sion

Oracle Fusion Middleware : Oracle Identity and Access Management Suite 10g/11gR1/11gR2PS1,PS2,PS3 : OIM | OAM,OAAM,OIF | OID, OVD, DIP | OUD/ ODSEE | Microsft AD | OpenLDAP | ADF | EBS R12 | OECMCCR4 | Business Intelleigence - Bi Publisher | Banking | Demo Applications | Core Java | SQL | PLSQL | Web services | Weblogic | Tomcat | JBoss | OHS | WebGate | WebCenter | In any Queries please Contact Me : info@oratechsoft.com

Search This Blog

Saturday, 11 March 2017

Oracle Identity Manager API - Example

 
Oracle Identity Manager API 
 

  1. https://github.com/adharmad/oim-api-samples/tree/master/src/iamsamples
  2. https://blogs.oracle.com/sfehrman/entry/programmatically_provisioning_users_via_oracle
  3. http://massivegaze.blogspot.in/2015/05/oim-apis.html
  4. https://github.com/rayedchan/OIMUtilities 
  5. http://oraclestack.blogspot.in/2015/01/generate-requests-using-oim-api.html
  6. How To Run Oracle Identity Manager (OIM) API From Command Prompt? (Doc ID 801377.1)
  7. Getting started with OIM API’s using Eclipse (Doc ID 457649.1)
  8. https://paramanandmallik.wordpress.com/2015/04/29/modify-oim-users-in-bulk/
  9. http://techmeonline.com/creating-a-custom-attribute-oim-11g/
  10. http://docs.oracle.com/cd/E15586_01/doc.1111/e14308/conf_mangmnt.htm
    • Note 1279270.1 : Javadocs for Oracle Identity Manager 11g
    • Note 1262803.1 : OIM11g: Sample Code For A Custom Event Handler Implemented for Pre-Process Stage During Create User Management Operation
    • Note 1273464.1 : How To Use The OIM 11g Password Generator Feature To Generate Random Password For A User
    • Note 1268246.1 : OIM API 11g Services Sample Code using JDeveloper
    • Note 1268985.1 : Getting Started With OIM API 11g Using Ant
    • Note 1228035.1 : OIM11g: Sample Code For A Custom Username Generation Policy Plugin Using JDeveloper


    Regards
    Lakshmi Prasad Reddy 

OTS IAM Architecture




====================================================================

                                                          OIM Useful SQL Queries

====================================================================



*****************************************************************************************************************

User Details:

select * from USR where UPPER(usr_login)='username';

   
*****************************************************************************************************************
   
AUDIT:

select * from dev_oim.UPA_FIELDS UPA_FIELDS LEFT outer JOIN dev_oim.upa_usr  upa_USR ON upa_fields.upa_usr_key=upa_USR.UPA_USR_KEY where UPPER(upa_usr.usr_login) like 'userlogin';

   
*****************************************************************************************************************
   
Resource Audit:

select * from dev_oim.UPA_RESOURCE;

*****************************************************************************************************************
   
Plugins Info:

    select * from dev_oim.plugins;

*****************************************************************************************************************

Audit Table:

      select * from dev_oim.UPA where usr_key='userkey' order by upa_key desc;
     
     
****************************************************************************************************************

OIM Audit Table: Sample Queries to Find Who did What and When ?

     
      SELECT usr_key,   usr_login as changed_by_user,  upa_usr.upa_usr_eff_from_date AS changed_time,   field_name,   field_old_value,   field_new_value
 FROM upa_usr, upa_fields,   (SELECT field_new_value AS changed_by_user    FROM upa_fields
   WHERE upa_fields_key =  (SELECT MAX(upa_fields_key)      FROM upa_fields, upa_usr
     WHERE upa_usr.upa_usr_key = upa_fields.upa_usr_key
     AND upa_usr.usr_key = <>
     AND upa_fields.field_name ='Users.Updated By Login'
     )
   )
 WHERE upa_usr.upa_usr_key = upa_fields.upa_usr_key
 AND upa_usr.usr_key = <>;

*****************************************************************************************************************
Jar file:

    select * from dev_oim.oimhome_jars;

*****************************************************************************************************************

Provisioned/provisioning :

