This document describes how to configure Oracle Identity Cloud Service to provide Single Sign-On (SSO) using OpenID Connect and provisioning for Oracle Policy Automation.
Oracle Policy Automation enables organizations in all industries to automate service processes, policies, rules, and regulations to provide superior customer experiences across all channels, through interactive self-service advice, guided agent interviews, and offline surveys and assessments. Oracle Policy Automation includes a management console for tracking, sharing and deploying policy versions, and for configuring user permissions and connections.
After integrating Oracle Policy Automation with Oracle Identity Cloud Service:
Note: This integration is applicable to Oracle Policy Automation Hub users, including Oracle Policy Automation Mobile users, but not to Oracle Policy Automation interview users.
Use this section to register and activate Oracle Policy Automation and to enable provisioning for Oracle Policy Automation. You can then assign users or groups to Oracle Policy Automation and start the user provisioning process.
Note: The Synchronization feature is currently not supported.
To enable provisioning, client ID and client secret values are required to authenticate with Oracle Policy Automation REST APIs. You obtain these values by adding a new local API client in the Oracle Policy Automation Hub.
The detailed instructions for performing these tasks are available in the Oracle Policy Automation documentation. For details, see the Add a new API client section in the Project Administrator Guide.
Use this section to enable provisioning for managing user accounts in Oracle Policy Automation through Oracle Identity Cloud Service.
Parameter | Value |
---|---|
Host Name | Enter the host name of the server hosting the Oracle Policy Automation Hub. |
Port Number | Enter the port number where Oracle Policy Automation is listening. |
Client ID | Enter the client ID value that you obtained in the “Prerequisite Steps” section. |
Client Secret | Enter the client secret value that you obtained in the “Prerequisite Steps” section. |
Authorization Server URL | Enter the URL of the Oracle Policy Automation Hub authorization server. For example, https:///opa-hub/api/auth/ |
You can now manage Oracle Policy Automation accounts through Oracle Identity Cloud Service. For more information on performing provisioning tasks, see the Managing Oracle Identity Cloud Service Users and Managing Oracle Identity Cloud Service Groups sections in Administering Oracle Identity Cloud Service.
Use this section to configure OpenID Connect in Oracle Identity Cloud Service.
Use this section to configure the Oracle Policy Automation Hub for registering and activating OpenID Connect.
Before registering and activating OpenID Connect in Oracle Policy Automation, ensure that the Oracle Policy Automation application is assigned to a user account. You use this account for verifying the integration. After the integration is successful, this account is assigned the default Hub Administrator role in Oracle Policy Automation.
Note: Ensure that you do not revoke access for the user account with the Hub Administrator role otherwise the user cannot access the Oracle Policy Automation Hub as Hub Administrator.
Parameter | Value |
---|---|
Authorization Server URL | Enter the Oracle Identity Cloud Service host URL. For example, https://.identity.oraclecloud.com . You obtain this information from the Oracle Identity Cloud Service administration console URL: https://.identity.oraclecloud.com/ui/v1/adminconsole . |
Client ID | Enter the client ID value that you obtained in the "Configuring OpenID Connect in Oracle Identity Cloud Service" section. |
Client Secret | Enter the client secret value that you obtained in the "Configuring OpenID Connect in Oracle Identity Cloud Service" section. |
Client Primary Audience | By default, this field displays the Oracle Policy Automation Server URL. For example, https:/// . Ensure that the URL does not include a suffix after . For example, if the field displays the URL as https:///opa/idcs/ , remove the opa/idcs/ suffix. |
Use this section to verify that OpenID Connect authentication works correctly when initiated either from Oracle Policy Automation (Relying Party) or Oracle Identity Cloud Service (IdP).
This confirms that the login that is initiated from Oracle Identity Cloud Service works.
This confirms that the login that is initiated from Oracle Policy Automation works.
This confirms that logout works and that the user is no longer logged in to Oracle Policy Automation and Oracle Identity Cloud Service.
Use this section to locate solutions to common integration issues.
Cause: Oracle Identity Cloud Service Administrator regenerates the client secret attribute in Oracle Identity Cloud Service.
Solution: The client secret attribute must be updated in the Oracle Policy Automation Hub by the Hub Administrator before logging off. If not, users will not be able to log in to the Oracle Policy Automation Hub and security will have to be reset by Support.
Cause1: The administrator revokes access for the user at the same time that the user tries to access the Oracle Policy Automation Hub using Oracle Identity Cloud Service.
Solution1: Access the Oracle Identity Cloud Service administration console, select Applications, OPA, Users, and then click Assign to re-assign the user.
Cause2: The OpenId Connect integration between the Oracle Identity Cloud Service and Oracle Policy Automation Cloud is deactivated.
Solution2:
Cause1: After a successful Oracle Policy Automation - Oracle Identity Cloud Service configuration, the Oracle Identity Cloud Service Administrator regenerates the client secret attribute.
Solution1: Contact the Oracle Policy Automation support team and request to disable the Oracle Policy Automation - Oracle Identity Cloud Service configuration in the Oracle Policy Automation Hub. To fix this problem, run the steps detailed in the "Configuring OpenID Connect in Oracle Identity Cloud Service" section with the regenerated client secret attribute value.
For unknown issues, contact Oracle Support: