Skip Headers
Oracle® Access Manager Integration Guide
10g (10.1.4.2)

Part Number E10356-01
Go to Documentation Home
Home
Go to Book List
Book List
Go to Table of Contents
Contents
Go to Index
Index
Go to Feedback page
Contact Us

Go to previous page
Previous
Go to next page
Next
View PDF

17 Integrating SharePoint Server

SharePoint Portal Server is a secure, scalable, enterprise portal server. This chapter explains how to integrate with the Microsoft SharePoint Portal Server 2003 and SharePoint Office Server 2007. It covers the following topics:

17.1 About Oracle Access Manager and the SharePoint Server

Oracle Access Manager provides identity management and security functions, including Web-based single sign-on, user self-service and self-registration, user provisioning, reporting and auditing, policy management, dynamic groups, and delegated administration. Oracle Access Manager integrates with all leading directory servers, application servers, Web servers, and enterprise applications.

SharePoint Portal Server is a secure, scalable, enterprise portal server that builds on Windows Server 2003 Microsoft Internet Information Services (IIS) and Windows SharePoint Services (WSS). SharePoint Portal Server can aggregate SharePoint sites, information, and applications into a single, easy-to-use portal. In addition to WSS functionality, SharePoint Portal Server incorporates additional features such as News and Topics as well as personal and public views for My Site, and so on.

SharePoint Office Server 2007 enhances control over content, business processes, and information sharing. Office SharePoint Office Server 2007 provides centralized access and control over documents, files, Web content, and e-mail, and enables users to submit files to portals for collaborative work.

When Oracle Access Manager is integrated with SharePoint Portal Server 2003 or SharePoint Office Server 2007, the Access System handles user authentication through an ISAPI filter for IIS and an ISAPI wildcard extension, which enables single sign-on between Oracle Access Manager and SharePoint Portal Server. WSS handles resource request authorization for all SharePoint Portal Server resources.

This integration provides single sign-on to SharePoint Portal Server 2003 and SharePoint Office Server 2007 resources and all other Oracle Access Manager-protected resources.

17.1.1 About Windows Impersonation

This integration relies on Windows impersonation, which enables a trusted user in the Windows server domain to assume the identity of any user requesting a target resource in SharePoint Portal Server 2003 or SharePoint Office Server 2007. This trusted impersonator maintains the identity context of the user while accessing the resource on behalf of the user.

Impersonation is transparent to the user. Access appears to take place as if the SharePoint resource were a resource within the Access System domain.

17.2 Supported Platforms and Requirements

Successful integration with SharePoint Portal Server 2003 or SharePoint Office Server 2007 requires both Oracle Access Manager and Microsoft components, which must be installed and configured to support impersonation as well as integration.

This section contains the following topics:

17.2.1 Supported Versions and Platforms

Any references to specific versions and platforms in this chapter are for demonstration purposes.

You can find support and certification information at the following URL:

http://www.oracle.com/technology/documentation/

You must register with OTN to view this information.

Also, you can see the supported versions and platforms for this integration on Metalink, as follows.

To view information on Metalink

  1. In your browser, enter the following URL:

    https://metalink.oracle.com

  2. Log in to MetaLink.

  3. Click the Certify tab.

  4. Click View Certifications by Product.

  5. Select the Application Server option and click Submit.

  6. Choose Oracle Identity Management and click Submit.

  7. Click Oracle Identity Management Certification Information 10g (10.1.4.0.1) (html) to display the Oracle Identity Management page.

  8. Click the link for Section 6, Oracle Access Manager Certification to display the certification matrix.

17.2.2 Required Microsoft Components

Table 17-1 lists the Microsoft components required to integrate with SharePoint Portal Server 2003 and SharePoint Office Server 2007.

Note:

Be sure to install SP1 or later to have all critical updates.

Table 17-1 Microsoft Requirements

Component Description

Operating System

Windows Server for the SharePoint Server host.

Note: Any of the five editions is acceptable.

The Active Directory Domain Controller must reside on a Windows Server 2003 computer. This computer does not have to be the SharePoint Portal Server host.

Extended Services

  • Internet Information Services (IIS) 6.0.

    You must install IIS on the host computer for SharePoint Server after installing Windows Server 2003 on that computer.

  • Windows SharePoint Services (WSS) 2.0.

    These services install automatically when you install the SharePoint Server. See SharePoint Server in this table.

Directory Service

Active Directory. You install this after installing Windows Server 2003. You can connect a SharePoint Server directly to the Active Directory Domain Controller or to a different instance of Active Directory, as follows:

  • The Active Directory Domain Controller can reside on the same computer as your SharePoint Server installation. If it does, SharePoint Server requires an instance of SQL Server (not Desktop SQL) installed on a computer in the Active Directory domain.

  • Alternatively, you can connect SharePoint Server to an Active Directory Domain Controller residing on a different Windows Server 2003 machine.

  • Another option is to connect SharePoint Server to a non-domain controller instance of Active Directory, which can reside on the machine hosting SharePoint Server or on any other machine in your Active Directory domain.

Note: For all scenarios mentioned here, SharePoint Server can use either Desktop SQL or an instance of SQL Server installed on a machine within the Active Directory domain.

SharePoint Server

SharePoint Server. After installing Active Directory, you install SharePoint Portal Server 2003 or SharePoint Office Server 2007 on a computer where Windows Server 2003 and IIS are already installed.

Security Service

Kerberos Key Distribution Center (KDC) installs automatically as part of Windows Server 2003.


17.2.3 Required Oracle Access Manager Components

The components in Table 17-2 are required to integrate with SharePoint Server and SharePoint Portal Server.

Table 17-2 Component Requirements

Item Requirement/Description

WebGate

The ISAPI version WebGate that ships with Oracle Access Manager must reside on the same machine as SPPS.

Within the context of the SPPS integration, this WebGate is an ISAPI filter that intercepts HTTP requests for Web resources and works with the Access Server to authenticate the user who made the request. If authentication is successful, the WebGate creates an ObSSOCookie and sends it to the user's browser, thus facilitating single sign-on. The WebGate also sets impersonate as a HeaderVar action for this user session.

IISImpersonationExtension. dll

This dll is an IIS wildcard extension that checks whether the Authorization Success Action HeaderVar has been set to impersonate, and if it has been, the dll creates a Kerberos U4S2Self ticket so that the special trusted user in the SPPS Active Directory can impersonate the user who originally made the request.

When you run the ISAPI WebGate installation wizard, IISImpersonationExtension.dll installs automatically within the WebGate directory structure, but you still need to configure the dll manually to enable impersonation and SPPS integration.

Oracle Access ManagerDirectory

Oracle Access Manager can be connected to any supported directory service including, but not limited to, LDAP and Active Directory. It can even connect to the same instance of Active Directory used by SPPS.

In any case, the directory does not have to reside on the same machine as SPPS and the WebGate protecting it.

Other Components

The SPPS integration also requires installation of the other standard Oracle Access Manager system components such as the Access Server with which the WebGate protecting your SPPS installation is configured to interoperate. For details see the Oracle Access Manager Installation Guide.

Except for the WebGate protecting SPPS, your components do not need to reside on the machine hosting SPPS.

Note that if you install either Policy Manager or WebPass (or both) on the same IIS virtual server as SPPS, you must exclude the URL paths to those components through SharePoint Managed Paths. (See "To define managed paths in SharePoint" for details). You may find it easier to install Policy Manager and WebPass on a machine other than the one on which SPPS resides or, at the very least, on an IIS virtual server other than the one on which SPPS has been installed.


17.3 Request Processing by the SharePoint Portal Server Integration

Oracle Access Manager uses the Windows impersonation feature to facilitate user access to SharePoint Portal Server resources.

Process overview: Request processing with the SharePoint Portal Server integration

  1. The user requests access to an SharePoint Portal Server resource.

  2. The WebGate ISAPI filter protecting SharePoint Portal Server intercepts the request, determines whether the target resource is protected, and if it is, challenges the user for authentication credentials.

  3. If the user supplies credentials and the Access Server validates them, the WebGate sets an ObSSOCookie in the user's browser, thus enabling single sign-on.

    The WebGate also sets an HTTP header variable called "impersonate", whose value is set to the authenticated user's LDAP uid (or samaccountname, if the user account exists in Active Directory, or userPrincipalName, if the user account exists in a multi-domain Active Directory forest).

    Note:

    At this point, IIS considers the user to be anonymous, since the impersonation has not yet been set.
  4. The Oracle Access Manager ISAPI wildcard extension IISImpersonationExtension.dll checks for the Authorization Success Action header variable named impersonate.

    When such a header variable exists, the wildcard extension obtains a Kerberos ticket for the user. This Service for User to Self (S4U2Self) impersonation token enables the designated trusted user to assume the identity of the requesting user and obtain access to the target resource through IIS and SharePoint Portal Server.

17.4 Integrating with SharePoint Portal Server 2003

Any references to specific versions and platforms in this chapter are made for demonstration purposes. For complete support information, see the Certify tab at https://metalink.oracle.com.

There are several phases to integrate with the SharePoint Portal Server.

Task overview: Integrating with SharePoint Portal Server

  1. Install the Microsoft components, as described in "Installing Microsoft Components".

  2. Install Oracle Access Manager, as described in "Installing Oracle Access Manager Components".

  3. Set up impersonation, as described in "Setting Up Impersonation".

  4. Complete the integration, as described in "Completing the SharePoint Server Integration".

17.4.1 Installing Microsoft Components

Except where noted, all Microsoft SharePoint Portal Server-related components must be installed on the same host machine, including the following software:

  • Windows Server 2003

  • Microsoft IIS v6 Web Server

  • SharePoint Portal Server (and underlying WSS)

The following Microsoft components can be installed on machines other than the one hosting the main SharePoint Portal Server installation:

  • Active Directory (see Table 17-1 for installation location details).

  • SQL Server must be installed on a machine in the Active Directory domain only if the Active Directory Domain Controller is installed on the same machine as SharePoint Portal Server. See Table 17-1 for installation location details.

  • Additional SharePoint Portal Server front end servers.

  • One or more back end servers containing SharePoint Portal Server resources such as Web pages, documents, or applications.

Note:

All of the machines hosting the preceding SharePoint Portal Server-related components must be in the same Active Server domain as the SharePoint Portal Server server you are installing.

The following task overview includes references to documentation that provides procedures and steps you need to complete when installing the Microsoft components for this integration.

Task overview: Installing Microsoft Components

  1. Install Windows Server 2003 on the machine that will host your SharePoint Portal Server installation, as described in the appropriate Microsoft documentation.

