Oracle Identity Cloud Service

Author: s | 2025-04-25

★★★★☆ (4.3 / 3709 reviews)

Download defrag professional 26.0

How to Access Oracle Identity Cloud Service. Access Service Consoles. About Oracle Identity Cloud Service User Accounts and Groups. About Oracle Identity Cloud Service Applications and Application Roles. Typical Workflow for Using Oracle Identity Cloud Service. Deprecated Oracle Identity Cloud Service Software Appliances Download Oracle Identity Cloud Service Identity Provider Metadata; Configure Single Sign-On. Configure Oracle Identity Cloud Service as Identity Provider in Oracle Applications Cloud Console; Register and Activate Oracle Fusion Applications in Oracle Identity Cloud Service; Test and Activate the SSO Integration in Oracle Applications Cloud console

Download diskdigger 1.29.37.2963

Oracle Identity Cloud Service: Integrating with Oracle Identity

CONFIGURATION AND NOTIFY USERS.Note: Enabling SSO deactivates the ability to log in using the user name and password. Remain logged in to the Cisco Umbrella session until you complete the next section to verify that Identity Provider initiated SSO from Oracle Identity Cloud Service works.Verifying the IntegrationUse this section to verify that SSO works when initiated from Oracle Identity Cloud Service (IdP Initiated SSO) and Cisco Umbrella (SP Initiated SSO).Verifying Identity Provider Initiated SSO from Oracle Identity Cloud ServiceAccess the Oracle Identity Cloud Service My Profile console using the URL: in using credentials for a user that is assigned to the Cisco Umbrella app. Oracle Identity Cloud Service displays a shortcut to Cisco Umbrella under My Apps.Click Cisco Umbrella. The Cisco Umbrella home page appears.In the upper-right corner, confirm that the user that is logged in is the same for both Cisco Umbrella and Oracle Identity Cloud Service.This confirms that SSO that is initiated from Oracle Identity Cloud Service works.Verifying Service Provider Initiated SSO from Cisco UmbrellaAccess Cisco Umbrella using the URL: The Cisco Umbrella login page appears.Click Single sign on, enter the email address, and then click Sign In. You are redirected to the Oracle Identity Cloud Service login page.Log in using credentials for a user that is assigned to the Cisco Umbrella app. The Cisco Umbrella home page appears.In the upper-right corner, confirm that the user that is logged in is the same for both Cisco Umbrella and Oracle Identity Cloud Service.This confirms that SSO that is initiated from Cisco Umbrella works.TroubleshootingUse this section to locate solutions to common integration issues.Known IssuesCisco Umbrella displays the message, "Single Sign-On Unavailable"Cause: The email attribute sent by Oracle Identity Cloud Service during SSO doesn't match any existing user in Cisco Umbrella.Solution: Ensure that the user that you assign to the Cisco Umbrella app has an account in both Oracle Identity Cloud Service and Cisco Umbrella with the same email address.Oracle Identity Cloud Service displays the message, "You are not authorized to access the app. Contact your system administrator."Cause 1: The SAML 2.0 integration between the Oracle Identity Cloud Service Cisco Umbrella app and Cisco Umbrella is deactivated.Solution 1:Access the Oracle Identity Cloud Service administration console, select Applications, and then select Cisco Umbrella.In the App Details section, click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.Cause 2: The administrator revokes access for the user at the same time that the user tries to access the Cisco Umbrella app using Oracle Identity Cloud Service.Solution 2:Access the Oracle Identity Cloud Service administration console, select Applications, and then select Cisco Umbrella.In the App Details section, select Users, and then click Assign to re-assign the user.Unknown IssuesFor unknown issues, contact Oracle Support:Go to Cloud Support, and then sign in with your support credentials.In the Cloud Dashboard, confirm that there are no planned outages in Oracle Identity Cloud Service, and then click Create Service Request.Select Oracle Identity Cloud Service as the service type.Complete your service request. Last updated on JULY 01, 2024Applies to: Identity Cloud Service (IDCS) - Version N/A to N/AInformation in this document applies to any platform.SymptomsWhen following the documentation Supporting Oracle Fusion Cloud Applications Service Integrations with Oracle Platform as a Service (Doc ID 2785751.1) to enable Federation with Oracle Fusion Applications Cloud Service as Identity Provider and Identity Cloud Service as Service provider, the following error is presented:"Cannot save Identity Provider : The partnerProviderID property specified in the payload is different from the entityID attribute of the Metadata EntityDescriptor element. Correct the partnerProvider property or do not specify the partners providerID."ChangesBefore initiating the process to enable Federation with Oracle Fusion Applications Cloud Service as Identity Provider and Identity Cloud Service as Service provider, a new SAML Identity Provider in Oracle Identity Cloud Service needs to be configured.Use the Oracle Identity Cloud Service console to add and configure a new SAML identity provider.Before getting started, download the SAML provider metadata from the Oracle Fusion Applications Cloud Service identity provider and save it as an xml file.For example, download the metadata from and save it as FA-IdP-metadata.xml.However, unfortunately using the above method leads to having the incorrect IssuerID depicted within the configuration template.Cause To view full details, sign in with your My Oracle Support account. Don't have a My Oracle Support account? Click to get started! In this Document My Oracle Support provides customers with access to over a million knowledge articles and a vibrant support community of peers and Oracle experts.

