Lab 02 Fga For User and Role MGMT
Lab 02 Fga For User and Role MGMT
Lab 02 Fga For User and Role MGMT
Contents
Lab 2 - Enterprise User lifecycle influenced by Delegated Administrators and End-users .......................... 1
1. Introduction ............................................................................................................................................. 1
2. Contents.................................................................................................................................................... 4
Introduction
This use case will cover the configurations and usage of OIM features to model advanced user account management scenarios
within a controlled system driven by strong authorization policies. The use case will consider people with various personas -
Helpdesk personnel / IT Administrators, End-users and their Managers, interacting with OIM.
1
OIM 11g PS1 Workshop - Lab2
Due to some recent changes in ACME user provisioning context, current OIM user schema needs to be extended by more attributes:
Professional Qualifications
Backend Attributes
<Employee from acquisition> (this one should not show up on UI, backend logic will use it)
1.1.In this use cases, ‚Helpdesk‛ staff needs to be created. To perform their duties, members of Helpdesk staff need to be assigned
authorization policies in OIM, which will be modeled as members of an appropriate OIM Role. For creating and managing the
lifecycle of such static roles, ACME has a process in place which is carried out by dedicated Role Owners and Access Administrators.
Members of a role named Role Owners have the rights to create any OIM role representing Helpdesk (ACME HelpDesk
Once Role Owners would have created the Helpdesk role, another group of users (who would be members of a role named
Access Administrators), would have to add a specific OIM user to the Helpdesk role. Of course this would be done for
those users who need to be a part of Helpdesk team and needs certain authorization controls (described in the points
below). However, it is important to keep into consideration that Access Administrators cannot add members to all roles
2
OIM 11g PS1 Workshop - Lab2
defined in OIM deployment. If ACME wants them to be able to define members to Helpdesk role, they need to be
To create users directly (but they cannot delete) for only departments – ‚Public Finance‛ and its sub-department
‚Taxation‛.
They are also asked to execute some operations in Bulk on a number of users collectively (like - Enable, Disable). Also they
can update the ‚Previous Job History Verified‛ flag on a batch of recently hired users collectively once notified from HR
(thru an email).
They can only modify particular attributes of user profile but not all.
When they create users for department ‚Mergers and Acquisition‛, the user id, password will have to be generated. User id
If e-mail is provided, then username is generated based on the e-mail. If e-mail is not available, then it generates username based on
firstname and lastname by appending a user domain to it. The user domain is configured as the Default user name domain system
When Helpdesk reset the password for a user, it is communicated to him thru an email. Password should meet the
enterprise password policy requirements. When user logs into OIM with the helpdesk-reset password, he should enforced
3
OIM 11g PS1 Workshop - Lab2
They can search for only their hierarchies, and only view their user details. They can go for a complicated search filter using
advanced search. They cannot view certain specific attributes like ‚Pay‛.
Senior managers can search users who are post-graduates in their departments.
They can update attributes on their profile, which raises requests to User's manager. Manager approves it and the profile
gets updated.
Contents
2.1. Extend OIM User schema
2.4. Configure Managers authorization for the administration of their directs’ reports
4
OIM 11g PS1 Workshop - Lab2
Purpose
This step includes the configuration required to extend OIM User schema as mentioned in section.
Steps
Login to the Oracle Identity Manager Administration console (use xelsysadm credentials unless specified otherwise).
In the Welcome page, under Advanced Administration, click User Configuration. Alternatively, you can click the Configuration
5
OIM 11g PS1 Workshop - Lab2
6
OIM 11g PS1 Workshop - Lab2
On the left pane of the console, from the Actions menu, select User Attributes. The User Attributes page is displayed with a
7
OIM 11g PS1 Workshop - Lab2
8
OIM 11g PS1 Workshop - Lab2
Click Add Category or select Add Category from Actions menu under User Attributes. Pop-up dialog box to create category
appears. Fill in the Category name as ‚Professional Qualifications‛. Click Save. Message confirming successful creation of
category appears.
9
OIM 11g PS1 Workshop - Lab2
10
OIM 11g PS1 Workshop - Lab2
Click Create Attribute or Select Create Attribute form Actions menu. Pop-up dialog box to create attribute appears. Fill in the
11
OIM 11g PS1 Workshop - Lab2
12
OIM 11g PS1 Workshop - Lab2
13
OIM 11g PS1 Workshop - Lab2
To add another attribute click Create Attribute or select Create Attribute from Actions menu. Pop-up dialog box to create
On selecting the LOV as Display type, the display window changes and additional options appear. Select LOV Type as Admin
14
OIM 11g PS1 Workshop - Lab2
15
OIM 11g PS1 Workshop - Lab2
Fill in LOV Options as ‘1’ and LOV Options Description as ‘0-2 Yrs’ and Click Add.
Note: You can scroll down this screen to see the values just added.
Repeat to Add LOV Options 2,3,4,5 with LOV Options Description as follows:
16
OIM 11g PS1 Workshop - Lab2
This is how it looks after adding all LOV option and descriptions.
17
OIM 11g PS1 Workshop - Lab2
Click Next.
Fill in Attribute size as ‘10’ and Click Next and then Click Save. Message confirming successful creation of attribute appears.
Repeat the steps outlined in 2.1.6 to 2.1.8 to add more attribute as per following:
18
OIM 11g PS1 Workshop - Lab2
Checkpoint
This completes the configuration of modifying OIM User schema. If at this point you, as ‘xelsysadm’ user, View existing Users, you
will not see their extended attributes as additional Auth Policies needs to be assigned to users to view these attributes, which we
will do in next section. If you create a new User, you will be presented with the new attributes as schema is extended.
Purpose
We will configure HelpDesk User and Role authorizations in this section.
19
OIM 11g PS1 Workshop - Lab2
(C) Role Administrator user has specific responsibility to create and manage roles and role categories, so we will create a
corresponding role and auth policy to perform those duties.
(D) Helpdesk user performs specific helpdesk duties as outlined in use case and Access Administrator user has specific
responsibilities to manage membership of HelpDesk role to Helpdesk Administrator staff. To achieve that we will now have Role
Administrator log in create role for HelpDesk and Access Administrator. Auth Policies are still to be created by xelsysadm so we
will have xelsysadm create auth policies for both the roles. Once this is done we will have Access Administrator assign the
HelpDesk role to HelpDesk staff.
(E) Setup Email Notification (You may not get mails depending upon environment on which you are practicing these labs)
Steps
CAPITAL Company:
20
OIM 11g PS1 Workshop - Lab2
ACMECAPITAL
ACME Taxation
In the Welcome tab of Oracle Identity Manager Administration page, under Organizations, click Create Organization.
Alternatively in the left pane, click the Browse tab. Under Organizations, from the Action menu, select Create. You can also click
21
OIM 11g PS1 Workshop - Lab2
Create ACME HelpDesk Organization. Enter ‘ACME HelpDesk’ as Name, select Department as Type. To choose previously
22
OIM 11g PS1 Workshop - Lab2
23
OIM 11g PS1 Workshop - Lab2
A pop-up window appears from which search for Parent Organization that Begins with ACME. Select ACME CAPITAL from
Search Results and Click Add. Note: Screen shows contains, instead it should be Begins With
24
OIM 11g PS1 Workshop - Lab2
Click Save and then repeat the process to create rest of the Organization Structure as:
ACME CAPITAL -> ACME Public Finance -> ACME Taxation (Department)
25
OIM 11g PS1 Workshop - Lab2
The Organization Structure for ACME CAPITAL will look like this:
26
OIM 11g PS1 Workshop - Lab2
(B) Create a Role Administrator user, an Access Administrator user and two HelpDesk Administrator users.
In the Welcome page of Identity Administration, under Users, click Create New User. Alternatively Click the Administration
tab on the toolbar, and then in the Browse tab, click Create New User.
27
OIM 11g PS1 Workshop - Lab2
In Create User Page enter ACME as First Name, RoleAdmin as Last Name. Choose ACME CAPITAL as Organization, Employee
as User Type and roleadmin as User Login. Enter Abcd123 as Password. Click Save.
28
OIM 11g PS1 Workshop - Lab2
Having created Role Administrator we will now create Access Administrator by following steps from 2.2.5 and 2.2.6. Enter
ACME as First Name, AccessAdmin as Last Name. Choose ACME CAPITAL as Organization, Employee as User Type and
Following steps from 2.2.5 and 2.2.6 again, we will now create two new user for HelpDesk staff.