    SELECT OIU_KEY,    OIU.ORC_KEY, USR.USR_KEY,
            USR_LOGIN,
            OBJ_NAME,
            OST_STATUS
        FROM OIU,
              OST,
              OBI,
              OBJ,
              USR
            WHERE OIU.USR_KEY=USR.USR_KEY
            AND OIU.OST_KEY  =OST.OST_KEY
            AND OIU.OBI_KEY  =OBI.OBI_KEY
            AND OBJ.OBJ_KEY  =OBI.OBJ_KEY
            AND USR.USR_LOGIN=UPPER('TUSER13')
            ORDER BY OIU_KEY;



*****************************************************************************************************************

Display all users accounts:

        SELECT *
        FROM USR,
          OBI,
          OIU,
          OBJ,
          OST OST
        WHERE USR.USR_KEY =OIU.USR_KEY
        AND OIU.OBI_KEY   =OBI.OBI_KEY
        AND OIU.OST_KEY   = OST.OST_KEY
        AND OBI.OBJ_KEY   =OBJ.OBJ_KEY;


*****************************************************************************************************************

list of all the users and their resource Status :       
       
SELECT usr.usr_login, usr.usr_first_name, usr.usr_last_name,
obj.obj_key, obj.obj_name, oiu.oiu_create, ost.ost_status, orc.orc_tos_instance_key
FROM orc, usr, obj, oiu, ost, obi
WHERE orc.orc_key = oiu.orc_key AND
oiu.usr_key = usr.usr_key AND
oiu.ost_key = ost.ost_key AND
oiu.obi_key = obi.obi_key AND
obi.obj_key = obj.obj_key



*****************************************************************************************************************

Query to get account details based on specif connectors: 

Ex: OID Connector accounts

            SELECT USR.USR_KEY,
              USR.USR_LOGIN,
              UD_OID_USR.UD_OID_USR_KEY,
              OST.OST_STATUS,
              OBJ.OBJ_NAME
            FROM USR,
              UD_OID_USR,
              OIU,
              OBI,
              OBJ,
              OST,
              ORC
            WHERE USR.USR_LOGIN =UD_OID_USR.UD_OID_USR_USERID -- matching condition needs to be extended based on recon profile
            AND USR.USR_KEY     =OIU.USR_KEY
            AND OIU.OBI_KEY     =OBI.OBI_KEY
            AND OBI.OBJ_KEY     =OBJ.OBJ_KEY
            AND OIU.OST_KEY     =OST.OST_KEY
            AND OST.OST_STATUS IN ('Provisioned', 'Enabled', 'Disabled')
              --and obj.obj_name='OID User'
            AND OIU.ORC_KEY=ORC.ORC_KEY
              --AND ORC.ORC_KEY=UD_OID_USR.ORC_KEY;
             
             
             
*****************************************************************************************************************

OIM User Accounts Provisioned Yet Doesn’t Exist :

select * from oiu
left outer join pol on (oiu.pol_key = pol.pol_key)
left outer join ost on (oiu.ost_key = ost.ost_key)
left outer join obj on (ost.obj_key = obj.obj_key)
left outer join orc on (oiu.orc_key = orc.orc_key)
left outer join usr on (oiu.usr_key = usr.usr_key)
left outer join obi on (oiu.obi_key = obi.obi_key)
where usr.usr_login = ‘JACK’ and usr.usr_status = ‘Active';


select * from OST where OBJ_KEY = '9';


update oiu
set ost_key = 66
where oiu_key = 35341



*****************************************************************************************************************

OIM Update User Accounts After Adding Role:


select USR.USR_LOGIN, USR.USR_KEY, USR.USR_STATUS, USER_PROVISIONING_ATTRS.POLICY_EVAL_IN_PROGRESS, USER_PROVISIONING_ATTRS.POLICY_EVAL_NEEDED from user_provisioning_attrs
left outer join usr on USER_PROVISIONING_ATTRS.USR_KEY = USR.USR_KEY
where POLICY_EVAL_IN_PROGRESS = 1 or POLICY_EVAL_NEEDED = 1
order by usr_login desc




update user_provisioning_attrs
set policy_eval_needed=1,
POLICY_EVAL_IN_PROGRESS=0,
update_date=sysdate
where usr_key in (
select usr_key from usr where usr_login in (‘JACK’) and usr_status = ‘Active’
)


*****************************************************************************************************************
Query OIM Database for OIM User Policy ::


select * from oiu
left outer join pol on (oiu.pol_key = pol.pol_key)
left outer join ost on (oiu.ost_key = ost.ost_key)
left outer join obj on (ost.obj_key = obj.obj_key)
left outer join orc on (oiu.orc_key = orc.orc_key)
left outer join usr on (oiu.usr_key = usr.usr_key)
left outer join obi on (oiu.obi_key = obi.obi_key)
where usr.usr_login = ‘JACK’ and usr.usr_status = ‘Active';

and obj.OBJ_NAME = ‘Oracle DB User';


*****************************************************************************************************************

Below Query gives me all the records of users that are disabled/terminated prior to 50 days (from today) but their AD directory resource is not revoked yet:

SELECT usr.usr_login,
usr.usr_first_name,
usr.usr_last_name,
usr.usr_end_Date,
usr.usr_status "User Status",
ost.ost_status "AD Status",
sysdate - 50 "date comparison"
FROM orc,
usr,
obj,
oiu,
ost,
obi
WHERE orc.orc_key = oiu.orc_key AND
oiu.usr_key = usr.usr_key AND
oiu.ost_key = ost.ost_key AND
oiu.obi_key = obi.obi_key AND
obi.obj_key = obj.obj_key AND
obj.obj_name = 'AD User' AND
ost.ost_status != 'Revoked' AND
usr.usr_disabled = 1 AND
usr.usr_end_date < sysdate - 50;


*****************************************************************************************************************


1. Getting all information about Email Definition:
======================================================
select emd.emd_subject, emd.emd_name,emd.usr_key, emd.emd_body, emd.emd_from_type, emd.emd_type from emd emd where emd.emd_name='Email Definition Name';


*****************************************************************************************************************

2. Updating Resource Status to Revoked for a given resource:
==========================================================

update oiu set ost_key = (select ost_key from ost where obj_key in ( select obj_key from obj where obj_name like 'RESOURCENAME' ) and ost_status like 'Revoked') where ORC_KEY = 'Process Instance Key'

update orc set orc_status='X' where orc_key = 'Process Instance Key'

*****************************************************************************************************************

 OIM – SQL Script to fetch who Revoked a Resource :


select usr.usr_login, obj.obj_name, ost.ost_status, rev.usr_login “Revoker”
from oiu, usr, obi, obj, ost, usr rev
where oiu.usr_key=usr.usr_key
and oiu.obi_key=obi.obi_key
and obi.obj_key=obj.obj_key
and oiu.ost_key=ost.ost_key
and oiu.oiu_updateby=rev.usr_key
and ost.ost_status = ‘Revoked’



*****************************************************************************************************************

OIM DB Script – Fetch status of any task for a specified resource with a specified status:


SELECT USR.USR_LOGIN, USR2.USR_LOGIN , USR.USR_START_DATE, MIL.MIL_NAME,OSI.SCH_KEY,SCH.SCH_STATUS,STA.STA_BUCKET, SCH_ACTUAL_START, SCH_ACTUAL_END FROM
OSI,SCH,STA,MIL,TOS,PKG,OIU,USR,OBJ,OST, ORC,USR USR2,UD_ADUSER
WHERE OSI.MIL_KEY=MIL.MIL_KEY
AND SCH.SCH_KEY=OSI.SCH_KEY
AND STA.STA_STATUS=SCH.SCH_STATUS
AND TOS.PKG_KEY=PKG.PKG_KEY
AND MIL.TOS_KEY=TOS.TOS_KEY
AND OIU.USR_KEY=USR.USR_KEY
AND OIU.OST_KEY=OST.OST_KEY
AND OST.OBJ_KEY=OBJ.OBJ_KEY
AND OSI.ORC_KEY=OIU.ORC_KEY
–AND OST.OST_STATUS = ‘Disbaled’
AND STA.STA_BUCKET = ‘Completed’
AND PKG.PKG_NAME= ‘AD User’
AND MIL.MIL_NAME= ‘Disable User’
AND ORC.ORC_KEY=UD_ADUSER.ORC_KEY
AND ORC.ORC_KEY=OIU.ORC_KEY
AND OSI.OSI_UPDATEBY = USR2.USR_KEY

*****************************************************************************************************************



Update USR set USR_POLICY_UPDATE=1 where USR_KEY =$USER_KEY ;
COMMIT;

