xix
List of Tables
1–1 Summary of Model Comparison ............................................................................................. 1-9
3–1 Granted and Inherited Permissions ........................................................................................ 3-5
6–1 Basic Administrative Security Tasks....................................................................................... 6-2
7–1 Tools to Deploy Applications after Development ................................................................ 7-2
10–1 Options to Create DER Format Files from PEM............................................................... 10-18
10–2 Connection Filter Rules........................................................................................................ 10-22
10–3 OAMCfgTool CREATE Mode Parameters and Values................................................... 10-24
10–4 OAMCfgTool VALIDATE Mode Parameters and Values.............................................. 10-26
10–5 Plug-ins for the Authentication Scheme............................................................................ 10-42
10–6 Oracle Access Manager Authentication Provider Common Parameters ..................... 10-62
10–7 Provider-Specific Parameters for Identity Asserter for Single Sign-On ....................... 10-62
10–8 Provider-Specific Parameters: Oracle Access Manager Authenticator......................... 10-63
10–9 OAMCfgTool Known Issues ............................................................................................... 10-64
10–10 Headers Sent by Oracle HTTP Server................................................................................ 10-76
10–11 ssoreg Parameters to Register Oracle HTTP Server mod_osso...................................... 10-79
10–12 Connection Filter Rules........................................................................................................ 10-86
10–13 SSO Sync Filter Properties and Sync Behavior................................................................. 10-95
12–1 Audit Properties in jps-config.xml .................................................................................... 12-18
12–2 Attributes of Base Table IAU_BASE ................................................................................. 12-22
13–1 List of Audit Reports ........................................................................................................... 13-12
13–2 Attributes of Audit Reports................................................................................................ 13-14
15–1 Summary of JpsFilter and JpsInterceptor Parameters....................................................... 15-7
15–2 Settings to Skip Policy Migration ....................................................................................... 15-15
15–3 Settings to Migrate Policies with Merging........................................................................ 15-15
15–4 Settings to Migrate Policies with Overwriting ................................................................. 15-16
15–5 Settings to Remove Policies................................................................................................. 15-16
15–6 Settings to Prevent the Removal of Policies...................................................................... 15-17
15–7 Settings to Skip Credential Migration................................................................................ 15-20
15–8 Settings to Migrate Credentials with Merging ................................................................. 15-20
15–9 Settings to Migrate Credentials with Overwriting .......................................................... 15-20
18–1 Comparing Authorization in the Java EE Model...............................................................
18-1
18–2 Behavior of checkPermission According to JAAS Mode .................................................. 18-5
19–1 Classes and Interfaces in the User and Role API............................................................... 19-2
19–2 LDAP Identity Provider Classes.......................................................................................... 19-5
19–3 Start-time Identity Provider Configuration Properties.................................................... 19-7
19–4 Runtime Identity Provider Configuration Properties ...................................................... 19-8
A–1 First- and Second-Level Elements in jps-config.xml............................................................ A-2
A–2 Scenarios for <extendedProperty>......................................................................................... A-5
A–3 Scenarios for <property> ....................................................................................................... A-15
B–1 Hierarchy of Elements in system-jazn-data.xml .................................................................. B-1
C–1 Oracle Directory Integration Platform Events..................................................................... C-2
C–2 Oracle Platform Security Services Events............................................................................. C-6
C–3 Oracle HTTP Server Events.................................................................................................... C-8
C–4 Oracle Directory Integration Platform Events..................................................................... C-9
C–5 Oracle Identity Federation Events....................................................................................... C-11
C–6 Oracle Virtual Directory Events........................................................................................... C-17
C–7 OWSM-Agent Events ............................................................................................................ C-19
C–8 OWSM-PM-EJB Events ......................................................................................................... C-20
C–9 Reports Server Events ........................................................................................................... C-21
C–10 WS-Policy Attachment Events ............................................................................................. C-21
C–11 Oracle Web Cache Events..................................................................................................... C-22
C–12 Oracle Web Services Manager Events................................................................................. C-24
C–13 Attributes of Audited Events ............................................................................................... C-25