  2. Install IIS on the machine that will host your SharePoint Portal Server installation, as described in the appropriate Microsoft documentation.

  3. Install Active Directory, as described in the appropriate Microsoft documentation and the Oracle Access Manager Installation Guide; also, see Table 17-1 for installation location considerations.

  4. If SharePoint Portal Server and Active Directory Domain Controller reside on the same machine, you must also install Microsoft SQL Server on that machine as well, as described in Table 17-1.

  5. Install SharePoint Services and SharePoint Portal Server on the root virtual server (which uses port 80, by default) of your IIS installation or on some other IIS virtual server.

  6. Create and set up your portal.

  7. After you install SharePoint Portal Server, stop and test the installation to ensure it operates correctly before you integrate with Oracle Access Manager.

Task Overview: Creating and setting up a Sharepoint portal

  1. Create a portal.

    See "To create a portal" for details.

  2. Upload a test document.

    See "To upload a document to the portal" for details.

  3. Create audiences.

    See "To create audiences" for details.

  4. Edit audiences (if necessary).

    See "To edit audiences" for details.

  5. Compile audiences.

    See "To compile audiences" for details.

To create a portal

  1. In the Portal Site and Virtual Server Configuration section of the SharePoint Portal Server Central Administration page for server on which you wish to create a portal, click Create a portal site.

  2. In the Portal Creation Options section, click Create a portal.

  3. In the Site Name section, in the Name box, type a name for the portal site. This name will appear at the top of most pages for the portal site.

  4. In the Virtual server list within the Site URL section, click the existing virtual server on the server that will host the portal site.

  5. In the URL box, type the URL through which users connect to the portal site. By default, this URL is http://server_name/. If you choose a virtual server that has a port number other than 80, the port number appears as part of the URL, that is, http://server_name:port_number/.

    Note:

    Make sure to specify the load-balanced URL, not the local server URL.
  6. In the Account name box of the Owner section, type the account name of the portal site owner in the format Domain\user_name. The portal site owner manages content and user access.

  7. In the E-mail address box, type the e-mail address for the portal site owner, then click OK.

  8. On the Create Portal Confirmation for server_name page, click OK to begin creating the portal site.

  9. The Operation Status page displays as the portal is created. Following successful portal site creation, the Operation Successful page appears. At this point, you can begin detailed configuration of the portal site.

To upload a document to the portal

  1. Using your Web browser, navigate to the home page for the portal.

  2. Select Upload Document from the Actions list.

  3. On the Upload Document page, click Browse, navigate to the document you wish to add, then click Open.

    To add multiple documents simultaneously, click Upload Multiple Files.

    To replace a file of the same name within the library, select the checkbox titled "Overwrite existing file(s)?"

  4. Click Save, then click Close.

To create audiences

  1. Audiences, which are based on jobs or tasks within an organization, match specified users to target content while preventing all other users from viewing that content. On the Managing Audiences page for the site you wish to configure, click Create audience.

  2. On the Create Audience page, type a name and description for the audience.

  3. Click either "Satisfy all rules" or "Satisfy any of the rules," then click OK.

  4. After the Add Audience Rule page appears, add whatever rules you wish to govern access to the site content. (You can also add rules through the View Audience Properties page.) For details, consult the Microsoft SharePoint Portal Server documentation on Adding and Editing Audience Rules.

  5. Compile the audience so that the content is targeted to that audience. See "To compile audiences".

To edit audiences

  1. On the View Audience Properties page for the site you are configuring, click View Audience Properties, then click Edit audience.

  2. On the Edit Audience page, change the name or description of the audience, as necessary.

  3. Click either "Satisfy all rules" or "Satisfy any of the rules," then click OK.

  4. When the View Audience Properties page reappears, Add, Delete, or Edit the audience rules, as necessary.

  5. Review the statistics for the audience, checking the number of current members and the most recent time of compilation. When you are satisfied with all the settings for the audience and the rules associated with that audience, compile the audience so that your changes take effect. See "To compile audiences".

To compile audiences

  1. Any changes you make to an audience or the rules associated with them do not take effect until you compile the audience. Navigate to the Manage Audiences page and check the compilation status and most recent compilation time for the audience you wish to compile. (You can also view the number of incomplete audiences on this page).

  2. Either start a compilation or set a compilation schedule.

17.4.2 Installing Oracle Access Manager Components

The ISAPI Webgate for SharePoint Portal Server must be installed on the same machine as SharePoint Portal Server. The rest of your installation can reside on the same machine or any other machine.

If you choose to install on a different machine (which can be a Solaris, Linux, or Windows machine), it can be set up for Active Directory (if the host machine runs Windows Server 2003) or some other directory service, such as NetScape Directory Server (if the machine runs Solaris or Linux, for example).

If both Oracle Access Manager and SharePoint Portal Server are set up for different instances of Active Directory, both instances must belong to the same Active Directory domain.

To install Oracle Access Manager components for SharePoint Portal Server integration

  1. On either the same machine that hosts SharePoint Portal Server (or on a different machine), install an Identity Server and a WebPass, then set up the Identity System as described in the Oracle Access Manager Installation Guide and see Table 17-2 for WebPass installation considerations.

  2. On either the same machine that hosts SharePoint Portal Server (or a different machine), install Policy Manager and one or more instances of the Access Server, as described in the Oracle Access Manager Installation Guide and Table 17-2.

  3. On the machine hosting the SharePoint Portal Server instance you are trying to integrate, install an ISAPI WebGate.

    The IISImpersonationExtension.dll will be installed as part of the package in the following directory:

    WebGate_install_dir\access\Oblix\apps\webgate\bin\

    Where WebGate_install_dir is the directory where you installed the WebGate.

  4. If you installed Policy Manager or WebPass on the same IIS virtual server as SharePoint Portal Server, complete activities in "Defining Managed Paths in SharePoint".

17.4.2.1 Defining Managed Paths in SharePoint

You complete the following procedure only if the Policy Manager or WebPass resides on the same IIS virtual server as SharePoint Portal Server and listens to the same port as that IIS virtual server. For instance, the default virtual IIS server uses port 80, as do many Policy Manager and WebPass installations; therefore, you need to change the port used by one application or exclude the path used by the Oracle Access Manager component through the Define Managed Paths feature in SharePoint.

To define managed paths in SharePoint

  1. Select Start, Administrative Tools, SharePoint Central Administration.

  2. In the Virtual Server Configuration section, click Configure virtual server settings.

  3. In the Virtual Server list, click Default Web Site or the name of the virtual server on which both SharePoint Portal Server and the Oracle Access Manager components are installed.

  4. In the Virtual Server Management section, select Define Managed Paths.

  5. In the Add a Path section, type the path to Policy Manager or WebPass, then click the button marked Excluded path.

  6. Click OK to add the path to the list of excluded paths.

Figure 17-1 Defining Managed Paths in SharePoint

Graphic of defining managed paths in SharePoint

17.5 Integrating with SharePoint Office Server 2007

Integrating with SharePoint Office Server 2007 is very similar to integrating with SharePoint Portal Server 2003. Many of the steps for performing the two integrations are identical.

The following paragraphs describe how to create and set up a Web site using SharePoint Office Server 2007.

Note:

The SharePoint Portal Server 2003 portal creation object model is deprecated in SharePoint Office Server 2007. In SharePoint Office Server 2007, portal sites use the same provisioning process as Windows SharePoint Services sites. You must update any scripts that create portals sites to use the Microsoft Windows SharePoint Services 3.0 site creation APIs. If you require a new vServer (Web application), use the Windows SharePoint Services CreateWebApplication API before creating the site. See the following URL for details:

http://msdn2.microsoft.com/en-us/library/ms545807.aspx

Task overview: Integrating with SharePoint Portal Server

  1. Install the Microsoft components, as described in "Installing Microsoft Components".

  2. Create a new Web application or site application in SharePoint Office Server 2007.

    See "To create a new Web application in SharePoint Office Server 2007" and "To create a new site collection for SharePoint Office Server 2007" for details.

  3. Install Oracle Access Manager, as described in "Installing Oracle Access Manager Components".

  4. Set up impersonation, as described in "Setting Up Impersonation".

  5. Complete the integration, as described in "Completing the SharePoint Server Integration".

To create a new Web application in SharePoint Office Server 2007

  1. From the Windows desktop, click Start, then All Programs, then Microsoft Office Server, then click SharePoint 3.0 Central Administration.

  2. From the Central Administration home page, click Application Managment.

  3. From the Application Managemetn page, in the SharePoint Web Application Management section, click Create or Extend Web Application.

  4. From the Create or Extend Web Application page, in the Adding a SharePoint Web Application section, click Create a New Web Application.

  5. Configure the following on the Create New Web Application page:

    Table 17-3 Create Web Application Options for SharePoint Office Server 2007

    Section What You Configure in This Section

    IIS Web Site

    In this section you configure the following settings for your new Web application, as follows:

    • To choose an existing Web site, click Use an Existing Web Site, and from the drop-down menu select the Web site where you want to install the new Web application.

    • To create a new site, click Create a New IIS Web Site, and enter a name in the Description text field.

    • In the Port field, enter the port number you want to use to access the Web application.

      For a new Web site, this field contains a default port number. For an exiting site, this field contains the currently configured port number.

    • In the optional Host Header field, enter the URL for accessing the Web application.

    • In the Path field, enter the path to the directory that contains the site on the server.

      For a new Web site, this field contains a default path. For an exiting site, this field contains the current path.

    Security Configuration

    In this section you configure authentication and encryption for your Web application, as follows:

    • In the Authentication Provider section, select Negotiate (Kerberos) or NTLM, as appropriate.

    • In the Allow Anonymous section, choose Yes or No.

      A value of Yes allows anonymous access to the Web site by using a computer-specific anonymous access account. The account name is IUSR_computername.

    • In the Secure Sockets Layer (SSL) section, choose Yes or No.

      If you choose to enable SSL for the Web site, you must configure SSL by requesting and installing a certificate.

    Load Balanced URL

    Enter the URL for the domain name for all sites that users will access in this Web application. This URL domain will be used in all links shown on pages in the Web application. By default, the box is populated with the current server name and port. The Zone field is automatically set to Default for a new Web application and cannot be changed from this page.

    Application Pool

    In the Application Pool section, choose whether to use an existing application pool or create a new application pool for this Web application, as follows:

    • To use an existing application pool, select Use Existing Application Pool, then select the application pool you wish to use from the drop-down menu.

    • To create a new application pool, select Create a New Application Pool, and in the Application Pool Name field, type the name of the new application pool, or keep the default name.

