sion

Oracle Fusion Middleware : Oracle Identity and Access Management Suite 10g/11gR1/11gR2PS1,PS2,PS3 : OIM | OAM,OAAM,OIF | OID, OVD, DIP | OUD/ ODSEE | Microsft AD | OpenLDAP | ADF | EBS R12 | OECMCCR4 | Business Intelleigence - Bi Publisher | Banking | Demo Applications | Core Java | SQL | PLSQL | Web services | Weblogic | Tomcat | JBoss | OHS | WebGate | WebCenter | In any Queries please Contact Me : info@oratechsoft.com

Search This Blog

Sunday, 12 March 2017

OAM Patches | Bundle Patches

OAM Bundle Patch Release History (Doc ID 736372.1)


In this Document

Description
Occurrence
Symptoms
Workaround
 11.1.2.3.x OAM Bundle Patch History
 11.1.2.2.x OAM Bundle Patch History
 11.1.2.1.x OAM Bundle Patch History
 11.1.2.0.x OAM Bundle Patch History
 11.1.1.7.x OAM Bundle Patch History
 11.1.1.5.x OAM Bundle Patch History
 11.1.1.3.x OAM Bundle Patch History
 10.1.4.3.x OAM Bundle Patch History
 10.1.4.2.x OAM Bundle Patch History
 10.1.4.0.x OAM Bundle Patch History
 7.0.4.3.x OAM Bundle Patch History
History
References

Applies to:

COREid Access - Version 7.0.4 to 10.1.4 [Release 7.0.4 to 10g]
Oracle Mobile and Social - Version 11.1.2.0.0 to 11.1.2.3.0 [Release 11gR2]
Oracle Identity Federation - Version 11.1.2.0.0 and later
Oracle Security Token Service - Version 11.1.2.2.0 to 11.1.2.3.0 [Release 11g]
Oracle Access Manager - Version 11.1.1.3.0 to 11.1.2.3.0 [Release 11g]
Information in this document applies to any platform.

Description

Starting November 1st, 2007 the OAM team will follow a new OAM Patchset release process. Refer to Metalink note Note:466993.1 for full details on the new patchset release process.
This document will be continually updated to list the OAM bundle patch release history.

Occurrence

Review the following tables to find the latest bundle patch for various OAM product releases.

Symptoms

For more information please contact Oracle Support by opening a new service request for the Oracle Access Manager product.

Workaround

Review the following tables to find the latest bundle patch for various OAM product releases.
There are a several products under the OAM parent product that do not have Bundle Patches, at this time. Any interim patches that are released for these products are rolled into future Bundle Patches for the OAM product. These child products include the following:

    Oracle Mobile and Social (OAMMS)
    Oracle Identity Federation (OIF)
    Oracle Security Token Service (STS)

11.1.2.3.x OAM Bundle Patch History

The bundle patches listed below must be applied on top of an existing 11.1.2.3.0 installation. The below bundle patches do not include the 11.1.2.3.0 release.
Beginning with the PS3 release in July 2015, the OAM 11.1.2.3.0 Access Server bundle patch was on a monthly cadence as well as the latest OAM 11.1.2.3.x being included in the quarterly Identity Management Suite Bundle Patch. However, beginning in October 2015, IDM 11.1.2.3 bundle patches, including OAM 11.1.2.3 bundle patches, will be released on a quarterly basis with the quarterly Identity Management Suite Bundle Patch.
The ASDK and OAM webgate bundle patches are scheduled and released only when there are sufficient bug fixes to warrant a bundle patch, otherwise ASDK and webgate fixes will be released as individual one-off patches (outside of the Identity Management Suite Bundle Patch).
It is important to note that Access Server patch numbers listed below will reference the product Oracle Identity Management Suite which will include bundle patches for OAM, OIM, OAAM, and OES or the individual bundle patch as appropriate. Install each bundle patch as appropriate for your environment. For more information regarding the Identity Management Suite Bundle Patch see note 1494151.1.

As of April 2016, the 5-digit of the bundle version is changing to reflect the date of the release. For example, 11.1.2.3.6 will be called 11.1.2.3.160419 to reflect the release date of April 10, 2016. 

BundlePlatformPatch NumberRelease DateDocumentation
11.1.2.3.1 (BP01) Access Server Generic patch:21169810 7/14/2015 Oracle Access Manager Bundle Patch: 11.1.2.3.1 PDF
11.1.2.3.1 (BP01) Webgate Linux 64-bit
Solaris 64-bit
HP-Itanium
AIX
patch:21118593 7/14/2015 Oracle Access Manager WebGate Bundle Patch: 11.1.2.3.1 PDF
11.1.2.3.2 (BP02) Access Server Generic patch:21544485 8/18/2015 Oracle Access Manager Bundle Patch: 11.1.2.3.2 PDF
11.1.2.3.3 (BP03) Access Server Generic patch:21869176 9/21/2015 Oracle Access Manager Bundle Patch: 11.1.2.3.3 PDF
11.1.2.3.4 (BP04) Access Server Generic patch:21698880 10/20/2015 Oracle Access Manager Bundle Patch: 11.1.2.3.4 PDF
11.1.2.3.5 (BP05) Access Server Generic patch:22085274 1/20/2016 Oracle Access Manager Bundle Patch: 11.1.2.3.5 PDF
11.1.2.3.160419 (BP06) Access Server Generic patch:22675286 5/6/2016 Oracle Access Manager Bundle Patch: 11.1.2.3.160419.PDF
11.1.2.3.160419 (BP02) Webgate Linux 64-bit
Windows 64-bit
Linux 32-bit
AIX
Solaris Sparc 64-bit
HP-Itanium
patch:22595401 4/19/2016 Oracle Access Manager WebGate Bundle Patch: 11.1.2.3.160419 PDF
11.1.2.3.160719 (BP07) Access Server  Generic This BP has been removed due to issued identified with the release. See MOS note:2194526.1 for more details. 7/19/2016  
11.1.2.3.160719 (BP03) Webgate Linux 64-bit
Windows 64-bit
Linux 32-bit
AIX
Solaris Sparc 64-bit
HP-Itanium
This BP has been removed due to issued identified with the release. See MOS note:2194526.1 for more details. 7/19/2016  
11.1.2.3.161018 (BP08) Access Server Generic patch:24326201 10/18/2016 Oracle Access Manager Bundle Patch: 11.1.2.3.161018 PDF
11.1.2.3.161018 (BP04) Webgate Linux 64-bit
Windows 64-bit
Linux 32-bit
AIX
Solaris Sparc 64-bit
HP-Itanium
Solaris x86-64
patch:24323167 10/18/2016 Oracle Access Manager WebGate Bundle Patch: 11.1.2.3.161018 PDF
11.1.2.3.170117 (BP09) Access Server Generic patch:25038775 1/17/2017 Oracle Access Manager Bundle Patch: 11.1.2.3.170117 PDF
11.1.2.3.170117 (BP05) Webgate Linux 64-bit
Windows 64-bit
Linux 32-bit
AIX
Solaris Sparc 64-bit
HP-Itanium
Solaris x86-64
patch:24916846 1/17/2017 Oracle Access Manager WebGate Bundle Patch: 11.1.2.3.170117 PDF

11.1.2.2.x OAM Bundle Patch History

The bundle patches listed below must be applied on top of an existing 11.1.2.2.0 installation. The below bundle patches do not include the 11.1.2.2.0 release.

Note that the OAM 11.1.2.2.1 Access Server is delivered as part of the Identity Management Suite Bundle Patch. All future 11.1.2.x Access Server bundle patches will be part of the Identity Management Suite Bundle Patch while any ASDK and WebGate bundle patches will be delivered as individual releases. It is important to note that Access Server patch numbers listed below will reference the product Oracle Identity Management Suite which will include bundle patches for OAM, OIM, OAAM, and OES. Install each bundle patch as appropriate for your environment.

For more information regarding the Identity Management Suite Bundle Patch see note 1494151.1.

BundlePlatformPatch NumberRelease DateDocumentation
 11.1.2.2.1 (BP01) Access Server Generic  patch:18333689  4/15/2014 Oracle Access Manager Bundle Patch: 11.1.2.2.1 PDF
11.1.2.2.2 (BP02) Access Server Generic patch:18662903 7/15/2014 Oracle Access Manager Bundle Patch: 11.1.2.2.2 PDF
11.1.2.2.3 (BP03) Access Server Generic patch:19157573 10/14/2014 Oracle Access Manager Bundle Patch: 11.1.2.2.3 PDF
11.1.2.2.4 (BP04) Access Server Generic patch:19718347 1/20/2015 Oracle Access Manager Bundle Patch: 11.1.2.2.4 PDF
11.1.2.2.5 (BP05) Access Server Generic patch:20533052 4/14/2015 Oracle Access Manager Bundle Patch: 11.1.2.2.5 PDF
11.1.2.2.6 (BP06) Access Server Generic patch:20963120 7/14/2015 Oracle Access Manager Bundle Patch: 11.1.2.2.6 PDF
11.1.2.2.7 (BP07) Access Server Generic patch:21660126 10/20/2015 Oracle Access Manager Bundle Patch: 11.1.2.2.7 PDF
11.1.2.2.8 (BP08) Access Server Generic patch:22085294 1/20/2016 Oracle Access Manager Bundle Patch: 11.1.2.2.8 PDF

11.1.2.1.x OAM Bundle Patch History

The bundle patches listed below must be applied on top of an existing 11.1.2.1.0 installation. The below bundle patches do not include the 11.1.2.1.0 release.

Note that the OAM 11.1.2.1.1 Access Server is delivered as part of the Identity Management Suite Bundle Patch. All future 11.1.2.x Access Server bundle patches will be part of the Identity Management Suite Bundle Patch while any ASDK and WebGate bundle patches will be delivered as individual releases. It is important to note that Access Server patch numbers listed below will reference the product Oracle Identity Management Suite which will include bundle patches for OAM, OIM, OAAM, and OES. Install each bundle patch as appropriate for your environment.

For more information regarding the Identity Management Suite Bundle Patch see note 1494151.1.

BundlePlatformPatch NumberRelease DateDocumentation
 11.1.2.1.1 (BP01) Access Server Generic  patch:16672826  7/16/2013 Oracle Access Manager Bundle Patch: 11.1.2.1.1 PDF
11.1.2.1.1 (BP01) ASDK Generic patch:16774301 7/16/2013  
11.1.2.1.2 (BP02) Access Server Generic patch:17179015 1/14/2014 Oracle Access Manager Bundle Patch: 11.1.2.1.2 PDF
11.1.2.1.3 (BP03) Access Server Generic patch:18138998 4/15/2014 Oracle Access Manager Bundle Patch: 11.1.2.1.3 PDF
11.1.2.1.4 (BP04) Access Server Generic patch:19157616  10/14/2014 Oracle Access Manager Bundle Patch: 11.1.2.1.4 PDF

11.1.2.0.x OAM Bundle Patch History

The bundle patches listed below must be applied on top of an existing 11.1.2.0.0 installation. The below bundle patches do not include the 11.1.2.0.0 release.

Note that the OAM 11.1.2.0.1 Access Server is delivered as part of the Identity Management Suite Bundle Patch. All future 11.1.2.x Access Server bundle patches will be part of the Identity Management Suite Bundle Patch while any ASDK and WebGate bundle patches will be delivered as individual releases. It is important to note that Access Server patch numbers listed below will reference the product Oracle Identity Management Suite which will include bundle patches for OAM, OIM, OAAM, and OES. Install each bundle patch as appropriate for your environment.

For more information regarding the Identity Management Suite Bundle Patch see note 1494151.1.

BundlePlatformPatch NumberRelease DateDocumentation
 11.1.2.0.1 (BP01) Access Server Generic  patch:14606628  10/16/2012 Oracle Access Manager Bundle Patch: 11.1.2.0.1 PDF
11.1.2.0.2 (BP02) Access Server Generic patch:14760806 1/15/2013 Oracle Access Manager Bundle Patch: 11.1.2.0.2 PDF
11.1.2.0.2 (BP02) WebGates Linux
Linux 64-bit
Windows
Windows 64-bit
Solaris 64-bit
Solaris Intel 64-bit
AIX
patch:14572136 1/15/2013 Oracle Access Manager WebGate Bundle Patch: 11.1.2.0.2 PDF 
11.1.2.0.2 (BP02) ASDK Generic patch:14572134 1/15/2013  
11.1.2.0.3 (BP03) Access Server Generic patch:16170896 7/16/2013 Oracle Access Manager Bundle Patch: 11.1.2.0.3 PDF
11.1.2.0.3 (BP03) WebGates AIX
Linux
Sparc 64
Linux x64
Solaris x86-64
Windows
Windows 64bit
patch:16692499 7/16/2013 Oracle Access Manager WebGate Bundle Patch: 11.1.2.0.3 PDF
11.1.2.0.4 (BP04) Access Server Generic
patch:17178993 10/15/2013 Oracle Access Manager Bundle Patch: 11.1.2.0.4 PDF
11.1.2.0.4 (BP04) Webates
(October 2013 Webgates)
Linux
Linux 64-bit
Windows
Windows 64-bit
AIX
Solaris 64-bit
Solaris Intel 64-bit
patch:17354916 1/27/2014 Oracle Access Manager WebGate Bundle Patch: 11.1.2.0.4 PDF
11.1.2.0.5 (BP05) Access Server  Generic patch:17567965  1/19/2014 Oracle Access Manager Bundle Patch: 11.1.2.0.5 PDF

11.1.1.7.x OAM Bundle Patch History

The bundle patches listed below must be applied on top of an existing 11.1.1.7.0 installation. The below bundle patches do not include the 11.1.1.7.0 release.

Note that beginning with the OAM 11.1.1.7.1 the Access Server bundle patch will delivered as part of the Identity Management Suite Bundle Patch. All future 11.1.1.7.x Access Server bundle patches will be part of the Identity Management Suite Bundle Patch while any ASDK and WebGate bundle patches will be delivered as individual releases. It is important to note that Access Server patch numbers listed below will reference the product Oracle Identity Management Suite which will include bundle patches for OAM, OIM, OAAM, and OES. Install each bundle patch as appropriate for your environment.

For more information regarding the Identity Management Suite Bundle Patch see note 1494151.1.

BundlePlatformPatch NumberRelease DateDocumentation
11.1.1.7.1 (BP01) Access Server Generic patch:18116639 4/15/2014 Oracle Access Manager Bundle Patch: 11.1.1.7.1 PDF
11.1.1.7.2 (BP02) Access Server Generic patch:19730938 10/14/2014 Oracle Access Manager Bundle Patch: 11.1.1.7.2 PDF
11.1.1.7.3 (BP03) Access Server Generic patch:19822601 1/20/2015 Oracle Access Manager Bundle Patch: 11.1.1.7.3 PDF
11.1.1.7.4 (BP04) Access Server Generic patch:20385315 4/14/2015 Oracle Access Manager Bundle Patch: 11.1.1.7.4 PDF
11.1.1.7.5 (BP05) Access Server Generic patch:21033489 7/14/2015 Oracle Access Manager Bundle Patch: 11.1.1.7.5 README
11.1.1.7.1 (BP01) Webgate Solaris x86-64
HP-Itanium
HP-UX
Power AIX
Linux 32-bit
Windows 32-bit
Sparc 64-bit
Windows 64-bit
Linux 64-bit
patch:22218959 7/19/2016 Oracle Access Manager WebGate Bundle Patch: 11.1.1.7.1 PDF

11.1.1.5.x OAM Bundle Patch History

The bundle patches listed below must be applied on top of an existing 11.1.1.5.0 installation. The below bundle patches do not include the 11.1.1.5.0 release.

Note that beginning with the OAM 11.1.1.5.4 the Access Server bundle patch will delivered as part of the Identity Management Suite Bundle Patch. All future 11.1.1.5.x Access Server bundle patches will be part of the Identity Management Suite Bundle Patch while any ASDK and WebGate bundle patches will be delivered as individual releases. It is important to note that Access Server patch numbers listed below will reference the product Oracle Identity Management Suite which will include bundle patches for OAM, OIM, OAAM, and OES. Install each bundle patch as appropriate for your environment.

For more information regarding the Identity Management Suite Bundle Patch see note 1494151.1.

BundlePlatformPatch NumberRelease DateDocumentation
11.1.1.5.1 (BP01) Access Server Generic patch:12733108 9/02/2011 Oracle Access Manager Bundle Patch: 11.1.1.5.1 PDF
11.1.1.5.1 (BP01) Webgates HPUX (64-bit)
HP-Itanium
Solaris
Linux
Linux x64
AIX
Win32
Win64
patch:12756804 9/02/2011 Oracle Access Manager Webgate Bundle Patch: 11.1.1.5.1 PDF
11.1.1.5.2 (BP02) Access Server Generic patch:13115859 2/13/2012 Oracle Access Manager Bundle Patch: 11.1.1.5.2 PDF
11.1.1.5.2 (BP02) Webgates HPUX 64-bit
Solaris 64-bit
HP-Itanium
Linux
Linux x64
Win64
AIX
Win32
patch:13453929 2/13/2012 Oracle Access Manager Webgate Bundle Patch: 11.1.1.5.2 PDF
11.1.1.5.3 (BP03) Access Server Generic patch:13473393 5/28/2012 Oracle Access Manager Bundle Patch: 11.1.1.5.3 PDF
11.1.1.5.3 (BP03) Webgates HP-UX 64bit
Solaris 64bit
HP Itanium
Linux
Linux 64bit
Windows
Windows 64bit
AIX
patch:13815418 5/28/2012 Oracle Access Manager Webgate Bundle Patch: 11.1.1.5.3 PDF
11.1.1.5.3 (BP03) ASDK Generic patch:14026048 5/28/2012  
11.1.1.5.4 (BP04) Access Server Generic patch:14609562 10/16/2012 Oracle Access Manager Bundle Patch: 11.1.1.5.4 PDF
11.1.1.5.4 (BP04) Webgate Windows
Solaris SPARC 64-bit
AIX
Windows 64bit
Linux
Linux 64bit
HP Itanium
Solaris x86-64
HP-UX 64bit
patch:14466702 10/16/2012 Oracle Access Manager Webgate Bundle Patch: 11.1.1.5.4 PDF 
11.1.1.5.4 (BP04) ASDK Generic patch:14466691 10/16/2012  
11.1.1.5.5 (BP05) Access Server Generic patch:14760839 1/15/2013 Oracle Access Manager Bundle Patch: 11.1.1.5.5 PDF
11.1.1.5.5 (BP05) Webgates Linux
Solaris SPARC
Solaris X64
Windows
HP-Itanium
AIX
HP PA-RISC
patch:14828904 1/15/2013 Oracle Access Manager Webgate Bundle Patch: 11.1.1.5.5 PDF
11.1.1.5.5 (BP05) ASDK Generic patch:14828910 1/15/2013  
11.1.1.5.6 (BP06) Access Server Generic patch:17178952 10/15/2013 Oracle Access Manager Bundle Patch: 11.1.1.5.6 PDF
October 2013 11.1.1.5 Webgate MLR Patch Linux
Linux 64-bit
Windows
Windows 64-bit
AIX
Solaris 64-bit
Solaris Intel 64-bit
HP Itanium 64-bit
HP RISC
patch:17184828 10/15/2013  
April 2014 11.1.1.5 WebGate  MLR Patch Linux
Linux 64-bit
Windows
Windows 64-bit
AIX
Solaris 64-bit
Solaris Intel 64-bit
HP Itanium 64-bit
HP RISC 64-bit
patch:18355263 4/15/2014  
11.1.1.5.7 (BP07) Access Server Generic patch:19730928 10/14/2014 Oracle Access Manager Bundle Patch: 11.1.1.5.7 PDF
11.1.1.5.8 (BP08) Access Server Generic patch:19822595 1/20/2015 Oracle Access Manager Bundle Patch: 11.1.1.5.8 PDF
11.1.1.5.9 (BP09) Access Server Generic patch:20385295 4/14/2015 Oracle Access Manager Bundle Patch: 11.1.1.5.9 PDF

11.1.1.3.x OAM Bundle Patch History

The bundle patches listed below must be applied on top of an existing 11.1.1.3.0 installation. The below bundle patches do not include the 11.1.1.3.0 release.

