27.8 Introduction to Hashed Attributes
- 27.9 Configuring Hashed Attributes
- 28.1 Introduction to Managing Password Policies
- 28.1.1 What a Password Policy Is
- 28.1.2 Steps Required to Create and Apply a Password Policy
- 1. Create a password policy entry in the appropriate container and associate it with the pwdpolicy object. (Default entries exists when you first install Oracle Internet Directory.)
- 2. Create the desired policy by setting values for attributes defined under the pwdpolicy object class for the entry created in step 1.
- 3. Enable the policy by setting the orclepwdpolicynable attribute to 1. If this is not set to 1, Oracle Internet Directory ignores the policy.
- 4. Determine the subtree to be governed by the policy. Add and populate a pwdpolicysubentry attribute with the policy's DN, at the root of that subtree.
- 28.1.3 Fine-Grained Password Policies
- 28.1.4 Default Password Policy
- 28.1.5 Password Policy Attributes
- 28.1.6 Password Policy-Related Operational Attributes
- 28.1.7 Directory Server Verification of Password Policy Information
- 28.1.8 Password Policy Error Messages
- 28.1.9 Releases Before 10g (10.1.4.0.1)
- 28.2 Managing Password Policies by Using Oracle Directory Services Manager
- 28.2.1 Viewing Password Policies by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Security.
- 3. Expand Password Policy in the left pane. All of the password policies appear in the left pane, listed by relative DN. Mouse over an entry to see the full DN.
- 4. Select a password policy to display its information in the right pane.
- 28.2.2 Modifying Password Policies by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Security.
- 3. Expand Password Policy in the left pane. All of the password policies appear in the left pane.
- 4. Select the password policy you want to modify. Five tab pages appear in the right pane.
- 5. In the General tab page, modify the editable attribute fields as needed.
- 6. Select the Account Lockout tab page and, to modify the fields, select Global Lockout. Modify the editable attribute fields as needed.
- 7. Select the IP Lockout tab page and, to modify the fields, select IP Lockout. Modify the editable attribute fields as needed.
- 8. Select the Password Syntax tab page and, to modify the fields, select Check Password Syntax. Modify the editable attribute fields as needed.
- 9. Select the Effective Subtree tab page to modify the subtree to which the policy applies. To add a subtree, select the Add ico...
- 10. When you are finished, choose Apply.
- 28.2.3 Creating a Password Policy and Assigning it to a Subtree by Using ODSM
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Security.
- 3. Expand Password Policy in the left pane. All of the password policies appear in the left pane.
- 4. To create a new policy, select Create. Alternatively, select an existing password policy in the left pant and select Create Like.
- 5. In the General tab page, set or modify the editable attribute fields as needed.
- 6. Select the Account Lockout tab page and, to modify the fields, select Global Lockout. Modify the editable attribute fields as needed.
- 7. Select the IP Lockout tab page and, to modify the fields, select IP Lockout. Modify the editable attribute fields as needed.
- 8. Select the Password Syntax tab page and, to modify the fields, select Check Password Syntax. Modify the editable attribute fields as needed.
- 9. To assign the password policy to a subtree, select the Effective Subtree tab page, then select Add. Either enter the DN, or s...
- 10. When you are finished, choose Apply.
- 28.2.1 Viewing Password Policies by Using Oracle Directory Services Manager
- 28.3 Managing Password Policies by Using Command-Line Tools
- 28.3.1 Viewing Password Policies by Using Command-Line Tools
- 28.3.2 Creating a New Password Policy by Using Command-Line Tools
- 1. Dump the contents of the default entry, cn=default,cn=pwdPolicies,cn=Common,cn=Products, cn=OracleContext, to an LDIF file, using ldapmodify. For example:
- 2. Modify the LDIF file so that it has the common name and desired values for the new policy. For example, you might change cn=default to cn=policy1 and change pwdMaxFailure from 10 to 5.
- 3. Add the new entry by using ldapadd. You would use a command line of the form:
- 28.3.3 Applying a Password Policy to a Subtree by Using Command-Line Tools
- 28.3.4 Setting Password Policies by Using Command-Line Tools
- 29.1 Introduction to Managing Directory Access Control
- 29.1.1 Access Control Management Constructs
- 29.1.1.1 Access Control Policy Points (ACPs)
- 29.1.1.2 The orclACI Attribute for Prescriptive Access Control
- 29.1.1.3 The orclEntryLevelACI Attribute for Entry-Level Access Control
- 29.1.1.4 Security Groups
- 29.1.1.4.1 ACP groups
- 29.1.1.4.2 Privilege Groups
- 29.1.1.4.3 Users in Both Types of Groups
- 29.1.1.4.4 Constraints on Security Groups
- 29.1.1.4.5 Overview: Granting Access Rights to a Group
- 29.1.1.4.6 How the Directory Server Computes Security Group Membership
- 29.1.1.4.7 Example: Computing Security Group Membership
- 29.1.2 Access Control Information Components
- 29.1.3 Access Level Requirements for LDAP Operations
- 29.1.4 How ACL Evaluation Works
- Table 29-4 Attribute States During ACL Evaluation
- 29.1.4.1 Precedence Rules Used in ACL Evaluation
- 29.1.4.2 Use of More Than One ACI for the Same Object
- 29.1.4.3 Exclusionary Access to Directory Objects
- 29.1.4.4 ACL Evaluation For Groups
- 29.1.1 Access Control Management Constructs
- 29.2 Managing Access Control by Using Oracle Directory Services Manager
- 29.2.1 Viewing an ACP by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Security.
- 3. Click Access Control in the left pane. All of the defined access control points (ACPs) appear in the left pane, listed by relative DN. Mouse over an entry to see the full DN.
- 4. Select an ACP to display its information in the right pane.
- 5. The Subtree Access Items section of the page shows the access controls on this ACP for entry level operations, that is, for operations on the entry itself.
- 29.2.2 Adding an ACP by Using Oracle Directory Services Manager
- 29.2.2.1 Task 1: Specify the Entry That Will Be the ACP
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Security.
- 3. Click Access Control in the left pane. All of the defined ACPs appear in the left pane.
- 4. In the left pane, click the Create Access Control Policy Point icon. The New Access Control Point screen appears.
- 5. Enter the path to the entry you want to create, or click Browse, select a DN, and click OK.
- 6. Alternatively, to create an ACP that is similar to an existing ACP, select the existing ACP in the list under Access Control Management in the left pane and click the Create Like icon. The New Access Control Point: Create Like screen appears.
- 29.2.2.2 Task 2: Configure Structural Access Items
- 1. To define a new structural access item, that is, an ACI that pertains to an entry, choose the Create new access item icon in ...
- 2. If you want all entries below the ACP to be governed by the ACP, then you do not need to enter anything on the Entry Filter tab page; simply proceed to the next step. Otherwise, perform this step.
- a. From the list at the left end of the search criteria bar, select an attribute of the entry for which you want to search. Beca...
- b. From the list in the middle of the search criteria bar, select a filter.
- c. In the text box at the right end of the search criteria bar, type the value for the attribute you just selected. For example, if the attribute you selected was cn, you could type the particular common name you want to find.
- d. Click + to add this search criterion to the LDAP Query field.
- e. To further refine your search, use the list of conjunctions (AND, OR, NOT AND, and NOT OR) and the lists and text fields on t...
- 3. Select the Added Object Filter tab page.
- 4. Select the By Whom tab page.
- 5. Select the Access Rights tab page.
- 6. Click OK. The structural access item you just created appears in the list.
- 29.2.2.3 Task 3: Configure Content Access Items
- 1. To define content access items, that is, ACIs that pertain to attributes, choose the Create new access item icon in the Conte...
- 2. If you want all entries below the ACP to be governed by the ACP, then you do not need to enter anything on Entry Filter tab page; simply proceed to the next step. Otherwise, perform this step.
- a. From the list at the left end of the search criteria bar, select an attribute of the entry for which you want to search. Beca...
- b. From the list in the middle of the search criteria bar, select a filter.
- c. In the text box at the right end of the search criteria bar, type the value for the attribute you just selected. For example, if the attribute you selected was cn, you could type the particular common name you want to find.
- d. Click + to add this search criterion to the LDAP Query field.
- e. To further refine your search, use the list of conjunctions (AND, OR, NOT AND, and NOT OR) and the lists and text fields on t...
- 3. Select the By Whom tab page.
- a. In the By Whom field, specify the entity or entities to whom you are granting access.
- b. From the Authentication Choice list under Bind Mode, select the type of authentication to be used by the subject (that is, the entity that seeks access).
- c. Specify the entity or entities to whom you are granting access.
- 4. Select the Attribute tab page.
- 5. Select the Access Rights tab page.
- 6. Click OK. The content access item you just created appears in the list.
- 29.2.2.4 Delete a Structural or Content Access Item
- 29.2.2.1 Task 1: Specify the Entry That Will Be the ACP
- 29.2.3 Modifying an ACP by Using Access Control Management in ODSM
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Security.
- 3. Click Access Control in the left pane. All of the defined ACPs appear in the left pane.
- 4. In the left pane, select an ACP in the list. A tab page for that ACP appears in the right pane.
- 5. To define a new structural access item, that is, an ACI that pertains to an entry, choose the Create icon in the Structural Access Items section of the entry tab page. The Structural Access Item dialog box appears.
- 6. To modify an existing structural access item, select the item and click Edit. The Structural Access Item dialog box appears. ...
- 7. To define a new content access item, that is, an ACI that pertains to attributes, choose the Create icon in the Content Access Items section of the entry tab page. The Content Access Item dialog box appears.
- 8. To modify an existing content access item, select the item and click Edit. The Content Access Item dialog box appears. It has...
- 9. To delete a structural or content access item, select the item and click the Delete icon.
- 10. Click Apply to effect the changes.
- 29.2.4 Adding or Modifying an ACP by Using the Data Browser in ODSM
- 1. Invoke Oracle Directory Services Manager as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Data Browser.
- 3. Navigate to the entry you want to set access to.
- 4. In the navigator pane, select the entry to display its properties in the right pane
- 5. Select the Subtree Access tab page, then create and edit local ACIs in the Structural Access Item and Content Access Item tabs as described inSection 29.2.3, "Modifying an ACP by Using Access Control Management in ODSM."
- 6. After you have made the changes, click Apply.
- 29.2.5 Setting or Modifying Entry-Level Access by Using the Data Browser in ODSM
- 1. Invoke Oracle Directory Services Manager as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, choose Data Browser.
- 3. Navigate to the entry you want to set access to.
- 4. In the navigator pane, select the entry to display its properties in the right pane
- 5. Select the Local Access tab page, then create and edit local ACIs in the Structural Access Item and Content Access Item tabs as described in Section 29.2.3, "Modifying an ACP by Using Access Control Management in ODSM."
- 6. After you have made the changes, click Apply.