Oracle Identity Cloud Service: Integrating with Oracle

Before You BeginIntroductionThis document describes how to configure Oracle Identity Cloud Service to provide Single Sign-On (SSO) for Cisco Umbrella using SAML.About Cisco UmbrellaCisco Umbrella is a cloud-delivered security service for the Cisco Integrated Services Router (ISR). It provides the first layer of defense against threats at branch offices. It offers the simplest and fastest way to protect every device on your branch network.After integrating Cisco Umbrella with Oracle Identity Cloud Service:Users can access Cisco Umbrella using their Oracle Identity Cloud Service login credentials.Users can start Cisco Umbrella using the Oracle Identity Cloud Service My Apps console.Admins can assign and revoke user access to the Cisco Umbrella app using the Oracle Identity Cloud Service administration console.What Do You Need?An Oracle Identity Cloud Service account with authorization rights to manage apps and users (Identity Domain Administrator or Application Administrator).A Cisco Umbrella account with authorization rights to configure federated authentication.Make sure that the email ID of each user in Cisco Umbrella matches the primary email ID of the Oracle Identity Cloud Service account.Configuring the Cisco Umbrella App in Oracle Identity Cloud ServiceUse this section to register and activate the Cisco Umbrella app, and then assign users to the app.Registering and Activating the Cisco Umbrella AppAccess the Oracle Identity Cloud Service administration console, select Applications, and then click Add.Click App Catalog.Search for Cisco Umbrella, click Add, and then click Next.Click Download Identity Provider Metadata. To learn about other methods you can use to access SAML metadata, see Access SAML Metadata.Tip: Use this file later during the Cisco Umbrella configuration in the "Configuring SSO for Cisco Umbrella" section.Click Finish. Oracle Identity Cloud Service displays a confirmation message.Click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.Assigning Users to the Cisco Umbrella AppOn the Cisco Umbrella app page in Oracle Identity Cloud Service, select Users, and then click Assign. The Assign Users window appears.Select users that you want to assign to Cisco Umbrella, and then click OK. Oracle Identity Cloud Service displays a confirmation message stating that the Cisco Umbrella app is assigned to the users that you selected.Configuring SSO for Cisco UmbrellaAccess Cisco Umbrella as an administrator using the URL: The Cisco Umbrella home page appears.Hover over the left navigation menu, click the Settings drop-down list, and then select Authentication. The Authentication page appears.Click SAML.On the "Choose SAML provider" tab, select Other, and then click NEXT.On the "Cisco Umbrella Metadata" tab, click NEXT.On the "Upload Metadata" tab, click Browse..., and then upload the metadata that you downloaded during the Cisco Umbrella registration in Oracle Identity Cloud Service. See the "Registering and Activating the Cisco Umbrella App" section.Click NEXT. The "Validate SAML Configuration" tab appears.Click TEST YOUR SAML CONFIGURATION to test your SAML configuration. You are redirected to the Oracle Identity Cloud Service login page.Log in using credentials for a user that is assigned to the Cisco Umbrella app. The SSO configuration success message appears.Select the I have read and understand all the above. check box, and then click SAVE. How to Access Oracle Identity Cloud Service. Access Service Consoles. About Oracle Identity Cloud Service User Accounts and Groups. About Oracle Identity Cloud Service Applications and Application Roles. Typical Workflow for Using Oracle Identity Cloud Service. Deprecated Oracle Identity Cloud Service Software Appliances