BundlePlatformPatch NumberRelease DateDocumentation
11.1.1.3.1 (BP01) Generic patch:10094106 10/20/2010 Oracle Access Manager Bundle Patch: 11.1.1.3.1 PDF
11.1.1.3.2 (BP02) Generic patch:10368022 2/16/2011 Oracle Access Manager Bundle Patch: 11.1.1.3.2 PDF
11.1.1.3.3 (BP03) Access Server Generic patch:12365301 5/31/2011 Oracle Access Manager Bundle Patch: 11.1.1.3.3 PDF
11.1.1.3.3 (BP03) Webgates HPUX 64-bit
Solaris 64-bit
HP-Itanium
Linux
Linux x64
AIX
Windows 32-bit
Windows 64-bit
patch:12371848 5/31/2011 Oracle Access Manager Webgate Bundle Patch: 11.1.1.3.3 PDF
11.1.1.3.4 (BP04) Generic patch:13087175 12/5/2011 Oracle Access Manager Bundle Patch: 11.1.1.3.4 PDF

10.1.4.3.x OAM Bundle Patch History

The bundle patches listed below must be applied on top of an existing 10.1.4.3.0 installation. The below bundle patches do not include the 10.1.4.3.0 release.

The 10.1.4.3.0 installer release, for customers starting from a new environment, can be downloaded from OTN at http://www.oracle.com/technology/software/products/middleware/htdocs/fmw_11_download.html.

The 10.1.4.3.0 patch set release, for customers starting from a 10.1.4.2.0 environment, can be downloaded from My Oracle Support ( https://support.oracle.com/ ) by searching for patch number patch:8276055.

If you are upgrading from OAM base version 10.1.4.2.0 you must remove any existing 10.1.4.2 bundle patch before installing the 10.1.4.3.0 patchset (patch 8276055).

The 10.1.4.3.0 SNMP Agent files can be downloaded from OTN using the following links. This is a fix for bug number 9924389. The following platforms are available:
Windows, Linux, Solaris

BundlePlatformPatch NumberRelease DateDocumentation
10.1.4.3.0_BP01 Windows
Linux
Solaris
patch:8584399 12/28/2009 Oracle Access Manager Bundle Patch: 10.1.4.3.0_BP01 PDF
10.1.4.3.0_BP02 Windows
Linux
Solaris
patch:9099113 3/23/2010 Oracle Access Manager Bundle Patch: 10.1.4.3.0_BP02 PDF
10.1.4.3.0_BP03 Windows
Linux
Solaris
patch:9402573 5/07/2010 Oracle Access Manager Bundle Patch: 10.1.4.3.0_BP03 PDF
10.1.4.3.0_BP04 Windows
Linux
Solaris
patch:9554723 8/18/2010 Oracle Access Manager Bundle Patch: 10.1.4.3.0_BP04 PDF
10.1.4.3.0_BP05 Linux
Windows
Solaris
Power-AIX
HP-UX
HPUX-Itanium
patch:9814991 11/30/2010 Oracle Access Manager Bundle Patch: 10.1.4.3.0_BP05 PDF
10.1.4.3.0_BP06 Windows
Linux
Solaris
patch:10044040 1/14/2011 Oracle Access Manager Bundle Patch: 10.1.4.3.0_BP06 PDF
10.1.4.3.0_BP07 Windows
Linux
Solaris
HPUX-Itanium
Power-AIX
patch:11682261 3/22/2011 Oracle Access Manager Bundle Patch: 10.1.4.3.0_BP07 PDF
10.1.4.3.0_BP08 Linux
Windows
Solaris
HP Itanium
AIX
patch:11857232 5/20/2011 Oracle Access Manager Bundle Patch: 10.1.4.3.0_BP08 PDF
10.1.4.3.0_BP09 Windows
Linux
Solaris
patch:12363955 7/14/2011 Oracle Access Manager Bundle Patch: 10.1.4.3.0_BP09 PDF
10.1.4.3.0_BP10 Windows
Linux
Solaris
patch:12634990 9/12/2011 Oracle Access Manager Bundle Patch: 10.1.4.3.0_BP10 PDF
10.1.4.3.0_BP11 HP
Linux
Windows
Solaris
AIX
patch:12845239 12/1/2011 Oracle Access Manager Bundle Patch: 10.1.4.3.0_BP11 PDF
10.1.4.3.0_BP12 Linux
Linux x64
Windows
Solaris
patch:13411955 3/15/2012 Oracle Access Manager Bundle Patch: 10.1.4.3.0_BP12 PDF
10.1.4.3.0_BP13 Linux
Microsoft Windows
Solaris
Power AIX
patch:13718105 1/15/2013 Oracle Access Manager Bundle Patch: 10.1.4.3.0_BP13 PDF

10.1.4.2.x OAM Bundle Patch History

The bundle patches listed below must be applied on top of an existing 10.1.4.2.0 installation. The below bundle patches do not include the 10.1.4.2.0 release. However, if needed, the 10.1.4.2.0 patch can be downloaded from metalink under Patch:5957301. There are additional 10.1.4.2.0 components available in patch:6776024.

Note: The 10.1.4.2 BP11 bundle patch will be the LAST bundle patch for the 10.1.4.2 code line.

BundlePlatformPatch NumberRelease DateDocumentation
10.1.4.2.0_BP01 Windows
Linux
Solaris
patch:6659126 1/18/2008 Oracle Access Manager Bundle Patch: 10.1.4.2.0_BP01 PDF
10.1.4.2.0_BP02 Windows
Linux
Solaris
patch:6748699 3/31/2008 Oracle Access Manager Bundle Patch: 10.1.4.2.0_BP02 PDF
10.1.4.2.0_BP03 Windows
Linux
Solaris
AIX
patch:6799354 5/26/2008 Oracle Access Manager Bundle Patch: 10.1.4.2.0_BP03 PDF
10.1.4.2.0_BP04 Windows
Linux
Solaris
AIX
patch:7113405 7/24/2008 Oracle Access Manager Bundle Patch: 10.1.4.2.0_BP04 PDF
10.1.4.2.0_NPTL Linux patch:7305519 9/5/2008 NPTL-enabled OAM PDF
10.1.4.2.0_BP05 Windows
Linux
Solaris
AIX
patch:7342498 10/20/2008 Oracle Access Manager Bundle Patch: 10.1.4.2.0_BP05 PDF
10.1.4.2.0_BP06 Windows
Linux
Solaris
AIX
HP-Itanium
Linux 32 bit
Linux 64 bit
patch:7408035 12/2/2008 Oracle Access Manager Bundle Patch: 10.1.4.2.0_BP06 PDF
10.1.4.2.0_BP07 Windows
Linux
Solaris
patch:7537346 2/27/2009 Oracle Access Manager Bundle Patch: 10.1.4.2.0_BP07 PDF
10.1.4.2.0_BP08 Windows
Linux
Solaris
patch:7695616 5/6/2009 Oracle Access Manager Bundle Patch: 10.1.4.2.0_BP08 PDF

Oracle Access Manager Bundle Patch: 10.1.4.2.0_BP08 Addendum for Secure Logging
10.1.4.2.0_BP09 Windows
Linux
Solaris
patch:8350593 7/22/2009 Oracle Access Manager Bundle Patch: 10.1.4.2.0_BP09 PDF
10.1.4.2.0_BP10 Windows
Linux
Solaris
patch:8584388 10/20/2009 Oracle Access Manager Bundle Patch: 10.1.4.2.0_BP10 PDF
10.1.4.2.0_BP11 Windows
Linux
Solaris
patch:8829778 2/15/2010 Oracle Access Manager Bundle Patch: 10.1.4.2.0_BP11 PDF

10.1.4.0.x OAM Bundle Patch History

The bundle patches listed below must be applied on top of an existing 10.1.4.0.1 installation. The below bundle patches do not include the 10.1.4.0.1 base release. The 10.1.4.0.1 base release can be downloaded from OTN using this link.