- 29.2.1 Viewing an ACP by Using Oracle Directory Services Manager
- 29.3 Managing Access Control by Using Command-Line Tools
- 29.3.1 Restricting the Kind of Entry a User Can Add
- 29.3.2 Setting Up an Inheritable ACP by Using ldapmodify
- 29.3.3 Setting Up Entry-Level ACIs by Using ldapmodify
- 29.3.4 Using Wildcards in an LDIF File with ldapmodify
- 29.3.5 Selecting Entries by DN
- 29.3.6 Using Attribute and Subject Selectors
- 29.3.7 Granting Read-Only Access
- 29.3.8 Granting Selfwrite Access to Group Entries
- 29.3.9 Defining a Completely Autonomous Policy to Inhibit Overriding Policies
- 30.1 Introduction to Password Verifiers for Authenticating to the Directory
- 30.2 Managing Hashing Schemes for Password Verifiers for Authenticating to the Directory
- 30.3 Introduction to Password Verifiers for Authenticating to Components
- 30.3.1 About Password Verifiers for Authenticating to Oracle Components
- 30.3.2 Attributes for Storing Password Verifiers for Authenticating to Oracle Components
- 30.3.3 Default Verifiers for Oracle Components
- 30.3.4 How Password Verification Works for an Oracle Component
- Figure 30-3 How Password Verification Works
- 1. The user tries to log in to an application by entering a user name and a clear text password.
- 2. The application sends the clear text password to the directory server. If the application stores password verifiers in the di...
- 3. The directory server:
- a. Generates a password verifier by using the hashing algorithm specified for the particular application
- b. Compares this password verifier with the corresponding password verifiers in the directory. For the compare operation to be successful, the application must provide its appID as the subtype of the verifier attribute. For example:
- c. Notifies the application of the results of the compare operation.
- 4. Depending on the message from the directory server, the application either authenticates the user or not.
- 1. Hashes the clear text password entered by the user
- 2. Retrieves from the directory the hashed value of the clear text password as entered by the user
- 3. Initiates a challenge to the user to which the client responds. If the response is correct, then the application authenticates the user.
- Figure 30-3 How Password Verification Works
- 30.4 Managing Password Verifier Profiles for Oracle Components by Using ODSM
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Security.
- 3. Expand Password Verifier in the left pane. All of the password verifiers appear in the left pane.
- 4. Select the password verifier you want to view. The right pane displays the Password Verifier Profile tab page.
- 5. You can modify the hashing algorithm used to generate a password verifier. In the Password Verifier Profile dialog box, specify the hashing algorithm in the Oracle Password Parameters field. The syntax is:
- 30.5 Managing Password Verifier Profiles for Components by Using Command-Line Tools
- 30.6 Introduction to Generating Verifiers by Using Dynamic Parameters
- 30.7 Configuring Oracle Internet Directory to Generate Dynamic Password Verifiers
- 31.1 Introduction to Delegating Privileges for Oracle Identity Management
- 31.2 Delegating Privileges for User and Group Management
- 31.2.1 How Privileges Are Granted for Managing User and Group Data
- 31.2.2 Default Privileges for Managing User Data
- 31.2.3 Default Privileges for Managing Group Data
- 31.3 Delegating Privileges for Deployment of Oracle Components
- 31.4 Delegating Privileges for Component Run Time
- 31.4.1 Default Privileges for Reading and Modifying User Passwords
- 31.4.2 Default Privileges for Comparing User Passwords
- 31.4.3 Default Privileges for Comparing Password Verifiers
- 31.4.4 Default Privileges for Proxying on Behalf of End Users
- 31.4.5 Default Privileges for Managing the Oracle Context
- 31.4.6 Default Privileges for Reading Common User Attributes
- 31.4.7 Default Privileges for Reading Common Group Attributes
- 31.4.8 Default Privileges for Reading the Service Registry
- 31.4.9 Default Privileges for Administering the Service Registry
- 32.1 Introduction to Authentication
- 32.1.1 Direct Authentication
- 32.1.2 Indirect Authentication
- Figure 32-1 Indirect Authentication
- 1. The end user sends to the application or middle tier a request containing a query to Oracle Internet Directory. The application or middle tier authenticates the end user.
- 2. The application or middle tier binds to the directory.
- 3. The application or middle tier performs a second bind, this time using the DN of the end user. It does not enter the end user's password.
- 4. The directory server recognizes this second bind as an attempt by the application or middle tier to switch to the end user's ...
- Figure 32-1 Indirect Authentication
- 32.1.3 External Authentication
- 32.1.4 Simple Authentication and Security Layer (SASL)
- How a SASL-Enabled Client Authenticates to a Directory Server by Using Digest-MD5
- 1. The directory server sends to the LDAP client a digest-challenge that includes various Digest-MD5 authentication options that it supports and a special token.
- 2. The client selects an authentication option, then sends a digest-response to the server indicating the option it has selected...
- 3. The directory server then decrypts and verifies the client credential from the response.
- How a SASL-Enabled Client Authenticates to a Directory Server by Using External Authentication
- How a SASL-Enabled Client Authenticates to a Directory Server by Using Digest-MD5
- 32.2 Configuring Certificate Authentication Method by Using Fusion Middleware Control
- 32.3 Configuring SASL Authentication by Using Fusion Middleware Control
- 1. Select Administration, then Server Properties from the Oracle Internet Directory menu, then select SASL.
- 2. Select the desired types for MD5 SASL Authentication Mode.
- 3. If you select Authentication with Integrity and Privacy Protection, you are presented with choices for SASL Cipher Choice for...
- 4. If desired, select Enable SASL Authentication. Before enabling SASL Authentication, ensure that Oracle Internet Directory is configured to perform mutual authentication. See Section 26.2, "Configuring SSL by Using Fusion Middleware Control."
- 5. Choose Apply.
- 32.4 Configuring Certificate Authentication Method by Using Command-Line Tools
- 32.5 Configuring SASL Authentication by Using the Command Line
- 32.6 Introduction to Anonymous Binds
- 32.7 Managing Anonymous Binds
- 32.7.1 Managing Anonymous Binds by Using Fusion Middleware Control
- 1. Select Administration, then Server Properties from the Oracle Internet Directory menu, then select the General. tab.
- 2. From the Anonymous Binds list, select Allows to enable anonymous binds. Select Disallow except for Read Access on the root DSE to allow only search operations on root DSE entry for anonymous users.
- 1. Select Administration, then Server Properties from the Oracle Internet Directory menu, then select the General. tab.
- 2. From the Anonymous Binds list, select Disallow.
- 32.7.2 Managing Anonymous Binds by Using the Command Line
- 32.7.1 Managing Anonymous Binds by Using Fusion Middleware Control
- 33.1 Introduction to Planning, Deploying and Managing Realms
- 33.1.1 Planning the Identity Management Realm
- 33.1.2 Identity Management Realms in an Enterprise Deployment
- 33.1.3 Identity Management Realms in a Hosted Deployment
- 33.1.4 Identity Management Realm Implementation in Oracle Internet Directory
- 33.1.5 Default Directory Information Tree and the Identity Management Realm
- 33.2 Customizing the Default Identity Management Realm
- Table 33-2 Customizing the Default Identity Management Realm
- Use Case 1:
- Use Case 2:
- Use Case 3:
- Use Case 4:
- Use Case 5:
- 33.2.1 Steps to Update the Existing User and Group Search Base
- 1. Back up the Oracle Internet Directory database.
- 2. Create the user and group containers for the third party directory, using Oracle Directory Services Manager, if the entries do not already exist in the directory.
- 3. Apply appropriate ACLs on the new users container by doing the following:
- 4. Apply appropriate ACLs on the new groups container by doing the following:
- 5. Determine a Lowest Common User Search Base base that is just high enough to include the existing users and the third party users.
- 6. If you must also synchronize groups, determine a group search base that is just high enough to include the existing groups and the third party groups. Lets call this search base the Lowest Common Group Search Base.
- 7. log in to the Self-Service Console as the administrator of the realm (usually orcladmin).
- 8. Go to the Configuration tab and set the user search base to the Lowest Common User Search Base you determined in step 5. If y...
- 9. To make Oracle Single Sign-On recognize these changes, follow the procedure described under Section 33.2.3, "Refresh Oracle Single Sign-On."
- 10. Verify the Oracle Single Sign-On login of users in the original user search base by logging in as orcladmin.
- 11. You must also reconfigure the applications that have been provisioned to reflect the modified user and group bases. Follow the steps described under Section 33.2.4, "Reconfigure Provisioning Profiles."
- Use Case 6:
- 33.2.2 Set up an Additional Search Base
- 1. Back up the Oracle Internet Directory database.
- 2. Create the user and group containers for the third party directory, using Oracle Directory Services Manager, if the entries do not already exist in the directory.
- 3. Apply appropriate ACLs on the new users container by doing the following:
- 4. Apply appropriate ACLs on the new groups container by doing the following:
- 5. log in to the Self-Service Console as the administrator of the realm.
- 6. Go the Configuration tab.
- 7. To make Oracle Single Sign-On recognize these changes, follow the procedure described under Section 33.2.3, "Refresh Oracle Single Sign-On."
- 8. Verify the Oracle Single Sign-On login of users in the original user search base by logging in as orcladmin.
- 9. If mid-tiers have been configured against this identity management configuration, then you must also reconfigure the applicat...
- 33.2.3 Refresh Oracle Single Sign-On
- 33.2.4 Reconfigure Provisioning Profiles
- 33.3 Creating Additional Identity Management Realms for Hosted Deployments
- 35.1 Introduction to Managing Garbage Collection
- 35.1.1 Components of the Oracle Internet Directory Garbage Collection Framework
- 35.1.2 How Oracle Internet Directory Garbage Collection Works
- Figure 35-1 Example: Garbage Collection of Change Log Entries
- 1. An LDAP client sends to the directory server a request for a particular garbage collection operation. The operation could be, for example, to purge the entries of tombstone or, change logs.
- 2. The directory server passes the request to the garbage collection plug-in.
- 3. The garbage collection plug-in sends the request to the garbage collection engine in the Oracle Internet Directory-designated database.
- 4. The garbage collection engine triggers the corresponding background database process-in this case, the change log garbage collector. The background database process runs according to the parameters specified in its configuration.
- Figure 35-1 Example: Garbage Collection of Change Log Entries
- 35.1.3 Garbage Collector Entries and the Oracle Internet Directory Statistics Collector Entry
- 35.1.4 Change Log Purging
- 35.2 Set Oracle Database Time Zone for Garbage Collection
- 1. Invoke PL/SQL:
- 2. Perform a query to get the value of dbtimezone:
- 3. Perform a query to get the displacement from Coordinated Universal Time (UTC):
- 4. If the dbtimezone parameter is equal to last column value of the systimestamp output, you do not need to perform the remaining steps. Otherwise, proceed to Step 5.
- 5. Stop all instances of Oracle Internet Directory that are using the Oracle Database, as described in Chapter 8, "Managing Oracle Internet Directory Instances."