Update OIU set OIU_POLICY_REVOKE=1, POL_KEY=$POLICY_KEY, OIU_POLICY_BASED=1 where ORC_KEY=$ORC_KEY;
COMMIT;


**********************************************************************************************************************************************************************************************************************************

OIM SQL query to find who assigned role to users :

select * from upa
where usr_key = (select usr_key from usr
                 where lower(usr_login)= 'lakshmi.nandyala')
and src like '%RoleManager%CREATE%';

Ref : http://www.identityaccessmgmt.com/2015/05/oim-11g-sql-query-to-find-who-assigned.html

**********************************************************************************************************************************************************************************************************************************

List of resource provisioned to user in OIM:


select oiu.oiu_key, oiu.obi_key, oiu.orc_key, ost.ost_status, obj.obj_name, obj.obj_key,oiu.req_key
from oiu
inner join ost on oiu.ost_key = ost.ost_key
inner join obi on oiu.obi_key = obi.obi_key
inner join obj on obi.obj_key = obj.obj_key
where oiu.usr_key =(select usr_key from usr where usr_login='lakshmi.nandyala');



**********************************************************************************************************************************************************************************************************************************


 This query used to get user key from usr table:

   
select usr_key from USR
where usr_login = ‘lakshmi.nandyala’;



This query get process instance of enabled user ‘lakshmi.nandyala’

   
select id from orchprocess
where entityid=’1024’ and entitytype='User' and operation='ENABLE';

This query gets all the event handler for enabled user ‘lakshmi.nandyala’

   
select * from orchevents
where processid=’561092’ order by orchorder;


**********************************************************************************************************************************************************************************************************************************

OIM SQL query to find who modified user attributes:

    select field_name, field_old_value, field_new_value
    from upa_fields fields
    where upa_usr_key in ( select upa_key from upa
                           where upa_key in (select usr_key
                                             from usr
                                             where lower(usr_login) like 'lakshmi.nandyala')))
    and field_name = 'Users.Email'
    order by upa_usr_key, field_name;



**********************************************************************************************************************************************************************************************************************************
OIM SQL query to force users to change password on next login:

he column value 0 means User not forced to reset password on next login.
?
1
2
   
update usr set USR_CHANGE_PWD_AT_NEXT_LOGON='0'
where usr_login = 'lakshmi.nandyala';

The column value 1 means User forced to reset password on next login.
?
1
2
   
update usr set USR_CHANGE_PWD_AT_NEXT_LOGON='1'
where usr_login = 'lakshmi.nandyala';




**********************************************************************************************************************************************************************************************************************************

Oracle Schema Version Registry:

select * from schema_version_registry;



**********************************************************************************************************************************************************************************************************************************

1. List all groups with info about administrative groups and membership rules (if any)
General info about user groups is stored in UGP table. Information about Administrative groups (and which admin group has which rights to a particular managed group) is stored in GPP table.

select group_admins_info.ugp_key as "Business Role OIM ID",
group_info.ugp_name as "Business Role Name",
group_admins_info.gpp_ugp_key as "Admin Group OIM ID",
c.ugp_name as "Admin Group Name"
from gpp group_admins_info
left join ugp group_info on group_info.ugp_key = group_admins_info.ugp_key
join ugp c on group_admins_info.gpp_ugp_key=c.ugp_key
where group_admins_info.ugp_key>4

Note: We need a condition where ugp.ugp_key>4 in our query, because we do not want to get info about OIM Built-in groups (SYSTEM ADMINISTRATORS, ALL USERS, SELF OPERATORS и OPERATORS).

2. List all group membership rules (detailed info)
Information about all (not only group membership) rules is stored in RUL table. GM rules always have type ‘General’ and are not linked to any Resource Object or Process Definition.
Information about rule elements (if form “attribute=condition”) is stored in RUE table.
And, finally, we can find out which groups have which membership rules by quering RGP table.