BundlePlatformPatch NumberRelease DateDocumentation
10.1.4.0.1_BP01 Windows
Linux
Solaris
patch:6602592 11/30/2007 Oracle Access Manager Bundle Patch: 10.1.4.0.1_BP01 PDF
10.1.4.0.1_BP02 Windows
Linux
Solaris
patch:6623277 1/3/2008 Oracle Access Manager Bundle Patch: 10.1.4.0.1_BP02 PDF
10.1.4.0.1_BP03 Solaris patch:7135436 11/14/2008 Oracle Access Manager Bundle Patch: 10.1.4.0.1_BP03 PDF

7.0.4.3.x OAM Bundle Patch History

The bundle patches listed below must be applied on top of an existing 7.0.4.3.0 installation. The below bundle patches do not include the 7.0.4.3.0 release. However, if needed, the 7.0.4.3.0 patch can be downloaded from metalink using Patch:5529705.

Note: The 7.0.4.3 BP09 bundle patch will be the LAST bundle patch for 7.0.4.3 code line. Additionally OAM/COREid version 7.0.4.3 will be desupported on 31-Dec-2009.

BundlePlatformPatch NumberRelease DateDocumentation
7.0.4.3_BP01 Windows
Linux
Solaris
HP-UX
patch:6610532 12/14/2007 Oracle Access Manager Bundle Patch: 7.0.4.3_BP01 PDF
7.0.4.3_BP02 Windows
Linux
Solaris
patch:6799238 5/1/2008 Oracle Access Manager Bundle Patch: 7.0.4.3_BP02 PDF
7.0.4.3_BP03 Windows
Linux
Solaris
patch:7023600 6/16/2008 Oracle Access Manager Bundle Patch: 7.0.4.3_BP03 PDF
7.0.4.3_BP04 Windows
Linux
Solaris
AIX
patch:7116514 8/30/2008 Oracle Access Manager Bundle Patch: 7.0.4.3_BP04 PDF
7.0.4.3_BP05 Windows patch:7408061 10/22/2008 Oracle Access Manager Bundle Patch: 7.0.4.3_BP05 PDF
7.0.4.3_BP06 Windows patch:7570268 1/5/2009 Oracle Access Manager Bundle Patch: 7.0.4.3_BP06 PDF
7.0.4.3_BP07 Windows
Linux
Solaris
patch:8350503 6/3/2009 Oracle Access Manager Bundle Patch: 7.0.4.3_BP07 PDF
7.0.4.3_BP08 Windows
Linux
Solaris
patch:8593692 8/31/2009 Oracle Access Manager Bundle Patch: 7.0.4.3_BP08 PDF
7.0.4.3_BP09 Windows patch:8854841 1/15/2010 Oracle Access Manager Bundle Patch: 7.0.4.3_BP09 PDF

History

** For Internal Use Only **
Click the note history link (paper icon) in the document details to get the full history of changes.

References

NOTE:1563072.1 - OAM 10g Bundle Patch Change History
NOTE:466993.1 - Details of the OAM Patch Bundle Process
NOTE:1081229.1 - Oracle Access Manager: Standard Packages Included in Version 10.1.4.3 Bundle Patches
Didn't find what you are looking for?
 

Saturday, 11 March 2017

Oracle Identity Manager API - Example

 
Oracle Identity Manager API 
 

  1. https://github.com/adharmad/oim-api-samples/tree/master/src/iamsamples
  2. https://blogs.oracle.com/sfehrman/entry/programmatically_provisioning_users_via_oracle
  3. http://massivegaze.blogspot.in/2015/05/oim-apis.html
  4. https://github.com/rayedchan/OIMUtilities 
  5. http://oraclestack.blogspot.in/2015/01/generate-requests-using-oim-api.html
  6. How To Run Oracle Identity Manager (OIM) API From Command Prompt? (Doc ID 801377.1)
  7. Getting started with OIM API’s using Eclipse (Doc ID 457649.1)
  8. https://paramanandmallik.wordpress.com/2015/04/29/modify-oim-users-in-bulk/
  9. http://techmeonline.com/creating-a-custom-attribute-oim-11g/
  10. http://docs.oracle.com/cd/E15586_01/doc.1111/e14308/conf_mangmnt.htm
    • Note 1279270.1 : Javadocs for Oracle Identity Manager 11g
    • Note 1262803.1 : OIM11g: Sample Code For A Custom Event Handler Implemented for Pre-Process Stage During Create User Management Operation
    • Note 1273464.1 : How To Use The OIM 11g Password Generator Feature To Generate Random Password For A User
    • Note 1268246.1 : OIM API 11g Services Sample Code using JDeveloper
    • Note 1268985.1 : Getting Started With OIM API 11g Using Ant
    • Note 1228035.1 : OIM11g: Sample Code For A Custom Username Generation Policy Plugin Using JDeveloper


    Regards
    Lakshmi Prasad Reddy 

OTS IAM Architecture




====================================================================

                                                          OIM Useful SQL Queries

====================================================================



*****************************************************************************************************************

User Details:

select * from USR where UPPER(usr_login)='username';

   
*****************************************************************************************************************
   
AUDIT:

select * from dev_oim.UPA_FIELDS UPA_FIELDS LEFT outer JOIN dev_oim.upa_usr  upa_USR ON upa_fields.upa_usr_key=upa_USR.UPA_USR_KEY where UPPER(upa_usr.usr_login) like 'userlogin';

   
*****************************************************************************************************************
   
Resource Audit:

select * from dev_oim.UPA_RESOURCE;

*****************************************************************************************************************
   
Plugins Info:

    select * from dev_oim.plugins;

*****************************************************************************************************************

Audit Table:

      select * from dev_oim.UPA where usr_key='userkey' order by upa_key desc;
     
     
****************************************************************************************************************

OIM Audit Table: Sample Queries to Find Who did What and When ?

