In this 5-minute tech tip video, We are going to look at Oracle Access Manager (OAM) Architecture.
Oracle Access Manager is a part of Oracle Identity & Access Manager Suite and a recommended Single Sign-on (SSO) solution for Web Applications .
As shown in Video, Oracle Access Manager (OAM) is consists of .
- Application Tier: In this tier, you have OAM and the Application that you want to protect via OAM. Oracle Access Manager is deployed on a Weblogic Domain. The domain consists of an Admin Server and Managed Server. On Admin Server, you have Access Manager Console deployed that is a Graphical User Interface (GUI) to manage Oracle Access Manager. OAM Managed Server is where actual authentication and SSO happens.
- DB tier: In this tier, you have Database and LDAP Server. The database is used to store metadata and all the policies which are nothing but the rules governing how a particular URL is protected. Then you have User data store which is LDAP Server something similar to Microsoft Active Directory (AD) or Oracle Internet Directory (OID) or Oracle Unified Directory (OUD) or third party LDAP server. In this LDAP server, you store Users and groups.
- Web Tier: In this tier, you have the web server. You put a web server in front of the application that you want to protect via OAM. On this Web Server, you put a policy enforcement point or a gatekeeper or Policy Enforcement Point (PEP) called Webgate.
Any request that comes to the webserver, the Webgate will collect the URL, take it to the OAM and ask OAM what login page user should be redirected to. Then OAM will submit collected userid/password to the LDAP Server (OID/OUD or AD). LDAP server will validate the username and password and on successful authentication, a session will be created in OAM. Then OAM will return to the
LDAP server will validate the username and password and on successful authentication, a session will be created in OAM. Then OAM will return request back to the web Server with an authenticated user ID. The WebServer will forward that request to the application with authenticated user id and the application will create its own session related to that user. After that application can be accessed by the user as long as SSO cookie is valid or someone has not terminated User session from Oracle Access Manager or the user has not Logged out from the application itself.
So this is all in nutshell about Oracle Access Manager Architecture.
We Cover this in Detail in our Oracle Access Manager & Oracle Identity Manager Administration Training also we cover Architecture, Install, Configure, Integrate, HA, DR, Troubleshooting etc in training.
If you are looking for a Job change or Preparing for Your Job as an IDM Expert? Download Your FREE Copy of Interview Questions guide for Oracle Identity Manager and Oracle Access Manager
Related Posts
- Oracle Access Manager 12c (12.2.1.3.0): Download & Installation: Part I Click Here
- Oracle Access Manager 12C: RCU & Configure Domain (12.2.1.3.0) [Part2] Click Here
- Overview of Oracle Identity & Access Management Products (OAM, OIM, OID, OUD, OES, OIF….) Click Here
- Documentation & Download of Oracle IDM 12cPS3 here
- IDM 12cPS3 installation and Configuration here.
- Download IDM Software and create Schema click here
- Console in OAM: OAM Console, WebLogic & EM
- OID Consoles Overview: ODSM, Weblogic & EM
If You’ve not looked at Our Oracle Identity & Access Management Workshop & want to check what we cover in the Workshop then check here & Step By Step Hands-On Activity Guide we cover in Training.
Next Task For You
If you are looking for commonly asked interview questions for Oracle Access Manager then just click here and get that in your inbox.
Join our free live webinar to polish your learnings and basics for OAM.
Did You Find this Video useful?
or
What more topics you want to see as part of 5 Minute Tech Tips on Oracle Access Manager?
Leave a Comment.
The post [Video]: Oracle Access Manager (OAM) Architecture (5 Min Tech Tip) appeared first on Oracle Trainings.