SSO Oracle Identity Cloud Service Oracle

Apps.Click Eloqua. The Eloqua home page appears.On the Eloqua home page, confirm that the user that is logged in is the same for both Eloqua and Oracle Identity Cloud Service.This confirms that SSO that is initiated from Oracle Identity Cloud Service works.Verifying Service Provider Initiated SSO from EloquaAccess Eloqua at: Sign in with SSO or another account. You are prompted to sign in using your company credentials.Enter the Company name and click Sign In. The Oracle Identity Cloud Service Sign In page appears.Note: When there are multiple identity providers, select the appropriate identity provider, and then click Sign In.Log in using credentials for a user that is assigned to the Eloqua app. The Eloqua home page appears.On the Eloqua home page, confirm that the user that is logged in is the same for both Eloqua and Oracle Identity Cloud Service.This confirms that SSO that is initiated from Eloqua works.Verifying Identity Provider Initiated SLOOn the Oracle Identity Cloud Service home page, click the user name in the upper-right corner, and then select Sign Out from the drop-down list.Access the user profile in Eloqua, and then confirm that the login page appears.This confirms that SLO works and that the user is no longer logged in to Eloqua and Oracle Identity Cloud Sevice.Verifying Service Provider Initiated SLOOn the Eloqua home page, click the user icon in the upper-right corner, and then select Logout from the drop-down list.Click OK at the confirmation message that displays.Access the Oracle Identity Cloud Service My Console, and then confirm that the login page appears.This confirms that SLO works and that the user is no longer logged in to Eloqua and Oracle Identity Cloud Service.TroubleshootingUse this section to locate solutions to common integration issues.Known IssuesEloqua Service displays the error, "Your user is unknown."Cause: The email attribute sent to Oracle Identity Cloud Service during SSO doesn't match any existing user in Eloqua.Note: The above error message gets displayed when the debug mode is enabled. Error message when the debug mode is disabled: "Your request either didn't include a SAML response or the SAML response was malformed.”Solution: Check your SSO configuration and ensure that the user that you assign to the Eloqua app has an account in both Oracle Identity Cloud Service and Eloqua service with the same email address.Oracle Identity Cloud Service displays the message "You are not authorized to access the app. Contact your system administrator".Cause 1: The administrator revokes access for the user at the same time that the user tries to access the Eloqua app using Oracle Identity Cloud Service.Solution 1: Access the Oracle Identity Cloud Service administration console, select Applications, Eloqua, Users, and then click Assign to re-assign the user.Cause 2: The SAML 2.0 integration between Eloqua Account columns, and then click OK. For example, if you want to add the User Name field, enter $(user.userName) in the User column, and then select the corresponding field from the drop-down list in the Eloqua Account column.Specify the provisioning operations that you want to enable for Eloqua:Note: By default, the Create Account, De-activate Account, and Delete Account check boxes are selected.Create Account: Automatically creates an account in Eloqua when Eloqua access is granted to the corresponding user in Oracle Identity Cloud Service.De-activate Account: Automatically activates or de-activates an account in Eloqua when the corresponding user is activated or de-activated in Oracle Identity Cloud Service.Delete Account: Automatically deletes an account from Eloqua when Eloqua access is revoked from the corresponding user in Oracle Identity Cloud Service.You can now manage Eloqua accounts through Oracle Identity Cloud Service. For more information on performing provisioning tasks, see the Managing Oracle Identity Cloud Service Users and Managing Oracle Identity Cloud Service Groups sections in Administering Oracle Identity Cloud Service.Creating a Flat File for Manually Importing User Accounts from EloquaUse this section to download user data from Eloqua and create a compatible flat file for manually importing user accounts in Oracle Identity Cloud Service.Log in as an administrator to Eloqua. The home page appears.Click the Settings icon.Click Users from the Users and Security section.From the Users drop-down list, select Download Users. The Download Users page appears.From the Export drop-down list, select Export To Excel. The Export To Excel page appears and the download process is initiated. After the download is complete, the Excel file is stored on your local system. This file holds data for all of the User attributes available in Eloqua.Create a new CSV file, add ID, NAME, and ACTIVE column headers, and then copy corresponding data from the file (downloaded in Step 5) based on the mappings described in the following table:This table provides the mapping details, description, and sample values for the Eloqua User attributes.AttributeMap ToDescriptionSample ValueIDUser NameUnique [email protected] NameAccount [email protected] EnabledAccount statustrueYou can now use this CSV file to import user accounts into Oracle Identity Cloud Service. For more information on performing this task, see the Importing User Accounts from a Flat File Using REST APIs section in Administering Oracle Identity Cloud Service.Verifying the IntegrationUse this section to verify that SSO and single log-out (SLO) work when initiated from Oracle Identity Cloud Service (IdP Initiated SSO and IdP Initiated SLO) and Eloqua (SP Initiated SSO and SP Initiated SLO).Verifying Identity Provider Initiated SSO from Oracle Identity Cloud ServiceAccess the Oracle Identity Cloud Service My Console: in using credentials for a user that is assigned to the Eloqua app. Oracle Identity Cloud Service displays a shortcut to Eloqua under My

