{"id":628,"date":"2012-02-05T11:24:47","date_gmt":"2012-02-05T05:54:47","guid":{"rendered":"http:\/\/www.oratraining.com\/blog\/?p=628"},"modified":"2013-01-07T07:49:01","modified_gmt":"2013-01-07T07:49:01","slug":"preparing-identity-and-policy-stores","status":"publish","type":"post","link":"https:\/\/www.oratraining.com\/blog\/2012\/02\/preparing-identity-and-policy-stores\/","title":{"rendered":"Preparing Identity and Policy Stores"},"content":{"rendered":"<p><span style=\"color: #404040; font-size: 13pt;\"><span style=\"text-decoration: underline;\">Oracle Fusion Applications Installation<\/span><strong>: Preparing Identity and Policy Stores<br \/>\n<\/strong><\/span><\/p>\n<p>Previous:\u00a0<strong><a title=\"Configuring Oracle Identity and Access Management components\" href=\"http:\/\/www.oratraining.com\/blog\/2012\/02\/configuring-oracle-identity-and-access-management-components\/\">Configuring Oracle Identity and Access Management components<\/a><\/strong><\/p>\n<h3><span style=\"color: #ff0000;\">Important Note: This is OLD guide for old version 11.1.1.5. Please follow instructions at\u00a0<\/span><a href=\"http:\/\/www.oratraining.com\/blog\/2012\/12\/oracle-fusion-applications-installation-step-by-step-guide-11-1-5\/\">http:\/\/www.oratraining.com\/blog\/2012\/12\/oracle-fusion-applications-installation-step-by-step-guide-11-1-5\/<\/a>\u00a0<span style=\"color: #ff0000;\">for latest guide for current version i.e. 11.1.5<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p>Now we will prepare the Identity and Policy stores which will create the necessary users, groups etc. This will also generate a file called idmDomainConfig.param which we need to specify while creating a provisioning plan. This will automatically populate some of the required fields during the provisioning plan creation.<\/p>\n<blockquote><p>Important Note: Please make sure to run all these commands from same location since these commands will create\/append into a file named idmDomainConfig.param in same directory. Running these commands from same directory will ensure that all the contents is appended into single file.<\/p><\/blockquote>\n<p>Change the directory to <strong>&lt;IAM_ORACLE_HOME&gt;\/idmtools\/bin. <\/strong>And\u00a0export the required environment variables.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <strong><span style=\"color: red;\">cd \/app\/fusion\/bea_default\/Oracle_IAM\/idmtools\/bin<\/span><br \/>\n<\/strong><\/p>\n<p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>export IDM_HOME=\/app\/fusion\/bea_default\/Oracle_IDM1<\/strong><\/span><\/p>\n<p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>export ORACLE_HOME=\/app\/fusion\/bea_default\/Oracle_IAM<\/strong><br \/>\n<\/span><\/p>\n<p>[oracle@fusion bin]$ <strong><span style=\"color: red;\">export MW_HOME=\/app\/fusion\/bea_default<\/span><br \/>\n<\/strong><\/p>\n<p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>export JAVA_HOME=\/app\/fusion\/jdk6<\/strong><\/span><\/p><\/blockquote>\n<p>Now create a file named <strong>policystore.props<\/strong> with following contents.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>more policystore.props <\/strong><\/span><\/p>\n<p>POLICYSTORE_HOST : fusion<\/p>\n<p>POLICYSTORE_PORT : 3060<\/p>\n<p>POLICYSTORE_BINDDN: cn=orcladmin<\/p>\n<p>POLICYSTORE_READONLYUSER: PolicyROUser<\/p>\n<p>POLICYSTORE_READWRITEUSER: PolicyRWUser<\/p>\n<p>POLICYSTORE_SEARCHBASE: dc=localdomain<\/p>\n<p>POLICYSTORE_CONTAINER: cn=jpsroot<\/p><\/blockquote>\n<p>Now run <strong>idmConfigTool.sh<\/strong> to configure the Policy store based on the above input file. Enter a password of choice whenever prompted. We will stick to &#8220;oracle123&#8221; for now.