Coming Soon – Oracle Fusion Applications 11.1.4 installation step by step guide

Dear all,

We are glad to inform that we are in process of publishing a very comprehensive step by step guide for Oracle Fusion Applications 11.1.4 installation on Solaris SPARC x64.  We are going to include all possible issues you may encounter during the installation with recommended and exclusive shortcut workarounds with list of bugs.

Have a nice day !

ORA Training admin

Fix for “We were unable to return you to the page you were viewing” error in IE

Many users face issue running Oracle forms on Microsoft Internet Explorer 7 or 8 (IE7 or IE8) which causes the page to redirect to following url with “Website restore error” title

res://ieframe.dll/acr_error.htm#,http://<server>:<port>/forms/frmservlet?config=<config>

It displays following error.

We were unable to return you to the page you were viewing.
Internet Explorer has stopped trying to restore this website. It appears that the website continues to have a problem.

Solution-1:

1) Take backup of jvm.dll located at c:Program FilesOracleJInitiator 1.3.1.xbinhotspot directory. (Depending on JInitiator version you have)
2) Copy jvm.dll from C:Program FilesJavajre1.6.0_07binclient (or whichever highest version of jre you have) to c:Program FilesOracleJInitiator 1.3.1.xbinhotspot
3) Clear browser cache and also Oracle Jar cache (Remove all files from c:documents and settings<username>Oralce Jar cache)
4) Close all the browsers and restart

Solution-2: [ This solution will ALWAYS work 🙂 ]

In case if you are unable to find the jvm.dll in that location or if the above solution didn’t work for you, you can download the working jvm.dll from this link (Windows XP) or this link (Windows 7+).

Enjoy !! The issue should have been resolved now !

Aug 2nd, 2012 | Posted by Tushar Thakker | Filed under Applications Performance Tuning, Browser issues, Oracle, Oracle Applications, Windows

Integrate Oracle Identity Manager (OIM) and Oracle Access Manager (OAM)

Oracle Fusion Applications Installation: Integrate Oracle Identity Manager (OIM) and Oracle Access Manager (OAM)

Previous: Configuring Oracle Identity and Access Management components 

Important Note: This is OLD guide for old version 11.1.1.5. Please follow instructions at http://www.oratraining.com/blog/2012/12/oracle-fusion-applications-installation-step-by-step-guide-11-1-5/ for latest guide for current version i.e. 11.1.5

 

Preparing OAM for integration

Create a file named config_oam2.props as follows.

[oracle@fusion bin]$ more config_oam2.props

WLSHOST: fusion

WLSPORT: 7001

WLSADMIN: weblogic

WLSPASSWD: Oracle123

IDSTORE_HOST: fusion

IDSTORE_PORT: 3060

IDSTORE_BINDDN: cn=orcladmin

IDSTORE_USERNAMEATTRIBUTE: cn

IDSTORE_LOGINATTRIBUTE: uid

IDSTORE_USERSEARCHBASE: cn=Users,dc=localdomain

IDSTORE_SEARCHBASE: dc=localdomain

IDSTORE_GROUPSEARCHBASE: cn=Groups,dc=localdomain

IDSTORE_OAMSOFTWAREUSER: oamLDAP

IDSTORE_OAMADMINUSER: oamadmin

PRIMARY_OAM_SERVERS: fusion:5575

WEBGATE_TYPE: ohsWebgate10g

ACCESS_GATE_ID: Webgate_IDM

OAM11G_IDM_DOMAIN_OHS_HOST:false

OAM11G_IDM_DOMAIN_OHS_PORT:7777

OAM11G_IDM_DOMAIN_OHS_PROTOCOL:http

OAM11G_WG_DENY_ON_NOT_PROTECTED: false

OAM_TRANSFER_MODE: open

OAM11G_OAM_SERVER_TRANSFER_MODE:open

OAM11G_IDM_DOMAIN_LOGOUT_URLS: /console/jsp/common/logout.jsp,/em/targetauth/emaslogout.jsp

OAM11G_OIM_WEBGATE_PASSWD: Oracle123

OAM11G_SERVER_LOGIN_ATTRIBUTE: uid

COOKIE_DOMAIN: .localdomain

OAM11G_IDSTORE_ROLE_SECURITY_ADMIN: OAMAdministrators

OAM11G_SSO_ONLY_FLAG: true

OAM11G_OIM_INTEGRATION_REQ: true

OAM11G_IMPERSONATION_FLAG:true

OAM11G_SERVER_LBR_HOST:fusion

OAM11G_SERVER_LBR_PORT:7777

OAM11G_SERVER_LBR_PROTOCOL:http

COOKIE_EXPIRY_INTERVAL: 120

OAM11G_OIM_OHS_URL:http://fusion:7777/

[oracle@fusion bin]$ export ORACLE_HOME=/app/fusion/fmw/iam

[oracle@fusion bin]$ export IDM_HOME=/app/fusion/fmw/idm

[oracle@fusion bin]$ export MW_HOME=/app/fusion/fmw

[oracle@fusion bin]$ export JAVA_HOME=/app/fusion/jdk6

 