Use Oracle Identity Cloud Service with Oracle Java Cloud Service

About the Predefined SFTP User Accounts Oracle Cloud automatically creates the necessary SFTP user accounts for you. Each account has a first name, a last name, an email address, and a user name automatically generated by Oracle Cloud. You can’t change this information. Some cloud services do not use the Service SFTP account for any operations. For example, Oracle CRM Cloud Service does not use the Service SFTP account because it has a native file import and export process that works over HTTP. To activate the SFTP user accounts, an identity domain administrator must sign in to Infrastructure Classic Console or Applications Console and configure the password for each SFTP user account. The following table describes each SFTP user account and when you use it. SFTP Account When Account Is Created When to Use Identity Domain SFTP For every new identity domain established, Oracle Cloud creates one SFTP account for the domain. You use the Identity Domain SFTP user account only to retrieve the data that Oracle automatically archives when you terminate a paid subscription to an Oracle Cloud service. Service SFTP For every instance of a service activated in the identity domain, Oracle Cloud creates an SFTP account for the service. Use the Service SFTP account to perform data transfer operations for a selected Oracle Cloud service. For example, you use the Service SFTP account to import and export data for Oracle Database Cloud Service. For details about using the Service SFTP account, see the documentation specific to your service. HCM SFTP For every instance of an Oracle HCM Cloud Service or an Oracle ERP Cloud Service in the identity domain, Oracle Cloud creates an HCM SFTP account. You use the HCM SFTP account to manage integration transactions. Viewing Details of SFTP User Accounts In both the My Account application and the Infrastructure Classic Console or Applications Console, the service details page displays information about the SFTP user accounts. The details include the SFTP host address, port number, and user name. To view details about the SFTP user accounts: Sign in to Applications Console or Infrastructure Classic Console.Sign in

