{"id":13211,"date":"2020-01-02T21:20:32","date_gmt":"2020-01-02T20:20:32","guid":{"rendered":"https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/"},"modified":"2020-01-02T21:20:32","modified_gmt":"2020-01-02T20:20:32","slug":"weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider","status":"publish","type":"post","link":"https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/","title":{"rendered":"WebLogic Server &#8211; Automatic\/Silent creation of an LDAP Authentication Provider"},"content":{"rendered":"<p>In a <a href=\"https:\/\/www.dbi-services.com\/blog\/documentum-automatic-silent-creation-of-ldap-ldaps-server-config-objects\/\" target=\"_blank\" rel=\"noopener noreferrer\">previous blog<\/a>, I explained how it is possible to create an LDAP\/LDAPs connection from a Documentum Content Server automatically\/silently (without any need for a GUI). So I thought I would do the same thing but from a WebLogic Server to have the full chain from the Application to the backend, all connected to the LDAP\/LDAPs. This blog isn&#8217;t linked to Documentum, it is really just WebLogic Server specific so if you want to do the same but for another application, that&#8217;s also what you need to do. There are plenty of blogs on the internet about how to configure WebLogic but they are (almost?) always using the GUI&#8230; Which is good because it&#8217;s simple, but it is also annoying because you cannot really automate that.<\/p>\n<p>As mentioned in this <a href=\"https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-setup-of-a-saml2-sso\/\" target=\"_blank\" rel=\"noopener noreferrer\">subsequent blog<\/a>, my goal was a little bit more than just an LDAP setup so I first searched about any hints on what would be needed to setup everything. The only thing I found that was a little bit helpful was actually the examples that are shipped with the OFM (if you included them). We usually install only the minimal requirements so we don&#8217;t have the examples but you can choose to have the examples as well when you install the binaries. In the silent properties file, you can just set the install type to include &#8220;<strong>&#8230; With Examples<\/strong>&#8220;. Inside these examples, there is a SAML2 SSO one which seems pretty complex. There is a plethora of files for the purpose of the example obviously but most of that is completely useless outside of this scope. Also, from what I could see, it was designed for a WebLogic Server 9 so that seemed to be pretty old&#8230; Since I was using WLS 12c, I obviously expected a lot of things going wrong. It was nonetheless a good starting point to have some details about where can you find the needed elements in WLST but you will still need a lot of knowledge in WLS and WLST to be able to make something out of it. That&#8217;s where this blog comes in.<\/p>\n<p>For the LDAP Authentication Provider creation, you can also record the execution from the Administration Console, it will gives you good information about what needs to be done (at least for this part).<\/p>\n<p>The first thing to do to setup a LDAPs (it doesn&#8217;t apply to a plain LDAP) is to add the LDAPs SSL Certificate chain into the WebLogic Server&#8217;s trust store:<\/p>\n<pre class=\"brush: bash; gutter: true; first-line: 1; highlight: [8,10]\">[weblogic@weblogic-server-0 ~]$ cert_location=\"\/tmp\/certs\"\n[weblogic@weblogic-server-0 ~]$ ssl_ldap_root_ca_file=\"LDAP_Root_CA.cer\"\n[weblogic@weblogic-server-0 ~]$ ssl_ldap_int_ca_file=\"LDAP_Int_CA.cer\"\n[weblogic@weblogic-server-0 ~]$ tks_file=\"$DOMAIN_HOME\/certs\/trust.jks\"\n[weblogic@weblogic-server-0 ~]$ tks_pwd=\"MyP4ssw0rd\"\n[weblogic@weblogic-server-0 ~]$\n[weblogic@weblogic-server-0 ~]$ $JAVA_HOME\/bin\/keytool -import -trustcacerts -alias ssl_ldap_root_ca -file ${cert_location}\/${ssl_ldap_root_ca_file} -keystore ${tks_file} -storepass ${tks_pwd} -noprompt\nCertificate was added to keystore\n[weblogic@weblogic-server-0 ~]$ $JAVA_HOME\/bin\/keytool -import -trustcacerts -alias ssl_ldap_int_ca -file ${cert_location}\/${ssl_ldap_int_ca_file} -keystore ${tks_file} -storepass ${tks_pwd} -noprompt\nCertificate was added to keystore\n[weblogic@weblogic-server-0 ~]$<\/pre>\n<p>&nbsp;<\/p>\n<p>Once that is done, you can start the creation of the LDAP Authentication Provider. To be able to automate that, the best for me is to use a WLST script. Make sure the AdminServer is up, running and reachable before trying to execute a WLST script. I put all my parameters in a properties file and I&#8217;m loading this file in the WLST so that it creates the correct object with all the needed parameters. Here are the properties and the WLST script to create the LDAP (you can disregard the IdP and Managed Servers parameters, they are only used for the SAML2 SSO part in the other blog):<\/p>\n<pre class=\"brush: python; gutter: true; first-line: 1\">[weblogic@weblogic-server-0 ~]$ cat domain.properties\n# AdminServer parameters\nCONFIG_FILE=\/home\/weblogic\/secure\/configfile.secure\nKEY_FILE=\/home\/weblogic\/secure\/keyfile.secure\nADMIN_URL=t3s:\/\/weblogic-server-0.domain.com:8443\n# LDAP Authentication Providers parameters\nATN_NAME=Internal_LDAP\nATN_FLAG=SUFFICIENT\nATN_HOST=ldap.domain.com\nATN_PORT=636\nATN_PRINCIPAL=ou=APP,ou=applications,ou=intranet,dc=dbi services,dc=com\nATN_CREDENTIAL=T3stP4ssw0rd\nATN_SSL=true\nATN_BASE_DN=ou=people,ou=intranet,dc=dbi services,dc=com\nATN_USER_FILTER=(&amp;(uid=%u)(objectclass=person))\nATN_USER_CLASS=person\nATN_USER_AS_PRINCIPAL=true\nATN_GROUP_FILTER=(&amp;(cn=%g)(objectclass=groupofuniquenames))\nATN_TIMEOUT=30\n# IdP Partner parameters\nIDA_NAME=APP_SAML2_IDAsserter\nIDP_NAME=APP_SAML2_IDPartner\nIDP_METADATA=\/home\/weblogic\/idp_metadata.xml\nIDP_ENABLED=true\nIDP_REDIRECT_URIS=['\/D2-01\/*','\/D2-02\/*']\n# Managed Servers SSO parameters\nSSO_MS=msD2-01,msD2-02\nSSO_URLS=https:\/\/lb_url1\/saml2,https:\/\/lb_url2\/saml2\nSSO_ENTITY_IDS=APP_SAML2_Entity_ID_01,APP_SAML2_Entity_ID_02\nSSO_SP_ENABLED=true\nSSO_SP_BINDING=HTTP\/POST\n[weblogic@weblogic-server-0 ~]$\n[weblogic@weblogic-server-0 ~]$\n[weblogic@weblogic-server-0 ~]$ cat createLDAPAuthenticationProviders.wlst\n##################################################################\n#\n# Authors: Morgan Patou    \n# Version: 1.4 - 30\/08\/2019\n#\n# File: createLDAPAuthenticationProviders.wlst\n# Purpose: Script to create LDAP\/LDAPs Authentication Providers\n# Parameters: input properties file (optional)\n# Output:\n#\n##################################################################\n\n# Get operating system (for vars)\nimport os\n\n# Read the domain properties file\ntry:\n  if len(sys.argv) == 2:\n    domainProperties=sys.argv[1]\n  else:\n    domainProperties=os.path.realpath(os.path.dirname(sys.argv[0])) + \"\/domain.properties\"\n  loadProperties(domainProperties)\n  print \"&gt;&gt;&gt; Loaded the properties file: \" + domainProperties\n  print\n\nexcept:\n  exit(exitcode=1)\n\ntry:\n  redirect('\/dev\/null','false')\n  # Connect to AdminServer\n  connect(userConfigFile=CONFIG_FILE,userKeyFile=KEY_FILE,url=ADMIN_URL)\n  print \"&gt;&gt;&gt; Connected to the AdminServer.\"\n\n  # Start Edit Session\n  edit()\n  startEdit()\n  stopRedirect()\n  print \"&gt;&gt;&gt; Edit Session started.\"\n\n  # Get default Realm\n  realm=cmo.getSecurityConfiguration().getDefaultRealm()\n\n  # Create Authentication Providers\n  iplanetAtn=realm.lookupAuthenticationProvider(ATN_NAME)\n  if iplanetAtn != None:\n    realm.destroyAuthenticationProvider(iplanetAtn)\n  iplanetAtn=realm.createAuthenticationProvider(ATN_NAME,'weblogic.security.providers.authentication.IPlanetAuthenticator')\n  print \"&gt;&gt;&gt; Authentication Provider created.\"\n\n  # Config Authentication Providers\n  iplanetAtn.setControlFlag(ATN_FLAG)\n  iplanetAtn.setHost(ATN_HOST)\n  iplanetAtn.setPort(int(ATN_PORT))\n  iplanetAtn.setPrincipal(ATN_PRINCIPAL)\n  iplanetAtn.setCredential(ATN_CREDENTIAL)\n  iplanetAtn.setSSLEnabled(Boolean(ATN_SSL))\n  iplanetAtn.setUserBaseDN(ATN_BASE_DN)\n  iplanetAtn.setUserFromNameFilter(ATN_USER_FILTER)\n  iplanetAtn.setUserObjectClass(ATN_USER_CLASS)\n  iplanetAtn.setUseRetrievedUserNameAsPrincipal(Boolean(ATN_USER_AS_PRINCIPAL))\n  iplanetAtn.setGroupBaseDN(ATN_PRINCIPAL)\n  iplanetAtn.setGroupFromNameFilter(ATN_GROUP_FILTER)\n  iplanetAtn.setConnectTimeout(int(ATN_TIMEOUT))\n  print \"&gt;&gt;&gt; Authentication Provider configured.