For first user, enter Acme as First Name, HelpDesk1 as Last Name. Choose ‘ACME HelpDesk’ as Organization, Employee as
User Type and acmehelpdesk1 as User Login. Enter Abcd123 as Password. Click Save
Similarly for second user, enter Acme as First Name, HelpDesk2 as Last Name. Choose ‘ACME HelpDesk’ as Organization,
Employee as User Type and acmehelpdesk2 as User Login. Enter Abcd123 as Password. Click Save
(C) Role Administrator user has specific responsibility to create and manage roles and role categories, so we will
create a corresponding role for this user and also create auth policy for this user to perform those duties.
In the Welcome page of Administration tab, under Roles, click Create Role. Alternatively, in the Browse tab of the left pane,
expand Roles, and from the Actions menu, select Create Role. Otherwise, click the Create Role icon on the toolbar.
29
OIM 11g PS1 Workshop - Lab2
30
OIM 11g PS1 Workshop - Lab2
Select Members tab of role "Role Owners" and then click Assign to assign user created in last step "ACME RoleAdmin" to this
role.
31
OIM 11g PS1 Workshop - Lab2
32
OIM 11g PS1 Workshop - Lab2
On the Welcome page, under Authorization Policy, click Create Authorization Policy. Alternatively, you can you can click the
33
OIM 11g PS1 Workshop - Lab2
34
OIM 11g PS1 Workshop - Lab2
In the Policy Name field, enter the name of the authorization policy as ‚Role Owners - Manage Roles‛. In the Description field,
enter a description of the authorization policy ‚Auth Policy assigned to Role Owners to create and manage roles and role
categories‛. In the Entity Name field, select the name of the feature for which you want to create the authorization policy. To
create an authorization policy for role management, select Role Management. Click Next
35
OIM 11g PS1 Workshop - Lab2
36
OIM 11g PS1 Workshop - Lab2
The Permissions page is displayed. In this page, you can select permissions that you want to enable in the authorization poli cy.
We will select ‚Create Role‛, ‚Delete Role‛, ‚Modify Role Detail‛, ‚Create Role Category‛, ‚Delete Role Category‛, ‚Modify
37
OIM 11g PS1 Workshop - Lab2
The Assignment page of the Create Policy wizard is displayed. To assign roles to the authorization policy: Click Add. The
Assign Roles dialog box is displayed. Search for Role Name Beings with ‚Role‛. From Search Results select ‚Role Owners‛ and
Click Add.
38
OIM 11g PS1 Workshop - Lab2
39
OIM 11g PS1 Workshop - Lab2
Click Next
40
OIM 11g PS1 Workshop - Lab2
41
OIM 11g PS1 Workshop - Lab2
(D) Helpdesk user performs specific helpdesk duties as outlined in use case and Access Administrator user has
specific responsibilities to manage membership of HelpDesk role to Helpdesk Administrator staff. To achieve
that we will first have xelsysadm create Access Administrator role and assign to ACME Access Admin user and
then we will have Role Administrator log in to create role for HelpDesk Administrator. Auth Policies are still to
be created by xelsysadm so we will have xelsysadm log back in to create auth policies for both the roles. Once
this is done we will have Access Administrator assign the helpdesk role to helpdesk staff.
Follow steps from 2.2.9 to 2.2.11 to create a role called "Access Administrators" and assign "ACME AccessAdmin" to this role
Now logout and login with roleadmin credentials (to create HelpDesk Role). Note: If you are logging it as roleadmin for first
Again follow steps from 2.2.9 and 2.2.10 to create a role called "ACME HelpDesk Administrators".
Please note that there is a pre-seeded role ‚ACME Help Desk Administrators which has a space between ‘Help’ and ‘Desk’. The
Now log out and login with xelsysadm credentials to create Auth Policies.
42
OIM 11g PS1 Workshop - Lab2
Follow steps from 2.2.13 to 2.2.19 to Create Auth Policy per following for Access Administrator.