Select rue.rul_key as "Rule OIM ID", rue.rue_sequence as "Predicate No", rue.rue_attribute as "Rule Attribute", rue.rue_operation as "Is Equal", rue.rue_value as "Attribute Value", rgp.ugp_key as "Business Role OIM ID", rul.rul_operator as "Rule Elements join Operator"
from rue
inner join rgp on rue.rul_key = rgp.rul_key
join rul on rul.rul_key = rgp.rul_key

3. List all access policies
General information about access policies is stored in POL table
select
pol.pol_key as "IT Role OIM ID", pol.pol_name as "IT Role Name", pol.pol_description as "IT Role Description"
from pol

4. List all entitlements
All information about OIM entitlements is stored in ENT_LIST table (including the relationship of each entitlement to the real IT privilege in some Resource Object)
Note: This table appeared since release 9.1.0.2.
select ent_list.ent_list_key as "Entitlement OIM ID",
ent_list.obj_key as "Resource Object Key",
obj.obj_name as "Resource Object Name",
ent_list.ent_code as "Entitlement Unique Name",
/* this value corresponds to the 'Code' field of corresponding
lookup containing IT privilege data*/
ent_list.ent_value as "Entitlement Description" from ent_list
inner join obj on obj.obj_key=ent_list.obj_key

5. List all dependencies between  Access Policies and Entitlements (child data of resource object forms)
We can find out which data was added to a res object’s process child form by quering POC table.

select poc.poc_key as "Ent 2 Priv Link OIM ID", poc.pol_key as "Entitlement OIM ID", poc.obj_key as "Resource Object OIM ID", obj.obj_name as "Resource Object Name", poc.poc_field_value as "Entitlement Name" from poc
inner join obj on obj.obj_key=poc.obj_key

6. List all connections between User Groups and Access Policies
Connections between User Groups and Access Policies is stored in POG table.
select ugp.ugp_key as "Business Role OIM ID", ugp.ugp_name as "Business Role Name",
pol.pol_key as "IT Role OIM ID", pol.pol_name as "IT Role Name", pol.pol_description as "IT Role Description"
from pol
left join pog on pog.pol_key=pol.pol_key
join ugp on ugp.ugp_key = pog.ugp_key



**********************************************************************************************************************************************************************************************************************************


 Query to Pull Lookup table form OIM Database

select LKV_ENCODEd, LKV_DECODED from LKV, LKU WHERE lku.lku_type_string_key='Lookup Code Name' and lkv.lku_key = lku.lku_key;


**********************************************************************************************************************************************************************************************************************************

How DB find's out the Version Details :

select * from v$version;

select * from schema_version_registry;


**********************************************************************************************************************************************************************************************************************************

How OIM find's out the Version Details :

select XSD_VALUE from XSD where XSD_CODE='XL_BUILD_NUMBER';



**********************************************************************************************************************************************************************************************************************************

SELECT table_name FROM dba_tables;

SELECT table_name FROM all_tables;

SELECT table_name FROM user_tables;


**********************************************************************************************************************************************************************************************************************************
scheduler Jobs:


SELECT * FROM QRTZ92_JOB_DETAILS



**********************************************************************************************************************************************************************************************************************************

Thursday, 9 February 2017

OIM API's from Deepak


OIM API's Sample Code :

Ref : http://docs.oracle.com/cd/E27559_01/apirefs.1112/e28159/toc.htm
 

Connection Related API's :

Audit Related API's :

Catalog Related API's :

Deployment Manager Related API's :

Connector Related API's :

Orchestartion and Process Handler Related API's :

Reconciliation Related API's :

Notification Related API's :

Organization Related API's :

Password Management Related API's :

Provisioning Related API's :
Request Related API's :

Roles Related API's :

Scheduler Related API's :

SOA Related API's :

User Related API's :

Sunday, 29 January 2017

OIM11gR2PS3 BundlePatchset Upgration (Oracle Identity Management Suite Bundle Patch 11.1.2.3.170117)


Oracle Identity Management Suite Bundle Patch  11.1.2.3.170117

Oracle Identity Manager Bundle Patches: 11.1.2.3.x (11gR2PS3) Version - Please refer below post.


1. copy p25038775_111230_Genericc.zip to /stage directory

2. su - oracle
     unzip p25038775_111230_Generic.zip

3. shut down all servers (Admin & Managed ) – Weblogic, soa_server1, oim_server1

4. cd /stage/p25038775/iamsuite/patch/oim
ls -ltr
21197325                            24927639  
Note :  If you want to apply multiple patches at the same time use following command other you can use step 5 and step 6 

        su -oracle
        cd /stage/p25038775/iamsuite/patch/oim
        opatch lsinventory -details
        opatch napply 
        opatch lsinventory -details  

5. apply patch 21197325
su – oracle
cd /stage/p25038775/iamsuite/patch/oim/21197325
# set the environment Veriable OIM_Home as Oracle IAM Directory and PATH as  IAM OPatch Directory.
 
export ORACLE_HOME=/app/Middleware/Oracle_IDM1/
export PATH=$ORACLE_HOME/OPatch:$PATH

opatch lsinventory -details
Oracle Home :/app/Middleware/Oracle_IDM1/
opatch apply
opatch lsinventory -details 

6. apply patch 24927639
cd /stage/p25038775/iamsuite/patch/oim/24927639
opatch lsinventory -details
opatch apply
opatch lsinventory -details 


        7. Startup all servers (Admin & Managed ) – Weblogic, soa_server1, oim_server1


        8.Create a profile as "patch_oim_wls.profil"
cd /app/Middleware/user_projects/domains/iam_domain/bin
ls patch_oim_wls.profile              # Please refer below profile file.

# take a one backup profile file
cp patch_oim_wls.profile /stage/patch_oim_wls.profile_backup

        8. Run the Oracle Identity Manager Managed Servers (patch_oim_wls Stage)

cd /app/Middleware/user_projects/domains/iam_domain/bin

                      nohup ./patch_oim_wls.sh  >> patch_oim_wls.log &
 
 cd /app/Middleware/user_projects/domains/iam_domain/servers/oim_server1/tmp/_WL_user/
rm -fr oracle.iam.console.identity.self-service.ear_V2.0

cd /d01/Weblogic/FMW/Oracle_IAM1/server/bin
vim patch_oim_wls.log

        9. Restart the All Server once again (Admin & Managed Servers )

       10.  If your IAM environment is in cluster Mode Please repeat above same process on Node2.  



------------------------------------------------------------------------------------------------------------
# For passwords if you dont want to put password </optional> in this file just comment it out from here, you will be promted for it in rumtime.

#Neccessary env variables       [Mandatory]

ant_home=/app/Middleware/modules/org.apache.ant_1.7.1
java_home=/usr/jdk1.7.0_80/
mw_home=/app/Middleware/
oim_oracle_home=/app/Middleware/Oracle_IDM1/
soa_home=/app/Middleware/Oracle_SOA1/
weblogic.server.dir=/app/Middleware/wlserver_10.3
domain_home=/app/Middleware/user_projects/domains/iam_domain/
policybackup.required=true



#weblogic configuration variables
weblogic_user=weblogic

#Password is optional,  if you want to  give it on terminal itself leave it commented. Otherwise uncomment it.
weblogic_password=Lucky1234
soa_host=iam.oratechsoft.com
soa_port=8001

#DB configuration variables   
operationsDB.user=dev_oim

# Database password is optional. if you want to  give it on terminal itself leave it commented. Otherwise uncomment it.
OIM.DBPassword=Lucky1234
operationsDB.host=iam.oratechsoft.com
operationsDB.serviceName=OIMDB11g
operationsDB.port=1521


mdsDB.user=dev_mds
#Password is optional,  if you want to  give it on terminal itself leave it commented. Otherwise uncomment it.
mdsDB.password=Lucky1234
mdsDB.host=iam.oratechsoft.com
mdsDB.port=1521
mdsDB.serviceName=OIMDB11g

oim_username=xelsysadm
#Password is optional, you can put it here also(and also uncomment the line) otherwise leave it as it is and you will get prompted for it during runtime as hidd en string
oim_password=Lucky1234
oim_serverurl=t3://iam.oratechsoft.com:14000
-----------------------------------------------------------------------------------------------------

Wednesday, 25 January 2017

OIM Bundle Patch Release History (Doc ID 2049708.1)


OIM Bundle Patch Release History (Doc ID 2049708.1)




https://support.oracle.com/epmos/adf/images/t.gif
In this Document




























Applies to:
Identity Manager - Version 9.1.0.2 and later
Information in this document applies to any platform.
Description
This document provides Oracle Identity Manager patch release history.
Occurrence
This information is needed while upgrading/patching Oracle Identity Manager.
Symptoms
These patches help resolve issues which one may see while running Oracle Identity Manager.