- 6. Set the dbtimezone parameter, using the value you got from the last column the systimestamp query:
- 7. Shut down the Oracle Database:
- 8. Restart the Oracle Database:
- 9. Restart Oracle Internet Directory as described in Chapter 8, "Managing Oracle Internet Directory Instances."
- 35.3 Modifying Oracle Internet Directory Garbage Collectors
- 35.3.1 Modifying a Garbage Collector by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Advanced.
- 3. Expand Garbage Collection in the left pane, then select the garbage collector you want to modify. The Garbage Collector Window appears in the right pane.
- 4. In the Garbage Collector window, enter the changes you want to make for this garbage collector.
- 5. Choose Apply.
- 35.3.2 Modifying a Garbage Collector by Using Command-Line Tools
- 35.3.3 Modifying the Oracle Internet Directory Statistics Collector
- 35.3.1 Modifying a Garbage Collector by Using Oracle Directory Services Manager
- 35.4 Managing Logging for Oracle Internet Directory Garbage Collectors
- 35.4.1 Enabling Logging for Oracle Internet Directory Garbage Collectors
- 1. Set the orclpurgedebug attribute to 1if needed. When orclpurgedebug is set to 1, extra debugging detail information is logged. This is useful for troubleshooting garbage collection problems.
- 2. Set the orclpurgefilename attribute to a valid file name for the log file, for example: oidgc001.log.
- 3. Set the orclpurgefileloc attribute to the path name of the directory in which the log file is located, for example: /private/qzhou/oracle/ldap/log.
- 4. Enable PL/SQL I/O access to the directory specified in step 3. To do this, include the following in the database:
- 5. Shut down the replication server, then the Oracle Internet Directory server.
- 6. Restart the database.
- 7. Start the Oracle Internet Directory server, then the replication server.
- 35.4.2 Disabling Logging for Oracle Internet Directory Garbage Collectors
- 35.4.3 Monitoring Garbage Collection Logging
- 35.4.1 Enabling Logging for Oracle Internet Directory Garbage Collectors
- 35.5 Configuring Time-Based Change Log Purging
- 36.1 Introduction to Migrating Data from Other Data Repositories
- 36.2 Migrating Data from LDAP-Compliant Directories
- Table 36-1 Features of bulkload and syncProfileBootstrap
- 36.2.1 Migrating LDAP Data by Using an LDIF File and bulkload
- Figure 36-1 Using an LDIF File and bulkload
- Task 1: Export Data from the Non-Oracle Internet Directory Server into LDIF File Format
- Task 2: Analyze the LDIF User Data for Any Required Schema Additions Referenced in the LDIF Data
- Task 3: Extend the Schema in Oracle Internet Directory
- Task 4: Remove Any Proprietary Directory Data from the LDIF File
- Task 5: Remove Operational Attributes from the LDIF File
- Task 6: Remove Incompatible userPassword Attribute Values from the LDIF File
- Task 7: Run the bulkload check =TRUE" Mode and Determine Any Remaining Schema Violations or Duplication Errors
- 36.2.2 Migrating LDAP Data by Using syncProfileBootstrap Directly
- 36.2.3 Migrating LDAP Data by Using an LDIF File and syncProfileBootstrap
- 36.2.4 Migrating LDAP Data by Using syncProfileBootstrap, bulkload, and LDIF Files
- 36.2.5 Migrating LDAP Data by Using the Oracle Directory Integration Platform Server
- 36.3 Migrating User Data from Application-Specific Repositories
- 36.3.1 The Intermediate Template File
- 1. Exporting the application-specific data as an intermediate template file
- 2. You, the directory administrator, using the OID Migration Tool (ldifmigrator) to read these partial LDIF entries and convert them to pure LDIF entries based on the deployment choices
- 3. You, the directory administrator, loading the data, now in pure LDIF, into Oracle Internet Directory
- 4. The application completing the migration process according to its own specifications
- 36.3.2 Reconciling Data in Application Repository with Data Already in the Directory
- 36.3.3 Tasks For Migrating Data from Application-Specific Repositories
- 36.3.1 The Intermediate Template File
- 37.1 Introduction to Configuring Server Chaining
- 37.2 Configuring Server Chaining
- 37.2.1 Configuring Server Chaining by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Advanced.
- 3. Expand Server Chaining. Server Chaining entries appear in the left panel. Current entries include iPlanet (Oracle Directory Server Enterprise Edition and Sun Java System Directory Server) and Active Directory.
- 4. To modify a server chaining configuration entry, select it. The Server Chaining Management tab appears in the right pane.
- 5. Modify External Host Name, External Port Number, Login User DN, and Login User Password as necessary.
- 6. To enable server chaining authentication, modification, or search, select the corresponding checkbox.
- 7. Modify the other fields as necessary.
- 8. After modifying an external user container, group container, or login credential, verify the value by clicking Verify User Container, Verify Group Container, or Verify Login Credential, respectively.
- 9. If you want to add an attribute mapping, click the Add attribute mappings to list icon under Attribute Mapping. To edit an ex...
- 10. Click OK to create the mapping or click Cancel to abandon it.
- 11. To delete a mapping, select the mapping and click the Delete selected attribute mapping icon. When the Delete Confirm dialog appears, click Delete to delete the mapping or Cancel to abandon deletion.
- 12. Click OK to enable the configuration changes or click Cancel to abandon the changes.
- 37.2.2 Configuring Server Chaining from the Command Line
- 1. Create an LDIF file to manually add the user and group containers. To determine the DNs for these containers, see Section 37....
- 2. Use ldapadd and the LDIF file you just created to add the entries.
- 3. Create another LDIF file to modify and enable the server chaining configuration entries. For example LDIF files, see Section ...
- 4. Modify the server chaining configuration entries using the ldapmodify command and the LDIF file you just created. Use a command line of the form:
- 37.2.1 Configuring Server Chaining by Using Oracle Directory Services Manager
- 37.3 Creating Server Chaining Configuration Entries
- 37.3.1 Configuration Entry Attributes
- 37.3.2 Requirements for User and Group Containers
- 37.3.3 Attribute Mapping
- 37.3.4 Active Directory Example
- 37.3.5 Active Directory with SSL Example
- 1. Configure Active Directory server chaining without SSL, as described in the previous section.
- 2. Create an LDIF file like the following to enable SSL connection to the external directory. Replace the values of orcloidscextsslport, orcloidscwalletlocation and orcloidscwalletpassword with values that match the actual Active Directory server:
- 3. To apply the changes, use a command line such as
- 37.3.6 Active Directory with New Attributes Example
- 37.3.7 Oracle Directory Server Enterprise Edition and Sun Java System Directory Server (iPlanet) Example
- 37.3.8 Oracle Directory Server Enterprise Edition and Sun Java System Directory Server (iPlanet) with SSL Example
- 37.3.9 eDirectory Example
- 37.3.10 eDirectory with SSL Example
- 37.4 Debugging Server Chaining
- 1. Set the Oracle Internet Directory server debug logging level, as described in Section 23.2, "Managing Logging by Using Fusion...
- 2. Modify the Oracle Internet Directory server chaining debugging settings. For both cn=oidscad,cn=oid server chaining,cn=subconfigsubentry and cn=oidsciplanet,cn=oid server chaining, cn=subconfigsubentry. set the attribute orcloidscDebugEnabled to 1.
- 37.5 Configuring an Active Directory Plug-in for Password Change Notification
- 1. In Active Directory, create an attribute called orclCommonAttribute to store the hash password. Use a command line such as:
- 2. Associate the attribute with the user objectclass. Use a command line such as:
- 3. Install the password change notification plug-in, as follows:
- a. Copy %ORACLE_HOME%\ldap\admin\oidpwdcn.dll to the Active Directory WINDOWS\system32 folder.
- b. Use regedt32 to modify the registry. In the line:HKEY_LOCAL_ MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Notification Packages, add oidpwdcn to the end. It should look like the following:
- c. Restart Active Directory.
- d. Verify that the plug-in is installed properly by resetting the password of a user. The orclCommonAttribute should contain the hash password value.
- 4. Reset the password for all the Active Directory users so that the password verifier is present for all the users.
- 38 Managing DIT Masking
- 38.1 Configuring Masking
- 38.2 Masking Examples
- 39.1 Introduction to Setting Up Replication
- 39.1.1 Replication Transport Mechanisms
- 39.1.2 Replication Setup Methods
- 39.1.3 Bootstrap Rules
- 39.1.4 The Replication Agreement
- 39.1.5 Other Replication Configuration Attributes
- 39.1.6 Replication Process and Architecture
- 39.1.7 Rules for Configuring LDAP-Based Replication
- 1. If you have multiple Oracle Internet Directory instances that use the same Oracle Database, only one of the instances can be set up for replication.
- 2. LDAP Multimaster replication is not backward compatible. It is only supported between replicas that are running 11g Release 1 (11.1.1).
- 3. For either multimaster replication or two-way fan-out replication, all nodes must be running the same release of Oracle Internet Directory. Therefore, you must turn off replication while performing rolling upgrades.
- 4. You can add a one-way fan-out replica that is running a newer release than its supplier. For example, in Figure 6-5, "Example of Fan-Out Replication", Node F can be running a newer release than the other nodes.
- 5. In general, do not replicate changes generated on a newer version of Oracle Internet Directory to a node that has not yet upgraded to that version. If you do, the changes can contain information that the earlier version cannot properly interpret.
- 6. More specifically, if you add a new Oracle Internet Directory 11g Release 1 (11.1.1.6) node to an existing DRG as a one-way f...
- 7. In LDAP-based replication, only the naming contexts listed in the namingcontexts attribute of the root DSE can be replicated to the consumer.
- 8. The supplier of an LDAP-based replica can be a master node that is not a member of any replication group, a member of a multimaster replication group, or another LDAP-based replica.
- 9. An LDAP-based replica can be a consumer for another LDAP-based replica. That consumer is then called a fan-out replica.
- 10. The new consumer node must be empty. That is, Oracle Internet Directory must be newly installed.
- 39.1.8 Replication Security
- 39.1.9 LDAP Replication Filtering for Partial Replication
- 39.1.9.1 Included and Excluded Naming Contexts in LDAP Replication Filtering
- 39.1.9.2 Attributes that Control Naming Contexts
- 39.1.9.3 Rules for LDAP Replication Filtering
- 1. The overall included naming context is the union of all included naming contexts defined in each naming context object.
- 2. The overall excluded naming contexts is the union of all excluded naming contexts defined in each naming context object.
- 3. The attribute exclusions in a naming context object are specific only to that naming context object.
- 4. If there is a conflict between an included naming context and an excluded naming context, the excluded naming context overrul...
- 5. If you configure partial replication between two different versions of Oracle Internet Directory (for example 10g (10.1.4.0.1...