Access Auth Policy assigned to Role View Role ACME Role: Access
Administrators Access Administrators to Management Membership HelpDesk Administrators
- Manage Role View and Modify Role Administrators
Modify Role
Membership Memberships
Membership
So far we have created Auth Policies for Role Management which were assigned to roleadmin and accessadmin through
respective roles. Now we will create some auth policies for User Management which will be assigned to acmehelpdesk1 and
The following image illustrates what ACME HelpDesk’s user can do:
43
OIM 11g PS1 Workshop - Lab2
ACME
ACME ACME Public
Mergers and
HelpDesk Finance
Aquisitions
ACME
Taxation
On the Welcome page, under Authorization Policy, click Create Authorization Policy. Alternatively, you can you can click the
44
OIM 11g PS1 Workshop - Lab2
In the Policy Name field, enter the name of the authorization policy as ‚HelpDesk CreateUser - Public Finance‛. In the
Description field, enter a description of the authorization policy ‚Auth Policy assigned to ACME HelpDesk Administrators to
create users in Public Finance Org‛. In the Entity Name field, select the name of the feature for which you want to create the
authorization policy. To create an authorization policy for user management, select User Management. Click Next
45
OIM 11g PS1 Workshop - Lab2
46
OIM 11g PS1 Workshop - Lab2
The Permissions page is displayed. In this page, you can select permissions that you want to enable in the authorization policy.
47
OIM 11g PS1 Workshop - Lab2
The Data Constraints page of the Create Policy wizard is displayed. In this page, options for the feature selected on the Entity
Name field in previous step are displayed. Select option ’Users that are members of selected Organizations’ to specify
organizations for whose members you want to create the authorization policy. Click Add Organization.
48
OIM 11g PS1 Workshop - Lab2
49
OIM 11g PS1 Workshop - Lab2
Add Organization dialog box is displayed. Search for Organization name that Begins with ‚ACME Public Finance‚. Select
50
OIM 11g PS1 Workshop - Lab2
Select checkbox ‚Hierarchy Aware (include all Child Organizations)‛ and Click Next. This is done so that Helpdesk can create
51
OIM 11g PS1 Workshop - Lab2
The Assignment page of the Create Policy wizard is displayed. To assign roles to the authorization policy: Click Add. The
Assign Roles dialog box is displayed. Search for Role Name that Begins with ‚ACME HelpDesk‛. From Search Results select
Click Next.
52
OIM 11g PS1 Workshop - Lab2
Click Finish.
53
OIM 11g PS1 Workshop - Lab2
Create other Auth policies per table below by following steps from 2.2.26 to 2.2.35:
Policy Name Description Entity Name Permissions Attributes Data Policy Assignments
Constraints
HelpDesk Auth Policy assigned to User Create User ACME Role: ACME
Create User - M ACME HelpDesk Management Mergers and HelpDesk
&A Administrators to create Acquisitions Administrators
users in Mergers and (Hierarchy
Acquisitions Org Aware)
HelpDesk Auth Policy assigned to User - Search User ACME Role: ACME
SearchUser ACME HelpDesk Management CAPITAL HelpDesk
- View User
Administrators to Search (Hierarchy Administrators
Details
Users and View their Details Aware)
before Updating or
Modifying them
HelpDesk Auth Policy assigned to User Modify User ACME Role: ACME
UpdateUser ACME HelpDesk Management Status CAPITAL HelpDesk
Administrators to Update (Hierarchy Administrators
User Status as Enable/Disable Aware)
HelpDesk Auth Policy assigned to User Modify User Previous Job ACME Role: ACME
ModifyUser ACME HelpDesk Management Profile History Verified CAPITAL HelpDesk
Administrators to Modify (Hierarchy Administrators
User Profile attribute - Aware)
Previous job History Verified
HelpDesk Auth Policy assigned to User Change User ACME Role: ACME
PasswordMgmt ACME HelpDesk Management Password CAPITAL HelpDesk
Administrators to reset user (Hierarchy
54
OIM 11g PS1 Workshop - Lab2
Now logout and login with accessadmin credentials to assign the role "ACME HelpDesk Administrator" to HelpDesk staff
(acmehelpdesk1 and acmehelpdesk2). Note: Since you are logging with accessadmin for first time, you will be redirected to
DON’T USE the pre-seeded role ‚ACME Help Desk Administrators‛. Note the space between ‘Help’ and ‘Desk’. The one to use
Search for role "ACME HelpDesk Administrator" and then follow the steps outlined in 2.2.11 to assign members acmehelpdesk1
You will see that you are not able to search for users acmehelpdesk1 and acmehelpdesk2 (search doesn't return any user). This is
because of the fact that accessadmin is only authorized to change role membership but is not authorized to search user. To
workaround this issue create another auth policy per below (you need to log back as xelsysadm):
Policy Name Description Entity Name Permissions Attributes Data Policy Assignments
Constraints
Now log back in as accessadmin and retry assigning the role "ACME HelpDesk Administrator" to HelpDesk staff (acmehelpdesk1
and acmehelpdesk2).
