Introduction

 

This post is part of a mini-serie covering the Oracle Integration Cloud v3 from the networking perspective.

I will cover the configuration of a test integration and the OAauth 2.0 authentication to it.  
**I am not an integrations expert nor a security expert , while writing my previous post, i wanted to test the connectivity to a customer managed custom endpoint and i struggled to achieve this simple task and i wanted to capture these steps to reuse it in the future.**

Please read the post on configuring a custom endpoint before moving forward.

 

 

Configure a sample integration

 

After provisioning an OIC v3 instance, you can create several sample integrations following the official documentation. For the purpose of this post, i will configure the simplest one, called “echo”.

Login to your OIC design-time url, click the “Browse store” botton.

 
02.png


Click the search button,  

03.png 

and search for “echo” and hit “Get”.  

04.png

From “Home” navigate to “Projects”, and click on the “Oracle REST Echo Request”.  

05.png

Click on the integration and “Activate” it.  

06.png

07.png

Click on the integration and hit “Run”.  

08.png

You can do a simple test and if the Custom endpoint is configured correctly, you will get a 200 OK http status.  

09.png

If you click on the “Endpoint metadata”, you will see the endpoint details.

10.png

 

 

 

 

 

Configure the OAuth 2.0 client credential authentication

 

Next we will configure the OAuth 2.0 for authenticating Requests for Invoking Oracle Integration Flows.  
Please read the official documentation for authenticating the request.

 

Configure the Integrated Application

Navigate to “Identity and Security >> Identity >> Domains” and choose you configured Identity domain (in my example it is the default domain).  
Navigate to “Integrated Applications” and hit “Add application” and choose “Confidential Application”.

11.png

 
Give it a name and a description, left everything else not filled in and hit “Next”.

12.png

Configure the OAuth as “Client Configuration”, under Authorization check “client credentials” and “refresh token”.

13

Under “Token issuance policy” set the “Authorised resources” to “specific” and select “”add resources”.  
Under “Add scope” search your provisioned integration instance, expand it, select the scopes and hit add.  


14.png

 

Hit next to the proceed to the “Configure policy” section which will be left as “Skip and do later”.  

15.png

The application is disabled, so we will need to hit the “Activate” button.  

16.png

 

 

Configure the Integration Instance to use oauth2

 

Next we will assign the application to the “Oracle Cloud Services” created application for your Integration instance.

Before configuring this, we need to understand what users can do by role. Please check the official documentation.
In this exercise, i will use the “Service User” role.

Navigate to “Identity and Security > Identity > Domains” and choose your configured Identity domain (in my example it is the default domain).  
Under Oracle Cloud Services, search for your integrations instance name. You will get the application configured when you provisioned the integration instance. Under this application we will configure the oauth2 authentication.

Under “Resources”, navigate to “Application roles”, expand the “ServiceUser” role and under “Assigned application” hit “Manage”.  
17.png

 

Under “Available applications” search for the integrated application that was just configured and hit “Assign”.  


18.png

 

 

Test Connectivity

 

Now that we have a test application under our integration instance and the authentication of the requests setup, we will use Postman to do a connection.  
Postman is a software client that is used throughout the industry to test APIs.  
In this post i used the free version of the service, where i configured a new collection called OICv3.  
Under the collection i configured the following variables:

– Access token url  
    This is the IDCS url appended with the path “”/oauth2/v1/token  
    The IDCS url can be found by navigating to “Identity and Security > Identity > Domains” and choose you configured Identity domain (in my example it is the default domain).  
  19.png


– Client ID and Client Secret  
    This information can be found under Identity and Security >> Identity >> Domains >> Default domain >> Integrated applications >> “your application”.  
   20.png


– Scope  
    Under the same path as the Client ID, we can pind the scope
    21.png


– message – will be the message that will be sent to the integration.

22.png

 

Now that we have the variables, we can configure a connection.

In order to get the endpoint url, we need to login to the Oracle Sample Echo application on our integration instance and get the endpoint metadata.  


23.png

In Postman under the collection that we created, select “add request”, put as method “GET”, under URL put the endpoint url and under “Auth Type” choose “OAuth 2.0” and under “Add authorization data to” choose “Request Headers” and for the rest of the configuration, use the variables that we just created like in the screenshot below.  


24.png

In order to authenticate, first we need to acquire a token. for this task we will hit the “Get new Access Token”.  


25.png

once the token is created you are getting a confirmation,  

26.png  

and you will see the token.  

27.png

 

Once you send the request, you will get a 200 OK message.

28.png

 

 

Conclusion

After following this post you are able to configure a sample integration and authenticate the requests to it using oauth 2.0.

In the next blog we will configure Disaster Recovery.