      In the section Select a Security Account for This Application Pool, select Predefined to use an existing application pool security account, then select the security account from the drop-down menu. To use a security account that is not currently being used for an existing application pool, select Configurable, enter the user name of the account you want to use in the User Name field, and enter the password for the account in the Password field.

    Reset Internet Information Services

    In this section, choose whether to allow SharePoint Office Server 2007 to restart IIS on other farm servers. The local server must be restarted manually for the process to finish. If you do not select this option and you have more than one server in the farm, you must wait until the IIS Web site is created on all servers and then run iisreset/noforce on each Web server. The new IIS site is not usable until this action is completed.

    This choice is unavailable if your farm only contains a single server.

    Database Name and Authentication

    In this section, choose the database server, database name, and authentication method for your new Web application.

    In the Database Name field, enter the name of the database or use the default entry. In the Database Authentication field, choose whether to use Windows authentication (recommended) or SQL authentication, as follows:

    • If you want to use Windows authentication, leave this option selected.

    • If you want to use SQL authentication, select SQL authentication. In the Account field, type the name of the account that you want the Web application to use to authenticate to the SQL Server database, then type the password in the Password field.


  6. Click OK to create the new Web application, or click Cancel to cancel the process and return to the Application Management page.

To create a new site collection for SharePoint Office Server 2007

  1. On the SharePoint Central Administration home page, click the Application Management tab on the top link bar.

  2. On the Application Management page, in the SharePoint Site Management section, click Create Site Collection.

  3. On the Create Site Collection page, in the Web Application section, either select a Web application to host the site collection from the Web Application drop-down list, or create a new Web application to host the site collection, as follows:

    Table 17-4 Create a Web Application to Host a Site Collection for SharePoint Office Server 2007

    Section What You Configure in This Section

    Title and Description

    Enter a title and description for the site collection

    Web Site Address

    Select a URL type, and specify a URL for the site collection.

    Template

    Select a template from the tabbed template control.

    Primary Site Collection Administrator

    Enter the user account name for the user you want to be the primary administrator for the site collection.

    You can also browse for the user account by clicking the book icon to the right of the text box. You can verify the user account by clicking the check names icon to the right of the text box.

    Secondary Site Collection Administrator (optional)

    Enter the user account for the user that you want to be the secondary administrator for the site collection.

    You can also browse for the user account by clicking the book icon to the right of the text box. You can verify the user account by clicking the Check Names icon to the right of the text box.


17.6 Setting Up Impersonation

Setting up impersonation, whether for SharePoint Server integration or for use by some other application, is described in the following sections:

Task overview: Setting up impersonation

  1. Create a trusted user account for only impersonation in the Active Directory connected to SharePoint Server, as described in "Creating a Trusted User Accounts".

  2. Give the trusted user the special right to act as part of the operating system., as described in "Assigning Rights to the Trusted User".

  3. Bind the trusted user to the WebGate by supplying the authentication credentials for the trusted user, as described in "Binding the Trusted User to Your WebGate".

  4. Add a header variable named impersonate to Authorization Success Action in the policy domain for impersonation, as described in "Adding an Impersonation Action to a Policy Domain".

  5. Configure IIS by adding the IISImpersonationExtension.dll to your IIS configuration, as described in "Adding an Impersonation dll to IIS".

  6. Test impersonation, as described in "Testing Impersonation".

17.6.1 Creating a Trusted User Accounts

This special user should not be used for anything other than impersonation.

To create a trusted user account

  1. On the Windows 2003 machine hosting your SharePoint Portal Server installation, select Start, Programs, Manage Your Server, Domain Controller (Active Directory), Manage Users and Computers in Active Directory.

  2. In the Active Directory Users and Computers window, right-click Users on the tree in the left pane, then select New, User.

  3. In the First name field of the pane entitled New Object - User, enter an easy-to-remember name such as SPPSImpersonator.

  4. Copy this same string to the User logon name field, then click Next.

  5. In succeeding panels, you will be asked to choose a password and then retype it to confirm.

Note:

Oracle recommends that you chose a very complex password, because your trusted user is being given very powerful permissions. Also, be sure to check the box marked Password Never Expires. Since the impersonation extension should be the only entity that ever sees the trusted user account, it would be very difficult for an outside agency to discover that the password has expired.

Figure 17-2 Setting up a Trusted User Account for Windows Impersonation

Setting up a Trusted User Account

17.6.2 Assigning Rights to the Trusted User

You need to give the trusted user the right to act as part of the operating system.

To give appropriate rights to the trusted user

  1. Select Control Panel, Administrative Tools, Domain Controller Security Policy.

  2. On the tree in the left pane, click the plus icon (+) next to Local Policies.

  3. Click User Rights Assignment on the tree in the left pane.

  4. Double-click "Act as part of the operating system" in the right pane.

  5. Click Add User or Group.

  6. In the Add User or Group panel, type the User logon name of the trusted user (SPPSImpersonator in our example) in the User and group names text entry box, then click OK to register the change.

Figure 17-3 Configuring Rights for the Trusted User in Windows Impersonation

Configuring Rights for the Trusted User.

17.6.3 Binding the Trusted User to Your WebGate

You need to bind the trusted user to the WebGate by supplying the authentication credentials for the trusted user, as follows.