55
OIM 11g PS1 Workshop - Lab2
DON’T USE the pre-seeded role ‚ACME Help Desk Administrators‛. Note the space between ‘Help’ and ‘Desk’. The one to use
Search for role "ACME HelpDesk Administrator" and then follow the steps outlined in 2.2.11 to assign members acmehelpdesk1
Bug: System gives ADF error and UI doesn't show the members of this role but if you search for acmehelpdesk1 user and check his
56
OIM 11g PS1 Workshop - Lab2
To setup Email Server, Login to the Oracle Identity Manager Administration Console. In the Welcome page, under Advanced
57
OIM 11g PS1 Workshop - Lab2
Note : If this training content is being used by people who do not work for Oracle and therefore do not have Oracle email ids,
should go for using a JES (Java Email Server) based mail server installed and configured in the Training VM environment. Lab 1
contains the details about running this particular Email Server and using it with OIM.
Create IT Resource dialog box appears. Enter ‘Email Server’ as IT Resource Name and select ‘Mail Server’ as IT Resource Type.
Click Continue.
58
OIM 11g PS1 Workshop - Lab2
The UI wizard has step numbers on the top, as shown in the screenshot. In Step 2 of Create IT Resource, enter ‘false’ as
Authentication, ‘mail.oracle.com’ as Server Name and enter your User Login and click Continue. Leave User Password blank.
Note: If mail.oracle.com as Server Name does not work for some reasons, another value that could be used is stbeehive.oracle.com. If
people not in oracle are doing these labs they need to use some mail server that they can reach to and doesn't require authnetication.
59
OIM 11g PS1 Workshop - Lab2
Leave everything else default in Step 3 and 4 and click Continue. From Step 5 click Continue. Steps 6 confirms the creation of IT
You should always ensure that the relevant system property is set to the right value for Email Server configuration to work.
60
OIM 11g PS1 Workshop - Lab2
Login to the Oracle Identity Manager Administration Console. In the Welcome page, under Advanced Administration, click
Search System Properties. Enter * under Search System Configuration and Click Search.
61
OIM 11g PS1 Workshop - Lab2
On the left pane of the window, scroll down to locate property Email Server and Click it. The System Property Detail: Email
Server window appears. Ensure that the Value field is set to as Email Server (same as IT Resource Name).
62
OIM 11g PS1 Workshop - Lab2
63
OIM 11g PS1 Workshop - Lab2
To Setup UserId Generation Policy, select ‚Default policy for username generation‛ from the left pane above window. Make
64
OIM 11g PS1 Workshop - Lab2
65
OIM 11g PS1 Workshop - Lab2
To setup Default Domain for username generation, select ‘Default user name domain’ from the left pane above window. Make
sure the Value field is populated and has right domain. For our usecase we will use oracle.com, which is default. If not chan ge it
We will use default password policy, which can be checked through Design Console, if required.
66
OIM 11g PS1 Workshop - Lab2
Login as xelsysadm Open Each Organization e.g ACME CAPITAL Click on Administrative Roles and Assign the Role ACME
HelpDesk Administrator. Provide Read Permission (which is by Default). Do this for each organization , so that when you
search as acmehelpdesk1, user you can see the organization and test creating the user.
Checkpoint
This completes the configurations for HelpDesk User authorizations. We created ACME Organization hierarchy, HelpDesk Role,
HelpDesk Administrator Users and Authorization Policies. We assigned all these Auth Policies to HelpDesk Administrators
through HelpDesk Role. We also did some misc configuration to setup Email Server etc.
Purpose
This section, we will login as one of the HelpDesk admin and perform various actions authorized for HelpDesk per configuration in
previous section like: Create User, Search User, Update User Status, Bulk Modify User Details and Reset User Password. We will
also see what HelpDesk is not authorized to do like: Delete User and Create User in Org’s it is not authorized for. Apart from this
we will see how user Login is created as per User Id generation Policy.
Steps
2.3.1. Login as helpdesk user (either acmehelpdesk1 or acmehelpdesk2).
67
OIM 11g PS1 Workshop - Lab2
To execute all parts of this use case, login only as one of the two helpdesk users you’ve just created.
While creating the User choose Organization as ‘ACME CAPITAL’. Notice acmehelpdesk1 is NOT allowed to create a user.
68
OIM 11g PS1 Workshop - Lab2
69
OIM 11g PS1 Workshop - Lab2
Create a User with Organization ‘ACME Public Finance’. Choose User Login ‘acmefinuser1’ and Password ‘Abcd1234’. User
70
OIM 11g PS1 Workshop - Lab2
71
OIM 11g PS1 Workshop - Lab2
Create a User in ACME Taxation which is child org of Acme Public Finance – allowed
Create a User with Organization ‘ACME Taxation’. Choose User Login ‘acmetaxuser1’ and Password ‘Abcd1234’. User
72
OIM 11g PS1 Workshop - Lab2
73
OIM 11g PS1 Workshop - Lab2
Search for User with search pattern as *tax*. A List of users are displayed and delete icon is grayed out indicating logged in user is
not allowed for this operation. Even the option to delete from Actions Menu is also grayed out.
74
OIM 11g PS1 Workshop - Lab2
75
OIM 11g PS1 Workshop - Lab2
While logged in as acmehelpdesk1, from Welcome page of Identity Administration select Advanced Search. Put 2 search criteria
with Last Name. Last Name Begins With Fin and Last Name Begins With Tax. A list of User’s are displayed.
Select all displayed users from above and click Action -> Disable.
76
OIM 11g PS1 Workshop - Lab2
Click Yes.
To confirm this, perform same search again and now you can see Identity Status of all users is displayed as Disabled.
77
OIM 11g PS1 Workshop - Lab2
Note: Before moving ahead. Repeat the above process to Enable back all users that were disabled.
78
OIM 11g PS1 Workshop - Lab2
Bulk Modify User Profile attribute (Previous Job History Verified) – allowed
While logged in as acmehelpdesk1, from Welcome page of Identity Administration select Advanced Search. Put search criteria Last
Name begins with Tax and Last Name Begins with Fin. A list of users is displayed. Select all the uses and click Bulk Modify.
Bulk Modify tab opens up. Check attribute: Previous Job History Verified and click Save. A message confirming successful
79
OIM 11g PS1 Workshop - Lab2
Follow the above process, this time try changing some other attribute, let’s say Start Date and you will be presented with a message
80
OIM 11g PS1 Workshop - Lab2
81
OIM 11g PS1 Workshop - Lab2
Create a User in Mergers & Acquisitions (auto-generation of User Login from firstname & lastname).
Create a User with First Name ‚John‛, Last Name ‚Roe‛, Organization ‚ACME Mergers and Acquisition‛, User Type
82
OIM 11g PS1 Workshop - Lab2
83
OIM 11g PS1 Workshop - Lab2
84
OIM 11g PS1 Workshop - Lab2
Create a User in Mergers & Acquisitions (auto-generation of User Login from email)
Create a User with First Name ‚Jane‛, Last Name ‚Roe‛, Organization ‚ACME Mergers and Acquisition‛, User Type ‚Employee‛
and Email as your own email id (Example: Nalin Sardana - Oracle employee, practicing this lab will put his email as
Nalin.Sardana@Oracle.COM). Only then you can see the result of the configuration as an actual mail arriving at your inbox. Also we
use this user for reset password in later lab, so it is important the new password arrives to accessible email address.
85
OIM 11g PS1 Workshop - Lab2
86
OIM 11g PS1 Workshop - Lab2
User created with your User Login (specified as email) and not from Name, which is Jane Roe
Check your mailbox for mail with temporary password for your account Jane Roe.
87
OIM 11g PS1 Workshop - Lab2
Reset end-user password by HelpDesk (compliance of password policy, password delivery by email and end-user is forced to
Search for User Jane. Open the User and click Reset Password. Reset Password window appears. Select Radio button Manually
change the Password and enter Abcd1234 as New Password. Check E-mail the new password to the user and Click Reset
Password.