\"\n\n  # Reorder Authentication Providers\n  defaultAtn=realm.lookupAuthenticationProvider('DefaultAuthenticator')\n  defaultIdA=realm.lookupAuthenticationProvider('DefaultIdentityAsserter')\n  realm.setAuthenticationProviders(jarray.array([iplanetAtn,defaultAtn,defaultIdA],weblogic.management.security.authentication.AuthenticationProviderMBean))\n  print \"&gt;&gt;&gt; Authentication Providers re-ordered.\"\n\nexcept Exception, e:\n  print \"ERROR... check error messages for cause.\"\n  print e\n  exit(exitcode=1)\n\nredirect('\/dev\/null','false')\nsave()\nactivate()\ndisconnect()\nexit(exitcode=0)\n[weblogic@weblogic-server-0 ~]$<\/pre>\n<p>&nbsp;<\/p>\n<p>With the above, you have everything needed to simply create an LDAP Authentication Provider. I won&#8217;t really describe what the WLST script is doing, I believe it is pretty self-explanatory and there is a commented line before each section which describes the use of the commands. If you have any questions, please feel free to ask them in the comments below! I used an IPlanet Authenticator but you can obviously choose something else. I also set the group base dn as my principal because I don&#8217;t need the groups but you can set whatever you want\/need. There are other properties as well that you can set, just check them in WLST to have the correct method name (or use the record method as mentioned previously). In the above WLST script, the last thing done is also to re-order the Authentication Providers so that the newly created LDAP one is the first to be checked. The control flag is set as &#8220;<strong>SUFFICIENT<\/strong>&#8220;, meaning that if the authentication is successful for the LDAP, then WebLogic can proceed. For the LDAP user&#8217;s principal and password, you can also use an encrypted file containing the username and password with the &#8220;<strong>setEncrypted(&#8230;)<\/strong>&#8221; method instead.<\/p>\n<p>To execute the WLST script and therefore create the LDAP Authentication Provider, just execute the script:<\/p>\n<pre class=\"brush: python; gutter: true; first-line: 1\">[weblogic@weblogic-server-0 ~]$ ls\ncreateLDAPAuthenticationProviders.wlst  domain.properties\n[weblogic@weblogic-server-0 ~]$\n[weblogic@weblogic-server-0 ~]$ $ORACLE_HOME\/oracle_common\/common\/bin\/wlst.sh createLDAPAuthenticationProviders.wlst\n\nInitializing WebLogic Scripting Tool (WLST) ...\n\nWelcome to WebLogic Server Administration Scripting Shell\n\nType help() for help on available commands\n\n&gt;&gt;&gt; Loaded the properties file: \/home\/weblogic\/domain.properties\n&gt;&gt;&gt; Connected to the AdminServer.\n&gt;&gt;&gt; Edit Session started.\n&gt;&gt;&gt; Authentication Provider created.\n&gt;&gt;&gt; Authentication Provider configured.\n&gt;&gt;&gt; Authentication Providers re-ordered.\n[weblogic@weblogic-server-0 ~]$<\/pre>\n<p>&nbsp;<\/p>\n<p>As shown above, you can put a parameter to the script with the full path and name of the properties file to be loaded. Alternatively, if you do not provide any parameter, it will assume that the properties file is located just beside the WLST script with a certain name (&#8220;<strong>domain.properties<\/strong>&#8221; by default). In all cases, once the LDAP Authentication Provider has been created, you will need to restart the full Domain. That&#8217;s all there is to do to create an LDAP\/LDAPs connection on WebLogic Server.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a previous blog, I explained how it is possible to create an LDAP\/LDAPs connection from a Documentum Content Server automatically\/silently (without any need for a GUI). So I thought I would do the same thing but from a WebLogic Server to have the full chain from the Application to the backend, all connected to [&hellip;]<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[197],"tags":[60,1547,872,1417,647],"type_dbi":[],"class_list":["post-13211","post","type-post","status-publish","format-standard","hentry","category-application-integration-middleware","tag-12c","tag-ldap","tag-server","tag-silent","tag-weblogic"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.5) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>WebLogic