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>.\/idmConfigTool.sh -configPolicyStore input_file=policystore.props<\/strong><\/span><\/p>\n<p><strong>Enter Policy Store Bind DN password :<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p><strong>Enter User Password for PolicyROUser:<br \/>\n<\/strong><\/p>\n<p><strong>Confirm User Password for PolicyROUser:<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p><strong>Enter User Password for PolicyRWUser:<br \/>\n<\/strong><\/p>\n<p><strong>Confirm User Password for PolicyRWUser:<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p>The tool has completed its operation. Details have been logged to automation.log<\/p><\/blockquote>\n<p>Whenever you run this tool, it will append log to automation.log in same directory. You can check the same as follows.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>ls -ltr<\/strong><\/span><\/p>\n<p>total 60<\/p>\n<p>-rwxr-x&#8212; 1 oracle oinstall 1169 Dec 2 2010 appidtool.sh<\/p>\n<p>-rwxr-x&#8212; 1 oracle oinstall 1139 Dec 2 2010 appidtool.bat<\/p>\n<p>-rwxr-x&#8212; 1 oracle oinstall 1593 Mar 28 2011 orclTenantManager.sh<\/p>\n<p>-rwxr-x&#8212; 1 oracle oinstall 2287 May 2 2011 orclTenantManager.bat<\/p>\n<p>-rwxr-x&#8212; 1 oracle oinstall 3005 May 3 2011 idmConfigTool.sh<\/p>\n<p>-rwxr-x&#8212; 1 oracle oinstall 3096 May 3 2011 idmConfigTool.bat<\/p>\n<p>-rw-r&#8211;r&#8211; 1 oracle oinstall 235 Jan 25 21:21 policystore.props<\/p>\n<p><strong>-rw-r&#8212;&#8211; 1 oracle oinstall 154 Jan 25 21:23 idmDomainConfig.param<\/strong><\/p>\n<p><strong>-rw-r&#8211;r&#8211; 1 oracle oinstall 1497 Jan 25 21:23 automation.log<\/strong><\/p><\/blockquote>\n<p>As you can see it has created 2 files. <strong>idmDomainConfig.param<\/strong> and <strong>automation.log<br \/>\n<\/strong><\/p>\n<p>Next we need to re-associate the policy store. Follow the steps below for the same.<\/p>\n<blockquote><p>[oracle@fusion bin]$ cd \/app\/fusion\/bea_default\/ocracle_common\/common\/bin\/<\/p>\n<p>[oracle@fusion bin]$ .\/wlst.sh<\/p>\n<p>\u2026<\/p>\n<p>Initializing WebLogic Scripting Tool (WLST) &#8230;<\/p>\n<p>Welcome to WebLogic Server Administration Scripting Shell<\/p>\n<p>Type help() for help on available commands<\/p><\/blockquote>\n<p>This will take you to a prompt which looks as follows. Enter following command to connect to the weblogic AdminServer.<\/p>\n<blockquote><p><strong>wls:\/offline&gt;<\/strong><br \/>\n<span style=\"color: red;\"><strong>connect(&#8220;weblogic&#8221;,&#8217; &#8220;oracle123&#8243;,&#8221;t3:\/\/fusion:7001&#8221;)<br \/>\n<\/strong><\/span><\/p>\n<p>Connecting to t3:\/\/fusion:7001 with userid weblogic &#8230;<\/p>\n<p>Successfully connected to Admin Server &#8216;AdminServer&#8217; that belongs to domain &#8216;IDM_domain&#8217;.<\/p>\n<p>Warning: An insecure protocol was used to connect to the server. To ensure on-the-wire security, the SSL port or Admin port should be used instead.<\/p><\/blockquote>\n<p>Once connected run the following <strong>reassociateSecurityStore <\/strong>command.