- Why do we need OID for Fusion Applications when existing Enterprise Repository can be used ? a. All the Fusion Applications specific and Oracle specific attributes are created in OID
- Can multiple directories still be used as Identity stores?a. Yes. Multiple directories can still be used as Identity stores with oracle specific attributes present in OID and enterprise specific attributes and Fusion Application specific attributes present in say AD.I will discuss this scenario in upcoming blogs
- Are User Login Ids unique across directories?a. Yes , this a pre requisite and other pre requisites and limitations are very well discussed in IDM Enterprise Deployment Guide for Fusion Applications for configuration of directories other than OID
- When is the good time to configure split directory mode, before or after FA provisioning?a. I will stress this and recommend to go with this configuration after FA provisioning is completedb. Since this can also be done prior to FA provisioning , in that case the recommendation is to complete the IDM Environment with OVD and OID (ID Store,Policy Store) >>Validate IDM Environment >> Then proceed with split AD Configurationc. Configuring AD and OID before IDM validation is prone to good number of user errors.For easy understanding and simple configuration I will stick to the scenario of split profile configuration where existing Enterprise Repository is not extended.In this scenario this is how the view is from OVD level (adapter plug-in view/ unified view).
As you see in the image above even though the actual base of both OID and AD repositories are same ‘dc=us,dc=oracle,dc-com’ , OVD Adapters are configured to map uniquely and to consolidate to a unified view of ‘dc=adidm,dc=oididm,dc=com’
Now let’s get in to action on how to create above configuration. On a high level this can be split in to 5 tasks
- Setting up Shadow directory in OID
- Create a shadow joiner
- Create user Adapters for AD and OID
- Create Changelog Adapters for AD and OID
- Create Join View Adapter and Global Change Log Plug-In
1.Set up OID as shadow directory
Since AD is not being extended, OID will be used as a shadow directory and use Oracle Virtual Directory to merge the entities from the directories and for this purpose we need to create a container in OID to store Fusion Apps specific attributesa. Create 'shadowentries' container in oid ( below is sample ShadowADContainer.ldif)dn: cn=shadowentries
cn: shadowAD1
objectclass: top
objectclass: orclContainer
ShadowADContainer.ldif
c. Create acis on the newly created group/container to grant access to RealmAdministrators and OIMAdministrators(This is the group that does all ID Administration in OIM)
dn: cn=shadowentries
changetype: modify
add: orclaci
orclaci: access to entry by group="cn=RealmAdministrators,cn=groups,cn=OracleContext,dc=us,dc=oracle,dc=com" (browse,add,delete)
orclaci: access to attr=(*) by group="cn=RealmAdministrators,cn=groups,cn=OracleContext,dc=us,dc=oracle,dc=com" (read,write,search,compare)
orclaci: access to entry by group="cn=OIMAdministrators,cn=groups,dc=us,dc=oracle,dc=com" (browse,add,delete)
orclaci: access to attr=(*) by group="cn=OIMAdministrators,cn=groups,dc=us,dc=oracle,dc=com" (search,read,compare,write)
-
changetype: modify
add: orclentrylevelaci
orclentrylevelaci: access to entry by * (browse,noadd,nodelete)
orclentrylevelaci: access to attr=(*) by * (read,search,nowrite,nocompare)
Note: All the steps here after are to be performed by connecting to OVD via ODSM.You can use the screen shots as pointers for configuration.
2.Create Shadow Joiner Adapter
3.Create User Adapters for AD and OID
4.Create Change Log Adapters for AD and OID
4.1 Change Log Adapter for AD