Administering Oracle Identity Cloud Service

Note: This tutorial requires access to Oracle Cloud. To sign up for a free account, see Get started with Oracle Cloud Infrastructure Free Tier. It uses example values for Oracle Cloud Infrastructure credentials, tenancy, and compartments. When completing your lab, substitute these values with ones specific to your cloud environment. IntroductionChatbots or digital assistants provide a very easy and convenient way to access all types of data – be it our own enterprise data, or service provider’s data, or vendor’s data, or even customer’s data.But not all data is publicly accessible. The chatbots should allow users to access only the data that they are authorized to, and thereby enable secured access to data based on roles. Also for some chatbot functionalities, you may need the user ID of the authenticated user. That would require the user to first login, while using the chatbot.Oracle Digital Assistant (ODA) enables you to develop secure chatbots, where you can secure the capabilities using different Identity Providers. Oracle Digital Assistant enables security with these identity providers: Oracle Identity Cloud Service (IDCS) Oracle Access Manager (OAM) Microsoft identity platform Google identity platformArchitectureObjectives Configure an Oracle Digital Assistant chatbot to be secured with Oracle Identity Cloud Service.Prerequisites An active Oracle Cloud Infrastructure (OCI) tenancy with required permissions and resources quota to support the solution architecture. Instantiation and familiarity with Oracle Digital Assistant and Oracle Identity Cloud Service. For more information about configuration of Oracle Digital Assistant, see Conversational AI in Minutes (No Developer Experience Required). Task 1: Configure Oracle Identity Cloud Service Register an application with Oracle Identity Cloud Service. For more information, see Register an Application with IDCS or OAM. To create an Authorization Code Service using the ODA Console, go to Settings and Authentication Services. For more information, see Add an Authorization Code Service. Task 2: Configure the Oracle Digital Assistant (ODA) Skill Create a new ODA skill using the ODA Console. For more information, refer to the ODA LiveLabs Conversational AI in Minutes (No Developer Experience Required). It covers creation of ODA skills, including defining the intents, utterances, entities and designing the visual dialog flow and validation, debugging and testing the skill. In the ODA Visual Dialog Flow (where you want to enable authentication), double-click Events and click Authorize User and Add State. Select Security and OAuth 2.0 Account Link component, while adding new state. Configure the OAuth 2.0 Account Link component. Select the. How to Access Oracle Identity Cloud Service. Access Service Consoles. About Oracle Identity Cloud Service User Accounts and Groups. About Oracle Identity Cloud Service Applications and Application Roles. Typical Workflow for Using Oracle Identity Cloud Service. Deprecated Oracle Identity Cloud Service Software Appliances

Oracle Identity Cloud Service - Okta

Before You BeginIntroductionThis document describes how to configure Oracle Identity Cloud Service to provide Single Sign-On (SSO) using SAML and provisioning for Oracle Eloqua.About EloquaOracle Eloqua enables marketers to plan and execute campaigns while delivering a personalized customer experience for their prospects.After integrating Eloqua with Oracle Identity Cloud Service:Users can access Eloqua using their Oracle Identity Cloud Service login credentials.Users can start Eloqua using the Oracle Identity Cloud Service My Apps console.Admins can assign and revoke user access to the Eloqua app using the Oracle Identity Cloud Service administration console.What Do You Need?An Oracle Identity Cloud Service account with authorization rights to manage apps and users (Identity Domain Administrator or Application Administrator).An Eloqua account with authorization rights to configure federated authentication.An Eloqua service account (added to the Customer Administrator and Everyone security groups) to manage user accounts in Eloqua through Oracle Identity Cloud Service.Identity Provider metadata. Use the following URL to access the metadata: SSO for EloquaUse this section to configure SSO in Eloqua with Oracle Identity Cloud Service.Configuring an Identity ProviderLog in as an administrator to: the Settings icon.On the Settings page, click Users from the Users and Security section.Click the Single Sign-On menu, and then select Identity Provider Settings.On the Identity Provider Management page, click Upload Identity Provider from Metadata, and then follow the on-screen instructions.Enter a name for the identity provider settings, and then upload the Identity Provider metadata file that you downloaded in the “What Do You Need” section.Click Save. The uploaded IdP information appears.Click Edit at the bottom of the page. The Edit Identity Provider Details page appears.Verify that Protocol Binding is set to HttpPost.Select Sha256 from the Signature Algorithm drop-down list box.Verify that User Identity Location is set to The user identity is located in an assertion subject’s name identifier.Select Assertion contains the Username from the User object in the User Identity Mapping section, and then click Save. The Identity Provider Details page appears with the settings that you just configured.Click Download at the bottom of the page to download the SP metadata information. You need the following information from this file while configuring Eloqua in Oracle Identity Cloud Service.The entityID url in the metadata file has the following format: the metadata file sample:The Site Id of the entityID is 561407682.The Identity Provider ID of the entityID F568F44F86E94F398E04D797C33FDA51.The signing certificate in the metadata file appears as the X509Certificate value. Use this value to create the certificate file that you must upload later in the “Registering and Activating the Eloqua Application” section.Saving the X509 Certificate in PEM FormatUse this section to convert the X509Certificate value into a format that is suitable for Oracle Identity Cloud Service.In the SP metadata file, locate under .Copy the value

