Step 1:
Create a user in OID using OIDDAS . For e.g “admin_user”.
Step 2:
Create the privilege group by name “ConsolePrivGroup” in OID. Make this group available as a role in OID using OIDDAS
Step 3:
Add the user created in Step 1 to the role created in Step 2.
Step 4:
Login to the SOA Suite 10.1.3.1 Midtier & edit the following file
$ORACLE_HOME/j2ee/oc4j_soa/application-deployments/orabpel/console/orionweb.xml
Add the following lines inside <orion-web-app>
<security-role-mapping name=" ConsolePrivGroupRole">
<group name=" ConsolePrivGroup" />
</security-role-mapping>
Step 5:
Edit $ORACLE_HOME/j2ee/oc4j_soa/applications/orabpel/console/WEB-INF/web.xml . Make the following changes, Add <auth-constraint> inside <security-constraint> as shown below
a) <security-constraint>
... <auth-constraint>
<role-name>
ConsolePrivGroup
</role-name>
</auth-constraint>
</security-constraint>
b) Add <login-config> inside <web-app>
<login-config>
<auth-method>
BASIC
</auth-method>
<realm-name>
DEFAULT_REALM_NAME
</realm-name>
</login-config>
c)Provide the <security-role> inside <web-app> as shown below
<security-role>
<description>
BPEL PM User
</description>
<role-name>
ConsolePrivGroup
</role-name>
</security-role>
No comments:
Post a Comment