Tuesday, October 14, 2014
OAM Post Authentication operation
Since OAM 10g days, keeping track
of Protected Resource that user wanted to access throughout custom
authentication process has been a challenge. In OAM 10g, it was possible to create
custom OBFormLoginCookie to overcome that challenge. With the introduction of
Encrypted OAM_REQ cookie in OAM 11g, it is not feasible. That makes it difficult
to do post Authentication operations or any customizations in Authentication
process.
OAM 11gR2 introduced a feature
where you can redirect user to a URL post successful Authentication (On
Authentication success event in Authentication policy as defined in the screen
shot below). OAM while doing that redirect, adds end_url query parameter to URL
with the value of protected resource that user tried to access. You can do any
post Authentication processing required on Authentication success URL and then redirect
user to end_url.
Labels:
OAM 11gR2,
Post Authentication Operation
A Beginner's HowTo on Social Federation with OAM Mobile & Social
Introduction
Social Federation: a somewhat fancy name for a simple concept. We want to leverage identities in Social Network providers in our own applications. For example, granting access to either cloud or on-premise applications to end users using their Google identities. In this post we're going to take a close look at the necessary configuration in OAM M&S (Oracle Access Manager Mobile & Social) server to have Java Web applications leveraging Google and LinkedIn identities.
Conceptually, this is very similar to SAML-based federation model indeed. The difference is that we are now dealing with different protocols, like OpenID and OAuth. And the main appeal for federation keeps being the acceptance of third party identities by a service provider (a.k.a. relying party) without the need of having end user passwords stored locally.
Subscribe to:
Posts (Atom)