Oracle® Application Server 10g Release Notes 10g (9.0.4) for Linux x86 Part Number B12261-03 |
|
This chapter describes issues with OracleAS Certificate Authority (OCA). It includes the following topics:
This section describes general issues and their workarounds for OCA. It includes the following topics:
The OracleAS Certificate Authority schema in one repository can only be used with one OCA.
When installing another OracleAS Certificate Authority, you must not choose a repository that has been used to install an earlier OCA: the OCA configuration tool will fail.
This failure will force you to exit the whole installation and restart it.
When installing another OracleAS Certificate Authority, you must not install and start OCA in zh or zh_TW locale. Instead, use one of the following locales:
This section describes configuration issues and their workarounds for OracleAS Certificate Authority. It includes the following topics:
During installation, you establish the password for the administrator of the Oracle Application Server Certificate Authority. The following information supersedes the administrator password information given in Section 6.24 of the Oracle Application Server 10g Installation Guide in Table 6.14. Passwords must
Thus during installation, the password you choose for the OCA administrator must accommodate these restrictions.
In Oracle Application Server 10g, by default, the Oracle Internet Directory server has two ports available: SSL and NON SSL.
To secure the connection between OCA and Oracle Internet Directory, OCA always connects to the directory server using the SSL port. This DH (Diffie Hellman SSL) connection does not require authentication. OCA then authenticates itself to the directory server by sending its username/password over the now-secured SSL connection.
Therefore, on the administrative pages, on the General page within Configuration Management, the section for Certificate Publishing has a check box for "Protect publication using SSL mode". This check box is not relevant anymore, because OCA always uses SSL.
This section extends the discussion of the same name ("Enabling PKI Authentication with SSO and OCA") that appears in Chapter 3 of the Oracle Application Server Certificate Authority Administrator's Guide, on page 3-22.
After installation, the OracleAS Single Sign-On server can be PKI-enabled. If a site chooses to PKI-enable its OracleAS Single Sign-On, then users of the applications partnering with OracleAS Single Sign-On, which use its authentication service, must have certificates to log in to those applications.
This requirement presents the following issue:
This issue is resolved by using multiple authentication levels in the OracleAS Single Sign-On server. Once PKI is enabled, all partner applications will have "medium high" security level (using certificates for authentication), even though OCA can have "medium" security level by using username/password or Windows Native Authentication. This allows OCA to use passwords to authenticate a user before issuing a certificate, but forces other SSO-enabled applications to use certificates for authentication.
To configure OCA to have "medium" security level using username/password:
MediumSecurity = 40 MediumSecurity_AuthPlugin = oracle.security.sso.server.auth.SSOServerAuth
Once you know this port number, add the following line:
ocaHostName\:ocaPort = MediumSecurity
where ocaPort is OCA's server authentication (SSL) port on the host machine ocaHostName. For example, if OCA is allocated port 4400 during installation on the host machine myoca1234.us.company.com, this line would read
myoca1234.us.company.com\:4400 = MediumSecurity
$ORACLE_HOME/opmn/bin/opmnctl restartproc type=oc4j instancename=OC4J_ SECURITY
Similarly, OCA can be configured to use other authentication mechanisms like Windows Native Authentication. Assign a security level to the plugin implementing the authentication mechanism as in Step 1 and then assign the OCA URL to use that security level as in Step 2.
This section corrects one parameter in the discussion of the same name ("Re-registering OCA's Virtual Host to SSO Server") that appears in Chapter 3 of the Oracle Application Server Certificate Authority Administrator's Guide, also on page 3-22.
The syntax for the command to re-register with the SSL server, to be run on a single line from the $ORACLE_HOME
where OCA is installed, is given there as follows:
$ORACLE_HOME/jdk/bin/java -jar $ORACLE_HOME/sso/lib/ossoreg.jar -oracle_home_path orcl_home_path -site_name site_name -config_mod_osso TRUE -mod_osso_url mod_osso_url -u userid [-virtualhost virtual_host_name] [-update_mode CREATE | DELETE | MODIFY] [-config_file config_file_path] [-admin_info admin_info] [-admin_id adminid]
The correction is to remove the square brackets, which indicated an optional parameter, from the line reading
[-virtualhost virtual_host_name]
so that it reads instead as follows:
-virtualhost virtual_host_name
indicating, by the absence of the square brackets, that this parameter is required.
Thus in the example that directly follows, on page 3-23, the command in step 2 should read as follows:
$ORACLE_HOME/jdk/bin/java -jar $ORACLE_HOME/sso/lib/ossoreg.jar -oracle_home_path $ORACLE_HOME -site_name "my_oca_site_name" -config_mod_osso TRUE -mod_osso_url https://myoca.mysite.com:4400 -u root -config_file $ORACLE_HOME/Apache/Apache/conf/osso/oca/osso.conf -virtualhost
For OCA, the -virtualhost
command does not require that a virtual_host_name
be specified.
This section describes administration issues and their workarounds for OracleAS Certificate Authority. It includes the following topics:
OracleAS Certificate Authority alerts and notifications are created and sent in the language of the Server Locale. They will not use the language of the client locale, if that is different from the Server locale. If OCA were to be installed on an server that is in English, and a Japanese client submits a request, the notification will be in English.
If you use templates for customizing alerts or notifications, as described in the next section, the language in which you edit the templates is used. It is advisable to edit the templates in the language of the server, because the message body is encoded in the language of the server locale.
If you do not use templates, then all alerts and notifications will appear in the language of the server locale.
As the administrator, you can specify the body of e-mail alerts and notifications as templates, which are stored in the following directory:
$ORACLE_HOME/oca/templates/email
You can use the tokens described below to format the e-mail to provide specific information. These tokens are replaced before the e-mail is sent. Table 25-1 lists the notifications, filenames for e-mail format and the supported tokens.
Table 25-2 describes the values that will replace each of the listed tokens before the alert or notification is sent:
After importing the certificate into your browser from the OCA screen, you can export it as a PKCS#12 wallet using the following steps:
A window appears, labeled 'Choose a Certificate Backup password', with the prompt 'Please enter the master password for the Software Security Device'.
This section describes known errors in the documentation for OracleAS Certificate Authority. It includes the following topics:
Pages 3-4, 3-7, 3-20, and 6-15 refer to the SSL port. Chapter 3 refers to the file "portlist.ini" as the place to find what port number to use. However, if port changes have occurred since installation, the most current information will be found by signing on to the Oracle Enterprise Manager Control and clicking the instance on which OCA was installed. Then click the Ports link, find the entry in the Type column that says "OCA Server Authentication (SSL)", and use the number in the adjacent column, headed "Port In Use".
Replace an explanatory sentence and add a Note in Chapter 6 of the OracleAS Certificate Authority Administrator's Guide, in the section entitled "Changing Identity Management (IM) Services (SSO/OID) Used by OCA", pages 6:15,16.
The sentence immediately after Step 6 should read as follows:
This command performs the following two actions:
Then the following note should appear after that second bullet just added:
|
![]() Copyright © 2003 Oracle. All Rights Reserved. |
|