OPSS Configuration
OPSS Configuration
OPSS Configuration
file based store is not recommended, when using XML policy stores, the changes
made on Managed Servers are not propagated to the Administration Server
unless they use the same domain home. The Oracle FMW SOA Suite Enterprise
Deployment topology uses different domain homes for the Administration Server
and the Managed Server, thus use LDAP or Oracle DB store for integrity and
consistency.
There is a current bug where the system-jazn-data.xml is overwritten in some
cases. If a customer is using this in production, again the customer is required to
restore this from an backed up original file and need to make hand edits to this
file for policy changes.
When you restart the managed server few roles can be missed some times from
XML file
It might be a better idea to move to using the database as a policy store right
after installation of a cluster by using the reassociateSecurityStore command
below. This way all application specific policy grants can be made afresh and
stored in the database.
Understanding concepts
jps-config.xml
This is the OPSS file that describes all its services. It is located through the
Doracle.security.jps.config system property, which is set in setDomainEnv.sh script
in a standard JRF (Java Required Files) domain. By the default, the property points to
${DOMAIN_HOME}/config/fmwconfig/jps-config.xml and it is defined in the variable
EXTRA_JAVA_PROPERTIES. It is NOT a good idea to change it, since jps-config.xml
holds several relative references to other files.
When a re-association operation is performed, configuration changes are made to
jps-config.xml. In many cases, a corrupted jps-config.xml can bring your domain to
a non startable state. Therefore, be very diligent and careful when making changes
to it. Do NOT perform manual changes. Instead, use either Enterprise Manager or
wlst.
System-jazn-data.xml
This consists of application users, groups and roles of a deployed application in a
domain for providing the security.
The Policy Store
The policy store holds all security policies used by applications deployed on a Fusion
Middleware instance. These include grants given to principals (users, groups,
application roles) as well as to code.
The Credential Store
The credential store securely holds credentials to be used by Fusion Middleware
applications when connecting to other systems. OWSM agents, for instance, use the
credential store service when a WSS username token needs to be attached to an
outgoing SOAP message. Another heavy user is ADF (Application Development
Framework), who uses it to store credentials required to connect to external
systems.
cwallet.sso
This file keeps credentials used by the application, credentials and identities are not
the same thing. cwallet.sso is encrypted and you cannot browse it or explicitly edit
it via JDeveloper. At design-time, different components make use of cwallet.sso and
are responsible for creating the necessary credentials in it.
jps-config.xml
system-jazn-data.xml
bootstrap/cwallet.sso
As a precaution, you should also back up the boot.properties file for the
Administration Server for the domain.
Create OPSS schema using RCU:
Create OPSS schema using RCU or ensure OPSS schema exists, in this process you
will create a OPSS user with OPSS schema in Database, Give these OPSS user
details while creating OPSS datasource in next step
STEP1:
STEP 2:
STEP 3:
Give Host Name, Port Service Name, username, Password (here the details are
given for local system). Please check with your environment
Hint: Collect the URL details from already created datasource from connection
pool tab .
STEP 4:
STEP 5:
STEP 6:
STEP 7:
STEP 8:
STEP 9:
STEP 10:
STEP 11:
STEP 12:
2) Give the Name, JNDI Name, and Database Type to for new JDBC Data Source as
shown below pic
6) Now test the database connection details through Test Configuration button, if
all details are correct than message Connection test succeeded will be
displayed, if not an error will be thrown
7) In Select Targets Screen, Ensure the data source is targeted to the Admin Server
and all Managed Servers which have wsm-pm application deployed to them.
8) And click the button activate the changes to save the configured steps
Now click on Change Store Type button to change file based to DB-Based
Select store type as Oracle Database and DataSource JNDI Name from created
OPSS datasource previously and click OK
After creating Security Store successfully, the below message will appear
Debugging OPSS
If you encounter any issues doing the above, OPSS debugging can enabled by
adding the following to the SOA Managed Server and Admin Server startup scripts:
-Djps.auth.debug.enable=true
-Djps.auth.debug.enable.verbose=true
The debug information is printed in the Admin and Managed server diagnostic logs
as usual.