\u00a0<span style=\"color: #ff0000;\"><strong>reassociateSecurityStore(domain=\u201dIDMDomain\u201d, admin=\u201dcn=orcladmin\u201d,password=\u201doracle123\u2033, ldapurl=\u201dldap:\/\/fusion:3060\u2033, servertype=\u201dOID\u201d,jpsroot=\u201dcn=jpsroot\u201d)<\/strong><\/span><\/p>\n<blockquote><p><strong>wls:\/IDM_domain\/serverConfig&gt; <span style=\"color: red;\">reassociateSecurityStore(domain=&#8221;IDMDomain&#8221;,admin=&#8221;cn=orcladmin&#8221;,password=&#8221;oracle123&#8243;,ldapurl=&#8221;ldap:\/\/fusion:3060&#8243;,servertype=&#8221;OID&#8221;,jpsroot=&#8221;cn=jpsroot&#8221;)<br \/>\n<\/span><\/strong><\/p>\n<p>Location changed to domainRuntime tree. This is a read-only tree with DomainMBean as the root.<\/p>\n<p>For more help, use help(domainRuntime)<\/p>\n<p>Starting policy store reassociation.<\/p>\n<p>\u2026<\/p>\n<p>Jps Configuration has been changed. Please restart the application server.<\/p><\/blockquote>\n<p>Enter the command &#8220;exit()&#8221; to quit the tool now.<\/p>\n<blockquote><p><strong>wls:\/IDM_domain\/serverConfig&gt; <span style=\"color: red;\">exit()<\/span><\/strong><\/p>\n<p>Exiting WebLogic Scripting Tool.<\/p><\/blockquote>\n<p>Now restart the Weblogic Server. We will use the shell scripts which we have created to start\/stop weblogic. You can do this manually as well.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>~\/scripts\/stopwls.sh<\/strong><\/span><\/p>\n<p>Stopping Weblogic Server<\/p>\n<p>\u2026<\/p>\n<p>Shutting down the server AdminServer with force=false while connected to AdminServer &#8230;<\/p>\n<p>..<\/p>\n<p>Stopping Derby Server&#8230;<\/p>\n<p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>~\/scripts\/startwls.sh<\/strong><\/span><\/p>\n<p>Starting Weblogic Server<\/p><\/blockquote>\n<p>Again change the directory to <strong>&lt;IAM_ORACLE_HOME&gt;\/idmtools\/bin <\/strong>and\u00a0create a file named <strong>extend.props<\/strong> with following contents.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>cd \/app\/fusion\/bea_default\/ocracle_common\/common\/bin\/<\/strong><\/span><\/p>\n<p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>more extend.props<\/strong><\/span><\/p>\n<p>IDSTORE_HOST : fusion<\/p>\n<p>IDSTORE_PORT : 3060<\/p>\n<p>IDSTORE_BINDDN : cn=orcladmin<\/p>\n<p>IDSTORE_USERNAMEATTRIBUTE: cn<\/p>\n<p>IDSTORE_LOGINATTRIBUTE: uid<\/p>\n<p>IDSTORE_USERSEARCHBASE: cn=Users,dc=localdomain<\/p>\n<p>IDSTORE_GROUPSEARCHBASE: cn=Groups,dc=localdomain<\/p>\n<p>IDSTORE_SEARCHBASE: dc=localdomain<\/p>\n<p>IDSTORE_SYSTEMIDBASE: cn=systemids,dc=localdomain<\/p><\/blockquote>\n<p>Make sure that all required environment variables are already set. No need to set again if you are in the same terminal\/putty window.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <strong>echo $IDM_HOME<\/strong><\/p>\n<p>\/app\/fusion\/bea_default\/Oracle_IDM1<\/p>\n<p>[oracle@fusion bin]$ <strong>echo $ORACLE_HOME<\/strong><\/p>\n<p>\/app\/fusion\/bea_default\/Oracle_IAM<\/p><\/blockquote>\n<p>&nbsp;<\/p>\n<p>Again run <strong>idmConfigTool.sh<\/strong> Enter a password of choice whenever prompted. We will stick to &#8220;oracle123&#8221; for now.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>.\/idmConfigTool.sh -preConfigIDStore input_file=extend.props<br \/>\n<\/strong><\/span><\/p>\n<p><span style=\"color: red;\"><strong>Enter ID Store Bind DN password :<br \/>\n<\/strong><\/span><\/p>\n<p>&#8230;<\/p>\n<p>The tool has completed its operation. Details have been logged to automation.log<\/p><\/blockquote>\n<p>Now create a file named <strong>oam.props<\/strong> with following contents.