     
      SELECT usr_key,   usr_login as changed_by_user,  upa_usr.upa_usr_eff_from_date AS changed_time,   field_name,   field_old_value,   field_new_value
 FROM upa_usr, upa_fields,   (SELECT field_new_value AS changed_by_user    FROM upa_fields
   WHERE upa_fields_key =  (SELECT MAX(upa_fields_key)      FROM upa_fields, upa_usr
     WHERE upa_usr.upa_usr_key = upa_fields.upa_usr_key
     AND upa_usr.usr_key = <>
     AND upa_fields.field_name ='Users.Updated By Login'
     )
   )
 WHERE upa_usr.upa_usr_key = upa_fields.upa_usr_key
 AND upa_usr.usr_key = <>;

*****************************************************************************************************************
Jar file:

    select * from dev_oim.oimhome_jars;

*****************************************************************************************************************

Provisioned/provisioning :

    SELECT OIU_KEY,    OIU.ORC_KEY, USR.USR_KEY,
            USR_LOGIN,
            OBJ_NAME,
            OST_STATUS
        FROM OIU,
              OST,
              OBI,
              OBJ,
              USR
            WHERE OIU.USR_KEY=USR.USR_KEY
            AND OIU.OST_KEY  =OST.OST_KEY
            AND OIU.OBI_KEY  =OBI.OBI_KEY
            AND OBJ.OBJ_KEY  =OBI.OBJ_KEY
            AND USR.USR_LOGIN=UPPER('TUSER13')
            ORDER BY OIU_KEY;



*****************************************************************************************************************

Display all users accounts:

        SELECT *
        FROM USR,
          OBI,
          OIU,
          OBJ,
          OST OST
        WHERE USR.USR_KEY =OIU.USR_KEY
        AND OIU.OBI_KEY   =OBI.OBI_KEY
        AND OIU.OST_KEY   = OST.OST_KEY
        AND OBI.OBJ_KEY   =OBJ.OBJ_KEY;


*****************************************************************************************************************

list of all the users and their resource Status :       
       
SELECT usr.usr_login, usr.usr_first_name, usr.usr_last_name,
obj.obj_key, obj.obj_name, oiu.oiu_create, ost.ost_status, orc.orc_tos_instance_key
FROM orc, usr, obj, oiu, ost, obi
WHERE orc.orc_key = oiu.orc_key AND
oiu.usr_key = usr.usr_key AND
oiu.ost_key = ost.ost_key AND
oiu.obi_key = obi.obi_key AND
obi.obj_key = obj.obj_key



*****************************************************************************************************************

Query to get account details based on specif connectors: 

Ex: OID Connector accounts

            SELECT USR.USR_KEY,
              USR.USR_LOGIN,
              UD_OID_USR.UD_OID_USR_KEY,
              OST.OST_STATUS,
              OBJ.OBJ_NAME
            FROM USR,
              UD_OID_USR,
              OIU,
              OBI,
              OBJ,
              OST,
              ORC
            WHERE USR.USR_LOGIN =UD_OID_USR.UD_OID_USR_USERID -- matching condition needs to be extended based on recon profile
            AND USR.USR_KEY     =OIU.USR_KEY
            AND OIU.OBI_KEY     =OBI.OBI_KEY
            AND OBI.OBJ_KEY     =OBJ.OBJ_KEY
            AND OIU.OST_KEY     =OST.OST_KEY
            AND OST.OST_STATUS IN ('Provisioned', 'Enabled', 'Disabled')
              --and obj.obj_name='OID User'
            AND OIU.ORC_KEY=ORC.ORC_KEY
              --AND ORC.ORC_KEY=UD_OID_USR.ORC_KEY;
             
             
             
*****************************************************************************************************************

OIM User Accounts Provisioned Yet Doesn’t Exist :

select * from oiu
left outer join pol on (oiu.pol_key = pol.pol_key)
left outer join ost on (oiu.ost_key = ost.ost_key)
left outer join obj on (ost.obj_key = obj.obj_key)
left outer join orc on (oiu.orc_key = orc.orc_key)
left outer join usr on (oiu.usr_key = usr.usr_key)
left outer join obi on (oiu.obi_key = obi.obi_key)
where usr.usr_login = ‘JACK’ and usr.usr_status = ‘Active';


select * from OST where OBJ_KEY = '9';


update oiu
set ost_key = 66
where oiu_key = 35341



*****************************************************************************************************************

OIM Update User Accounts After Adding Role:


select USR.USR_LOGIN, USR.USR_KEY, USR.USR_STATUS, USER_PROVISIONING_ATTRS.POLICY_EVAL_IN_PROGRESS, USER_PROVISIONING_ATTRS.POLICY_EVAL_NEEDED from user_provisioning_attrs
left outer join usr on USER_PROVISIONING_ATTRS.USR_KEY = USR.USR_KEY
where POLICY_EVAL_IN_PROGRESS = 1 or POLICY_EVAL_NEEDED = 1
order by usr_login desc




update user_provisioning_attrs
set policy_eval_needed=1,
POLICY_EVAL_IN_PROGRESS=0,
update_date=sysdate
where usr_key in (
select usr_key from usr where usr_login in (‘JACK’) and usr_status = ‘Active’
)


*****************************************************************************************************************
Query OIM Database for OIM User Policy ::


select * from oiu
left outer join pol on (oiu.pol_key = pol.pol_key)
left outer join ost on (oiu.ost_key = ost.ost_key)
left outer join obj on (ost.obj_key = obj.obj_key)
left outer join orc on (oiu.orc_key = orc.orc_key)
left outer join usr on (oiu.usr_key = usr.usr_key)
left outer join obi on (oiu.obi_key = obi.obi_key)
where usr.usr_login = ‘JACK’ and usr.usr_status = ‘Active';

and obj.OBJ_NAME = ‘Oracle DB User';


*****************************************************************************************************************

Below Query gives me all the records of users that are disabled/terminated prior to 50 days (from today) but their AD directory resource is not revoked yet:

SELECT usr.usr_login,
usr.usr_first_name,
usr.usr_last_name,
usr.usr_end_Date,
usr.usr_status "User Status",
ost.ost_status "AD Status",
sysdate - 50 "date comparison"
FROM orc,
usr,
obj,
oiu,
ost,
obi
WHERE orc.orc_key = oiu.orc_key AND
oiu.usr_key = usr.usr_key AND
oiu.ost_key = ost.ost_key AND
oiu.obi_key = obi.obi_key AND
obi.obj_key = obj.obj_key AND
obj.obj_name = 'AD User' AND
ost.ost_status != 'Revoked' AND
usr.usr_disabled = 1 AND
usr.usr_end_date < sysdate - 50;


*****************************************************************************************************************


1. Getting all information about Email Definition:
======================================================
select emd.emd_subject, emd.emd_name,emd.usr_key, emd.emd_body, emd.emd_from_type, emd.emd_type from emd emd where emd.emd_name='Email Definition Name';


*****************************************************************************************************************

2. Updating Resource Status to Revoked for a given resource:
==========================================================

update oiu set ost_key = (select ost_key from ost where obj_key in ( select obj_key from obj where obj_name like 'RESOURCENAME' ) and ost_status like 'Revoked') where ORC_KEY = 'Process Instance Key'

update orc set orc_status='X' where orc_key = 'Process Instance Key'

*****************************************************************************************************************

 OIM – SQL Script to fetch who Revoked a Resource :


select usr.usr_login, obj.obj_name, ost.ost_status, rev.usr_login “Revoker”
from oiu, usr, obi, obj, ost, usr rev
where oiu.usr_key=usr.usr_key
and oiu.obi_key=obi.obi_key
and obi.obj_key=obj.obj_key
and oiu.ost_key=ost.ost_key
and oiu.oiu_updateby=rev.usr_key
and ost.ost_status = ‘Revoked’