Comments

User9787

CONFIGURATION AND NOTIFY USERS.Note: Enabling SSO deactivates the ability to log in using the user name and password. Remain logged in to the Cisco Umbrella session until you complete the next section to verify that Identity Provider initiated SSO from Oracle Identity Cloud Service works.Verifying the IntegrationUse this section to verify that SSO works when initiated from Oracle Identity Cloud Service (IdP Initiated SSO) and Cisco Umbrella (SP Initiated SSO).Verifying Identity Provider Initiated SSO from Oracle Identity Cloud ServiceAccess the Oracle Identity Cloud Service My Profile console using the URL: in using credentials for a user that is assigned to the Cisco Umbrella app. Oracle Identity Cloud Service displays a shortcut to Cisco Umbrella under My Apps.Click Cisco Umbrella. The Cisco Umbrella home page appears.In the upper-right corner, confirm that the user that is logged in is the same for both Cisco Umbrella and Oracle Identity Cloud Service.This confirms that SSO that is initiated from Oracle Identity Cloud Service works.Verifying Service Provider Initiated SSO from Cisco UmbrellaAccess Cisco Umbrella using the URL: The Cisco Umbrella login page appears.Click Single sign on, enter the email address, and then click Sign In. You are redirected to the Oracle Identity Cloud Service login page.Log in using credentials for a user that is assigned to the Cisco Umbrella app. The Cisco Umbrella home page appears.In the upper-right corner, confirm that the user that is logged in is the same for both Cisco Umbrella and Oracle Identity Cloud Service.This confirms that SSO that is initiated from Cisco Umbrella works.TroubleshootingUse this section to locate solutions to common integration issues.Known IssuesCisco Umbrella displays the message, "Single Sign-On Unavailable"Cause: The email attribute sent by Oracle Identity Cloud Service during SSO doesn't match any existing user in Cisco Umbrella.Solution: Ensure that the user that you assign to the Cisco Umbrella app has an account in both Oracle Identity Cloud Service and Cisco Umbrella with the same email address.Oracle Identity Cloud Service displays the message, "You are not authorized to access the app. Contact your system administrator."Cause 1: The SAML 2.0 integration between the Oracle Identity Cloud Service Cisco Umbrella app and Cisco Umbrella is deactivated.Solution 1:Access the Oracle Identity Cloud Service administration console, select Applications, and then select Cisco Umbrella.In the App Details section, click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.Cause 2: The administrator revokes access for the user at the same time that the user tries to access the Cisco Umbrella app using Oracle Identity Cloud Service.Solution 2:Access the Oracle Identity Cloud Service administration console, select Applications, and then select Cisco Umbrella.In the App Details section, select Users, and then click Assign to re-assign the user.Unknown IssuesFor unknown issues, contact Oracle Support:Go to Cloud Support, and then sign in with your support credentials.In the Cloud Dashboard, confirm that there are no planned outages in Oracle Identity Cloud Service, and then click Create Service Request.Select Oracle Identity Cloud Service as the service type.Complete your service request.

