GlassFish to Payara Server Migration – migrating away from the Oracle Access Manager integration

Migration

In the fifth part of our continuing series on alternatives for commercial Oracle GlassFish features, we are looking  at a replacement for the Oracle’s Access Manager integration feature.

 

 {{cta(‘3382707d-3c20-4768-8acd-0a5b78c43d95’)}}

 

What is Oracle Access Manager?

Oracle GlassFish Server includes a special security provider, implemented as a custom JASPIC (JSR-196, Java Authentication Service Provider Interface for Containers) module that allows enterprise applications to authenticate and take advantage of the Single Sign On functionality provided by its integration with Oracle Access Manager (a security suite with strong integration with other Oracle products and several infrastructure arrangements). This security provider can be used in the following 2 ways:

  1. As an authenticator module, using the standard Java EE BASIC, FORM or client certificate (CERT) mechanisms; delegating authentication to the Access Manager.
  2. As an identity verifier that redirects the user to the Oracle Access Manager Web Gate (a login or startup page) in case of authentication failure. It also eases the login process by maintaining a single session across several applications (SSO).

How can it be replaced?

Since Oracle Access Manager is a proprietary licensed product of Oracle, there’s no special integration that comes bundled with Payara Server. However, Payara Server itself contains a simple Single Sign On solution inherited from GlassFish Open Source Edition that can be easily configured when using the standard JAAS configuration.

To enable this feature on Payara Server, go to the server-configVirtual Server section and select the virtual servers used by your applications:

 

virtual-server-screenshot.png

 

On the SSO property, select Enabled and configure the listeners that will be used for establishing the Single-Sign-On session (by default the standard HTTP and HTTPS listeners of the domain or instance configuration). Make sure to also set the sso-max-inactive-seconds and sso-reap-interval-seconds additional properties to the time frames that a SSO session will use before expiring.

 

When Single Sign On is enabled, all web applications that are deployed on the same virtual server will share authentication state, so if a user logs in to a web application he will be implicitly logged for all other remaining applications that require the same authentication information as well. Keep in mind that this behavior only applies for web applications configured on the same security realm.

 

If you were using Oracle Access Manager with your GlassFish Server and require a strong identity and access management suite of tools with good support that can be integrated with Payara Server, we strongly recommend migrating to ForgeRock’s suite of products and replace Oracle Access Manager with their own management suite.

 

Considering that the access management application (Open AM) doesn’t have direct support for Payara Server, to fully integrate it and its SSO capabilities, please follow the instructions we have detailed in our ‘Forge Rock Integration with Payara Server’ blog series:

 

 

Comments (0)

Post a comment

Your email address will not be published. Required fields are marked *

Payara needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Legal & Privacy Policy.

Related Posts

The Imperative for Legacy Java Modernization in Banking Cover 2 minutes
Security

The $57 Billion Problem: Why Banking’s Java Legacy Crisis Demands Immediate Action

How outdated Java systems are draining budgets and throttling innovation across financial services? Let’s dig in in this blog […]

Interview The software that could be putting your cyber-security at risk 2 minutes
Security

Middleware Cyber Security: The Hidden Risk Every C-Suite Should Prioritize

When tackling cyber risk at the strategic level, it pays to learn from trusted leaders. Steve Millidge, CEO and […]

Image promoting a Payara blog with an illustration of a document with checkmarks and a magnifying glass. 5 minutes
Jakarta EE

Why Jakarta EE Standards Make Legacy App Modernization Simple

Legacy Java applications built on enterprise standards don’t have to be roadblocks to modernization. When applications follow established specifications […]