*****************************************************************************************************************

OIM DB Script – Fetch status of any task for a specified resource with a specified status:


SELECT USR.USR_LOGIN, USR2.USR_LOGIN , USR.USR_START_DATE, MIL.MIL_NAME,OSI.SCH_KEY,SCH.SCH_STATUS,STA.STA_BUCKET, SCH_ACTUAL_START, SCH_ACTUAL_END FROM
OSI,SCH,STA,MIL,TOS,PKG,OIU,USR,OBJ,OST, ORC,USR USR2,UD_ADUSER
WHERE OSI.MIL_KEY=MIL.MIL_KEY
AND SCH.SCH_KEY=OSI.SCH_KEY
AND STA.STA_STATUS=SCH.SCH_STATUS
AND TOS.PKG_KEY=PKG.PKG_KEY
AND MIL.TOS_KEY=TOS.TOS_KEY
AND OIU.USR_KEY=USR.USR_KEY
AND OIU.OST_KEY=OST.OST_KEY
AND OST.OBJ_KEY=OBJ.OBJ_KEY
AND OSI.ORC_KEY=OIU.ORC_KEY
–AND OST.OST_STATUS = ‘Disbaled’
AND STA.STA_BUCKET = ‘Completed’
AND PKG.PKG_NAME= ‘AD User’
AND MIL.MIL_NAME= ‘Disable User’
AND ORC.ORC_KEY=UD_ADUSER.ORC_KEY
AND ORC.ORC_KEY=OIU.ORC_KEY
AND OSI.OSI_UPDATEBY = USR2.USR_KEY

*****************************************************************************************************************



Update USR set USR_POLICY_UPDATE=1 where USR_KEY =$USER_KEY ;
COMMIT;

Update OIU set OIU_POLICY_REVOKE=1, POL_KEY=$POLICY_KEY, OIU_POLICY_BASED=1 where ORC_KEY=$ORC_KEY;
COMMIT;


**********************************************************************************************************************************************************************************************************************************

OIM SQL query to find who assigned role to users :

select * from upa
where usr_key = (select usr_key from usr
                 where lower(usr_login)= 'lakshmi.nandyala')
and src like '%RoleManager%CREATE%';

Ref : http://www.identityaccessmgmt.com/2015/05/oim-11g-sql-query-to-find-who-assigned.html

**********************************************************************************************************************************************************************************************************************************

List of resource provisioned to user in OIM:


select oiu.oiu_key, oiu.obi_key, oiu.orc_key, ost.ost_status, obj.obj_name, obj.obj_key,oiu.req_key
from oiu
inner join ost on oiu.ost_key = ost.ost_key
inner join obi on oiu.obi_key = obi.obi_key
inner join obj on obi.obj_key = obj.obj_key
where oiu.usr_key =(select usr_key from usr where usr_login='lakshmi.nandyala');



**********************************************************************************************************************************************************************************************************************************


 This query used to get user key from usr table:

   
select usr_key from USR
where usr_login = ‘lakshmi.nandyala’;



This query get process instance of enabled user ‘lakshmi.nandyala’

   
select id from orchprocess
where entityid=’1024’ and entitytype='User' and operation='ENABLE';

This query gets all the event handler for enabled user ‘lakshmi.nandyala’

   
select * from orchevents
where processid=’561092’ order by orchorder;


**********************************************************************************************************************************************************************************************************************************

OIM SQL query to find who modified user attributes:

    select field_name, field_old_value, field_new_value
    from upa_fields fields
    where upa_usr_key in ( select upa_key from upa
                           where upa_key in (select usr_key
                                             from usr
                                             where lower(usr_login) like 'lakshmi.nandyala')))
    and field_name = 'Users.Email'
    order by upa_usr_key, field_name;



**********************************************************************************************************************************************************************************************************************************
OIM SQL query to force users to change password on next login:

he column value 0 means User not forced to reset password on next login.
?
1
2
   
update usr set USR_CHANGE_PWD_AT_NEXT_LOGON='0'
where usr_login = 'lakshmi.nandyala';

The column value 1 means User forced to reset password on next login.
?
1
2
   
update usr set USR_CHANGE_PWD_AT_NEXT_LOGON='1'
where usr_login = 'lakshmi.nandyala';




**********************************************************************************************************************************************************************************************************************************

Oracle Schema Version Registry:

select * from schema_version_registry;



**********************************************************************************************************************************************************************************************************************************

1. List all groups with info about administrative groups and membership rules (if any)
General info about user groups is stored in UGP table. Information about Administrative groups (and which admin group has which rights to a particular managed group) is stored in GPP table.

select group_admins_info.ugp_key as "Business Role OIM ID",
group_info.ugp_name as "Business Role Name",
group_admins_info.gpp_ugp_key as "Admin Group OIM ID",
c.ugp_name as "Admin Group Name"
from gpp group_admins_info
left join ugp group_info on group_info.ugp_key = group_admins_info.ugp_key
join ugp c on group_admins_info.gpp_ugp_key=c.ugp_key
where group_admins_info.ugp_key>4

Note: We need a condition where ugp.ugp_key>4 in our query, because we do not want to get info about OIM Built-in groups (SYSTEM ADMINISTRATORS, ALL USERS, SELF OPERATORS и OPERATORS).

2. List all group membership rules (detailed info)
Information about all (not only group membership) rules is stored in RUL table. GM rules always have type ‘General’ and are not linked to any Resource Object or Process Definition.
Information about rule elements (if form “attribute=condition”) is stored in RUE table.
And, finally, we can find out which groups have which membership rules by quering RGP table.

Select rue.rul_key as "Rule OIM ID", rue.rue_sequence as "Predicate No", rue.rue_attribute as "Rule Attribute", rue.rue_operation as "Is Equal", rue.rue_value as "Attribute Value", rgp.ugp_key as "Business Role OIM ID", rul.rul_operator as "Rule Elements join Operator"
from rue
inner join rgp on rue.rul_key = rgp.rul_key
join rul on rul.rul_key = rgp.rul_key

3. List all access policies
General information about access policies is stored in POL table
select
pol.pol_key as "IT Role OIM ID", pol.pol_name as "IT Role Name", pol.pol_description as "IT Role Description"
from pol

4. List all entitlements
All information about OIM entitlements is stored in ENT_LIST table (including the relationship of each entitlement to the real IT privilege in some Resource Object)
Note: This table appeared since release 9.1.0.2.
select ent_list.ent_list_key as "Entitlement OIM ID",
ent_list.obj_key as "Resource Object Key",
obj.obj_name as "Resource Object Name",
ent_list.ent_code as "Entitlement Unique Name",
/* this value corresponds to the 'Code' field of corresponding
lookup containing IT privilege data*/
ent_list.ent_value as "Entitlement Description" from ent_list
inner join obj on obj.obj_key=ent_list.obj_key

5. List all dependencies between  Access Policies and Entitlements (child data of resource object forms)
We can find out which data was added to a res object’s process child form by quering POC table.

select poc.poc_key as "Ent 2 Priv Link OIM ID", poc.pol_key as "Entitlement OIM ID", poc.obj_key as "Resource Object OIM ID", obj.obj_name as "Resource Object Name", poc.poc_field_value as "Entitlement Name" from poc
inner join obj on obj.obj_key=poc.obj_key

6. List all connections between User Groups and Access Policies
Connections between User Groups and Access Policies is stored in POG table.
select ugp.ugp_key as "Business Role OIM ID", ugp.ugp_name as "Business Role Name",
pol.pol_key as "IT Role OIM ID", pol.pol_name as "IT Role Name", pol.pol_description as "IT Role Description"
from pol
left join pog on pog.pol_key=pol.pol_key
join ugp on ugp.ugp_key = pog.ugp_key



**********************************************************************************************************************************************************************************************************************************


 Query to Pull Lookup table form OIM Database

select LKV_ENCODEd, LKV_DECODED from LKV, LKU WHERE lku.lku_type_string_key='Lookup Code Name' and lkv.lku_key = lku.lku_key;


**********************************************************************************************************************************************************************************************************************************

How DB find's out the Version Details :

select * from v$version;

select * from schema_version_registry;


**********************************************************************************************************************************************************************************************************************************

How OIM find's out the Version Details :

select XSD_VALUE from XSD where XSD_CODE='XL_BUILD_NUMBER';



**********************************************************************************************************************************************************************************************************************************

SELECT table_name FROM dba_tables;

SELECT table_name FROM all_tables;

SELECT table_name FROM user_tables;


**********************************************************************************************************************************************************************************************************************************
scheduler Jobs:


SELECT * FROM QRTZ92_JOB_DETAILS



**********************************************************************************************************************************************************************************************************************************

Thursday, 9 February 2017

OIM API's from Deepak


OIM API's Sample Code :

Ref : http://docs.oracle.com/cd/E27559_01/apirefs.1112/e28159/toc.htm
 

Connection Related API's :

Audit Related API's :

Catalog Related API's :

Deployment Manager Related API's :

Connector Related API's :

Orchestartion and Process Handler Related API's :

Reconciliation Related API's :

Notification Related API's :

Organization Related API's :

Password Management Related API's :

Provisioning Related API's :
Request Related API's :

Roles Related API's :

Scheduler Related API's :

SOA Related API's :

User Related API's :

Sunday, 29 January 2017

OIM11gR2PS3 BundlePatchset Upgration (Oracle Identity Management Suite Bundle Patch 11.1.2.3.170117)


Oracle Identity Management Suite Bundle Patch  11.1.2.3.170117

Oracle Identity Manager Bundle Patches: 11.1.2.3.x (11gR2PS3) Version - Please refer below post.


1. copy p25038775_111230_Genericc.zip to /stage directory

2. su - oracle
     unzip p25038775_111230_Generic.zip

3. shut down all servers (Admin & Managed ) – Weblogic, soa_server1, oim_server1

4. cd /stage/p25038775/iamsuite/patch/oim
ls -ltr
21197325                            24927639  
Note :  If you want to apply multiple patches at the same time use following command other you can use step 5 and step 6 

        su -oracle
        cd /stage/p25038775/iamsuite/patch/oim
        opatch lsinventory -details
        opatch napply 
        opatch lsinventory -details  

5. apply patch 21197325
su – oracle
cd /stage/p25038775/iamsuite/patch/oim/21197325
# set the environment Veriable OIM_Home as Oracle IAM Directory and PATH as  IAM OPatch Directory.
 
export ORACLE_HOME=/app/Middleware/Oracle_IDM1/
export PATH=$ORACLE_HOME/OPatch:$PATH

opatch lsinventory -details
Oracle Home :/app/Middleware/Oracle_IDM1/
opatch apply
opatch lsinventory -details 

6. apply patch 24927639
cd /stage/p25038775/iamsuite/patch/oim/24927639
opatch lsinventory -details
opatch apply
opatch lsinventory -details 


        7. Startup all servers (Admin & Managed ) – Weblogic, soa_server1, oim_server1


        8.Create a profile as "patch_oim_wls.profil"
cd /app/Middleware/user_projects/domains/iam_domain/bin
ls patch_oim_wls.profile              # Please refer below profile file.

# take a one backup profile file
cp patch_oim_wls.profile /stage/patch_oim_wls.profile_backup

        8. Run the Oracle Identity Manager Managed Servers (patch_oim_wls Stage)

cd /app/Middleware/user_projects/domains/iam_domain/bin

                      nohup ./patch_oim_wls.sh  >> patch_oim_wls.log &
 
 cd /app/Middleware/user_projects/domains/iam_domain/servers/oim_server1/tmp/_WL_user/
rm -fr oracle.iam.console.identity.self-service.ear_V2.0

cd /d01/Weblogic/FMW/Oracle_IAM1/server/bin
vim patch_oim_wls.log

        9. Restart the All Server once again (Admin & Managed Servers )

       10.  If your IAM environment is in cluster Mode Please repeat above same process on Node2.  



------------------------------------------------------------------------------------------------------------
# For passwords if you dont want to put password </optional> in this file just comment it out from here, you will be promted for it in rumtime.

#Neccessary env variables       [Mandatory]

ant_home=/app/Middleware/modules/org.apache.ant_1.7.1
java_home=/usr/jdk1.7.0_80/
mw_home=/app/Middleware/
oim_oracle_home=/app/Middleware/Oracle_IDM1/
soa_home=/app/Middleware/Oracle_SOA1/
weblogic.server.dir=/app/Middleware/wlserver_10.3
domain_home=/app/Middleware/user_projects/domains/iam_domain/
policybackup.required=true



#weblogic configuration variables
weblogic_user=weblogic

#Password is optional,  if you want to  give it on terminal itself leave it commented. Otherwise uncomment it.
weblogic_password=Lucky1234
soa_host=iam.oratechsoft.com
soa_port=8001

#DB configuration variables   
operationsDB.user=dev_oim

# Database password is optional. if you want to  give it on terminal itself leave it commented. Otherwise uncomment it.
OIM.DBPassword=Lucky1234
operationsDB.host=iam.oratechsoft.com
operationsDB.serviceName=OIMDB11g
operationsDB.port=1521


mdsDB.user=dev_mds
#Password is optional,  if you want to  give it on terminal itself leave it commented. Otherwise uncomment it.
mdsDB.password=Lucky1234
mdsDB.host=iam.oratechsoft.com
mdsDB.port=1521
mdsDB.serviceName=OIMDB11g

oim_username=xelsysadm
#Password is optional, you can put it here also(and also uncomment the line) otherwise leave it as it is and you will get prompted for it during runtime as hidd en string
oim_password=Lucky1234
oim_serverurl=t3://iam.oratechsoft.com:14000
-----------------------------------------------------------------------------------------------------