- 39.1.9.4 Examples of LDAP Replication Filtering
- Figure 39-1 A Sample Naming Context
- Scenario A: The Included Naming Context in One Naming Context Object Is a Subtree of the Included Naming Context in Another Naming Context Object
- Scenario B: The Included Naming Context in One Naming Context Object Is a Subtree of An Excluded Naming Context in Another Naming Context Object
- 39.1.9.5 Rules for Managing Naming Contexts and Attributes
- 39.1.9.6 Optimization of Partial Replication Naming Context for Better Performance
- 39.2 Converting an Advanced Replication-Based Agreement to an LDAP-Based Agreement
- 39.3 Setting Up an LDAP-Based Replication Agreement by Using the Replication Wizard
- 1. From the Oracle Internet Directory menu on the home page, select Administration, then Replication Management.
- 2. You are prompted to log into the replication DN account. Provide the host, port, replication DN, and replication DN password....
- 3. Click the Create icon.
- 4. On the Type screen, select the replication type: One Way Replication, Two Way Replication, or Multimaster Replication.
- 5. Click Next. The Replicas screen displays the replication type you selected.
- 6. Provide an agreement name. This must be unique across all the nodes.
- 7. For one way or two way replication, enter the host, port, user name (replication DN), and replication password for the consumer node. Fields for the supplier node are populated and greyed out.
- 8. Click Next to go the Settings page.
- 9. In the LDAP Connection field, select Keep Alive if you want the replication server to use same connection for performing mult...
- 10. Enter the Replication Frequency.
- 11. Enter the Human Intervention Queue Schedule. This is the interval, in seconds, at which the directory replication server repeats the change application process.
- 12. If you have specified Two Way Replication or Multimaster Replication as the agreement type, the settings page contains a sec...
- 13. Click Next to go to the Scope page. The default primary naming context is filled in.
- 14. To exclude a secondary naming context within the default primary naming context, select the primary naming context and click the Create button. Then proceed to Step 16.
- 15. To create another primary naming context, click the Create Primary Naming Context button. This invokes the Primary Naming Context dialog.
- 16. To exclude a secondary naming context, click the Add icon below the Excluded Secondary Naming Contexts field. This invokes t...
- 17. To exclude an attribute, click the Add icon below the ExcludedAttributes field. This invokes the Select Excluded Attributes screen. Select the attributes you want to exclude and click OK. The attribute now appears in the Excluded Attributes field.
- 18. Click OK. The primary naming context is now listed on the Scope page.
- 19. Click Next. The Summary page displays a summary of the replication agreement you are about to create.
- 20. Click Finish to create the replication agreement.
- 39.4 Testing Replication by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Data Browser.
- 3. Create a single entry on the MDS node, as described in Section 13.2.6, "Adding a New Entry by Using Oracle Directory Services Manager."
- 39.5 Setting Up an LDAP-Based Replication by Using the Command Line
- 39.5.1 Copying Your LDAP Data by Using ldifwrite and bulkload
- 39.5.2 Setting Up an LDAP-Based Replica with Customized Settings
- Table 39-1 Data Migration Using ldifwrite/bulkload versus Automatic Bootstrapping
- 39.5.2.1 Setting Up an LDAP-Based Replica by Using Automatic Bootstrapping
- 39.5.2.1.1 Task 1: Identify and Start the Directory Server on the Supplier Node
- 39.5.2.1.2 Task 2: Create the New Consumer Node by Installing Oracle Internet Directory
- 39.5.2.1.3 Task 3: Back Up the Metadata from the New Consumer Node
- 39.5.2.1.4 Task 4: Add an LDAP-Based Replica by Using the Replication Environment Management Tool
- 1. Determine the replica ID of the supplier and consumer replica nodes by executing the following search command on both nodes:
- 2. Determine the replication agreement entry, which is of the form:
- 3. For each naming context that you plan to include in replication, add an entry like the following on both the consumer and sup...
- 4. Repeat Step3 for each naming context (subtree) to be configured in partial replication.
- 39.5.2.1.5 Task 5: On the Consumer, Configure the Consumer Replica for Automatic Bootstrapping
- 39.5.2.1.6 Task 6: Optional: Change Default Replication Parameters
- 39.5.2.1.7 Task 7: Ensure the Directory Replication Servers are Started
- 39.5.2.1.8 Task 8: If Oracle Delegated Administration Services or Oracle Single Sign-On Are Installed on the New Node, Restore Their Entries in the New Node's Directory
- 1. In the ocbkup.new_replicaid.TO.master_ replicaid.timestamp.ldif file created by Task 3, locate and copy the DAS URL. The DN o...
- 2. Create an LDIF file called change_das_url.ldif with the following contents:
- 3. Execute the following command to change the DAS URL:
- 1. In the ocbkup.timestamp.dat file created by Task 3, locate and copy the SSO container entry. Copy only the attributes shown i...
- 2. Create an LDIF file add_SSO_container.ldif with the following contents:
- 3. Execute the following command to add the SSO container entry:
- 4. Create an LDIF file mod.ldif with the following contents:
- 5. Execute the following command to apply mod.ldif:
- 6. Using a browser, test the Oracle Delegated Administration Services and Oracle Single Sign-On pages.
- 39.5.2.2 Setting Up an LDAP-Based Replica by Using the ldifwrite Tool
- 39.5.2.2.1 Task 1: Start the Directory Server on Both the Supplier and the Consumer Nodes
- 39.5.2.2.2 Task 2: Back Up the Metadata from the New Consumer Node
- 39.5.2.2.3 Task 3: Change the Directory Server at the Supplier to Read-Only Mode
- 39.5.2.2.4 Task 4: Add an LDAP-Based Replica by Using the Replication Environment Management Tool
- 39.5.2.2.5 Task 5: Back Up the Naming Contexts to Be Replicated
- 1. Identify the replication agreement DN created in "Task 4: Add an LDAP-Based Replica by Using the Replication Environment Management Tool".
- 2. On the supplier, ensure that ORACLE_INSTANCE is set, the use the following command to get the data from the supplier. Data loaded into the file will be based on the agreement configured:
- 39.5.2.2.6 Task 6: Change the Directory Server at the Supplier to Read/Write Mode
- 39.5.2.2.7 Task 7: Load the Data on the New Consumer
- 39.5.2.2.8 Task 8: If Oracle Delegated Administration Services or Oracle Single Sign-On Are Installed on the New Node, Restore Their Entries in the New Node's Directory
- 39.5.2.2.9 Task 9: Optional: Change Default Replication Parameters
- 39.5.2.2.10 Task 10: Ensure the Directory Replication Servers are Started
- 39.5.3 Password Policy and Fan-out Replication
- 39.5.4 Deleting an LDAP-Based Replica
- 39.6 Setting Up a Multimaster Replication Group with Fan-Out
- Table 39-3 Nodes in Example of Partial Replication Deployment
- Figure 39-11 Example of Fan-Out Replication
- Task 1: Set up the Multimaster Replication Group for Node1 and Node2
- Task 2: Configure the Replication Agreement
- Task 3: Start the Replication Servers on Node1 and Node2
- Task 4: Test the Directory Replication Between Node1 and Node2.
- Task 5: Install and Configure Node3 as a Partial Replica of Node2
- Task 6: Customize the Partial Replication Agreement
- Task 7: Start the Replication Servers on All Nodes in the DRG
- Task 8: Install and Configure Node4 as a Full Replica of Node2
- Task 9: Test the Replication from Node2 to Node4
- Task 10: Install and Configure Node5 as a Two-Way Replica of Node1
- Task 11: Test the Two-Way Replication Between Node1 and Node5
- 40.1 Introduction to Replication Failover
- Figure 40-1 Replication Failover Scenario
- Figure 40-2 Consumer and New Supplier Connected to Old Supplier by LDAP
- Figure 40-3 Old and New Suppliers in the Same Advanced Replication Group
- 40.1.1 Limitations and Warnings for Replication Failover
- 40.1.2 Determining Which Type of Replication Failover to Use
- 40.2 Performing a Stateless Replication Failover
- 40.2.1 Task 1: Stop all Directory Replication Server on related Nodes
- 40.2.2 Task 2: Break Old Replication Agreement and Set up New Agreement
- 40.2.3 Task 3: Save Last Change Number
- 40.2.4 Task 4: Compare and Reconcile New Supplier and Consumer
- 40.2.5 Task 5: Update Last Applied Change Number of New Agreement
- 40.2.6 Task 6: Clean Up Old Agreement on Old Supplier
- 40.2.7 Task 7: Start All Directory Replication Server on related Nodes
- 40.3 Performing a Time-Based Replication Failover
- 40.3.1 Task 1: Configure Change Log Garbage Collection Object on New Supplier
- 40.3.2 Task 2: Save Last Change Number from New Supplier
- 40.3.3 Task 3: Enable Change Log Regeneration on New Supplier
- 40.3.4 Task 4: Wait for the Desired Time Period to Elapse
- 40.3.5 Task 5: Stop all Directory Replication Servers on Related Nodes
- 40.3.6 Task 6: Break Old Replication Agreement and Set Up New Agreement
- 40.3.7 Task 7: Update Last Applied Change Number of New Agreement
- 40.3.8 Task 8: Clean Up Old Agreement on Old Supplier
- 40.3.9 Task 9: Start All Directory Replication Servers on Related Nodes
- 41.1 Introduction to Replication Configuration Attributes
- 41.1.1 The Replication Configuration Container
- 41.1.2 The Replica Subentry
- 41.1.3 The Replication Agreement Entry
- 1. Oracle Database Advanced Replication-based replication agreement. The replication agreement for Advanced Replication nodes re...
- 2. LDAP-based replication agreement. The replication agreement for LDAP nodes resides under the supplier's replica subentry. For...
- 41.1.3.1 Replication Agreement Entry Attributes
- 41.1.3.2 Oracle Database Advanced Replication-Based Replication Agreements
- 41.1.3.3 LDAP Replication Agreements
- 41.1.3.4 Two-Way LDAP Replication Agreements
- 41.1.4 The Replication Naming Context Container Entry
- 41.1.5 The Replication Naming Context Object Entry
- 41.1.6 The Replication Configuration Set
- 41.1.7 Examples of Replication Configuration Objects in the Directory
- 41.2 Configuring Replication Configuration Attributes by Using Fusion Middleware Control
- 41.3 Managing Replication Configuration Attributes From the Command Line
- 42.1 Introduction to Managing and Monitoring Replication
- 42.1.1 Modifying What Is to Be Replicated in LDAP-Based Partial Replication
- 42.1.2 Managing Worker Threads
- 42.1.3 Change Logs in Directory Replication
- 42.1.4 The Human Intervention Queue
- 42.1.5 Pilot Mode
- 42.1.6 Conflict Resolution in Oracle Replication
- 42.1.6.1 Levels at Which Replication Conflicts Occur
- 42.1.6.2 Automatic Conflict Resolution
- 42.1.6.3 How Automated Conflict Resolution Works
- 1. The conflict is detected when a change is applied.
- 2. The replication process attempts to reapply the change a specific number of times or repetitively for a specific amount of time after a specific waiting period.
- 3. If the replication process reaches the retry limit without successfully applying the change, it flags the change as a conflic...
