Posts

How to install WebGate in Oracle Identity Management environment

WebGate A WebGate is a web-server plug-in for Oracle Access Manager (OAM) that intercepts HTTP requests and forwards them to the Access Server for authentication and authorization. Specifically an OHS WebGate, i.e. Oracle HTTP Server WebGate is a Web server plug-in that intercepts HTTP requests and forwards them to an existing Oracle Access Manager (OAM) instance for authentication and authorization. Installing WebGate There are two important steps for installing OHS WebGate, first is configuring the OHS WebGate and then Registering the OHS WebGate with OAM. See below  Configuring Oracle HTTP Server WebGate Registering the Oracle HTTP Server 12c WebGate with Oracle Access Manager Since 12c version, there is no need for installing WebGate separately. If you have installed OHS 12c server then WebGate comes pre-bundled with it. (In prior versions, 11g and 10g one had to first install WebGate binaries.) For overview of register/manage webgate in 12c, read   For 12c version  - Registe

Oracle E-Business Suite (EBS) integration with Oracle Identity Cloud Service

Image
Oracle EBS integration with Oracle IDCS Oracle E-Business Suite (EBS) can now be easily integrated with Oracle Identity Cloud Service (IDCS). You can read the earlier blog which provided EBS integration with OAM and OID here . However, when using Oracle Identity Cloud Service (IDCS) there is no requirement of using OAM or OID. You can integrate your on-premise EBS deployment with Oracle Cloud Identity Service. Here is a side by side comparison of the two deployment architectures - Oracle EBS integration with IDCS on left and with OAM/OID on right You don't need to configure Oracle E-Business Suite with Oracle Access Manager (OAM) Access Gate or OAM for integration with the Oracle Identity Cloud Service. Identity Cloud Service E-Business Suite Asserter replaces OAM Access Gate as the authentication mechanism for your Oracle E-Business Suite. Note: Your Oracle E-Business Suite must not be integrated with Oracle Access Manager, Oracle Internet Directory, or using any other SSO profil

High Availability, Multi-Data Center in Oracle Identity Governance 12.2.1.3

Services or Applications need to be available to end users. Any interruption of services or outages needs to be minimized or if possible provide maximum availability.  Any outage of services to end users is disruptive to Business.  Outages may be Planned outages or Unplanned.  Unplanned outages can occur due to Network issues, Data corruption, Application issues etc, whereas Planned outages are typically for Application updates or patching, Data migration etc. Highly available (HA) architectures are key in providing uninterrupted or maximum available services to end user and business. Below are some references and guides that provide detailed information as to how to implement Highly available architectures or across Multiple Data Centers for Oracle Identity Governance, Oracle Identity and Access Management. Also at the end their is a guide for Disaster Recovery (DR) for Oracle Fusion Middleware 12c. Configure High Availability for Oracle Identity Governance   (OIG) Prerequisites for C

What is UPN - User Principal Name

Image
What is UPN User Principal Name (UPN) attribute in Microsoft Active Directory is userPrincipalName, and its value may be set as user's email address, though not necessarily. You can view UPN via the AttributeEditor property of a user's account in Active Directory, see below screenshot that shows Attribute name as userPrincipalName and its Value set as testuser1@DC1.example.com You can also derive the UPN from the user's Account - User logon name, in Active Directory. See below concatenation of user logon name and domain suffix - testuser1 and DC1.example.com. Concatenating these two (as shown in the screenshot below) yields testuser1@DC1.example.com which is the email address of the user. (Note in Pre-Windows 2000 the User logon name is DC\testuser1) How to view Attribute Editor in Active Directory You have to select Advanced Features (right click on the Domain Controller DC1.example.com on the left pane, click on View and then click Advanced Features) in o

CyberArk Vault Backup Utility - PAReplicate

Image
CyberArk Privileged Access Solution provides a utility PAReplicate that can be used to copy and backup the Safe files from the CyberArk Vault to a specified computer on the network. The backed files are in the same structure as that in the Safes folder See below a typical High Level Design for CyberArk Privileged Access Management and CyberArk Backup process and file structure. High Level Design for CyberArk Privilege Access Management CyberArk Backup Process The PAReplicate utility copies the Safe files from the Vault to a specified computer on the network in a similar structure to that in the Safes folder. Any User who has the ‘Backup All Safes’ user authorization and the ‘Backup Safe’ authorization in specific Safes can issue this command for those Safes. Use the Backup User to replicate the entire Vault. You can use PAReplicate to backup a specific Safe or a group of Safes. When using the specific backup, the requested Safe data files are copied to the specif

Knowledge Areas

Image
Knowledge areas Project Integration Management Project Scope Management Project Time Management Project Cost Management Project Quality Management Project Human Resources Management Project Communication Management Project Risk Management Project Procurement Management Knowledge areas Project Integration Management Project Scope Management Project Time Management Project Cost Management Project Quality Management Project Human Resource Management Project Communications Management Project Risk Management Project Procurement Management Project Stakeholder Management The processes that belong in each process group - Initiating, Planning, Executing, Monitoring & Control, and Closing, what they do and which knowledge area they represent can be confusing. This post (based on the info in PMBOK) discusses about each process group and briefly explains the processes that belong in each process group. The knowledge area they represent is indicated in brackets after

Cisco SDN

Image
Table Of Contents Evolution of Software Defined Networking within Cisco's VMDC Challenges within the Data Center SDN Architectural Framework and Solution Characteristics Centralized Control Overlay Networks SDN Solution Taxonomy Control Plane Function Data Plane / Control Plane Collocation Cisco's Virtual Multiservice Data Center VMDC 2.x and 3.x VMDC 4.x (vCE) Cisco vPE Conclusion Evolution of Software Defined Networking within Cisco's VMDC Software-Defined Networking (SDN) has the capability to revolutionize the current data center architecture and its associated networking model. This new paradigm, with its promised benefits, has the potential to create an inflection point in deploying cloud services. This paper summarizes the key characteristics of SDN as it is applied to data center virtualization, and illustrates how Cisco's Virtualized Multiservice Data Center (VMDC) solutions leverage many of these concepts today, to solve real-w