Integrate with Oracle Internet Directory
The Oracle Internet Directory connector integrates Oracle Access Governance with Oracle Internet Directory. You can establish a connection between Oracle Internet Directory and Oracle Access Governance by entering connection details and configuring the connector. To achieve this, use the Orchestrated Systems functionality available in the Oracle Access Governance Console.
Preinstall
Before you install and configure an Oracle Internet Directory orchestrated system, you should consider the following pre-requisites and tasks.
Certified Components
The system can be any one of the following:
- Oracle Internet Directory 9.x
- Oracle Internet Directory 10.1.4.x
- Oracle Internet Directory 11g 11.1.1.5.0, 11.1.1.6.0, 11.1.1.7.0 and 11.1.1.9.0
- Oracle Internet Directory 12c 12.2.1.3.0 and 12.2.1.4.0
- Oracle Internet Directory 14c 14.1.2.1.0
Supported Operations
The Oracle Internet Directory orchestrated system supports the following operations:
- Create user
- Reset password
- Add groups
- Revoke groups
Create a System User Account for Oracle Internet Directory Orchestrated System Operations
Oracle Access Governance requires a user account to access the target system during service operations. Depending on the system you are using, you can create the user and assign specific permissions and roles to the user.
For Oracle Internet Directory:
- Create, modify, and delete entries related to the managed objects, including accounts, groups, roles (if supported), and organizational units (ou).
- Update passwords for users.
Create an admin user, admin group, and ACIs on the OID target system. To
perform this task, you must be an administrator on the OID target system who is
familiar with command-line utilities such as ldapsearch and
ldapmodify. If you prefer, you can also use Oracle Directory
Services Manager to perform these functions.
- Oracle Internet Directory 11g: Creating Another Account With Superuser Privileges
- Oracle Internet Directory 12c: Creating Another Account With Superuser Privileges
Install
You can establish a connection between Oracle Internet Directory and Oracle Access Governance by entering connection details and configuring your OID environment. To achieve this, use the Orchestrated Systems functionality available in the Oracle Access Governance Console.
Navigate to the Orchestrated Systems Page
- From the Oracle Access Governance
navigation menu icon
, select Service Administration → Orchestrated Systems
. - Select the Add an orchestrated system button to start the workflow.
Select system
On the Select system step of the workflow, specify which type of system you would like to onboard.
- Select Oracle Internet Directory and click Next.
Enter details
- Enter a name for the system you want to connect to in the Name field.
- Enter a description for the system in the Description field.
- Decide if this orchestrated system is an authoritative source, and if Oracle Access Governance can manage permissions by setting the following check boxes.
-
This is the authoritative source for my identities
Select one of the following:
- Source of identities and their attributes: System acts as a source identities and associated attributes. New identities are created through this option .
- Source of identity attributes only: System ingests additional identity attributes details and apply to existing identities. This option doesn't ingest or creates new identity records.
- I want to manage permissions for this system
-
This is the authoritative source for my identities
- Select Next.
Add owners
When setting up the first Orchestrated System for your service instance, you can assign owners only after you enable the identities from the Manage Identities section.
- Select an Oracle Access Governance active user as the primary owner in the Who is the primary owner? field.
- Select one or more additional owners in the Who else owns it? list. You can add up to 20 additional owners for the resource.
Account settings
- When a permission is requested and the account doesn't already exist, select this option to create new accounts . This option is selected by default. When selected, Oracle Access Governance creates an account if one doesn't exist when a permission is requested. If you clear this option, permissions are provisioned only for existing accounts in the orchestrated system. If no account exists, the provisioning operation fails.
- Select the recipients for notification emails when an account is created. The default recipient is User. If no recipients are selected, notifications aren't sent when accounts are created.
- User
- User manager
- Configure Existing AccountsNote
You can only set these configurations if allowed by the system administrator. When global account termination settings are enabled, application administrators can't manage account termination settings at the orchestrated-system level.- Select what to do with accounts when early termination begins: Choose the action to perform when an early termination begins. This happens when you need to revoke identity accesses before official termination date.
- Delete: Deletes all accounts and permissions managed by Oracle Access Governance.Note
If specific orchestrated system doesn't support the action, no action is taken. - Disable: Disables all accounts and disables permissions managed by Oracle Access Governance.
- Delete the permissions for disabled accounts: To ensure zero residual access, select this to delete directly assigned permissions and policy-granted permissions during account disablement.
- No action: No action is taken when an identity is flagged for early termination by Oracle Access Governance.
- Delete: Deletes all accounts and permissions managed by Oracle Access Governance.
- Select what to do with accounts on the termination date: Select the action to perform during official termination. This happens when you need to revoke identity accesses on the official termination date.
- Delete: Deletes all accounts and permissions managed by Oracle Access Governance.Note
If specific orchestrated system doesn't support Delete action, then no action is taken. - Disable: Disables all accounts and disables permissions managed by Oracle Access Governance.
- Delete the permissions for disabled accounts: To ensure zero residual access, select this to delete directly assigned permissions and policy-granted permissions during account disablement.
Note
If specific orchestrated system doesn't support the Disable action, then account is deleted. - No action: No action is taken on accounts and permissions by Oracle Access Governance.