Patches
11.1.2.3.x OIM Bundle Patch History
For detailed information about the OIM 11.1.2.3.x bundle patches including bug fixes, refer to Document 2031368.1:Information And Bug Listing of Oracle Identity Manager Bundle Patches: 11.1.2.3.x (11gR2PS3) Version
Bundle Patch Version
Patch Number
Release Date
Pillar/Suite Patch
 OIM Opatch Number
Patch Documentation
 11.1.2.3.1
 15-Jul-2015
 Yes
 21308416
 11.1.2.3.2
 19-Aug-2015
No
 21615056
 11.1.2.3.3
15-Sep-2015
No
 21771609
11.1.2.3.4
20-Oct-2015
Yes
 21979115
11.1.2.3.5
19-Jan-2016
Yes
22364075
11.1.2.3.160419
19-Apr-2016
Yes
22874405
11.1.2.3.160719
19-Jul-2016
Yes
24290399
11.1.2.3.161018
18-Oct-2016
Yes
24751162
11.1.2.3.170117
17-Jan-2017
Yes
24927639





11.1.2.2.x OIM Bundle Patch History
For detailed information about the OIM 11.1.2.2.x bundle patches including bug fixes, refer to Document 1676169.1:Information And Bug Listing of Oracle Identity Manager Bundle Patches: 11.1.2.2.x (11gR2PS2) Version
Bundle Patch Version
Patch Number
Release Date
Pillar/Suite Patch
 OIM Opatch Number
Patch Documentation
 11.1.2.2.1
 27-May-2014
No
 18252015
 11.1.2.2.2
 15-Jul-2014
No
 18818527
11.1.2.2.3
26-Aug-2014
No
19172743
11.1.2.2.4
14-Oct-2014
No
19479688
11.1.2.2.5
20-Jan-2015
Yes
19787058
11.1.2.2.6
14-Apr-2015
Yes
20300265
11.1.2.2.7
14-Jul-2015
Yes
21322054
11.1.2.2.8
20-Oct-2015
Yes
21608305
11.1.2.2.9
19-Jan-2016
Yes
22504794






11.1.2.1.x OIM Bundle Patch History
For detailed information about the OIM 11.1.2.1.x bundle patches including bug fixes, refer to Document 1569191.1: Information And Bug Listing of Oracle Identity Manager Bundle Patches: 11.1.2.1.x (11gR2PS1)
Bundle Patch Version
Patch Number
Release Date
Pillar/Suite Patch
 OIM Opatch Number
Patch Documentation
 11.1.2.1.1
 16-Jul-2013
Yes
16736729
 11.1.2.1.2
 30-Sep-2013
No
17086188
11.1.2.1.3
26-Nov-2013
No
17532765
11.1.2.1.4
14-Jan-2014
No
17832740
11.1.2.1.5
25-Feb-2014
No
18043012
11.1.2.1.6
15-Apr-2014
No
18296138
11.1.2.1.7
27-May-2014
No
18551679
11.1.2.1.8
 15-Jul-2014
No
 18818451
11.1.2.1.9
 14-Oct-2014
 No
19245744 

 




11.1.2.0.x OIM Bundle Patch History
For detailed information about the OIM 11.1.2.0.x bundle patches including bug fixes, refer to Document 1499587.1: Information And Bug Listing of Oracle Identity Manager Bundle Patches: 11.1.2.0.x (11gR2) Version
Bundle Patch Version
Patch Number
Release Date
Pillar/Suite Patch
 OIM Opatch Number
Patch Documentation
 11.1.2.0.1
 16-Jul-2013
Yes
14606628
 11.1.2.0.2
 15-Jan-2013
Yes
14760766
11.1.2.0.3
31-Jan-2013
No
16046043
11.1.2.0.4
28-Feb-2013
No
16229450
11.1.2.0.5
29-Mar2013
No
16392264
11.1.2.0.6
30-Apr-2013
No
16540518
11.1.2.0.7
31-May-2013
No
16721318
11.1.2.0.8
 28-June-2013
No
16872081
11.1.2.0.9
31-Jul-2013
No
17022792
11.1.2.0.10
 30-Aug-2013
 No
17233916
11.1.2.0.11
30-Sep-2013 
 No
17366526 
11.1.2.0.12
26-Nov-2013 
 No
17532764
11.1.2.0.13
15-Jan-2014 
 No
17832739 
11.1.2.0.14
 25-Feb-2014
 No
 18053011
11.1.1.7.x OIM Bundle Patch History
For detailed information about the OIM 11.1.1.7.x bundle patches including bug fixes, refer to Document 1662503.1: Information And Bug Listing of Oracle Identity Manager Bundle Patches: 11.1.1.7.x (R1 PS2) Version
Bundle Patch Version 
 Patch Number
 Release Date
 Pillar/Suite Patch
 OIM Opatch Number 
Patch Documentation 
 11.1.1.7.1
 15-Apr-2014
 Yes
 17998996
11.1.1.7.2
20-Oct-2015
No
21881425


