Skip to Main Content

oracle.scim.exception.ProviderException when using SCIM/REST OIG API

David Rios ValerianoSep 12 2017 — edited Sep 15 2017

Hi everyone,

I'm facing an issue with SCIM/REST API. I'm trying to execute following query:

Method:    Get

URL:        http://HOST_NAME:PORT/idaas/im/scim/v1/Me

However in my QA environment it is ending with an HTTP 500 status with following body response:

-------------------------

{

  "schemas": [

    "urn:ietf:params:scim:api:messages:2.0:Error"

  ],

  "detail": "Incorrect character   while parsing \"urn:ietf:params:scim:schemas:extension:oracle:2.0:OIG:User:SAP Linked User ID\" at index 63.",

  "status": "500"

}

-------------------------

And in oim log this is printed:

-------------------------

oracle.scim.exception.ProviderException: [Incorrect character   while parsing "urn:ietf:params:scim:schemas:extension:oracle:2.0:OIG:User:SAP Linked User ID" at index 63.]

        at oracle.iam.scim.oim.OimProvider.buildSchema(OimProvider.java:448)

        at oracle.iam.scim.oim.OimProvider.loadSchema(OimProvider.java:361)

        at oracle.iam.scim.oim.OimProvider.getSchema(OimProvider.java:112)

        at oracle.scim.webapp.ScimRestResources.executeRequest(ScimRestResources.java:947)

        at oracle.scim.webapp.ScimRestResources.getResources(ScimRestResources.java:212)

        at sun.reflect.GeneratedMethodAccessor7455.invoke(Unknown Source)

        at sun.reflect.DelegatingMethodAccessorImpl.invoke(DelegatingMethodAccessorImpl.java:43)

        at java.lang.reflect.Method.invoke(Method.java:606)

        at com.sun.jersey.spi.container.JavaMethodInvokerFactory$1.invoke(JavaMethodInvokerFactory.java:60)

        at com.sun.jersey.server.impl.model.method.dispatch.AbstractResourceMethodDispatchProvider$ResponseOutInvoker._dispatch(AbstractResourceMethodDispatchProvider.java:205)

        at com.sun.jersey.server.impl.model.method.dispatch.ResourceJavaMethodDispatcher.dispatch(ResourceJavaMethodDispatcher.java:75)

        at com.sun.jersey.server.impl.uri.rules.HttpMethodRule.accept(HttpMethodRule.java:288)

        at com.sun.jersey.server.impl.uri.rules.RightHandPathRule.accept(RightHandPathRule.java:147)

        at com.sun.jersey.server.impl.uri.rules.ResourceClassRule.accept(ResourceClassRule.java:108)

        at com.sun.jersey.server.impl.uri.rules.RightHandPathRule.accept(RightHandPathRule.java:147)

        at com.sun.jersey.server.impl.uri.rules.RootResourceClassesRule.accept(RootResourceClassesRule.java:84)

        at com.sun.jersey.server.impl.application.WebApplicationImpl._handleRequest(WebApplicationImpl.java:1469)

        at com.sun.jersey.server.impl.application.WebApplicationImpl._handleRequest(WebApplicationImpl.java:1400)

        at com.sun.jersey.server.impl.application.WebApplicationImpl.handleRequest(WebApplicationImpl.java:1349)

        at com.sun.jersey.server.impl.application.WebApplicationImpl.handleRequest(WebApplicationImpl.java:1339)

        at com.sun.jersey.spi.container.servlet.WebComponent.service(WebComponent.java:416)

        at com.sun.jersey.spi.container.servlet.ServletContainer.service(ServletContainer.java:537)

        at oracle.security.idm.common.rest.IdmServletContainer.doFilter(IdmServletContainer.java:178)

        at oracle.security.idm.common.rest.IdmServletContainer.doFilter(IdmServletContainer.java:148)

        at com.sun.jersey.spi.container.servlet.ServletContainer.doFilter(ServletContainer.java:795)

        at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:56)

        at oracle.wsm.agent.handler.servlet.SecurityFilter.doFilter(SecurityFilter.java:268)

        at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:56)

        at oracle.security.jps.ee.http.JpsAbsFilter$1.run(JpsAbsFilter.java:138)

        at java.security.AccessController.doPrivileged(Native Method)

        at oracle.security.jps.util.JpsSubject.doAsPrivileged(JpsSubject.java:324)

        at oracle.security.jps.ee.util.JpsPlatformUtil.runJaasMode(JpsPlatformUtil.java:464)

        at oracle.security.jps.ee.http.JpsAbsFilter.runJaasMode(JpsAbsFilter.java:121)

        at oracle.security.jps.ee.http.JpsAbsFilter.doFilter(JpsAbsFilter.java:211)

        at oracle.security.jps.ee.http.JpsFilter.doFilter(JpsFilter.java:71)

        at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:56)

        at oracle.dms.servlet.DMSServletFilter.doFilter(DMSServletFilter.java:163)

        at weblogic.servlet.internal.FilterChainImpl.doFilter(FilterChainImpl.java:56)

        at weblogic.servlet.internal.WebAppServletContext$ServletInvocationAction.wrapRun(WebAppServletContext.java:3730)

        at weblogic.servlet.internal.WebAppServletContext$ServletInvocationAction.run(WebAppServletContext.java:3696)

        at weblogic.security.acl.internal.AuthenticatedSubject.doAs(AuthenticatedSubject.java:321)

        at weblogic.security.service.SecurityManager.runAs(SecurityManager.java:120)

        at weblogic.servlet.internal.WebAppServletContext.securedExecute(WebAppServletContext.java:2273)

        at weblogic.servlet.internal.WebAppServletContext.execute(WebAppServletContext.java:2179)

        at weblogic.servlet.internal.ServletRequestImpl.run(ServletRequestImpl.java:1485)

        at weblogic.work.ExecuteThread.execute(ExecuteThread.java:256)

        at weblogic.work.ExecuteThread.run(ExecuteThread.java:221)

