Each resource assigned to an application domain can be protected by only one authentication policy. After adding a resource definition to the application domain, the administrator can begin refining a default authentication policy, adding a new policy, and assigning resources to the authentication policy.
- Administrators use authentication policies to protect specific resources. The authentication policy provides the sole authentication method for resources governed by the policy.
- Each authentication policy defines the type of verification that must be performed to provide a sufficient level of trust for Oracle Access Manager to grant access to the user making the request.
- Authentication policies are local. A single policy can be defined to protect one or more resources in the application domain. However, each resource can be protected by only one authentication policy. There is no policy inheritance as there is with Oracle Entitlement Server. The policy cannot be applied to any other resource.
a) Authentication Scheme – which defines how users are authenticated
b) Success/Failure URL – User is shown something based on the result of Policy
Evaluation
c) Responses – declares optional actions to be taken for OAM’s Single Sign-On feature,
and provides the ability to insert information into a session and pull it back out later.
To create an Authentication Policy, do the steps as shown: