OES10g - Unable Login To ASI Admin console and getting "ArmeUNKNOWNRESOURCE Exception: Object could not be found" error in logs (Doc ID 2148958.1)

Last updated on JULY 01, 2016

Applies to:

Oracle Entitlements Server - Version 10GR3 and later
Information in this document applies to any platform.

Symptoms

Having OES10gr3 cp5. User admin not able to login to the ASI console. Getting unauthenticated error message in asi console and also in Weblogic console

Observing the next error in the system-console log, after enabling authorization logging

 

========== BEGIN Policy Evaluation (2016-05-27 09:27:32,613 EDT) ==========
RequestResource is: //app/policy/ASI/asiconsole/url/asi/login/LoginFormProxy.jsp
UserInfo:
Name: //user/RootOrg!AdminDir/anonymous/
Groups: //sgrp/RootOrg!AdminDir/allusers/
Resource Present: false
Roles Granted: NONE
Role Mapping Policies: NONE
ATZ Policies: NONE
========== END Policy Evaluation (2016-05-27 09:27:32,613 EDT) ==========

2016-05-27 09:27:32,613 [[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)'] DEBUG com.bea.security.providers.authorization.asi.ARME.engine.ARME - unlock policy lock for read
2016-05-27 09:27:32,613 [[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)'] DEBUG com.bea.security.providers.authorization.asi.AuthorizationProviderImpl - received UnknownResourceException in isAccessAllowed, this is ok
2016-05-27 09:27:32,618 [[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)'] INFO com.bea.security.providers.authorization.asi.AccessResultLogger - Subject Subject:
resource type=<url>, application=asiconsole, contextPath=/asi, uri=/login/LoginFormProxy.jsp, httpMethod=POST result ABSTAIN
com.wles.arme.UnknownResourceException: ArmeUNKNOWNRESOURCE Exception: Object could not be found
at com.wles.arme.Credentials_ca.exceptionTransport(Credentials_ca.java:685)
at com.wles.arme.Credentials_ca._accessAllowed(Credentials_ca.java:313)
at com.wles.arme.CredentialsImpl._accessAllowed(CredentialsImpl.java:399)
at com.wles.arme.CachingCredentialsImpl._accessAllowed(CachingCredentialsImpl.java:275)
at com.wles.arme.CredentialsImpl.accessAllowed(CredentialsImpl.java:436)
at com.bea.security.providers.authorization.asi.AuthorizationProviderImpl.ARMEisAccessAllowed(AuthorizationProviderImpl.java:762)
at com.bea.security.providers.authorization.asi.AuthorizationProviderImpl.isAccessAllowed(AuthorizationProviderImpl.java:271)
at sun.reflect.GeneratedMethodAccessor45.invoke(Unknown Source)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:597)
at com.bea.security.providers.authorization.asi.AuthorizationProviderStub.isAccessAllowed(AuthorizationProviderStub.java:224)
at sun.reflect.GeneratedMethodAccessor44.invoke(Unknown Source)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:597)
at com.bea.common.security.internal.utils.Delegator$ProxyInvocationHandler.invoke(Delegator.java:57)
at $Proxy23.isAccessAllowed(Unknown Source)
at com.bea.common.security.internal.service.AccessDecisionServiceImpl.isAccessAllowed(AccessDecisionServiceImpl.java:108)
at sun.reflect.GeneratedMethodAccessor43.invoke(Unknown Source)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:597)
at com.bea.common.security.internal.utils.Delegator$ProxyInvocationHandler.invoke(Delegator.java:57)
at $Proxy29.isAccessAllowed(Unknown Source)
at com.bea.common.security.internal.service.AuthorizationServiceImpl.isAccessAllowed(AuthorizationServiceImpl.java:81)
at sun.reflect.GeneratedMethodAccessor42.invoke(Unknown Source)
at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:25)
at java.lang.reflect.Method.invoke(Method.java:597)
at com.bea.common.security.internal.utils.Delegator$ProxyInvocationHandler.invoke(Delegator.java:57)
at $Proxy31.isAccessAllowed(Unknown Source)
at weblogic.security.service.WLSAuthorizationServiceWrapper.isAccessAllowed(Unknown Source)
at weblogic.security.service.AuthorizationManager.isAccessAllowed(Unknown Source)
at weblogic.security.service.AuthorizationManager.isAccessAllowed(Unknown Source)
at weblogic.servlet.security.internal.WebAppSecurityWLS.hasPermission(WebAppSecurityWLS.java:317)
at weblogic.servlet.security.internal.FormSecurityModule.checkUserPerm(FormSecurityModule.java:215)
at weblogic.servlet.security.internal.FormSecurityModule.checkAccess(FormSecurityModule.java:92)
at weblogic.servlet.security.internal.ServletSecurityManager.checkAccess(ServletSecurityManager.java:82)
at weblogic.servlet.internal.WebAppServletContext.securedExecute(WebAppServletContext.java:2116)
at weblogic.servlet.internal.WebAppServletContext.execute(WebAppServletContext.java:2086)
at weblogic.servlet.internal.ServletRequestImpl.run(ServletRequestImpl.java:1406)
at weblogic.work.ExecuteThread.execute(ExecuteThread.java:201)
at weblogic.work.ExecuteThread.run(ExecuteThread.java:173)
2016-05-27 09:27:32,622 [[ACTIVE] ExecuteThread: '0' for queue: 'weblogic.kernel.Default (self-tuning)'] DEBUG com.bea.security.providers.authorization.ASIAdjudicator - Adjudicator.adjudicate results: ABSTAIN

 



 

Cause

Sign In with your My Oracle Support account

Don't have a My Oracle Support account? Click to get started

My Oracle Support provides customers with access to over a
Million Knowledge Articles and hundreds of Community platforms