88
OIM 11g PS1 Workshop - Lab2
Notice Password Policy (default) is displayed. Password must confirm to this policy. Also password can be auto generated by
89
OIM 11g PS1 Workshop - Lab2
Check your mailbox for new password. Logout and Login with your User Login Nalin.Sardana@oracle.com with password
Abcd1234. You will be prompted to change the password and answer security questions.
90
OIM 11g PS1 Workshop - Lab2
Checkpoint
In last section we completed configuration for HelpDesk User authorizations. In this section, we logged in as one of the HelpDesk
admin and performed various actions authorized for HelpDesk like: Create User, Search User, Update User Status, Bulk Modify
User Details and Reset User Password. We also saw what HelpDesk was not authorized to do like: Delete User and Create User in
Org’s helpDesk is not authorized for. Apart from this we saw how user Login is created as per User Id generation Policy. We also
Purpose
The purpose of this section is to configure Managers Authorization for administration of their direct reports. We will create a 3-level
hierarchy of users. We will also create a Senior Manager role for 2nd level managers who can do specific searches, which first level
At the end of this step, you will have the following organization structure:
91
OIM 11g PS1 Workshop - Lab2
92
OIM 11g PS1 Workshop - Lab2
Steps
93
OIM 11g PS1 Workshop - Lab2
94
OIM 11g PS1 Workshop - Lab2
95
OIM 11g PS1 Workshop - Lab2
96
OIM 11g PS1 Workshop - Lab2
97
OIM 11g PS1 Workshop - Lab2
Create ‘ACME SeniorManagers’ Role and assign the role to user ‘acmetaxdir’. Create Authorization Policy ‘Search PostGrad’ and
assign it to ‘ACME SeniorManagers’ Role. Configure Search to let ‘Post Graduate’ field be searchable.
In the Search Users, let the field empty and click the arrow icon.
Then select ‘Acme Taxation Director’ from the left list Available.
98
OIM 11g PS1 Workshop - Lab2
Click Save
99
OIM 11g PS1 Workshop - Lab2
Create ‘Search PostGrad’ Auth Policy with Policy Name ‘Search PostGrad’, Description ‘Auth Policy given to ACME Senior
Managers to search postgraduates in their own organizations’, Entity Name ‘User Management’. Give it Permissions to ‘Search
User’ and ‘View User Details’ (select only Post Graduate attribute). Specify Data Constraints as ‘ACME CAPITAL’ (Hierarchy
Aware). In Assignment specify Assign by Role as ‘ACME Senior Managers’ and Security Settings ‘Assignee must be a member
100
OIM 11g PS1 Workshop - Lab2
101
OIM 11g PS1 Workshop - Lab2
In the Welcome tab, under Advanced page, click User Configuration. On the left pane from the Actions menu, select Search
Configuration.
102
OIM 11g PS1 Workshop - Lab2
The User Search Configuration page is displayed. Scroll to Advanced Search: Search Attributes and select the attribute ‘Post
Graduate’ that you want to make available for advanced search. Click the Move buttons to add the attribute for advanced search.
Click Save.
103
OIM 11g PS1 Workshop - Lab2
Checkpoint
This finished the configuration of Managers Authorization for administration of their direct reports.
104
OIM 11g PS1 Workshop - Lab2
Purpose
After configuring the Managers Authorization, we will now login as managers and perform the administration of direct reports. We
will first login as first level manager (acmetaxmgr) and then do some specific administration as second level manager (acmetaxdir).
105
OIM 11g PS1 Workshop - Lab2
Steps
Only person reporting to Acme Taxation Manager is Acme Taxation Executive, who is displayed. No other person in Acme
106
OIM 11g PS1 Workshop - Lab2
107
OIM 11g PS1 Workshop - Lab2
Enter * as search filter in Display Name field and click Search. Acme Taxation Executive is the only report and hence the sea rch
returns only one User. Note: Screens shows Contains but actually it should be Begins With
108
OIM 11g PS1 Workshop - Lab2
Click on the Acme Taxation Executive User to display the User profile. Notice a few attributes from Basic User Information an d
109
OIM 11g PS1 Workshop - Lab2
110
OIM 11g PS1 Workshop - Lab2
From Advanced Search window, click Add Fields and select Post Graduate. This will add Post Graduate field as search filter.