- Delete: Deletes all accounts and permissions managed by Oracle Access Governance.
- Select what to do with accounts when early termination begins: Choose the action to perform when an early termination begins. This happens when you need to revoke identity accesses before official termination date.
- When an identity leaves your enterprise you must remove access to their accounts. Note
You can only set these configurations if allowed by your system administrator. When global account termination settings are enabled, application administrators cannot manage account termination settings at the orchestrated-system level.Select one of the following actions for the account:
- Delete: Delete all accounts and permissions managed by Oracle Access Governance.
- Disable: Disable all accounts and mark permissions as inactive.
- Delete the permissions for disabled accounts: Delete directly assigned and policy-granted permissions during account disablement to ensure zero residual access.
- No action: Take no action when an identity leaves the organization.
Note
These actions are available only if supported by the orchestrated system type. For example, if Delete is not supported, you will only see the Disable and No action options. - When all permissions for an account are removed, for example when an identity moves between departments, you may need to decide what to do with the account. Select one of the following actions, if supported by the orchestrated system type:
- Delete
- Disable
- No action
- Manage accounts that aren't created by Access Governance: Select to manage accounts that are created directly in the orchestrated system. With this, you can reconcile existing accounts and manage them from Oracle Access Governance.
If you don't configure the system as a managed system then this step in the workflow will display but is not enabled. In this case you proceed directly to the Integration settings step of the workflow.
If your orchestrated system requires dynamic schema discovery, as with the Generic REST and Database Application Tables integrations, then only the notification email destination can be set (User, Usermanager) when creating the orchestrated system. You cannot set the disable/delete rules for movers and leavers. To do this you need to create the orchestrated system, and then update the account settings as described in Configure Orchestrated System Account Settings.
Integration settings
On the Integration settings step of the workflow, enter the configuration details required to allow Oracle Access Governance to connect to the target Oracle Internet Directory.
- In the Host Name field, enter the hostname or IP address for the directory you want to integrate with Oracle Access Governance.
- In the Port Number field, enter the value of the TCP/IP port number used to communicate with the LDAP server.
- Enter the distinguished name which you will use to authenticate to the directory, in the Administrator Username field. This is the user you created in Create a Target System User Account for Oracle Internet Directory Orchestrated System Operations.
- Enter the password of the target distinguished name in the Administrator Password field. Confirm the password in the Confirm password field.
- Enter a base context from which to begin searches for users and groups into the Base Contexts field.
- In the Failover field, enter a list of failover servers in
the format
<servername>:<port>, <servername>:<port>, ..., for exampleOUDExample1:636, OUDExample1:636, ... - In the SSL Enabled field, ensure that the value true is selected.
- Check the right hand pane to view What I've selected. If you are happy with the details entered, select Add to create the orchestrated system.
Finish Up
The final step of the workflow is Finish Up where you are prompted to download the agent for your Orchestrated System. Once you have downloaded the agent, you can install and configure the agent in your environment using the instructions in Install Oracle Access Governance Agent.
- Customize before enabling the system for data loads
- Activate and prepare the data load with the provided defaults
Postinstall
There are no postinstall steps associated with an Oracle Internet Directory system.
Reference
Oracle Access Governance supports the following default Oracle Internet Directory attributes.
| Entity | Oracle Internet Directory Account Attribute | Oracle Access Governance Account Attribute | Oracle Access Governance Display name |
|---|---|---|---|
| User | User Login | uid | Unique Id |
| uid | name | Employee user name | |
| full DN | fullDN | Full DN | |
| givenName | firstName | First name | |
| initials | middleName | Middle name | |
| sn | lastName | Last name | |
| manager | managerLogin | Manager | |
| Status | status | Status | |
| departmentnumber | department | Department | |
| l | location | Location | |
| c | country | Country | |
| displayName | displayName | Display Name | |
| o | organizationName | Organization Name | |
| homePhone | homePhone | Home Phone | |
| mobile | mobile | Mobile | |
| orclActiveStartDate | startDate |
Start Date |
|
| orclActiveEndDate | endDate | End date | |
| orclTimeZone | timeZone | Time Zone | |
| orclGuid | orclGuid | GUID |
| Entity | Oracle Internet Directory Account Attribute | Oracle Access Governance Account Attribute | Oracle Access Governance Display name |
|---|---|---|---|
| User | orclGuid | uid | Unique Id |
| uid | name | User login | |
| Full DN | fullDn | Full DN | |
| Password | password | Password | |
| title | title | Title | |
| givenname | firstName | First name | |
| initials | middleName | Middle name | |
| sn | lastName | Last name | |
| __parentDN__ | containerDN | Container DN | |
|
emailID |
|||
| cn | commonName | Common name | |
| departmentnumber | department | Department | |
| l | location | Location | |
| telephonenumber | telephone | Telephone | |
| preferredlanguage | communicationLanguage | Preferred language | |
| orclTimeZone | timeZone | Time zone | |
| orclActiveStartDate | startDate | Start date | |
| orclActiveEndDate | endDate | End date | |
| manager | manager | Manager | |
| login Disabled | loginDisabled | Login disabled | |
| Status | status | Status | |
| c | country | Country | |
| Group Name | groups as entitlement | Groups |