[oracle@fusion bin]$ cd /app/fusion/fmw/iam/idmtools/bin/

 

[oracle@fusion bin]$ ./idmConfigTool.sh -configOAM input_file=config_oam2.props

Enter ID Store Bind DN password :

Enter User Password for IDSTORE_PWD_OAMSOFTWAREUSER:

Confirm User Password for IDSTORE_PWD_OAMSOFTWAREUSER:

Enter User Password for IDSTORE_PWD_OAMADMINUSER:

Confirm User Password for IDSTORE_PWD_OAMADMINUSER:

The tool has completed its operation. Details have been logged to automation.log

 

Restart Weblogic Admin Server.

Create another file named user.props as follows.

[oracle@fusion bin]$ more user.props

IDSTORE_HOST: fusion

IDSTORE_PORT: 3060

IDSTORE_ADMIN_USER: cn=orcladmin

IDSTORE_USERSEARCHBASE: cn=Users,dc=localdomain

IDSTORE_GROUPSEARCHBASE: cn=Groups,dc=localdomain

PASSWORD_EXPIRY_PERIOD: 7300

[oracle@fusion bin]$ ./idmConfigTool.sh -upgradeLDAPUsersForSSO input_file=user.props

Enter Directory Type[OID]: OID

Finished parsing LDAP

LDAP Users Upgraded.

 

Remove Security Providers

If you have already configured signle sign-on for Administration Console then you must delete the security providers you created in that section. Otherwise this can be skipped since these providers will not be present. Still make sure that these do not exist.

1. Log in to the WebLogic Administration Console at:

http://fusion:7777/console

2. Click Security Realms from the Domain structure menu.

3. Click Lock and Edit in the Change Center.

4. Click myrealm.

5. Select the Providers tab.

Select the following providers:

OVDAuthenticator

OIDAuthenticator

OAMIDAssertor

6. Click Delete.

7. Click Yes to confirm deletion.

8. Restart the administration server and all managed servers if you had to delete the above otherwise you can continue to next step.

 

Integrate OIM and OAM

Create a new file named oimitg.props as follows.

[oracle@fusion bin]$ more oimitg.props

LOGINURI: /${app.context}/adfAuthentication

LOGOUTURI: /oamsso/logout.html

AUTOLOGINURI: None

ACCESS_SERVER_HOST: fusion

ACCESS_SERVER_PORT: 5575

ACCESS_GATE_ID: Webgate_IDM

COOKIE_DOMAIN: .localdomain

COOKIE_EXPIRY_INTERVAL: 120

OAM_TRANSFER_MODE: open

WEBGATE_TYPE: ohsWebgate10g

SSO_ENABLED_FLAG: true

IDSTORE_PORT: 3060

IDSTORE_HOST: fusion

IDSTORE_DIRECTORYTYPE: OID

IDSTORE_ADMIN_USER: cn=oamLDAP,cn=Users,dc=localdomain

IDSTORE_USERSEARCHBASE: cn=Users,dc=localdomain

IDSTORE_GROUPSEARCHBASE: cn=Groups,dc=localdomain

MDS_DB_URL: jdbc:oracle:thin:@fusion:1521:fusiondb

MDS_DB_SCHEMA_USERNAME: dev_mds

WLSHOST: fusion

WLSPORT: 7001

WLSADMIN: weblogic

DOMAIN_NAME: IDMDomain

OIM_MANAGED_SERVER_NAME: wls_oim1

DOMAIN_LOCATION: /app/fusion/admin/IDMDomain/aserver/IDMDomain

 

[oracle@fusion bin]$ ./idmConfigTool.sh -configOIM input_file=oimitg.props

Enter sso access gate password :

Enter mds db schema password :

Enter idstore admin password :

Enter admin server user password :

Changes Activated. Edit session ended.

Connection closed sucessfully

The tool has completed its operation. Details have been logged to automation.log

Have a look at the automation.log if there are any errors. There should not be any.

Restart Admin server and all managed servers.

 

Manually Creating CSF Keys

1. Log into Oracle Enterprise Manager Fusion Middleware Control at:

http://fusion/em

2. Navigate to FARM_IDMDomain – Weblogic Domain

3. Click IDMDomain.

4. When the summary screen is displayed, select Security – Credentials from the list.

5. Click the credential key oim and click Create Key. Create the following keys:

 

SSOAccessKey

Field Value

Map oim

Key SSOAccessKey

Type Password

User Name SSOAccessKey

Password Value of OAM11G_OIM_WEBGATE_PASSWD

Description OAMAccessGatePassword

 

 

Before validating integration we must do the following.