-------------------------

According to the exception message, it seems that the schema name "SAP Linked User ID" triggers the error, but I can't find where to change/validate it. In addition, I have executed same query in my PROD enviroment and it works fine. Any ideas why this is happening in one environment but no in the other. I have checked patching but is the same for both, here you have the OPatch output:

-------------------------

Installed Top-level Products (1):

Oracle IDM Suite                                                     11.1.2.3.0

There are 1 products installed in this Oracle Home.

Interim patches (2) :

Patch  21197325     : applied on Fri Jun 09 11:20:32 CDT 2017

Unique Patch ID:  18996262

   Created on 3 Jul 2015, 07:28:59 hrs PST8PDT

   Bugs fixed:

     21197325

Patch  24751162     : applied on Fri Jun 09 10:12:55 CDT 2017

Unique Patch ID:  20630502

   Created on 28 Sep 2016, 20:50:10 hrs PST8PDT

   Bugs fixed:

     21275339, 20709413, 20488456, 23239063, 20255099, 20424362, 16063623

     20689668, 21137925, 21034388, 20524755, 23295775, 21938007, 21211157

     20475592, 20541274, 22969384, 20860916, 16063754, 22964362, 21532202

     22446828, 18705367, 23316887, 21319918, 18635472, 22455314, 20892756

     23276882, 23185967, 22018915, 22881138, 21267780, 20309633, 21777201

     18193512, 20730776, 20825443, 21021030, 20863982, 22061187, 21379041

     16063356, 21203366, 21963485, 21877102, 21651051, 22818817, 20953589

     22150399, 20328002, 20097227, 23733835, 22500047, 22929369, 21805807

     23624096, 20626958, 21678784, 20764415, 24319701, 22221277, 20417471

     20199902, 20716805, 20699815, 22247374, 20822965, 20801153, 21571621

     21445453, 22116533, 23322051, 21573655, 23625266, 22071231, 22876007

     24335236, 21880571, 21229120, 22637088, 21288258, 24717923, 21614229

     22288518, 21069725, 20327394, 16031158, 22552044, 21502653, 20216479

     22526906, 20820578, 21072088, 22721501, 22202612, 22258989, 21960123

     20877582, 20930751, 21344824, 21515490, 20762744, 20927398, 20866344

     20274370, 20801731, 17972797, 21445349, 20703665, 21278945, 22161205

     21916157, 20974561, 20718577, 20216549, 21324220, 22699122, 20816213

     20694423, 21796824, 20078727, 20864813, 21119498, 24394204, 16063744

     20078565, 22766736, 21604627, 22302761, 22525329, 21923194, 20866330

     21785321, 22717399, 18449663, 22046562, 22331195, 23340356, 23198263

     23726672, 20735186, 21305308, 21536413, 21229691, 20901208, 21517627

     21811482, 20589083, 22781095, 22170828, 23091621, 20561521, 22334711

     20649723, 22006620, 22299662, 22018489, 22856267, 21934392, 21310180

     21773185, 23081924, 23169221, 22912475, 24406584, 21866962, 21177299

     22261218, 20972800, 23024411, 17773501, 20695308, 21335538, 22664253

     22657067, 21202346, 20786009, 20956390, 21985906, 21794339, 21969751

     20771883, 22283738, 21269040, 22458505, 22006831, 20923899, 21947511

     21892457, 20278249, 20701142, 20216431, 21985284, 23340053, 20765884

     22841877, 21808690, 20851074, 21771586, 20343011, 21916535, 24563070

     22890679, 20762688, 23199870, 21425600, 21957728, 21682060, 22447195

     21095299, 20078286, 21811681, 22390959, 23723606, 23220998, 21358934

     20964544, 22108302, 22292135, 22734453, 24503455, 21063072, 21206346

     23035006, 22675042, 21483566, 21203315, 20975564, 22325137, 20488530

     21792490, 22831138, 21307737, 22543346, 22107125, 16063641, 20470640

     22923914, 24605551, 21573534, 22236920, 20631229, 21494462, 22737203

     21124580, 21574968, 20873672, 22151194, 23421440, 23543937, 21155379

     21831968, 20824745, 20786230, 21690822, 21259439, 20652122, 20816189

     20543741, 21883735, 22608297, 23548790, 21238452, 20864548, 20474071

     21923391, 20690202, 22240057, 22386519, 20902312, 21125125, 23251246

--------------------------------------------------------------------------------

OPatch succeeded.

Comments
Post Details
Added on Sep 12 2017
1 comment
106 views