- 42.2 Managing and Monitoring Replication by Using ODSM and Fusion Middleware Control
- 42.2.1 Enabling or Disabling Change Log Generation by Using Fusion Middleware Control
- 42.2.2 Viewing the Local Change Logs by Using Oracle Directory Services Manager
- 42.2.3 Viewing and Modifying Replica Naming Context Objects
- 1. From the Oracle Internet Directory menu on the home page, select Administration, then Replication Management.
- 2. You are prompted to log into the replication DN account. Provide the host, port, replication DN, and replication DN password.
- 3. The Replication Agreements page lists information about each replication agreement: name, type, supplier, consumer, and statu...
- 4. On the Scope tab, you can change the scope settings.
- 5. To exclude a secondary naming context, select it in the Secondary Naming Contexts field and click Exclude to move it to the Excluded Secondary Naming Contexts field.
- 6. To exclude an attribute, select it in the Attributes field and click Exclude to move it to the Excluded Attributes field.
- 7. To apply your changes, click Apply.
- 8. To effect the changes you have made, you must start or restart the replication server. For one-way replication, you must rest...
- 42.2.4 Viewing or Modifying a Replication Setup by Using the Replication Wizard
- 1. From the Oracle Internet Directory menu on the home page, select Administration, then Replication Management.
- 2. You are prompted to log into the replication DN account. Provide the host, port, replication DN, and replication DN password.
- 3. To view queue statistics for a replication agreement, select the replication agreement, select Queue Statistics and proceed as described in Section 42.2.10, "Viewing Queue Statistics by Using Fusion Middleware Control."
- 4. To view or edit a replication agreement, select the name of the replication agreement you want to edit and click the Edit icon. At the bottom of the screen, three tabs appear.
- 5. To view or edit the replication configuration, select the Replication Configuration tab.
- a. In the LDAP Connection field, select Keep Alive if you want the replication server to use same connection for performing mult...
- b. Enter the Replication Frequency.
- c. Enter the Human Intervention Queue Schedule. This is the interval, in seconds, at which the directory replication server repeats the change application process.
- d. Click Apply to apply your changes, or click Cancel to discard your changes.
- 6. To view or change the Scope settings, click the Scope tab. Proceed as described in Section 42.2.3, "Viewing and Modifying Replica Naming Context Objects."
- 7. To view the type, host, port, and user name for each node, click the Replicas tab of the Edit Replication Definition page.
- 8. To view or edit Replica Primary URI, Replica Secondary URI, or Replica State for a node:
- 9. To make a node the primary node in a multimaster replication group:
- 10. To add a node to a multimaster replication group:
- 11. To delete a node from a multimaster replication group containing three or more nodes:
- 42.2.5 Deleting an LDAP-Based Replication Agreement by Using the Replication Wizard
- 1. From the Oracle Internet Directory menu on the home page, select Administration, then Replication Management. The Replication Agreements page lists information about each replication agreement: name, type, supplier, consumer, and status.
- 2. You are prompted to log into the replication DN account. Provide the host, port, replication DN, and replication DN password.
- 3. To delete a replication agreement, select the agreement and click the Delete icon. When the Delete Popup appears, click Delete.
- 42.2.6 Configure Replication Attributes by Using Fusion Middleware Control
- 42.2.7 Activating or Inactivating a Replication Server by Using Fusion Middleware Control
- 1. Select Administration, then Shared Properties from the Oracle Internet Directory menu, then select Replication.
- 2. In the Replication Server Status section of the page, select the Oracle Internet Directory component that you want to activat...
- 3. If the replication status of the selected Oracle Internet Directory component is inactive, you can click Activate to activate...
- 42.2.8 Configuring the Replication Debug Level by Using Fusion Middleware Control
- 42.2.9 Configuring Replica Details by Using Fusion Middleware Control
- 42.2.10 Viewing Queue Statistics by Using Fusion Middleware Control
- 1. From the Oracle Internet Directory menu on the home page, select Administration, then Replication Management.
- 2. You are prompted to log into the replication DN account. Provide the host, port, replication DN, and replication DN password.
- 3. The Replication Agreements page lists information about each replication agreement. Click the name of the replication agreement for which you want to view the queue statistics, then click the Queue Statistics icon.
- 4. The bottom of the page lists the following statistics:
- 42.2.11 Managing Changelog Processing by Using Fusion Middleware Control
- 1. Select Administration, then Shared Properties from the Oracle Internet Directory menu
- 2. Select Replication.
- 3. Change the parameter Maximum Number of Entries to Process per Replication Cycle.
- 4. Choose Apply.
- 1. Select Administration, then Server Properties from the Oracle Internet Directory menu.
- 2. Select General.
- 3. Change the value of Maximum number of entries to be returned by a search.
- 4. Choose Apply.
- 42.2.12 Monitoring Conflict Resolution Messages by Using Fusion Middleware Control
- 42.3 Managing and Monitoring Replication by Using the Command Line
- 42.3.1 Enabling and Disabling Change Log Generation by Using the Command Line
- 42.3.2 Viewing Change Logs by Using ldapsearch
- 42.3.3 Configuring Attributes of the Replica Subentry by Using ldapmodify
- 42.3.4 Specifying Pilot Mode for a Replica by Using remtool
- 42.3.5 Configuring Replication Agreement Attributes by Using ldapmodify
- 42.3.6 Modifying Replica Naming Context Object Parameters by Using ldapmodify
- Example 42-1 Adding a Naming Context Object for an LDAP-Based Replica
- Example 42-2 Deleting a Naming Context Object
- Example 42-3 Modifying the orclIncludedNamingContexts Attribute for a Replica Naming Context Object
- Example 42-4 Modifying the orclExcludedNamingContexts Attribute for a Replica Naming Context Object
- Example 42-5 Modifying the orclExcludedAttributes Attribute for a Replica Naming Context Object
- 42.3.7 Configuring Attributes of the Replication Configuration Set by Using ldapmodify
- 42.3.8 Monitoring Conflict Resolution Messages by Using the Command Line
- 42.3.9 Managing the Human Intervention Queue
- 1. Examine the change in the human intervention queue.
- 2. Reconcile the conflicting changes using the Compare and Reconcile Tool (see Section 42.4, "Comparing and Reconciling Inconsistent Data by Using oidcmprec."
- 3. Either place the change back into the retry queue using ManageHiq.retry or into the purge queue using ManageHiq.purge.
- 42.3.10 Monitoring Replication Progress in a Directory Replication Group by Using remtool -pthput
- 42.3.11 Viewing Queue Statistics and Verifying Replication by Using remtool
- 42.3.12 Managing the Number of Entries the Human Intervention Queue Tools Can Process
- 42.3.13 Changing the Replication Administrator's Password for Advanced Replication
- 42.4 Comparing and Reconciling Inconsistent Data by Using oidcmprec
- 1. Set the supplier and the consumer to read-only mode. Use one of the procedures in"Changing Server Mode" on page 15-3.
- 2. Ensure that the supplier and the consumer are in a tranquil state-that is, that neither is supplying or applying changes. If they are not in a tranquil state, then wait until they have finished updating.
- 3. Identify the inconsistent entries or subtree on the consumer.
- 4. Use the Oracle Internet Directory Comparison and Reconciliation Tool to fix the inconsistent entries or subtree on the consumer.
- 5. Set the participating supplier and consumer back to read/write mode.
- 42.4.1 Conflict Scenarios
- 42.4.2 Operations Supported by oidcmprec
- 42.4.3 Output from oidcmprec
- 42.4.4 How oidcmprec Works
- 42.4.5 Setting the Source and Destination Directories
- 42.4.6 Selecting the DIT for the Operation
- 42.4.7 Selecting the Attributes for the Operation
- 42.4.8 Controlling Change Log Generation
- 42.4.9 Using a Text or XML Parameter File
- 42.4.10 Including Directory Schema
- 42.4.11 Overriding Predefined Conflict Resolution Rules
- 42.4.12 Using the User-Defined Compare and Reconcile Operation
- 42.4.13 Known Limitations of the oidcmprec Tool
- 43.1 Introduction to Configuring a Customized Password Policy Plug-in
- 1. The client sends the directory server either an ldapadd or ldapmodify request.
- 2. Before the directory server makes the addition or modification, it passes the password value to the plug-in.
- 3. The plug-in
- 4. If the password meets the specification, then the plug-in notifies the directory server accordingly, and the directory server makes the addition or modification.
- 43.2 Installing, Configuring, and Enabling a Customized Password Policy Plug-in
- 44.1 Introduction to Developing Plug-ins for the Oracle Internet Directory Server
- Figure 44-1 Oracle Internet Directory Plug-in Framework
- 44.1.1 Passing Options to the JVM
- 44.1.2 Supported Languages for Server Plug-ins
- 44.1.3 Server Plug-in Prerequisites
- 44.1.4 Server Plug-in Benefits
- 44.1.5 Guidelines for Designing Plug-ins
- 44.1.6 The Server Plug-in Framework
- 44.1.7 LDAP Operations and Timings Supported by the Directory
- 44.1.8 Using Plug-ins in a Replication Environment
- 44.2 Creating a Plug-in
- 44.3 Registering a Plug-in From the Command Line
- 44.4 Managing Plug-ins by Using Oracle Directory Services Manager and Oracle Enterprise Manager Fusion Middleware Control
- 1. Section 44.4.1, "Creating a New Plug-in by Using Oracle Directory Services Manager"
- 2. Section 44.4.2, "Registering a Plug-in by Using Oracle Directory Services Manager"
- 3. Section 44.4.3, "Editing a Plug-in by Using Oracle Directory Services Manager"
- 4. Section 44.4.4, "Deleting a Plug-in by Using Oracle Directory Services Manager"
- 5. Section 44.4.5, "Managing JVM Options by Using Oracle Enterprise Manager Fusion Middleware Control"
- 44.4.1 Creating a New Plug-in by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Advanced.
- 3. Expand Plug-in. Entries appear in the left panel.
- 4. To enable a plug-in management configuration entry, select it.
- 5. Click the Create icon.The New Plug-in window appears in the right pane.
- 6. Select Plug-in Enable if you want to enable the plug-in now.
- 7. Enter the Plug-in Name.
- 8. Select values for the other mandatory properties.
- 9. When you have finished entering the values, select OK. The plug-in you just created is now listed on the left side of the page.
- 44.4.2 Registering a Plug-in by Using Oracle Directory Services Manager
- 1. Invoke Oracle Directory Services Manager and connect to the Oracle Internet Directory server as described in Section 7.4.5, "Invoking Oracle Directory Services Manager."
- 2. From the task selection bar, select Advanced.
- 3. Expand Plug-in. Entries appear in the left panel.
- 4. To enable a plug-in management configuration entry, select it. The Plug-in Management tab appears in the right pane.
- 5. Select Plug-in Enable.
- 6. Click Apply.
- 7. When you have finished entering the values, select OK. The plug-in you just created is now listed on the left side of the page.
