REP-50004 When Run Reports 11gR2 with Webgate/OAM 11.1.2.3; Forms Okay

(Doc ID 2316126.1)

Last updated on OCTOBER 13, 2017

Applies to:

Oracle Reports Developer - Version 11.1.2.0.0 to 11.1.2.2.0 [Release 11g]
Information in this document applies to any platform.

Symptoms

Trying to run Reports 11g with SSOCONN protected by Webgate/OAM 11.1.2.3.

When protected using MOD_OSSO, the reports run without a problem.
But, when configure Reports and Forms with OAM/Webgate according to:

<Note:1566779.1> How to Integrate Forms 11gR2 with OAM/Webgate after an 11gR2 Forms/Reports Installation

Forms works fine being protected by the Webgate without any issues; however, Reports fails with:

ERROR

In IE, get the error:

REP-50004: No report is specified on the command line

In Firefox:

"The page is not redirecting properly"

 
The rwservlet_diagnostic.log shows:

[2017-10-03T08:07:14.268-04:00] [WLS_REPORTS] [INCIDENT_ERROR] [REP-52285] [oracle.reports.servlet] [tid: 13] [userId: <anonymous>] [ecid: 00iiJaTRe391RdrN4IECUE00035k0000nT,0:3:0x5f5e1c1] [APP: reports#11.1.2] REP-52285 : The user name or subscriber name cannot be found in Logon Server cookie. [[
oracle.reports.RWException: IDL:oracle/reports/RWException:1.0
at oracle.reports.utility.Utility.newRWException(Utility.java:1053)
at oracle.reports.rwclient.OIDManager.getUserDN(OIDManager.java:526)
at oracle.reports.rwclient.OIDManager.access$1200(OIDManager.java:44)
at oracle.reports.rwclient.OIDManager$Resource.getResourceAttributes(OIDManager.java:731)
at oracle.reports.rwclient.OIDManager$Resource.access$100(OIDManager.java:688)
at oracle.reports.rwclient.OIDManager.getConnString(OIDManager.java:139)
at oracle.reports.rwclient.AuthManager.handleSSOConn(AuthManager.java:446)
at oracle.reports.rwclient.AuthManager.getUserId(AuthManager.java:413)
at oracle.reports.rwclient.RWClient.appendUserid(RWClient.java:2491)
at oracle.reports.rwclient.RWClient.processRequest(RWClient.java:1941)
at oracle.reports.rwclient.RWClient.doGet(RWClient.java:512)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:707)
at javax.servlet.http.HttpServlet.service(HttpServlet.java:820)
at weblogic.servlet.internal.StubSecurityHelper$ServletServiceAction.run(StubSecurityHelper.java:227)
at weblogic.servlet.internal.StubSecurityHelper.invokeServlet(StubSecurityHelper.java:125)
at weblogic.servlet.internal.ServletStubImpl.execute(ServletStubImpl.java:301)
at weblogic.servlet.internal.TailFilter.doFilter(TailFilter.java:26)
at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:60)
at oracle.security.jps.ee.http.JpsAbsFilter$1.run(JpsAbsFilter.java:138)
at java.security.AccessController.doPrivileged(Native Method)
at oracle.security.jps.util.JpsSubject.doAsPrivileged(JpsSubject.java:324)
at oracle.security.jps.ee.util.JpsPlatformUtil.runJaasMode(JpsPlatformUtil.java:464)
at oracle.security.jps.ee.http.JpsAbsFilter.runJaasMode(JpsAbsFilter.java:121)
at oracle.security.jps.ee.http.JpsAbsFilter.doFilter(JpsAbsFilter.java:211)
at oracle.security.jps.ee.http.JpsFilter.doFilter(JpsFilter.java:71)
at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:60)
at oracle.dms.servlet.DMSServletFilter.doFilter(DMSServletFilter.java:163)
at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:60)
at weblogic.servlet.internal.WebAppServletContext$ServletInvocationAction.wrapRun(WebAppServletContext.java:3748)
at weblogic.servlet.internal.WebAppServletContext$ServletInvocationAction.run(WebAppServletContext.java:3714)
at weblogic.security.acl.internal.AuthenticatedSubject.doAs(AuthenticatedSubject.java:321)
at weblogic.security.service.SecurityManager.runAs(SecurityManager.java:120)
at weblogic.servlet.internal.WebAppServletContext.securedExecute(WebAppServletContext.java:2283)
at weblogic.servlet.internal.WebAppServletContext.execute(WebAppServletContext.java:2182)
at weblogic.servlet.internal.ServletRequestImpl.run(ServletRequestImpl.java:1499)
at weblogic.work.ExecuteThread.execute(ExecuteThread.java:263)
at weblogic.work.ExecuteThread.run(ExecuteThread.java:221)


Run report using similar syntax:
https://hostname:447/reports/rwservlet?passkey&report=myreport.rep

 (where passkey is mapped to "destype=cache&desformat=pdf&server=reports_server&SSOCONN=<mysso>&report=myreport.rep" in cgicmd.dat file.)

The same URLs work when protected by MOD_OSSO, pointed to the same OID store. The MOD_OSSO files are generated by the same OAM server which the Webgate connects to.
 
When run report without passkey,

https://hostname:447/reports/rwservlet?destype=cache&desformat=pdf&server=reports_server&SSOCONN=<mysso>&report=myreport.rep

you get the message" Oracle SSO" on the browser page.


According to live HTTP Headers, it tries to create a resource when there should be a RAD there already.

Cause

Sign In with your My Oracle Support account

Don't have a My Oracle Support account? Click to get started

My Oracle Support provides customers with access to over a
Million Knowledge Articles and hundreds of Community platforms