 

11.1.1.5.x OIM Bundle Patch History
For detailed information about the OIM 11.1.1.5.x bundle patches including bug fixes, refer to Document 1360009.1: Information And Bug Listing of Oracle Identity Manager Bundle Patches: 11.1.1.5.x (R1PS1) Version
Bundle Patch Version 
 Patch Number
 Release Date
 Pillar/Suite Patch
 OIM Opatch Number 
Patch Documentation
11.1.1.5.1
19-Sep-2011
No
12748351
11.1.1.5.2
28-Jan-2012
No
13399365
11.1.1.5.3
31-May-2012
No
13704894
11.1.1.5.4
17-Jul-2012
No
14102430
11.1.1.5.5
15-Oct-2012
Yes
14352690
11.1.1.5.6
15-Jan-2013
Yes
14766143
11.1.1.5.7
16-Apr-2013
Yes
16097399
11.1.1.5.8
16-Jul-2013
Yes
16482363
11.1.1.5.9
15-Oct-2013
Yes
17085796
11.1.1.5.10
14-Jan-2014
Yes
17787783
11.1.1.5.11
15-Jul-2014
Yes
18495306




11.1.1.3.x OIM Bundle Patch History
For detailed information about the OIM 11.1.1.3.x bundle patches including bug fixes, refer to Document 1247564.1: Information And Bug Listing of Oracle Identity Manager Bundle Patches: 11.1.1.3.x (DW/R1) Version
Bundle Patch Version 
 Patch Number
 Release Date
 Pillar/Suite Patch
 OIM Opatch Number 
Patch Documentation
11.1.1.3.1
22-Nov-2010
No
10104765
11.1.1.3.2
13-Dec-2010
No
10257660
11.1.1.3.3
09-Feb-2011
No
11061319
11.1.1.3.4
25-Mar-2011
No
11818697
11.1.1.3.5
07-Jun-2011
No
12409462
11.1.1.3.6
02-Aug-2011
No
12722062
11.1.1.3.7
05-Dec-2011
No
13063982
11.1.1.3.8
03-Apr-2012
No
13589894








9.1.0.2.x OIM Bundle Patch History
For detailed information about the OIM 9.1.0.2.x bundle patches including bug fixes, refer to Document 881954.1: Information And Bug Listing of Oracle Identity Manager Bundle Patches: 9.1.0.2
Bundle Patch Version
Patch Number
Release Date
Pillar/Suite Patch
 OIM Build Number
Patch Documentation
 9.1.0.2.1
14-Jul-2009
No
1866.1
 9.1.0.2.2
01-Sep-2009
No
1866.5
9.1.0.2.3
05-Nov-2009
No
1866.10
9.1.0.2.4
23-Nov-2009
No
1866.14
9.1.0.2.5
08-Jan-2010
No
1866.19
9.1.0.2.6
18-Feb-2010
No
1866.24
9.1.0.2.7
04-Mar-2010
No
1866.25
9.1.0.2.8
Not available for download
 -
No
1866.31

9.1.0.2.9
Not available for download
-
No
1866.35

9.1.0.2.10
Not available for download
-
No
1866.38
 
9.1.0.2.10A
28-Jul-2010 
No
1868.1
9.1.0.2.11
14-Aug-2010 
No
1866.47
9.1.0.2.12
28-Sep-2010 
No
1866.50
9.1.0.2.13
 10-Jan-2011
No
1866.56
9.1.0.2.14
01-Mar-2011 
No
1866.59
9.1.0.2.15
02-May-2011  
No
1866.62
9.1.0.2.16
07-Jun-2011 
No
1866.63
9.1.0.2.17
10-Jul-2011 
No
1866.70
9.1.0.2.18
31-Oct-2011 
No
1866.75
9.1.0.2.19
27-Jan-2012 
No
1866.79
9.1.0.2.20
31-May-2012 
No
1866.81
9.1.0.2.21
16-Jul-2013
No
1891.4
 





 Thanks & Regards 
Lakshmi P