Server - Automatic\/Silent creation of an LDAP Authentication Provider - dbi Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WebLogic Server - Automatic\/Silent creation of an LDAP Authentication Provider\" \/>\n<meta property=\"og:description\" content=\"In a previous blog, I explained how it is possible to create an LDAP\/LDAPs connection from a Documentum Content Server automatically\/silently (without any need for a GUI). So I thought I would do the same thing but from a WebLogic Server to have the full chain from the Application to the backend, all connected to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/\" \/>\n<meta property=\"og:site_name\" content=\"dbi Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-02T20:20:32+00:00\" \/>\n<meta name=\"author\" content=\"Morgan Patou\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@MorganPatou\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Morgan Patou\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\\\/\"},\"author\":{\"name\":\"Morgan Patou\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/c4d05b25843a9bc2ab20415dae6bd2d8\"},\"headline\":\"WebLogic Server &#8211; Automatic\\\/Silent creation of an LDAP Authentication Provider\",\"datePublished\":\"2020-01-02T20:20:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\\\/\"},\"wordCount\":856,\"commentCount\":0,\"keywords\":[\"12c\",\"ldap\",\"server\",\"Silent\",\"WebLogic\"],\"articleSection\":[\"Application integration &amp; Middleware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\\\/\",\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\\\/\",\"name\":\"WebLogic Server - Automatic\\\/Silent creation of an LDAP Authentication Provider - dbi Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#website\"},\"datePublished\":\"2020-01-02T20:20:32+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/c4d05b25843a9bc2ab20415dae6bd2d8\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WebLogic Server &#8211; Automatic\\\/Silent creation of an LDAP Authentication Provider\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/\",\"name\":\"dbi Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/#\\\/schema\\\/person\\\/c4d05b25843a9bc2ab20415dae6bd2d8\",\"name\":\"Morgan Patou\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g\",\"caption\":\"Morgan Patou\"},\"description\":\"Morgan Patou has over 12 years of experience in Enterprise Content Management (ECM) systems, with a strong focus in recent years on platforms such as Alfresco, Documentum, and M-Files. He specializes in the architecture, setup, customization, and maintenance of ECM infrastructures in complex &amp; critical environments. Morgan is well-versed in both engineering and operations aspects, including high availability design, system integration, and lifecycle management. He also has a solid foundation in open-source and proprietary technologies - ranging from Apache, OpenLDAP or Kerberos to enterprise-grade systems like WebLogic. Morgan Patou holds an Engineering Degree in Computer Science from ENSISA (\u00c9cole Nationale Sup\u00e9rieure d'Ing\u00e9nieurs Sud Alsace) in Mulhouse, France. He is Alfresco Content Services Certified Administrator (ACSCA), Alfresco Content Services Certified Engineer (ACSCE) as well as OpenText Documentum Certified Administrator. His industry experience spans the Public Sector, IT Services, Financial Services\\\/Banking, and the Pharmaceutical industry.\",\"sameAs\":[\"https:\\\/\\\/blog.dbi-services.com\\\/author\\\/morgan-patou\\\/\",\"https:\\\/\\\/x.com\\\/MorganPatou\"],\"url\":\"https:\\\/\\\/www.dbi-services.com\\\/blog\\\/author\\\/morgan-patou\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"WebLogic Server - Automatic\/Silent creation of an LDAP Authentication Provider - dbi Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/","og_locale":"en_US","og_type":"article","og_title":"WebLogic Server - Automatic\/Silent creation of an LDAP Authentication Provider","og_description":"In a previous blog, I explained how it is possible to create an LDAP\/LDAPs connection from a Documentum Content Server automatically\/silently (without any need for a GUI). So I thought I would