 

Assigning IDM Administrators Group to Weblogic Administration Groups

 

 

1. Log in to the WebLogic Administration Server Console.

2. In the left pane of the console, click Security Realms.

3. On the Summary of Security Realms page, click myrealm under the Realms table.

4. On the Settings page for myrealm, click the Roles & Policies tab.

5. On the Realm Roles page, expand the Global Roles entry under the Roles table.

This brings up the entry for Roles. Click the Roles link to go to the Global Roles page.

6. On the Global Roles page, click the Admin role to go to the Edit Global Role page:

a. On the Edit Global Roles page, under the Role Conditions table, click the Add Conditions button.

b. On the Choose a Predicate page, select Group from the drop down list for predicates and click Next.

c. On the Edit Arguments Page, Specify IDM Administrators in the Group Argument field and click Add.

7. Click Finish to return to the Edit Global Rule page.

8. The Role Conditions table now shows the IDM Administrators Group as an entry.

9. Click Save to finish adding the Admin role to the IDM Administrators Group.

10. Validate that the changes were successful by bringing up the WebLogic Administration Server Console using a web browser. Log in using the credentials for the weblogic_idm user.

 

Important Note: If you skip the above step then you may get following error while accessing fusion:7777/em with weblogic_idm user

“User is not authorized to login to WebLogic Domain. User should be part of one or more Administrative roles to be able to login.”

 

 

Install webgate

 

[oracle@fusion webgate]$ cd /mnt/fusion/installers/webgate

./Oracle_Access_Manager10_1_4_3_0_linux64_OHS11g_WebGate –gui

[Make sure you supply -gui argument]

Welcome screen appears. Click Next

Enter Username as “oracle” and group “oinstall“. Click Next

 

Enter the values as above and click Next

 

Review the above information and click Next

Supply the values as above but before clicking Next, open a new terminal window and execute following steps to create symbolic links in the desired directory.

[oracle@fusion oam_lib]$ mkdir /app/fusion/oam_lib

[oracle@fusion oam_lib]$ ln -s /usr/lib64/libstdc++.so.5 /app/fusion/oam_lib/libstdc++.so.5

[oracle@fusion oam_lib]$ ln -s /lib64/libgcc_s.so.1 /app/fusion/oam_lib/libgcc_s.so.1

Once done, click Next

 

The installation will finish and will automatically take you to the next screen.

Select Open Mode and click Next

 

 

Enter the values as follows and click Next.

WebGate ID: Webgate_IDM

Password: Oracle123 (or any desired password)

Access Server ID: wls_oam1

Host name: fusion

Port number (proxy port): 5575

 

Select Yes to proceed with automatic update of httpd.conf with webgate parameters. Click Next

Specify the httpd.conf location from the OHS instance directory. You can take a backup of this file in another terminal window if you want. Click Next

 

Click Next

Click Next

Click Next

Click Next

Click Finish to complete the installation.

Copy the following files to Webgate.

[oracle@fusion bin]$ cp -p /app/fusion/fmw/oam/webgate/access/oblix/lib/ObAccessClient.xml /app/fusion/fmw/oam/webgate/access/oblix/lib/ObAccessClient.xml.bak

[oracle@fusion bin]$ cp -p /app/fusion/admin/IDMDomain/aserver/IDMDomain/output/Webgate_IDM/ObAccessClient.xml /app/fusion/fmw/oam/webgate/access/oblix/lib/

[oracle@fusion Webgate_IDM]$ cd /app/fusion/admin/IDMDomain/aserver/IDMDomain/output/Webgate_IDM

[oracle@fusion Webgate_IDM]$ cp logout.html /app/fusion/fmw/oam/webgate/access/oamsso/

 

Comment out following lines from /app/fusion/admin/ohs_inst/config/OHS/ohs1/httpd.conf

#<LocationMatch “/oamsso/*”>

#Satisfy any

#</LocationMatch>

 

Restart HTTP server

This concludes the integration between OIM and OAM.

Next: Creating a New Provisioning Plan

Installing Oracle Fusion Applications – steps

  1. Installing Fusion Applications Provisioning Framework
  2. Installing Oracle 11g Database (Applications Transactional Database)
  3. Running Oracle Fusion Applications Repository Creation Utility (Applications RCU)
  4. Creating another database for Oracle  Identity Management Infrastructure (optional)
  5. Running Repository Creation Utility (RCU) for Oracle Identity Management components
  6. Installing Oracle Identity and Access Management Components
  7. Configuring Oracle Identity and Access Management components
  8. Integrate Oracle Identity Manager (OIM) and Oracle Access Manager (OAM)
  9. Creating a New Provisioning Plan
  10. Provisioning an Applications Environment
Apr 1st, 2012 | Posted by Tushar Thakker | Filed under Oracle