To bind your trusted user to your WebGate

  1. Point your browser to your Access System Console. For example:

    http://hostname.domain.com:port/access/oblix

    where hostname is the DNS name of the machine hosting your Policy Manager, domain is the name of the server domain to which the machine belongs, and port is the number of the port to which Policy Manager listens.

  2. Navigate to Access System Console, Access System Configuration, AccessGate Configuration.

  3. Select the name of the Webgate you want to modify.

    The Details for AccessGate page appears with a summary of the configuration information for this WebGate. At the bottom of this Web page are fields for Impersonation Username and Impersonation Password.

  4. Click the Modify button at the bottom of the Details for AccessGate page.

  5. After the Modify AccessGate page appears, scroll to the bottom and enter the username and password for the trusted user account you created through the task .

    For example:

    Fields for entering username and password.
  6. Click the Save button to commit the changes and return to the Details page.

    A bind has been created for the WebGate and the trusted user. The WebGate is now ready to provide impersonation on demand. The demand is created by an Authorization Success Action in a policy domain created for impersonation.

17.6.4 Adding an Impersonation Action to a Policy Domain

You must create or configure a policy domain to protect your SharePoint resources. You do this by adding an Authorization Success Action with a return type of "headerVar," the "name" parameter set to "Impersonate", and the "return attribute" parameter set to "samaccountname" for a single-domain Active Directory installation or "userPrincipalName" for a multi-domain Active Directory forest.

You must also choose an easy-to-remember name for the domain, such as Impersonation Policy Domain.

For details on creating a policy domain, see the Oracle Access Manager Access System Administration Guide.

To add an impersonation action to your policy domain

  1. Navigate to the Access System Console and log in, for example:

    http://hostname.domain.com:port/access/oblix

    Where hostname is the DNS name of the machine hosting your WebPass and Policy Manager, domain is the name of the server domain to which the machine belongs, and port is the number of the port to which Policy Manager listens.

  2. Navigate to the Authorization Definitions page of the policy domain you want to change:

    Policy Manager, My Policy Domains, PolicyName, Authorization Rules

    Where PolicyName refers to the policy domain you created specifically for impersonation (ImpersonationPolicyDomain in our example).

    Currently defined authorization rules are listed. If none are listed, click the Add button and complete the form to create one.

  3. Click the link to the rule to which you want to add the impersonation action to expand the description.

  4. Click the Actions tab, directly under the Authorization Rules tab.

    The Authorization Success page appears, with a separate section for Authorization Success and Authorization Failure. If no actions are identified, you must add them. If actions are provided, you can modify them.

    You need to add a header variable named "impersonate" to the Authorization Success Action in the policy domain for impersonation.

  5. On the Authorization Success page, click the Add or Modify button.

  6. In the Authorization Success area, fill in the Return details.

    For example:

    Type: HeaderVarName: IMPERSONATEReturn attribute: uid or samaccountname (Active Directory username, the Windows domain user for the desired folder)
    

    Where "HeaderVar" is the return Type, "IMPERSONATE" is Name of the header variable for impersonation, and the Return value of uid or samaccountname is based on the directory being used.

  7. Save the rule, which is used for the second WebGate request (for authorization).

    The following is a sample screen shot.

    Sample authorization success rule.

17.6.5 Adding an Impersonation dll to IIS

You are ready to configure IIS by adding the IISImpersonationExtension.dll to your IIS configuration. See "To add the impersonation dll to your IIS configuration" for details.

If you have multiple Web sites, where some are integrated with SharePoint Portal Server while others are not, you may want to enable impersonation for the Web sites that are not integrated with the SharePoint Portal Server. To do this, you must install Impersonation.dll at any level of the Web site tree and add a wildcard extension for Web sites. See "To add a wildcard extension for Web sites" for details.

To add the impersonation dll to your IIS configuration

  1. Select Start, Administrative Tools, Internet Information Services (IIS) Manager.

  2. Click the plus icon (+) to the left of the local computer icon on the tree in the left pane.

  3. Click Web Service Extensions on the tree in the left pane.

  4. Double-click Oblix WebGate in the right panel to open the Properties panel.

  5. Click the Required Files tab.

  6. Click Add.

  7. In the Path to file text box, type the full path to IISImpersonationExtension.dll.

    By default, the path is:

    WebGate_install_dir\access\oblix\apps\webgate\bin\ IISImpersonationExtension.dll

    Where WebGate_install_dir is the directory of your WebGate installation.

    Note:

    If any spaces exist in the path (for example, C:\Program Files\Oracle\...) surround the entire string with double quotes (" ").
  8. Click OK.

  9. Click the General tab on the Web Services Extension Properties panel, then verify that the box "Do not check the file location" is not checked.

  10. Verify that the Allow button to the left of the Oblix WebGate icon is greyed out, which indicates that the dll is allowed to run as a Web service extension.

Note:

If Allow is not greyed out, click it so that it becomes greyed out. When Allow is greyed out, this indicates that the highlighted file is permitted to run on the IIS virtual server.

Figure 17-4 Configuring IIS Security Settings

Graphic of IIS Security Settings

To add a wildcard extension for Web sites

  1. If Oracle Access Manager is not integrated with SharePoint Server, configure a wildcard extension for Web sites by navigating as follows:

    Click Start, then click Administrative Tools, then click Internet Information Services (IIS) Manager.