do the same thing but from a WebLogic Server to have the full chain from the Application to the backend, all connected to [&hellip;]","og_url":"https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/","og_site_name":"dbi Blog","article_published_time":"2020-01-02T20:20:32+00:00","author":"Morgan Patou","twitter_card":"summary_large_image","twitter_creator":"@MorganPatou","twitter_misc":{"Written by":"Morgan Patou","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/#article","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/"},"author":{"name":"Morgan Patou","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8"},"headline":"WebLogic Server &#8211; Automatic\/Silent creation of an LDAP Authentication Provider","datePublished":"2020-01-02T20:20:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/"},"wordCount":856,"commentCount":0,"keywords":["12c","ldap","server","Silent","WebLogic"],"articleSection":["Application integration &amp; Middleware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/","url":"https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/","name":"WebLogic Server - Automatic\/Silent creation of an LDAP Authentication Provider - dbi Blog","isPartOf":{"@id":"https:\/\/www.dbi-services.com\/blog\/#website"},"datePublished":"2020-01-02T20:20:32+00:00","author":{"@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8"},"breadcrumb":{"@id":"https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.dbi-services.com\/blog\/weblogic-server-automatic-silent-creation-of-an-ldap-authentication-provider\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/www.dbi-services.com\/blog\/"},{"@type":"ListItem","position":2,"name":"WebLogic Server &#8211; Automatic\/Silent creation of an LDAP Authentication Provider"}]},{"@type":"WebSite","@id":"https:\/\/www.dbi-services.com\/blog\/#website","url":"https:\/\/www.dbi-services.com\/blog\/","name":"dbi Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dbi-services.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.dbi-services.com\/blog\/#\/schema\/person\/c4d05b25843a9bc2ab20415dae6bd2d8","name":"Morgan Patou","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/5d7f5bec8b597db68a09107a6f5309e3870d6296ef94fb10ead4b09454ca67e5?s=96&d=mm&r=g","caption":"Morgan Patou"},"description":"Morgan Patou has over 12 years of experience in Enterprise Content Management (ECM) systems, with a strong focus in recent years on platforms such as Alfresco, Documentum, and M-Files. He specializes in the architecture, setup, customization, and maintenance of ECM infrastructures in complex &amp; critical environments. Morgan is well-versed in both engineering and operations aspects, including high availability design, system integration, and lifecycle management. He also has a solid foundation in open-source and proprietary technologies - ranging from Apache, OpenLDAP or Kerberos to enterprise-grade systems like WebLogic. Morgan Patou holds an Engineering Degree in Computer Science from ENSISA (\u00c9cole Nationale Sup\u00e9rieure d'Ing\u00e9nieurs Sud Alsace) in Mulhouse, France. He is Alfresco Content Services Certified Administrator (ACSCA), Alfresco Content Services Certified Engineer (ACSCE) as well as OpenText Documentum Certified Administrator. His industry experience spans the Public Sector, IT Services, Financial Services\/Banking, and the Pharmaceutical industry.","sameAs":["https:\/\/blog.dbi-services.com\/author\/morgan-patou\/","https:\/\/x.com\/MorganPatou"],"url":"https:\/\/www.dbi-services.com\/blog\/author\/morgan-patou\/"}]}},"_links":{"self":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/13211","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/comments?post=13211"}],"version-history":[{"count":0,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/posts\/13211\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/media?parent=13211"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/categories?post=13211"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/tags?post=13211"},{"taxonomy":"type","embeddable":true,"href":"https:\/\/www.dbi-services.com\/blog\/wp-json\/wp\/v2\/type_dbi?post=13211"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}