Introduction Any customer using Oracle IDCS with Azure AD as the IDP would want to automate the user and group provisioning process. When Azure AD acts as the...
Introduction Any customer using Oracle IDCS with Azure AD as the IDP would want to automate the user and group provisioning process. When Azure AD acts as the IDP, the users are born in Azure AD or are brought into Azure AD from an on-premise repository like AD. Users of the Oracle SaaS or PaaS applications protected with IDCS can be authenticated by Azure AD by setting up the federation trust and user synchronization is a pre-requisite for SSO to work. For user...
Introduction Any customer using Oracle IDCS with Azure AD as the IDP would want to automate the user and group provisioning process. When Azure AD acts as the IDP, the users are born in Azure AD or...
In the last few months, I ran into several Oracle SaaS and PaaS customers that use both Okta and Identity Cloud Service for various use cases. While working...
In the last few months, I ran into several Oracle SaaS and PaaS customers that use both Okta and Identity Cloud Service for various use cases. While working with those customers, I figured that we did not have automated users/groups provisioning supported by Okta. As I worked on the integration myself, I figured that there is some incompatibility between Okta and IDCS's SCIM implementation for Group membership management. I came up with a solution to put proxy between Okta...
In the last few months, I ran into several Oracle SaaS and PaaS customers that use both Okta and Identity Cloud Service for various use cases. While working with those customers, I figured that we did...
table td { border-width: 0px; border-color: black; border-style: solid; border-spacing: 1px 1px; padding: 10px; background-color: white; } .cb11w1 ul li,...
table td { border-width: 0px; border-color: black; border-style: solid; border-spacing: 1px 1px; padding: 10px; background-color: white; } .cb11w1 ul li, .cb11w1 ol li { line-height: 1.4em; color: #404040 } Introduction In an recent post I explained how to use the IDCS Assertion Grant Type Flow to create a personalized JWT Access Token. But I deliberatly excluded any sample code for obvious reasons: There are just too many libraries and programming languages available to...
table td { border-width: 0px; border-color: black; border-style: solid; border-spacing: 1px 1px; padding: 10px; background-color: white; } .cb11w1 ul li, .cb11w1 ol li { line-height: 1.4em;...
table td { border-width: 0px; border-color: black; border-style: solid; border-spacing: 1px 1px; padding: 10px; background-color: white; } .cb11w1 ul li, .cb11w1 ol li { line-height: 1.4em; color: #404040 } Introduction When a user or a computer program logs into Oracle's Identity Cloud Service (IDCS) using one of the three OpenID Connect flows an ID Token and an Access Token will be issued. Both tokens come with a number of required claims, i.e., attributes, and their...
Introduction This article shows how outbound REST calls can be made from App Composer Groovy using a content type of x-www-form-urlencoded. It assumes a basic...
Introduction This article shows how outbound REST calls can be made from App Composer Groovy using a content type of x-www-form-urlencoded. It assumes a basic knowledge of how to call REST APIs from Groovy and follows on from 2 articles on this subject: https://www.ateam-oracle.com/engagement-cloud-rest-in-brief https://www.ateam-oracle.com/engagement-cloud-outbound-rest-using-idcs-oauth Note - the method is not described in CX Sales documentation. Background Engagement...
Introduction This article shows how outbound REST calls can be made from App Composer Groovy using a content type of x-www-form-urlencoded. It assumes a basic knowledge of how to call REST APIs from...
Introduction In my earlier post I wrote about federating between Oracle Access Manager (OAM) and Oracle Cloud infrastructure (OCI) Console. However, in that...
Introduction In my earlier post I wrote about federating between Oracle Access Manager (OAM) and Oracle Cloud infrastructure (OCI) Console. However, in that post OAM was integrated with OCI on the commercial side of the house. OCI also has infrastructure for government agencies (.gov). In order to federate to OCI Gov, there are a different set of rules you must abide by, specifically we use the FedRAMP standard (https://fedramp.gov) when federating users to OCI. ...
Introduction In my earlier post I wrote about federating between Oracle Access Manager (OAM) and Oracle Cloud infrastructure (OCI) Console. However, in that post OAM was integrated with OCI on the...
In Part 1, About Desktop SSO using Azure AD, IDCS, and the App Gateway, I covered a high-level explanation on how this solution works including important...
In Part 1, About Desktop SSO using Azure AD, IDCS, and the App Gateway, I covered a high-level explanation on how this solution works including important decisions needed to deploy the App Gateway. If you have not read Part 1, please do so before continuing with this article. In Part 2 I provide concise steps on how to implement the solution, so let’s cut out the small talk and jump into it because there is a lot to cover. STEP 1 – Oracle App Gateway – Download, Deploy,...
In Part 1, About Desktop SSO using Azure AD, IDCS, and the App Gateway, I covered a high-level explanation on how this solution works including important decisions needed to deploy the App Gateway. ...
Introduction I worked with a number of customers to resolve issues with their E-Business Suite single sign-on setup using the IDCS asserter solution and saw a...
Introduction I worked with a number of customers to resolve issues with their E-Business Suite single sign-on setup using the IDCS asserter solution and saw a pattern in the misconfigurations causing these similar types of issues. In this blog, I want to share the basic EBS asserter flows to understand the runtime better and the commonly faced issues along with their resolutions. I hope this post will save you a lot of time and effort should you have any of these issues or...
Introduction I worked with a number of customers to resolve issues with their E-Business Suite single sign-on setup using the IDCS asserter solution and saw a pattern in the misconfigurations causing...
table td { border-width: 0px; border-color: black; border-style: solid; border-spacing: 1px 1px; padding: 10px; background-color: white; } .cb11w1 ul li, .cb11w1 ol li { line-height: 1.4em; color: #404040 } Introduction Many of the modern computer applications use a technology that is as old as the Roman Empire: this technology is user identitification by user name and pass word. It is used at the front end, the user interfaces, as well as the back end when computer...