  2. Click the plus icon (+) to the left of the local computer icon on the tree in the left pane.

  3. Click Web Sites in the tree in the left pane.

  4. Right-click the icon representing your Web site, then click Properties in the menu.

  5. Click the Home Directory tab.

  6. Click the Configuration button.

  7. In the list box for Wildcard application maps, click the entry for IISImpersonationExtension.dll to highlight it, then click Edit.

  8. Ensure that the box is unchecked.

17.6.6 Testing Impersonation

You can test Impersonation in the following ways:

17.6.6.1 Creating an IIS Virtual Site Not Protected by SharePoint Server

To test the impersonation feature outside the SharePoint Server context or to test single sign-on, you will need a target Web page on an IIS virtual Web site that is not protected by SharePoint Server. You create such a virtual Web site by completing the following task.

To create an IIS virtual site not protected by SharePoint Server

  1. Select Start, Administrative Tools, Internet Information Services (IIS) Manager.

  2. Click the plus icon (+) to the left of the local computer icon on the tree in the left pane.

  3. Right-click Web Sites on the tree in the left pane, then navigate to New, Web Site on the menu.

  4. Respond to the prompts by the Web site creation wizard.

  5. After you create the virtual site, you must protect it with a policy domain, as described in the Oracle Access Manager Access System Administration Guide.

17.6.6.2 Testing Impersonation Using the Event Viewer

When you complete impersonation testing using the Windows 2003 Event Viewer, you must configure the event viewer before conducting the actual test.

To test impersonation through the Event Viewer

  1. Select Start Menu, Event Viewer.

  2. In the left pane, right-click Security, then click Properties.

  3. Click the Filter tab on the Security property sheet.

  4. Verify that all Event Types are checked, and the Event Source and Category lists are set to All, then click OK to dismiss the property sheet.

    Your Event Viewer is now configured to display information about the HeaderVar associated with a resource request.

    Figure 17-5 Verifying Event Viewer Settings

    Graphic of Verifying Event Viewer Settings
  5. Create a new IIS virtual server (virtual site).

  6. Place a target Web page anywhere in the tree on the virtual site.

  7. Point your browser at the Web page.

If impersonation is working correctly, the Event Viewer will report the success of the access attempt.

17.6.6.3 Testing Impersonation using a Web Page

You can also test impersonation using a dynamic test page, such as an .asp page or a perl script, that can return and display information about the request.

To test impersonation through a Web page that displays server variables

  1. Create an .asp page or perl script that will display the parameters AUTH_USER and IMPERSONATE, which can resemble the sample page presented in the following listing:

    Example 17-1 Sample .ASP Page Code

    <TABLE border=1>
           <TR>
                 <TD>Variable</TD>
                 <TD>&nbsp&nbsp</TD>
                 <TD>Value</TD></TR>
           <%for each servervar in request.servervariables%>
           <TR>
                 <TD><%=servervar%></TD>   
                 <TD>&nbsp&nbsp</TD>
                 <TD><%=request.servervariables(servervar)%>&nbsp</TD>
           </TR>
    
  2. Create an IIS virtual site, or use the one you created for the previous task.

  3. Place an .asp page or perl script (such as the sample in the preceding listing) anywhere in the tree of the new virtual site.

  4. Point your browser at the page, which should appear, with both AUTH_USER and IMPERSONATE set to the name of the user making the request.

17.6.6.4 Negative Testing for Impersonation

To conduct negative testing for impersonation, you need to unbind the trusted user from the WebGate, as explained in the following procedure.

To unbind the trusted user from your WebGate

  1. Log in to the Access System Console at a URL similar to the following:

    http://hostname.domain.com:port/access/oblix

    Where hostname is the DNS name of the computer hosting your Access Manager, domain is the name of the server domain to which the machine belongs, and port is the number of the port to which Access Manager listens.

  2. Select Access System Console, then click Access System Configuration, then click AccessGate Configuration.

  3. Select the name of the Webgate that you want to modify.

    The Details for AccessGate page appears with a summary of the configuration information for this WebGate. At the bottom of this Web page are fields for Impersonation Username and Impersonation Password.

  4. Click the Modify button at the bottom of the Details for AccessGate page.

    The Modify AccessGate page appears.

  5. Remove the credentials for the trusted user.

  6. Click Save.

    You return to the Details page.

  7. Restart the IIS server.

  8. Point your browser at the sample .ASP code page that you created in "To test impersonation through a Web page that displays server variables".

    An error message page should appear. Values for AUTH_USER and IMPERSONATE are necessary for impersonation credentials to be bound to a WebGate.

17.7 Completing the SharePoint Server Integration

You need to complete several procedures to set up a Oracle Access Manager/SharePoint Server integration.

Task overview: Setting up the SharePoint Server integration

  1. Set up IIS security, as described in "Configuring IIS Security".

  2. Configure the wildcard extension for each SharePoint Server virtual server for which you wish to enable integration, as described in "Configuring the Wildcard Extension".

  3. Edit the web.config file, as described in "Editing web.config".

  4. Test the integration, as described in "Testing Your Integration".

17.7.1 Configuring IIS Security

Be sure to configure IIS Security before you continue.

To configure IIS Security for the SharePoint Server integration

  1. Select Start, Administrative Tools, Internet Information Services (IIS) Manager.

  2. Click the plus icon (+) to the left of the local computer icon on the tree in the left pane.

  3. Click Web Sites on the tree in the left pane.

  4. Right-click the icon on the tree in the left pane that represents the SharePoint Server server you are protecting with your WebGate, then select Properties from the menu.