- 44.4.3 Editing a Plug-in by Using Oracle Directory Services Manager
- 44.4.4 Deleting a Plug-in by Using Oracle Directory Services Manager
- 44.4.5 Managing JVM Options by Using Oracle Enterprise Manager Fusion Middleware Control
- 45.1 Introduction to Configuring a Customized External Authentication Plug-in
- 45.2 Installing, Configuring, and Enabling the External Authentication Plug-in
- 1. Implement your standalone external authentication PL/SQL program. For example, if you want to authenticate users by using user names and passwords, then you should have a PL/SQL program which takes these two parameters.
- 2. Integrate this standalone program into the plug-in modules.
- 3. Load the plug-in package into database. In this example, we enter:
- 4. Register the plug-ins. Do this by creating and uploading an LDIF file that provides the directory server with the necessary information to invoke the plug-in.
- 5. This example uses a file named oidexauth.ldif, which contains the following:
- 45.3 Debugging the External Authentication Plug-in
- 45.4 Creating the PL/SQL Package oidexaup.sql
- A.1 Instance Creation and Process Management
- A.2 Locations of Configuration Attributes
- A.3 Default Ports
- A.4 Enabling Server Debugging
- A.5 Command Line Tools
- A.6 Path Names
- A.7 Graphical User Interfaces
- A.8 Audit
- A.9 Referential Integrity
- A.10 Server Chaining
- A.11 Replication
- A.12 Oracle Directory Integration Platform
- A.13 Oracle Single Sign-On and Oracle Delegated Administration Services
- A.14 Java Containers
- B.1 Introduction to Managing Oracle Internet Directory by Using OIDCTL
- B.2 Creating and Starting an Oracle Internet Directory Server Instance by Using OIDCTL
- B.3 Stopping an Oracle Internet Directory Server Instance by Using OIDCTL
- B.4 Starting an Oracle Internet Directory Server Instance by Using OIDCTL
- B.5 Viewing Status Information by Using OIDCTL
- B.6 Deleting an Oracle Internet Directory Server Instance by Using OIDCTL
- C.1 Introduction to Setting up Oracle Database Advanced Replication-Based Replication
- C.2 Setting Up Advanced Replication-Based Replication
- C.2.1 Rules for Setting Up Advanced Replication
- 1. In this type of Directory Replication Group (DRG), there must be one node identified as the Master Definition Site (MDS): thi...
- 2. When you configure Multimaster replication, the master node for a Directory Replication Group (DRG) and each node that is to ...
- 3. When you add an Oracle Database Advanced Replication-based replica, the new replica must be empty. That is, Oracle Internet Directory must be newly installed.
- 4. The sponsor node for each Oracle Database Advanced Replication-based replica can be any of the following:
- 5. An Oracle Database Advanced Replication-based replica cannot be a consumer of an LDAP replica.
- 6. In Oracle Internet Directory 11g Release 1, a node cannot be part of more than one multimaster replication group.
- 7. The data replicated between servers in a directory replication group does not include DSE root-specific data, server configuration data, and replication agreement data.
- 8. When an multimaster replication group is configured, the Oracle Single Sign-On database schema is automatically configured in replication.
- 9. When you add a node to a DRG, it must be running the same version of Oracle Internet Directory as the other nodes in the DRG....
- C.2.2 Setting Up an Advanced Replication-Based Multimaster Replication Group
- C.2.2.1 Task 1: Install Oracle Internet Directory on the Master Definition Site (MDS)
- C.2.2.2 Task 2: Install the Oracle Internet Directory on the Remote Master Sites (RMS)
- C.2.2.3 Task 3: Set Up Advanced Replication for a Directory Replication Group
- C.2.2.3.1 On All Nodes, Prepare the Oracle Net Services Environment for Replication
- 1. Configure sqlnet.ora.
- 2. Configure tnsnames.ora in each Oracle Internet Directory ORACLE_ INSTANCE and Oracle Database ORACLE_INSTANCE.
- 3. Stop and restart the listener, both in the Oracle Internet Directory ORACLE_ HOME and in the Oracle Database ORACLE_HOME.
- 4. Test Oracle Net connections to all nodes from each node in the DRG.
- 1. Configure sqlnet.ora.
- 2. Configure tnsnames.ora in each Oracle Internet Directory ORACLE_ INSTANCE and Oracle Database ORACLE_INSTANCE.
- 3. Stop and restart the listener, both in the Oracle Internet Directory ORACLE_ HOME and in the Oracle Database ORACLE_HOME.
- 4. Test Oracle Net connections to all nodes from each node in the DRG.
- C.2.2.3.2 From the MDS, Configure Advanced Replication For Directory Replication
- 1. From the MDS console, connect as the system user on all nodes, including the MDS. Ensure the following on all nodes:
- 2. Ensure the following wallets exist on the remote sites:
- 3. Check the prerequisites in the attached Note. Then, at a command prompt in the MDS, use remtool (the Replication Environment Management Tool) to configure Advanced Replication by running the following command:
- C.2.2.3.1 On All Nodes, Prepare the Oracle Net Services Environment for Replication
- C.2.2.4 Task 4 (Optional): Load Data into the Directory
- C.2.2.5 Task 5: Ensure that Oracle Directory Server Instances are Started on All the Nodes
- C.2.2.6 Task 6: Start the Replication Servers on All Nodes in the DRG
- C.2.2.7 Task 7: Test Directory Replication
- C.2.3 Adding a Node for Advanced Replication-Based Multimaster Replication
- C.2.3.1 Prepare the Oracle Net Services Environment
- C.2.3.2 Task 1: Stop the Directory Replication Server on All Nodes
- C.2.3.3 Task 2: Identify a Sponsor Node and Install Oracle Internet Directory
- C.2.3.4 Task 3: Switch the Sponsor Node to Read-Only Mode
- C.2.3.5 Task 4: Back up the Sponsor Node by Using ldifwrite
- C.2.3.6 Task 5: Perform Advanced Replication Add Node Setup
- C.2.3.7 Task 6: Switch the Sponsor Node to Updatable Mode
- C.2.3.8 Task 7: Start the Directory Replication Server on All Nodes Except the New Node
- C.2.3.9 Task 8: Load Data into the New Node by Using bulkload
- C.2.3.10 Task 9: Start the Directory Server on the New Node
- C.2.3.11 Task 10: Start the Directory Replication Server on the New Node
- C.2.4 Deleting a Node from a Multimaster Replication Group
- C.2.1 Rules for Setting Up Advanced Replication
- D.1 Features of Oracle Database Advanced Replication-Based Replication
- D.2 Architecture for Oracle Database Advanced Replication-Based Replication
- Figure D-1 Advanced Replication Process
- 1. A change request is made on the Oracle Internet Directory server of Replica A.
- 2. The change is accepted and committed to storage in the Oracle Internet Directory Database.
- 3. The replication server on Replica A queries for new outbound change logs from the local ods_chg_log table. The filter used for the query is:
- 4. The new change log retrieved from ods_chg_log is copied to local asr_chg_ log.
- 5. The replication server requests Oracle Internet Directory server to update the Change log retry_cnt status properly.
- 6. The new change log is pushed From Replica A to Replica B through Oracle Database Advanced Replication.
- 7. If the last transported number is greater than last applied change number on Replica B, it indicates that there are new chang...
- 8. The replication server applies the new change at Replica B.
- 9. Oracle Internet Directory server at Replica B accepts and commits the change to storage in the Oracle Database.
- 10. The replication server request Oracle Internet Directory server to update the shadow change log retry_cnt status properly.
- Figure D-1 Advanced Replication Process
- D.3 Architecture of LDAP-Based Replication
- Figure D-2 LDAP Replication Process
- 1. An LDAP change request is made on the Oracle Internet Directory server of Replica A.
- 2. The change is accepted and committed to Oracle Internet Directory database storage.
- 3. The replication server on Replica B queries for new inbound change logs from the supplier replica, Replica A's ods_chg_log table]. The filter used for the query is:
- 4. The replication Server at B requests that the Oracle Internet Directory at Replica B store the new change log as a shadow change log.
- 5. The replication server at Replica B checks whether the last transported number is greater than the last applied change number...
- 6. The replication server at Replica B request that the Oracle Internet Directory server at Replica B apply the retrieved change to storage.
- 7. Oracle Internet Directory server at Replica B accepts and commits the change to Oracle Internet Directory database storage.
- 8. The replication server requests that the server update the shadow change log retry_cnt status properly.
- Figure D-2 LDAP Replication Process
- D.4 LDAP Replica States
- D.5 The Replication Process
- D.5.1 How the Multimaster Replication Process Adds a New Entry to a Consumer
- 1. The directory replication server looks in the consumer for the DN of the parent of the target entry. Specifically, it does this by looking for a global unique identifier (GUID) assigned to the DN of the parent.
- 2. If the parent entry exists, then the directory replication server composes a DN for the new entry and places the new entry under its parent in the consumer. It then places the change entry in the purge queue.
- D.5.2 How the Multimaster Replication Process Deletes an Entry
- D.5.3 How the Multimaster Replication Process Modifies an Entry
- 1. The directory replication server looks in the consumer for an entry with a GUID matching the one in the change entry.
- 2. If the matching entry exists in the consumer, then the directory replication server compares each attribute in the change entry with each attribute in the target entry.
- 3. The directory replication server then applies the following conflict resolution rules:
- 4. The directory replication server applies the filtered modification, and places the change entry in the purge queue.
- D.5.4 How the Multimaster Replication Process Modifies a Relative Distinguished Name
- D.5.5 How the Multimaster Replication Process Modifies a Distinguished Name
- 1. The directory replication server looks in the consumer for the DN with a GUID that matches the GUID in the change entry.
- 2. If both the DN and the parent DN of the target entry exist in the consumer, then the directory replication server modifies the DN of that entry and places the change entry in the purge queue.
- E Java Server Plug-in Developer's Reference
- D.5.1 How the Multimaster Replication Process Adds a New Entry to a Consumer
- E.1 Advantages of Java Plug-ins
- E.2 Setting Up a Java Plug-in
- 1. Create the standalone Java program using the pre-defined class definition and methods. You can implement the plug-in as a jar file or as a package.
- 2. Compile the plug-in file or package. Before compiling, ensure that your CLASSPATH is set to $ORACLE_HOME/ldap/jlib/ospf.jar. Make sure the compilation completes without error.
- 3. Place the class file, jar, or package in the pre-defined class location $ORACLE_ HOME/ldap/server/plugin.
- 4. Register the Java plug-in by adding the plug-in configuration entry.
- E.3 Java Plug-in API
- E.3.1 Communication Between the Server and Plug-in
- E.3.2 Java Plug-in Structure
- E.3.3 PluginDetail
- E.3.3.1 Server
- E.3.3.2 LdapBaseEntry
- E.3.3.3 LdapOperation
- Table E-3 Behavior of Operation Result Code
- Table E-4 Subclasses of LdapOperation and Class-specific information.
- E.3.3.3.1 AddLdapOperation
- E.3.3.3.2 BindLdapOperation
- E.3.3.3.3 CompareLdapOperation
- E.3.3.3.4 DeleteLdapOperation
- E.3.3.3.5 ModdnLdapOperation
- E.3.3.3.6 ModifyLdapOperation
- E.3.3.3.7 SearchLdapOperation
- E.3.3.4 PluginFlexfield
- E.3.4 PluginResult
- E.3.5 ServerPlugin Interface
- E.4 Java Plug-in Error and Exception Handling
- E.5 Java Plug-in Debugging and Logging
- E.6 Java Plug-in Examples
- F.1 Designing, Creating, and Using PL/SQL Server Plug-ins
- F.1.1 PL/SQLPlug-in Caveats
- F.1.2 Creating PL/SQLPlug-ins
- F.1.3 Compiling PL/SQLPlug-ins
- F.1.4 Managing PL/SQL Plug-ins
- F.1.5 Enabling and Disabling PL/SQL Plug-ins
- F.1.6 Exception Handling in a PL/SQL Plug-in
- F.1.7 PL/SQL Plug-in LDAP API
- F.1.8 PL/SQL Plug-in and Database Tools
- F.1.9 PL/SQL Plug-in Security
- F.1.10 PL/SQL Plug-in Debugging
- F.1.11 PL/SQL Plug-in LDAP API Specifications
- F.1.12 Database Limitations
- F.2 Examples of PL/SQL Plug-ins
- F.2.1 Example 1: Search Query Logging
- F.2.2 Example 2: Synchronizing Two DITs
- 1. Assume that the entries under both DITs have been added to the directory. For example, the entry id=12345,cn=DIT1,cn=products,cn=oraclecontext is in DIT1, and id=12345,cn=DIT2,cn=products,cn=oraclecontext is in DIT2.
- 2. Create the plug-in package specification.
- 3. Create the plug-in package body.
- 4. Register the plug-in entry with Oracle Internet Directory.
- F.3 Binary Support in the PL/SQLPlug-in Framework
- F.4 Database Object Types Defined
- F.5 Specifications for PL/SQL Plug-in Procedures
- H.1 Schema for orclACI
- H.2 Schema for orclEntryLevelACI
- I.1 About Character Sets and the Directory
- I.2 The NLS_LANG Environment Variable
- I.3 Using Non-AL32UTF8 Databases
- I.4 Using Globalization Support with LDIF Files
- I.5 Using Globalization Support with Command-Line LDAP Tools
- I.6 Setting NLS_LANG in the Client Environment
- I.7 Using Globalization Support with Bulk Tools
- J.1 Setting up Access Controls for the User Search Base and the User Creation Base
- J.2 Setting up Access Controls for the Group Search Base and the Group Creation Base
- 1. Create an ldif (group_aci.ldif) file with the following entry:
- 2. Replace %subscriberdn% with the DN of the subscriber and %groupsearch_ or_createbase_dn% with the new value of the container DN where the new group search base or group create base points to.
- 3. Run the ldapmodify command as follows:
- K Searching the Directory for User Certificates
- K.1 Certificate Mapping
- K.2 Search Types
- L.1 Definitions
- L.2 Prerequisites
- 1. The operating system, version, and patch level of the new directory site must be the same as that of the sponsor directory site. This procedure might not work if the patch levels of the operating systems differ.
- 2. Oracle strongly recommends that you back up the sponsor directory's repository before you employ this procedure.
- 3. Because this procedure involves copying Oracle data files, performance depends on the underlying network. If the underlying n...
- 4. Only a person familiar with the Oracle database should perform this procedure.
- 5. If the sponsor site is already a part of an Advanced Replication group, the sponsor node must be the Master definition site (MDS).
- L.3 Sponsor Directory Site Environment
- L.4 New Directory Site Environment
- L.5 Addition of a Directory Node
- 1. Install the node and check its status, as follows:
- 2. Shut down Oracle Internet Directory and all other opmn processes on the sponsor node, as follows:
- 3. Perform the following steps on the sponsor node.
- a. At the command line prompt execute the following SQL*Plus commands:
- b. Shut down the database and Oracle Net Services listener on the sponsor node. By default, the listener name is LISTENER. Type:
- c. If the copied node is part of an Advanced Replication-based DRG, perform the following steps:
- d. Rename the trace file created in Step 3a to newdb.sql, under the same directory.
- 4. On the sponsor node, open newdb.sql in a text editor and delete all the lines except the STARTUP NOMOUNT and CREATE CONTROLFILE statements. After deleting those lines, newdb.sql should look like this:
- 5. Continue editing the file newdb.sql on the sponsor node, as follows:
- 6. Copy the initialization parameter file init$ORACLE_SID.ora from the sponsor directory's database to init$ORACLE_SID_NEW_DIR_D...
- 7. In the new initialization parameter file on the sponsor, make the following changes:
- a. Comment out the parameter JOB_QUEUE_PROCESSES, if it exists.
- b. Change the parameter dbname from LDAP to NLDAP.
- c. If the new site's domain name is different from the sponsor directory's domain name, alter the parameter db_domain also.
- d. Alter the location of the following parameters to point to the location of the new site.
- e. In addition to the parameters listed in Step 7d, if your initialization parameter file has any parameters that are node specific, such as DB_RECOVERY_FILE_ DEST and DB_CREATE_FILE_DEST, alter those parameters as well.
- 8. Edit the tnsnames.ora file to include connection details for the new node. Refer to the following sample file:
- 9. Create an archive of all the data files and compress the archived file. Be sure to include all the files listed under DATAFILE in newdb.sql.
- 10. Install Oracle Database on the new node using the software only option. See the Oracle Database Installation Guide for your platform and Oracle Fusion Middleware Installation Guide for Oracle Identity Management.
- 11. When the software-0nly install on the new node has completed, the following directory exists:
- 12. Copy the archived file created on the sponsor node in Step 9 to the new node, using FTP or another appropriate tool. Change directory to the database file location on the new node, then use FTP to copy the archived file from rst-sun.
- 13. If the sponsor node is part of an Advanced replication group, then perform the following steps:
- a. Copy the initialization parameter file initLDAP.ora from the sponsor node (rst-sun) to the new node under the UNIX directory $ORACLE_HOME/dbs using a tool such as FTP. Rename the file to initNLDAP.ora.
- b. Using a tool such as FTP, copy the file newdb.sql you created on the sponsor node in Step 5 to the new node. Rename newdb.sql to olddb.sql.
- c. Make a copy of tnsnames.ora called tnsnames.ora.bk.
- d. At the shell prompt on the new node, set the ORACLE_BASE, ORACLE_HOME, and ORACLE_SID environment variables. For example (using the C shell):
- e. In the same shell, execute olddb.sql using SQL*Plus as shown in the following example:
- f. Start up the database and listener as follows:
- g. If you have performed a database copy from a node that has Advanced replication configured with another node, you must delete the LDAP_REP replication group in the new node. To do so, execute the following commands:
- 14. Copy the initialization parameter file initLDAP.ora from the sponsor node (rst-sun) to the new node under the UNIX directory...
- 15. On the new node, ensure that the following files do not exist in the directory $ORACLE_HOME/dbs on UNIX or ORACLE_HOME\database in Windows:
- 16. Using FTP or another appropriate tool, copy the file newdb.sql you created on the sponsor node in Step 5 to the new node. For example:
- 17. At the UNIX shell prompt on the new node, set ORACLE_BASE, ORACLE_ HOME and ORACLE_SID environment variables. For example (using the C shell):
- 18. In the same UNIX shell, execute newdb.sql using SQL*Plus as shown in the following example:
- 19. Complete the changes on the new node.
- 20. Configure Oracle Internet Directory on the new node
- 21. On the new node, delete the wallet files oidpwdlldap1 and oidpwdr* at the new node and reset the ODS password
- 22. On the new node, reset the password and start the Oracle Internet Directory processes.
- 23. At this point, Oracle Internet Directory on the new node is up and running. The replicaid value in new Oracle Internet Direc...
- 24. Because the replica id of the new node was changed in Step 23, you must re-create the relative replica entries for the new node, as follows:
- 25. ) In addition to renaming the replica subentry, you must change the orclreplicauri, orclreplicasecondaryuri and orclreplicas...
- 26. Stop Oracle Internet Directory processes.
- 27. Clean up the changelog tables at the new node.
- 28. If the new node is part of an Advanced Replication-based DRG, proceed as follows.
- 29. If the new node is a full LDAP-based replication replica, configure LDAP-based Replication and add the full replica as fan-out, as follows:
- a. Make sure that the database and Oracle Internet Directory server is running at the sponsor node.
- b. Configure LDAP-based replication using remtool, as follows:
- c. Initialize the replication change status of the new replication agreement.
- d. Start up Oracle Internet Directory and the replication server on all the nodes. For one-way replication, you only need to start the replication server on the consumer node.
- M Oracle Authentication Services for Operating Systems
- N RFCs Supported by Oracle Internet Directory
- O Managing Oracle Directory Services Manager's Java Key Store
- O.1 Introduction to Managing ODSM's Java Key Store
- O.2 Retrieving ODSM's Java Key Store Password
- O.3 Listing the Contents of odsm.cer Java Key Store
- O.4 Deleting Expired Certificates
- P.1 Starting the Stack
- 1. Start the Oracle Database
- 2. Start the Oracle WebLogic Administration Server.
- 3. Ensure that the Node Manager is running. Normally, the Oracle WebLogic Administration Server starts the Node Manager. If, for some reason, the Node Manager is not running, start it.
- 4. Start system components, such as Oracle Internet Directory and Oracle Virtual Directory.
- 5. Start WebLogic managed components, such as Oracle Directory Integration Platform and Oracle Directory Services Manager.
- P.2 Stopping the Stack
- 1. Stop WebLogic managed components, such as Oracle Directory Integration Platform and Oracle Directory Services Manager.
- 2. Stop system components, such as Oracle Internet Directory and Oracle Virtual Directory.
- 3. Stop the WebLogic Administration Server.
- 4. If you want to stop the Node Manager, you can use the kill command.
- 5. Stop the Oracle Database.
- Q Performing a Rolling Upgrade
- Q.1 Prerequisites for Rolling Upgrade
- Q.2 Rolling Upgrade Instructions
- 1. Stop the replication server on the first node you want to upgrade.
- 2. Suspend the replication from the first node to each of the other nodes:
- 3. Validate that replication has been suspended from the first node to all the other nodes in the DRG by running the following ldapsearch command:
- 4. Stop Oracle Internet Directory on the node you are about to upgrade.
- 5. Patch the node to Release 11.1.1.4.0. Refer to the instructions in the Oracle Fusion Middleware Patching Guide:
- 6. Start Oracle Internet Directory on the node you have just upgraded.
- 7. Because no other nodes have been upgraded yet, do not resume replication between the first node and any other node.
- 8. Stop the replication server on the second node you want to upgrade.
- 9. Suspend replication from the second node to each of the nodes that have not been upgraded.
- 10. Validate that replication has been suspended from the node you are about to upgrade to each node that has not been upgraded, using the same command as in Step 3 against the second node.
