Oracle Identity Governance (OIG) 12c: Bulk Loaded Users Not Creating Passwords Correctly In Oracle Accesss Manager (OAM)
(Doc ID 2774334.1)
Last updated on MAY 24, 2021
Applies to:Identity Manager - Version 22.214.171.124.0 and later
Information in this document applies to any platform.
In an OIG/OAM 12c integrated environment, bulkloaded OIG 12c Users quite often experience a different OIG User password (usr_password) than the associated SSOTarget account password (ud_ssotarge_password) once the "Bulk Load Post Process" job is run.
It is observed that when this occurs the OIM Users passwords and SSOTarget passwords are shifted by a random number of users in the bulk load.
For example, if you bulk load 3 OIM Users and run the "Bulk Load Post Process" job then:
- OIG User 1 would get OIG User 3's usr_password value set to ud_ssotarge_password
- OIG User 2 would get OIG User 1's usr_password value set to ud_ssotarge_password
- OIG User 3 would get OIG User 2's usr_password value set to ud_ssotarge_password
To view full details, sign in with your My Oracle Support account.
Don't have a My Oracle Support account? Click to get started!
In this Document