  5. In the property sheet for the SharePoint Server server, click the Directory Security tab.

  6. In the Authentication and access control section of the Directory Security tab, click Edit.

  7. In the Authentication Methods panel, click the box labelled Enable anonymous access so that a check appears, then click OK to complete the task.

Note:

Enable anonymous access does not enable anonymous users to access the SharePoint Server. Rather, this setting configures IIS to relinquish access control to the Access System.

Figure 17-6 Configuring IIS Security

Graphic of IIS Security Configuration.

17.7.2 Configuring the Wildcard Extension

You are ready to configure the wildcard extension for each SharePoint Portal Server virtual server for which you wish to enable integration.

To configure the wildcard extension for SharePoint Portal Server virtual servers

  1. Select Start, Administrative Tools, Internet Information Services (IIS) Manager.

  2. Click the plus icon (+) to the left of the local computer icon on the tree in the left pane.

  3. Click Web Sites on the tree in the left pane.

  4. Right-click the icon representing your SharePoint Portal Server server, then click Properties on the menu.

  5. Click the Home Directory tab.

  6. Click the Configuration button.

  7. In the list box for Wildcard application maps, click the entry for IISImpersonationExtension.dll to highlight it, then click Edit.

  8. Ensure that the box is unchecked.

  9. Verify that the file exists, then click OK three times to close the Add/Edit panel, the Application Configuration panel and the property sheet for your portal server.

Figure 17-7 Configuring the Wildcard Extension

Graphic of configuring the Wildcard Extension

17.7.3 Editing web.config

Add the following line to the web.config file.

<add key = "SPS-EnforceIISAnonymousSetting" value="false" />

To edit web.config for the SharePoint Portal Server integration

  1. Open Windows Explorer and navigate to the document root of your IIS Web site.

  2. Use any text editor to open the XML file web.config.

  3. Locate the appSettings markers at the end of the file, or create them if they do not exist:

    <Configuration>
    // [Various configuration settings]
    <appSettings>
    // [Insert "<add key . . .>" here.]
    </appSettings >
    </Configuration>
    

    Important:

    The appSettings markers are case sensitive and must appear as appSettings.
  4. Add the following line where indicated in the previous listing:

    <add key = "SPS-EnforceIISAnonymousSetting" value="false" />
    
  5. Save web.config.

  6. Restart IIS so that the new setting will take effect by completing the following steps:

    1. Select Start Menu, Internet Information Services (IIS) Manager.

    2. In the tree in the left pane, locate the name of the local computer hosting your SharePoint Portal Server installation and write it down; you will need the name of this computer to restart IIS.

    3. Right-click the local computer icon and select Disconnect from the menu.

    4. After the warning asks if you really want to disconnect, click Yes to confirm the action.

      The local computer icon disappears from the tree in the left pane, indicating that IIS has been shut down on that machine.

    5. In the tree in the left pane, right-click the Internet Information Services icon and click Connect on the menu.

    6. In the Connect to computer panel, type the name of the computer hosting your SharePoint Portal Server installation, then click OK to restart IIS.

Figure 17-8 Restarting IIS after Editing web.config

Graphic of restarting IIS after editing web.config

17.7.4 Synchronizing User Profiles Between Directories

You need to synchronize user profiles between the SharePoint Portal Server directory and the Oracle Access Manager directory:

  • Uploading user data—If your Oracle Access Manager installation is configured for any directory server other than SharePoint Active Directory, you must load the user profiles that reside on the other directory server to SharePoint Active Directory.

  • Importing user profiles in SharePoint Portal Server—After uploading the user profiles, you need to import the profiles from Active Directory to SharePoint Portal Server.

To configure importing user profiles in SharePoint Portal Server

  1. Go to Site Settings.

  2. Under User Profile, Audiences, and Personal Sites, click Manage Profile Database.

  3. To configure user profile imports from Active Directory, click Configure Profile Import.

17.7.5 Testing Your Integration

After you complete the tasks to enable integration, you should test to verify that integration is working.

This section contains the following topics:

17.7.5.1 Testing the SharePoint Portal Server Integration

You want to verify that a user can access SharePoint Portal Server resources through Oracle Access Manager authentication and SharePoint Portal Server authorization.

To test your SharePoint Portal Server integration

  1. Navigate to any SharePoint Portal Server Web page using your browser.

    The Access System challenges you for credentials.

  2. Log in by supplying the necessary credentials, then verify that the page you requested is visible.

  3. Optional: Check the Event Viewer to confirm that the access request was successful.

17.7.5.2 Testing Single Sign-On for the SharePoint Portal Server Integration

You should also test single sign-on by demonstrating that a user who has just supplied credentials and accessed an SharePoint Portal Server resource can (before the ObSSOCookie expires) access a non-SharePoint Portal Server resource without having to supply credentials a second time. For example, use a resource defined in the Policy Manager.

When single sign-on is working, you should be granted access to the page without having to supply credentials a second time.

To test single sign-on for your SharePoint Portal Server integration

  1. Create and protect a new virtual site with a policy domain (or use one you have already created.

  2. Place a Web page anywhere in the tree of this virtual site.

  3. Using a browser, navigate to the page in the new virtual site.

    If you have already passed authentication, you should be granted access to the page without having to supply credentials a second time.