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>more oam.props<br \/>\n<\/strong><\/span><\/p>\n<p>IDSTORE_HOST : fusion<\/p>\n<p>IDSTORE_PORT : 3060<\/p>\n<p>IDSTORE_BINDDN : cn=orcladmin<\/p>\n<p>IDSTORE_USERNAMEATTRIBUTE: cn<\/p>\n<p>IDSTORE_LOGINATTRIBUTE: uid<\/p>\n<p>IDSTORE_USERSEARCHBASE: cn=Users,dc=localdomain<\/p>\n<p>IDSTORE_GROUPSEARCHBASE: cn=Groups,dc=localdomain<\/p>\n<p>IDSTORE_SEARCHBASE: dc=localdomain<\/p>\n<p>POLICYSTORE_SHARES_IDSTORE: true<\/p>\n<p>OAM11G_IDSTORE_ROLE_SECURITY_ADMIN:OAMAdministrators<\/p>\n<p>IDSTORE_OAMSOFTWAREUSER:oamLDAP<\/p>\n<p>IDSTORE_OAMADMINUSER:oamadmin<\/p><\/blockquote>\n<p>Again run <strong>idmConfigTool.sh<\/strong> Enter a password of choice whenever prompted. We will stick to &#8220;oracle123&#8221; for now.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>.\/idmConfigTool.sh -prepareIDStore mode=OAM input_file=oam.props<br \/>\n<\/strong><\/span><\/p>\n<p><strong>Enter ID Store Bind DN password :<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p><strong>Enter User Password for oblixanonymous:<br \/>\n<\/strong><\/p>\n<p><strong>Confirm User Password for oblixanonymous:<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p><strong>Enter User Password for oamadmin:<br \/>\n<\/strong><\/p>\n<p><strong>Confirm User Password for oamadmin:<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p><strong>Enter User Password for oamLDAP:<br \/>\n<\/strong><\/p>\n<p><strong>Confirm User Password for oamLDAP:<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p>The tool has completed its operation. Details have been logged to automation.log<\/p><\/blockquote>\n<p>Now create a file named <strong>oim.props<\/strong> with following contents.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>more oim.props<br \/>\n<\/strong><\/span><\/p>\n<p>IDSTORE_HOST : fusion<\/p>\n<p>IDSTORE_PORT : 3060<\/p>\n<p>IDSTORE_BINDDN : cn=orcladmin<\/p>\n<p>IDSTORE_USERNAMEATTRIBUTE: cn<\/p>\n<p>IDSTORE_LOGINATTRIBUTE: uid<\/p>\n<p>IDSTORE_USERSEARCHBASE:cn=Users,dc=localdomain<\/p>\n<p>IDSTORE_GROUPSEARCHBASE: cn=Groups,dc=localdomain<\/p>\n<p>IDSTORE_SEARCHBASE: dc=localdomain<\/p>\n<p>POLICYSTORE_SHARES_IDSTORE: true<\/p>\n<p>IDSTORE_SYSTEMIDBASE: cn=systemids,dc=localdomain<\/p>\n<p>IDSTORE_OIMADMINUSER: oimadmin<\/p>\n<p>IDSTORE_OIMADMINGROUP:OIMAdministrators<\/p><\/blockquote>\n<p>Again run <strong>idmConfigTool.sh<\/strong> Enter a password of choice whenever prompted. We will stick to &#8220;oracle123&#8221; for now.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>.\/idmConfigTool.sh -prepareIDStore mode=OIM input_file=oim.props<br \/>\n<\/strong><\/span><\/p>\n<p><strong>Enter ID Store Bind DN password :<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p><strong>Enter User Password for oimadmin:<br \/>\n<\/strong><\/p>\n<p><strong>Confirm User Password for oimadmin:<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p><strong>Enter User Password for xelsysadm:<br \/>\n<\/strong><\/p>\n<p><strong>Confirm User Password for xelsysadm:<br \/>\n<\/strong><\/p>\n<p>The tool has completed its operation. Details have been logged to automation.log<\/p><\/blockquote>\n<p>Now create a file named <strong>lwls.props<\/strong> with following contents.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>more lwls.props<br \/>\n<\/strong><\/span><\/p>\n<p>IDSTORE_HOST: fusion<\/p>\n<p>IDSTORE_PORT: 3060<\/p>\n<p>IDSTORE_BINDDN: cn=orcladmin<\/p>\n<p>IDSTORE_USERNAMEATTRIBUTE: cn<\/p>\n<p>IDSTORE_LOGINATTRIBUTE: uid<\/p>\n<p>IDSTORE_USERSEARCHBASE: cn=Users, dc=localdomain<\/p>\n<p>IDSTORE_GROUPSEARCHBASE: cn=Groups,dc=localdomain<\/p>\n<p>IDSTORE_SEARCHBASE: dc=localdomain<\/p>\n<p>POLICYSTORE_SHARES_IDSTORE: true<\/p><\/blockquote>\n<p>Again run <strong>idmConfigTool.sh<\/strong> Enter a password of choice whenever prompted. We will stick to &#8220;oracle123&#8221; for now.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>.\/idmConfigTool.sh -prepareIDStore mode=WLS input_file=wls.props<br \/>\n<\/strong><\/span><\/p>\n<p><strong>Enter ID Store Bind DN password :<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p><strong>Enter User Password for weblogic_idm:<br \/>\n<\/strong><\/p>\n<p><strong>Confirm User Password for weblogic_idm:<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p>The tool has completed its operation. Details have been logged to automation.log<\/p><\/blockquote>\n<p>Now create a file named <strong>fusion.props<\/strong> with following contents.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>more fusion.props<br \/>\n<\/strong><\/span><\/p>\n<p>IDSTORE_HOST : fusion<\/p>\n<p>IDSTORE_PORT : 3060<\/p>\n<p>IDSTORE_BINDDN : cn=orcladmin<\/p>\n<p>IDSTORE_USERNAMEATTRIBUTE: cn<\/p>\n<p>IDSTORE_READONLYUSER: IDROUser<\/p>\n<p>IDSTORE_READWRITEUSER: IDRWUser<\/p>\n<p>IDSTORE_USERSEARCHBASE:cn=Users,dc=localdomain<\/p>\n<p>IDSTORE_SEARCHBASE: dc=localdomain<\/p>\n<p>IDSTORE_GROUPSEARCHBASE: cn=Groups,dc=localdomain<\/p>\n<p>IDSTORE_SUPERUSER: weblogic_fa<\/p>\n<p>POLICYSTORE_SHARES_IDSTORE: true<\/p><\/blockquote>\n<p>Again run <strong>idmConfigTool.sh<\/strong> Enter a password of choice whenever prompted. We will stick to &#8220;oracle123&#8221; for now.<\/p>\n<blockquote><p>[oracle@fusion bin]$ <span style=\"color: red;\"><strong>.\/idmConfigTool.sh -prepareIDStore mode=fusion input_file=fusion.props<br \/>\n<\/strong><\/span><\/p>\n<p><strong>Enter ID Store Bind DN password :<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p><strong>Enter User Password for IDROUser:<br \/>\n<\/strong><\/p>\n<p><strong>Confirm User Password for IDROUser:<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p><strong>Enter User Password for IDRWUser:<br \/>\n<\/strong><\/p>\n<p><strong>Confirm User Password for IDRWUser:<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p><strong>Enter User Password for weblogic_fa:<br \/>\n<\/strong><\/p>\n<p><strong>Confirm User Password for weblogic_fa:<br \/>\n<\/strong><\/p>\n<p>\u2026<\/p>\n<p>The tool has completed its operation. Details have been logged to automation.log<\/p><\/blockquote>\n<p><strong>This concludes the preparation of Identity and Policy stores for the Fusion Applications Installation.<\/strong><\/p>\n<p>Next:\u00a0<strong><a title=\"Creating a new Provisioning Plan\" href=\"http:\/\/www.oratraining.com\/blog\/2012\/02\/creating-a-new-provisioning-plan\/\">Creating a New Provisioning Plan<\/a><\/strong><\/p>\n<p><strong><a title=\"Oracle Fusion Applications installation \u2013 Step by step guide\" href=\"http:\/\/www.oratraining.com\/blog\/2012\/02\/oracle-fusion-applications-installation-step-by-step-guide\/\">Installing Oracle Fusion Applications &#8211; steps<\/a><\/strong><\/p>\n<ol>\n<li><strong><a title=\"Installing Fusion Applications Provisioning Framework\" href=\"http:\/\/www.oratraining.com\/blog\/2012\/02\/installing-fusion-applications-provisioning-framework\/\">Installing Fusion Applications Provisioning Framework<\/a><br \/>\n<\/strong><\/li>\n<li><strong><a title=\"Installing Transactional Database\" href=\"http:\/\/www.oratraining.com\/blog\/2012\/02\/installing-transactional-database\/\">Installing Oracle 11g Database (Applications Transactional Database)<\/a><br \/>\n<\/strong><\/li>\n<li><strong><a title=\"Running Fusion Applications RCU\" href=\"http:\/\/www.oratraining.com\/blog\/2012\/02\/running-fusion-applications-rcu\/\">Running