111
OIM 11g PS1 Workshop - Lab2
Enter ‘Post Graduate’ as search filter and click Search. An error message is popped up telling that you do not have the search
In later version of product you may see you can't add 'Post Graduate' for search as it is not allowed.
112
OIM 11g PS1 Workshop - Lab2
Acme Taxation Executive reports to Acme Taxation Manager who in turn reports to Acme Taxation Director. A search of User will
113
OIM 11g PS1 Workshop - Lab2
Using the procedure listed in previous step, add Post Graduate as search filter. Search for Users who are not Post Graduates: Post
Graduate Equals false. A list of users are displayed who are not Post Graduated.
114
OIM 11g PS1 Workshop - Lab2
Checkpoint
In this section we performed various administration functions carried out by Managers for their direct reports.
115
OIM 11g PS1 Workshop - Lab2
Purpose
In this section we will do configuration for modification of User Self Profile. We will create Approval policies, as profile attributes
Steps
Create First Approval Policy
The first approval policy will define which profile attributes end users can modify.
2.6.1. Login as xelsysadm. Create Approval Policies for request raised as a result of modifying attributes by a user on their profile.
116
OIM 11g PS1 Workshop - Lab2
117
OIM 11g PS1 Workshop - Lab2
Click Next.
118
OIM 11g PS1 Workshop - Lab2
Set Approval Rule and Component window appears. Set Rule Name as: ‘SSRUserProfileModify_RL_Rule’ and click Add
Simple Rule.
119
OIM 11g PS1 Workshop - Lab2
Entity Request
Attribute Request Type
Condition Equals
120
OIM 11g PS1 Workshop - Lab2
.
Click Save. Click Next.
121
OIM 11g PS1 Workshop - Lab2
Click Next.
Set Approval Rule and Component window appears. Set: Rule Name as ‘SSRUserProfileModify_OL_Rule’ and click Add
Simple Rule
Entity Request
Attribute Request Type
Condition Equals
Value Modify Self Profile
Parent Rule Container Approval Rule
Click Save.
Click Next.
122
OIM 11g PS1 Workshop - Lab2
Checkpoint
In this section we did configuration for modification of User Self Profile by creating Approval policies. We created Request Level
and Operation Level approval policies, which will be used for approval of request generated by end user upon modifying their own
profile.
Purpose
In this section we will login as end user and demonstrate the modification of User Self profile.
Steps
2.7.1. Login as acmetaxexec (Acme Taxation Executive)
123
OIM 11g PS1 Workshop - Lab2
Click Profile -> My Profile. Edit Middle Name, Email and Telephone Number. Click Apply
124
OIM 11g PS1 Workshop - Lab2
Notice a request is generated and none of the attributes modified in previous step are modified yet.
125
OIM 11g PS1 Workshop - Lab2
Click Requests -> My Requests and you will see that the generated request is in Status Obtaining Operation Approval. You can
126
OIM 11g PS1 Workshop - Lab2
A new tab Request Detail: ID opens up. Click on Approval Tasks to see it is assigned to acmetaxmgr
127
OIM 11g PS1 Workshop - Lab2
Logout and Login as acmetaxmgr (Acme Tax Manager) to view/approve the request
128
OIM 11g PS1 Workshop - Lab2
Click Tasks -> Search Approvals Tasks. You will notice Request form previous step is waiting here for approval. Click Open
Task Detail
129
OIM 11g PS1 Workshop - Lab2
130
OIM 11g PS1 Workshop - Lab2
Task Details tab opens up. Click on View Details from Users tab to view more details
131
OIM 11g PS1 Workshop - Lab2
Verify the end user profile data user has requested for change
After checking the details close the popup dialog box and click Approve Task. A dialog box confirming approval of task
appears. Click OK
Click Profile -> My Profile and verify that the changes made are reflected in the profile now.
132
OIM 11g PS1 Workshop - Lab2
Checkpoint
In this section we saw the modification of end-user Self-Profile. A request was raised upon changing attributes. Upon approval by
the users manager, attributes were modified and reflected in user profile.
133
OIM 11g PS1 Workshop - Lab2
Conclusion
In this lab, you accomplished the following:
Extending/Customizing User Create-Update-Delete events by adding custom java code. This can be achieved by adding
pre-process, validation and post-process orchestration handlers on the OIM User entity
134