- 11. Stop Oracle Internet Directory on the node you are about to upgrade.
- 12. Patch the node to Release 11.1.1.4.0 as in Step 5.
- 13. Start Oracle Internet Directory on the node you have just upgraded.
- 14. Now two nodes have been upgraded, so resume replication from the first node you upgraded to the second node you upgraded.
- 15. Validate that replication has been resumed from first upgraded node to the second upgraded nodes in DRG by running the following ldapsearch command:
- 16. Start replication server on the second upgraded replica.
- 17. Shut down the replication server on the third node you want to upgrade.
- 18. Suspend replication from the third node to each node that has not yet been upgraded, if any.
- 19. Validate that replication has been suspended from the third node to each node that has not been upgraded.
- 20. Stop Oracle Internet Directory and other processes on the third node to be upgraded.
- 21. Patch the node to Release 11.1.1.4.0 as in Step 5.
- 22. Start Oracle Internet Directory on the third node.
- 23. Resume replication from each node that has already been upgraded to the third node.
- 24. Validate that replication has been resumed from each upgraded node to the third node.
- 25. Start replication on the third node
- Q.3 Rolling Upgrade Example
- 1. Stop the replication server on Node A.
- 2. Suspend the replication from:
- 3. Validate that replication has been suspended from Node A to Node B by running the following ldapsearch command:
- 4. Stop Oracle Internet Directory and other processes on Node A.
- 5. Run the PSA on Node A to upgrade it to 11g Release 1 (11.1.1.4.0).
- 6. Bring up Oracle Internet Directory and the replication server on Node A. Note that there is no node with which Node A should resume replication.
- 7. Stop the replication server on Node B.
- 8. Suspend replication from Node B to Node C by executing the following command:
- 9. Validate that replication has been suspended from Node B to Node C by running the following ldapsearch command:
- 10. Stop Oracle Internet Directory and other processes on Node B.
- 11. Run the PSA on Node B to upgrade it to 11g Release 1 (11.1.1.4.0).
- 12. Bring up Oracle Internet Directory on Node B.
- 13. Validate that replication has been resumed from Node A to Node B by running the following ldapsearch command:
- 14. Bring up the replication server on Node B.
- 15. Shut down the replication server on Node C.
- 16. There is no other node to be upgraded so there is no need to suspend replication. Stop Oracle Internet Directory and other processes on Node C.
- 17. Run PSA on Node C to upgrade it to 11g Release 1 (11.1.1.4.0).
- 18. Bring up Oracle Internet Directory on Node C.
- 19. Validate that replication has been resumed successfully by performing an ldapsearch on Node A and Node B similar to Step 13. Validate replication:
- 20. Bring up the replication server on Node C.
- R Using the Oracle Internet Directory VM Template
- R.1 Installing Operating System, Oracle Database, and Oracle Internet Directory
- 1. Install the Oracle VM server as described in Oracle VM Server Installation Guide.
- 2. Download the VM template files for Oracle Internet Directory, oidhome.tgz and OVM_EL5U2_X86_64_ORACLE11G_PVM_1.tgz, from http://edelivery.oracle.com.
- 3. Copy the template files to dom0 /OVS/seed_pool.
- 4. Change to that directory and extract the files, as follows:
- 5. Change to the directory containing the configuration file vm.cfg.
- 6. Edit vm.cfg, setting VCPU, Memory, and network (VIF) values appropriately for this VM. Recommendations for sizing and tuning ...
- 7. Start Oracle VM by typing:
- 8. By default, Oracle VM starts a VNC server on port 5900. From another window, using a VNC client, connect to the host where Oracle VM is running, at port 5900.
- 9. You are prompted for installation and configuration information. Provide the information to set up the Oracle 11g database.
- 10. Log into the host as user root, password ovsroot. Changing the password is recommended.
- 11. Oracle Internet Directory is now installed in the home directory /oidhome/app/mwhome.
- R.2 Installing Oracle Internet Directory Template with an Existing Oracle VM that has Oracle Database
- 1. Download the VM template file oidhome.tgz from http://edelivery.oracle.com.
- 2. Copy the file to dom0 /OVS/seed_pool.
- 3. Change to that directory and extract the file, as follows:
- 4. Change to the directory containing the configuration file vm.cfg. For example:
- 5. Edit vm.cfg, adding oidhome.img as a disk, as shown in bold:
- 6. Restart the guest OS by typing:
- 7. Create the /oidhome directory:
- 8. Mount the Oracle Internet Directory image:
- 9. Set the owner and group for the /mntPoint/app directory tree:
- 10. Run oidRoot.sh:
- 11. Switch to the user oracle:
- 12. Set the DISPLAY environment variable.
- 13. Set the ORACLE_HOME environment variable to: /mntPoint/app/mwhome/Oracle_ IDM1
- 14. Change to the directory containing config.sh and execute it:
- 15. You are prompted for information. Provide the information to configure the environment.
- R.3 Registering Oracle Internet Directory for Oracle Enterprise Manager Fusion Middleware Control and ODSM Management
- R.4 Using the Oracle Internet Directory OVM image in a Non-OVM Environment
- 1. Download the VM template file oidhome.tgz from http://edelivery.oracle.com.
- 2. Extract the file, as follows:
- 3. Copy oidhome.img to a directory. For example:
- 4. Switch to root user
- 5. Create /oidhome.
- 6. Mount the image. For example:
- 7. Change to the directory /oidhome and set the owner and group for the /oidhome/app tree:
- 8. Run oidRoot.sh:
- 9. Set the DISPLAY environment variable.
- 10. Set the ORACLE_HOME environment variable to: /oidhome/app/mwhome/Oracle_IDM1
- 11. Install the Oracle database, as described in the Oracle Database Installation Guide for your platform.
- 12. Run /oidhome/app/mwhome/Oracle_IDM1/bin/config.sh to configure Oracle Internet Directory.
- R.5 Default Values
- S.1 Problems and Solutions
- S.1.1 Installation Errors
- S.1.2 Oracle Database Server Errors
- S.1.3 Directory Server Error Messages and Causes
- S.1.4 Getting a Core Dump and Stack Trace When Oracle Internet Directory Crashes
- S.1.5 TCP/IP Problems
- S.1.6 Troubleshooting Password Policies
- S.1.7 Troubleshooting Directory Performance
- S.1.7.1 Poor LDAP Search Performance
- S.1.7.2 Poor LDAP Add or Modify Performance
- S.1.7.3 Poor Oracle Database Server Performance
- Problem
- Solution
- 1. Identify the LDAP operations that are processor-intensive by running:
- 2. Tune the database appropriately for this kind of query. See the Oracle Internet Directory chapter in Oracle Fusion Middleware Performance and Tuning Guide.
- 3. If possible, change the applications's search signature. If that is not possible, tune the Oracle Internet Directory attribute orclinmemfiltprocess. See the Oracle Internet Directory chapter in Oracle Fusion Middleware Performance and Tuning Guide.
- S.1.8 Troubleshooting Port Configuration
- S.1.9 Troubleshooting Creating Oracle Internet Directory Component with opmnctl
- S.1.10 Troubleshooting Starting Oracle Internet Directory
- S.1.10.1 Oracle Internet Directory is Down
- Problem
- Solution
- Problem
- Solution
- 1. The oidmon log, ORACLE_ INSTANCE/diagnostics/logs/OID/componentName/oidmon-0000.log contains details as to why oidmon cannot start the oidldapd process. The most common issues are
- 2. The Oracle Internet Directory dispatcher log, ORACLE_ INSTANCE/diagnostics/logs/OID/componentName/oidldapd01-0000.l og contains information about why oidldapd server processes fail to start. The most common reasons are:
- 3. The Oracle Internet Directory server log, ORACLE_ INSTANCE/diagnostics/logs/OID/componentName/oidldapd01sPID-00 00.log contains information about why the server processes fail to run. Common issues include:
- S.1.10.2 Oracle Internet Directory is Read-Only
- S.1.10.1 Oracle Internet Directory is Down
- S.1.11 Troubleshooting Starting, Stopping, and Restarting of the Directory Server
- S.1.12 Troubleshooting Oracle Internet Directory Replication
- S.1.13 Troubleshooting Change Log Garbage Collection
- S.1.14 Troubleshooting Dynamic Password Verifiers
- S.1.15 Troubleshooting Oracle Internet Directory Password Wallets
- S.1.16 Troubleshooting bulkload
- S.1.17 Troubleshooting bulkdelete, bulkmodify, and ldifwrite
- S.1.18 Troubleshooting catalog
- S.1.19 Troubleshooting remtool
- S.1.20 Troubleshooting Server Chaining
- S.1.21 Viewing Version Information
- S.1.22 Troubleshooting Fusion Middleware Control and WLST
- S.1.23 Troubleshooting Oracle Directory Services Manager
- S.1.23.1 Cannot Invoke ODSM from Fusion Middleware Control
- S.1.23.2 Cannot Invoke ODSM from Fusion Middleware Control in Multiple NIC and DHCP Enabled Environment
- Problem
- Solution
- 1. Using a web browser, access the WebLogic Server Administration Console.
- 2. In the left pane of the WebLogic Server Administration Console, click Lock & Edit to edit the server configuration.
- 3. In the left pane of the WebLogic Server Administration Console, expand Environment and select Servers.
- 4. On the Summary of Servers page, click the link for the WebLogic Managed Server where Oracle Directory Services Manager is deployed.
- 5. On the Settings page for the WebLogic Managed Server, update the Listen Address to the host name of the server where Oracle Directory Services Manager is deployed.
- 6. Click Save to save the configuration.
- 7. Click Activate Changes to update the server configuration.
- S.1.23.3 Various Failover Issues
- Problem
- 1. Oracle Directory Services Manager is deployed in a High Availability active-active configuration using Oracle HTTP Server.
- 2. Display an Oracle Directory Services Manager page using the Oracle HTTP Server name and port number.
- 3. Make a connection to an Oracle Internet Directory server.
- 4. Work with the Oracle Internet Directory server using the current Oracle Directory Services Manager Oracle HTTP Server host and port.
- 5. Shut down one managed server at a time using the WebLogic Server Administration Console.
- 6. Go back to the Oracle Directory Services Manager page and port, and the connection which was established earlier with Oracle ...
- Solution
- 1. In your web browser, exit the current Oracle Directory Services Manager page.
- 2. Launch a new web browser page and specify the same Oracle Directory Services Manager Oracle HTTP Server name and port.
- 3. Re-establish a new connection to the Oracle Internet Directory server you were working with earlier.
- Problem
- Solution
- Problem
- Solution
- Problem
- S.1.23.4 ODSM Displays an Error Message
- S.1.23.5 Cursor Loses Focus
- S.2 Need More Help?
- Symbols
- Numerics
- A
- B
- C
- D
- E
- F
- G
- H
- I
- J
- K
- L
- M
- N
- O
- P
- Q
- R
- S
- T
- U
- V
- W
- X