Oracle Fusion Applications Repository Creation Utility (Applications RCU)<br \/>\n<\/a><\/strong><\/li>\n<li><strong>Creating another database for Oracle \u00a0<strong>Identity Management Infrastructure\u00a0<\/strong>(optional)<br \/>\n<\/strong><\/li>\n<li><strong><a title=\"Running Repository Creation Utility for Oracle Identity Management components\" href=\"http:\/\/www.oratraining.com\/blog\/2012\/02\/running-repository-creation-utility-for-oracle-identity-management-components\/\">Running Repository Creation Utility (RCU) for Oracle Identity Management components<\/a><\/strong><\/li>\n<li><strong><a title=\"Installing Oracle Identity and Access Management components\" href=\"http:\/\/www.oratraining.com\/blog\/2012\/02\/installing-oracle-identity-and-access-management-components\/\">Installing Oracle Identity and Access Management Components<\/a><br \/>\n<\/strong><\/li>\n<li><strong><a title=\"Configuring Oracle Identity and Access Management components\" href=\"http:\/\/www.oratraining.com\/blog\/2012\/02\/configuring-oracle-identity-and-access-management-components\/\">Configuring Oracle Identity and Access Management components<\/a><br \/>\n<\/strong><\/li>\n<li><strong><a title=\"Preparing Identity and Policy Stores\" href=\"http:\/\/www.oratraining.com\/blog\/2012\/02\/preparing-identity-and-policy-stores\/\">Preparing Identity and Policy Stores<\/a><br \/>\n<\/strong><\/li>\n<li><strong><a title=\"Creating a new Provisioning Plan\" href=\"http:\/\/www.oratraining.com\/blog\/2012\/02\/creating-a-new-provisioning-plan\/\">Creating a New Provisioning Plan<\/a><br \/>\n<\/strong><\/li>\n<li><strong><a title=\"Provisioning an Applications Environment\" href=\"http:\/\/www.oratraining.com\/blog\/2012\/03\/provisioning-an-applications-environment\/\">Provisioning an Applications Environment<\/a><\/strong><\/li>\n<\/ol>\n<p><strong><br \/>\n<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Oracle Fusion Applications Installation: Preparing Identity and Policy Stores Previous:\u00a0Configuring Oracle Identity and Access Management components Important Note: This is OLD guide for old version 11.1.1.5. Please follow instructions at\u00a0http:\/\/www.oratraining.com\/blog\/2012\/12\/oracle-fusion-applications-installation-step-by-step-guide-11-1-5\/\u00a0for latest guide for current version i.e. 11.1.5 &nbsp; Now we will prepare the Identity and Policy stores which will create the necessary users, groups etc. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[4],"tags":[],"class_list":["post-628","post","type-post","status-publish","format-standard","hentry","category-oracle"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.oratraining.com\/blog\/wp-json\/wp\/v2\/posts\/628","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.oratraining.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oratraining.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oratraining.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oratraining.com\/blog\/wp-json\/wp\/v2\/comments?post=628"}],"version-history":[{"count":0,"href":"https:\/\/www.oratraining.com\/blog\/wp-json\/wp\/v2\/posts\/628\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.oratraining.com\/blog\/wp-json\/wp\/v2\/media?parent=628"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oratraining.com\/blog\/wp-json\/wp\/v2\/categories?post=628"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oratraining.com\/blog\/wp-json\/wp\/v2\/tags?post=628"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}