2025-04-08
User4630

Last updated on JULY 01, 2024Applies to: Identity Cloud Service (IDCS) - Version N/A to N/AInformation in this document applies to any platform.SymptomsWhen following the documentation Supporting Oracle Fusion Cloud Applications Service Integrations with Oracle Platform as a Service (Doc ID 2785751.1) to enable Federation with Oracle Fusion Applications Cloud Service as Identity Provider and Identity Cloud Service as Service provider, the following error is presented:"Cannot save Identity Provider : The partnerProviderID property specified in the payload is different from the entityID attribute of the Metadata EntityDescriptor element. Correct the partnerProvider property or do not specify the partners providerID."ChangesBefore initiating the process to enable Federation with Oracle Fusion Applications Cloud Service as Identity Provider and Identity Cloud Service as Service provider, a new SAML Identity Provider in Oracle Identity Cloud Service needs to be configured.Use the Oracle Identity Cloud Service console to add and configure a new SAML identity provider.Before getting started, download the SAML provider metadata from the Oracle Fusion Applications Cloud Service identity provider and save it as an xml file.For example, download the metadata from and save it as FA-IdP-metadata.xml.However, unfortunately using the above method leads to having the incorrect IssuerID depicted within the configuration template.Cause To view full details, sign in with your My Oracle Support account. Don't have a My Oracle Support account? Click to get started! In this Document My Oracle Support provides customers with access to over a million knowledge articles and a vibrant support community of peers and Oracle experts.

2025-04-12
User3884

Before You BeginIntroductionThis document describes how to configure Oracle Identity Cloud Service to provide Single Sign-On (SSO) for Cisco Umbrella using SAML.About Cisco UmbrellaCisco Umbrella is a cloud-delivered security service for the Cisco Integrated Services Router (ISR). It provides the first layer of defense against threats at branch offices. It offers the simplest and fastest way to protect every device on your branch network.After integrating Cisco Umbrella with Oracle Identity Cloud Service:Users can access Cisco Umbrella using their Oracle Identity Cloud Service login credentials.Users can start Cisco Umbrella using the Oracle Identity Cloud Service My Apps console.Admins can assign and revoke user access to the Cisco Umbrella app using the Oracle Identity Cloud Service administration console.What Do You Need?An Oracle Identity Cloud Service account with authorization rights to manage apps and users (Identity Domain Administrator or Application Administrator).A Cisco Umbrella account with authorization rights to configure federated authentication.Make sure that the email ID of each user in Cisco Umbrella matches the primary email ID of the Oracle Identity Cloud Service account.Configuring the Cisco Umbrella App in Oracle Identity Cloud ServiceUse this section to register and activate the Cisco Umbrella app, and then assign users to the app.Registering and Activating the Cisco Umbrella AppAccess the Oracle Identity Cloud Service administration console, select Applications, and then click Add.Click App Catalog.Search for Cisco Umbrella, click Add, and then click Next.Click Download Identity Provider Metadata. To learn about other methods you can use to access SAML metadata, see Access SAML Metadata.Tip: Use this file later during the Cisco Umbrella configuration in the "Configuring SSO for Cisco Umbrella" section.Click Finish. Oracle Identity Cloud Service displays a confirmation message.Click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.Assigning Users to the Cisco Umbrella AppOn the Cisco Umbrella app page in Oracle Identity Cloud Service, select Users, and then click Assign. The Assign Users window appears.Select users that you want to assign to Cisco Umbrella, and then click OK. Oracle Identity Cloud Service displays a confirmation message stating that the Cisco Umbrella app is assigned to the users that you selected.Configuring SSO for Cisco UmbrellaAccess Cisco Umbrella as an administrator using the URL: The Cisco Umbrella home page appears.Hover over the left navigation menu, click the Settings drop-down list, and then select Authentication. The Authentication page appears.Click SAML.On the "Choose SAML provider" tab, select Other, and then click NEXT.On the "Cisco Umbrella Metadata" tab, click NEXT.On the "Upload Metadata" tab, click Browse..., and then upload the metadata that you downloaded during the Cisco Umbrella registration in Oracle Identity Cloud Service. See the "Registering and Activating the Cisco Umbrella App" section.Click NEXT. The "Validate SAML Configuration" tab appears.Click TEST YOUR SAML CONFIGURATION to test your SAML configuration. You are redirected to the Oracle Identity Cloud Service login page.Log in using credentials for a user that is assigned to the Cisco Umbrella app. The SSO configuration success message appears.Select the I have read and understand all the above. check box, and then click SAVE

2025-04-07

Add Comment