Configure Integration Between Oracle Access Governance and Oracle Fusion Cloud Applications
Prerequisites
Before you install and configure an Oracle Fusion Cloud Applications orchestrated system, you should consider the following pre-requisites and tasks.
Certification
You must certify your Oracle Fusion Cloud Applications system to access Oracle Access Governance. Refer to Certified Components for details of the versions supported.
Enable HCM AtomFeeds for Partial Data Load
To enable incremental data load change for your orchestrated system, enable
User Requests HCM Atom Feed
in Oracle Fusion Cloud
Applications. This is valid only when your orchestrated system is setup either as HCM or Both.
Create FA HCM Data Roles and Security Profiles
Before configuring your orchestrated system you should setup either an HCM or ERP service account and grant permissions required to integrate with Oracle Access Governance.
To view a list of Default Roles or permissions, see Grant Default Roles or Permissions.
- IT Security Manager Job role
(
ORA_FND_IT_SECURITY_MANAGER_JOB) - Human Capital Management Integration Specialist
(
ORA_HRC_HUMAN_CAPITAL_MANAGEMENT_INTEGRATION_SPECIALIST_JOB)
- Log in to Oracle Fusion Cloud Applications.
- Go to My Enterprise > Setup and Maintenance.
- Select Tasks icon located at the right-side of the page.
- Select Search and select Manage Data Role and Security Profiles.
- Search for
Human Capital Management Integration Specialistjob role that does not have any security profiles. - Select +Create
- Enter data role name. For example,
<ServiceAccountName>-DataRole. - Select
Human Capital Management Integration Specialistjob to inherit. - Select OK.
- Enter data role name. For example,
- Select Next.
- On the Security Context page, select View All in the list across security profile configurations.
- Select Next to review and Submit.
- Search for the data role created. Notice that now the Security Profile Assigned column is now selected.
- Select Done.
You must create a service account and assign this data role to the service account.
Create a Service Account and Grant Default Roles
The service account should be used when configuring the connection in your orchestrated system. You can set this service user up using default Oracle Fusion Cloud Applications roles and permissions, or using a custom role.
Create a Service Account
You must have the IT Security Manager Job role
(ORA_FND_IT_SECURITY_MANAGER_JOB).
- Log in to Oracle Fusion Cloud Applications.
- From the Navigator, go to Tools > Security Console.
- Select Users > Add User Account.
- Enter the required fields for User information.
- Select Save and Close. Ensure the status is Active.
- Select the user and select Edit.
Add Roles to Service Account
- Select the Add Role button.
- For HCM, assign the default roles one at a time to the account. See Grant Default Roles or Permissions
- For ERP, assign the default roles one at a time to the account. See
Grant Default Roles or
Permissions
Note
If you are configuring both HCM and ERP, then you must assign all the default roles for HCM and ERP.Note
You must add the required Look up Types for the Access Request Security Administrator. See Add Lookup Types. - Assign the Data Role created in the previous task. See Create FA HCM Data Roles and Security Profiles.
- Select Save and Close.
- Search account and verify roles needed are assigned.
- Verify the creation of the new service account by logging in.
Grant Permissions Using a Custom Role - Least Privilege Principle
An alternative to using default Oracle Fusion Cloud Applications roles and permissions is to setup a custom role for your service user. This allows you to conform to the principle of least privilege by only configuring the fine-grained privileges required by the service user.
To create your custom role:- Create an Oracle Fusion Cloud Applications role of category Common - Job Roles.
- Add the privileges into the function security policies train stop. Refer the list: Grant Privileges.
- Add the aggregated privileges as role into the role hierarchy train stop. Refer the list: Grant Privileges Grant Aggregated Privileges.
- Grant Data Security Policies for the right data set to the custom role. If you do not grant the right data security policies, some data may not be returned. The API calls will not fail (200 OK), but the count will be 0 if the data security policies are omitted.
- Assign the custom role to the Service Account. See Add Role to Service Account.
Run Refresh Access Control Data Job
- Navigate to Tools → Scheduled Processes.
- Search Refresh Access Control Data.
- Select Schedule New Process.
- Select Refresh Access Control Data as job name and enter meaningful description.
- Select Full Refresh or Incremental Refresh, as required to run the job.
- Select OK.
- Select Submit. Copy the process ID number.
- Run User and Roles Synchronization Process to retrieve latest users and role definitions. For more information, see Run User and Roles Synchronization Process.
Add Lookup Types for Access Request Security Administrator
The following lookup type permission must be granted for Access Request Security Administrator role type
- Log in to Oracle Fusion Cloud Applications.
- Go to My Enterprise > Setup and Maintenance.
- Select Tasks icon located at the right-side of the page.
- Select Search and select Manage Standard Lookups.
- Add the new lookup type
FUN_DS_OPTIN_OPTIONSby using the following lookup CodeFUN_DS_GET_BOOKCODE. - In the Module list, select Application Core.
- In the REST Access Secured list, select Authenticated.
- Select Save and Close.
Risk Management Cloud (RMC) Segregation of Duties (SoD) Check
You can evaluate permissions or roles to users within Oracle Fusion Cloud Applications to ensure that permission assignment is valid and doesn't violate SOD checks.
Complete the prerequisites and run mandatory jobs periodically.
User Account Creation & Linking
A user account must have an associated worker information. Verify this, from the Security Console → Users page, a linked account shows Associated Worker Information.
Mandatory Background Jobs
In Oracle Fusion Cloud Applications, after creating or updating the user account, ensure to run the following jobs in the given order:
- Import User and Role Application Security Data. For more information, see Run the Import User and Role Application Security Data Process.
- Security Synchronization. For more information, see Predefined Security Jobs.
- Global User Synchronization. For more information, see Configure Global
Users.Note
Run these mandatory jobs periodically or on-demand to avoid errors during SoD Checks.
Verify User Visibility in Risk Management
After running the jobs, verify the results:
- Navigate to Risk Management → Setup and Administration → Global User Configuration.
- Search for the user for whom you want to run the SOD violations check.
Workflow Configuration
You must attach an approval workflow with an access bundle to process violation checks. If an access bundle has no approval workflow assigned, Oracle Access Governance triggers the SoD violations check but the provisioning proceeds immediately even if potential violations exist. When an approval workflow is attached, Oracle Access Governance pauses the request until the SoD analysis completes.
For more information, see Preventive Segregation of Duties.
Authenticating with OCI OAuth
Use the steps to authenticate Oracle Fusion Cloud Applications using OAuth with Oracle Cloud Infrastructure (OCI) instance to integrate with Oracle Access Governance.
Use a certificate issued by a trusted Certificate Authority (CA) in the PEM format for secure authentication and compatibility, or leverage OCI Certificate Service to generate and manage certificates efficiently.
- To create a certificate, refer the steps as explained in Creating a Certificate in OCI IAM.
-
To retrieve a certificate, ensure that the Identity Domain is configured to
issue and sign tokens.
- In the Identity & Security, and select Domains.
- From the Settings tab, enable Access signing certificate.
- In Identity Domain console, navigate to Security > Certificates.
- Select on the certificate name to view its details.
- Download the certificate in PEM or CER format. This file will be used to validate the signature of OAuth tokens in your application.
- Navigate to Identity & Security, and select Domains.
- Select a compartment where your Oracle Access Governance service instance is located, and then select the domain.
- Select the Security tab.
- Select Import certificate.
-
Enter the same alias name that you provided while generating the keystore file
certificate alias, and import the
.cerfile. - Select Import. Ensure correct alias is correct, showing both the SHA-1 Thumbprint and SHA-256 Thumbprint, the Certificate Start Date, and the Certificate End Date
- Navigate to Identity & Security, and select Domains.
- Select Domains.
- Select the Integrated applications tab.
- Select Add application.
- Select Confidential Application tile, and then select Launch workflow.
-
In the Details page, enter the following:
- Enter name and description for the confidential application.
- Select Submit.
- Select the OAuth configuration tab.
- Select Edit OAuth configuration.
- Select Configure this application as a client now.
- Select Client Credentials, JWT assertion and Refresh token grant types
- Select Trusted as the Client type option.
- Import the certificate.
- Select On behalf of as the Allowed operations.
- Select network perimeter to restrict login attempts to specific IPs or ranges, else select Anywhere.
- Under the Token Issuance Policy, select All.
- In the Add Scopes section, select the Oracle Fusion Cloud Applications application references.
- Select Submit.
- Activate the application, select the Actions icon and then select Activate. The status should change from Inactive to Active.
Create an OCI Vault to Store Credentials
Oracle Access Governance uses OCI Vault and Secret Management service to store sensitive values such as passwords, client secrets, and private keys.
Create an Oracle Cloud Infrastructure (OCI) vault, an encryption key, and secrets for Basic Authentication or OAuth credentials.
- Permission to create vaults, keys, and secrets in the target compartment.
- Permission to use keys to encrypt secrets.
Configure
You can establish a connection between Oracle Fusion Cloud Applications and Oracle Access Governance by entering connection details. To achieve this, use the orchestrated systems functionality available in the Oracle Access Governance Console.
Navigate to the Orchestrated Systems Page
The Orchestrated Systems page of the Oracle Access Governance Console is where you start configuration of your orchestrated system.
Select system
On the Select system step of the workflow, you can specify which type of system you would like to integrate with Oracle Access Governance.
You can search for the required system by name using the Search field.
- Select Oracle Fusion Cloud Applications .
- Select Next.
Add details
Add details such as name, description, and configuration mode.
- Enter a name for the system you want to connect to in the Name field.
- Enter a description for the system in the Description field.
- Decide if this orchestrated system is an authoritative source, and if Oracle Access Governance can manage permissions by setting the following check boxes.
-
This is the authoritative source for my identities
Select one of the following:
- Source of identities and their attributes: System acts as a source identities and associated attributes. New identities are created through this option .
- Source of identity attributes only: System ingests additional identity attributes details and apply to existing identities. This option doesn't ingest or creates new identity records.
- I want to manage permissions for this system
-
This is the authoritative source for my identities
- Select Next.
- If you're managing permissions with this then an additional checkbox is displayed for Segregation of Duties Checks:
- In Oracle Fusion Cloud Applications ensure that a user account is created and linked to the worker's person record. A successfully linked account will display the associated person information in the Security Console under the Users page.
- To enable this option for your select Enable Risk Management and Compliance (RMC) integration for separation of duties check
Add Owners
Add primary and additional owners to your orchestrated system to allow them to manage resources.
When setting up the first Orchestrated System for your service instance, you can assign owners only after you enable the identities from the Manage Identities section.
- Select an Oracle Access Governance active user as the primary owner in the Who is the primary owner? field.
- Select one or more additional owners in the Who else owns it? list. You can add up to 20 additional owners for the resource.
Account settings
Outline details of how to manage account settings when setting up your orchestrated system including notification settings, and default actions when an identity moves or leaves your organization.
- When a permission is requested and the account doesn't already exist, select this option to create new accounts . This option is selected by default. When selected, Oracle Access Governance creates an account if one doesn't exist when a permission is requested. If you clear this option, permissions are provisioned only for existing accounts in the orchestrated system. If no account exists, the provisioning operation fails.
- Select the recipients for notification emails when an account is created. The default recipient is User. If no recipients are selected, notifications aren't sent when accounts are created.
- User
- User manager
- Configure Existing AccountsNote
You can only set these configurations if allowed by the system administrator. When global account termination settings are enabled, application administrators can't manage account termination settings at the orchestrated-system level.- Select what to do with accounts when early termination begins: Choose the action to perform when an early termination begins. This happens when you need to revoke identity accesses before official termination date.
- Delete: Deletes all accounts and permissions managed by Oracle Access Governance.Note
If specific orchestrated system doesn't support the action, no action is taken. - Disable: Disables all accounts and disables permissions managed by Oracle Access Governance.
- Delete the permissions for disabled accounts: To ensure zero residual access, select this to delete directly assigned permissions and policy-granted permissions during account disablement.
- No action: No action is taken when an identity is flagged for early termination by Oracle Access Governance.
- Delete: Deletes all accounts and permissions managed by Oracle Access Governance.
- Select what to do with accounts on the termination date: Select the action to perform during official termination. This happens when you need to revoke identity accesses on the official termination date.
- Delete: Deletes all accounts and permissions managed by Oracle Access Governance.Note
If specific orchestrated system doesn't support Delete action, then no action is taken. - Disable: Disables all accounts and disables permissions managed by Oracle Access Governance.
- Delete the permissions for disabled accounts: To ensure zero residual access, select this to delete directly assigned permissions and policy-granted permissions during account disablement.
Note
If specific orchestrated system doesn't support the Disable action, then account is deleted. - No action: No action is taken on accounts and permissions by Oracle Access Governance.
- Delete: Deletes all accounts and permissions managed by Oracle Access Governance.
- Select what to do with accounts when early termination begins: Choose the action to perform when an early termination begins. This happens when you need to revoke identity accesses before official termination date.
- When an identity leaves your enterprise you must remove access to their accounts. Note
You can only set these configurations if allowed by your system administrator. When global account termination settings are enabled, application administrators cannot manage account termination settings at the orchestrated-system level.Select one of the following actions for the account:
- Delete: Delete all accounts and permissions managed by Oracle Access Governance.
- Disable: Disable all accounts and mark permissions as inactive.
- Delete the permissions for disabled accounts: Delete directly assigned and policy-granted permissions during account disablement to ensure zero residual access.
- No action: Take no action when an identity leaves the organization.
Note
These actions are available only if supported by the orchestrated system type. For example, if Delete is not supported, you will only see the Disable and No action options. - When all permissions for an account are removed, for example when an identity moves between departments, you may need to decide what to do with the account. Select one of the following actions, if supported by the orchestrated system type:
- Delete
- Disable
- No action
- Manage accounts that aren't created by Access Governance: Select to manage accounts that are created directly in the orchestrated system. With this, you can reconcile existing accounts and manage them from Oracle Access Governance.
If you don't configure the system as a managed system then this step in the workflow will display but is not enabled. In this case you proceed directly to the Integration settings step of the workflow.
If your orchestrated system requires dynamic schema discovery, as with the Generic REST and Database Application Tables integrations, then only the notification email destination can be set (User, Usermanager) when creating the orchestrated system. You cannot set the disable/delete rules for movers and leavers. To do this you need to create the orchestrated system, and then update the account settings as described in Configure Orchestrated System Account Settings.
Integration settings
Enter details of the connection to your Oracle Fusion Cloud Applications system.
- On the Integration settings step of the workflow, enter the details required to allow Oracle Access Governance to connect to your Oracle Fusion Cloud
Applications system.
Integration settings Pre-condition Parameter Name Description Application Type - Both: If you want to integrate both HCM and ERP within the same orchestrated system
- Oracle Human Capital Management (HCM)
- Oracle Enterprise Resource Planning (ERP)
Mode: Authoritative Source - User Account
- Person
- Select User Account to ingest identities that represents security identity and have system access to Oracle Fusion Cloud Applications.
- Select Person to ingest identities containing employment details, such as employee number, work relationships, job code, person record.
Oracle Fusion Cloud Applications Host Name Host name to access your Oracle Fusion Cloud Applications system. For example, in your URL, the host name is fa-test.example.comhttps://fa-test.example.com:443/fcsUI/faces/FuseWelcomeOracle Fusion Cloud Applications Port Enter the port number at which the source Oracle Fusion Cloud Applications system is listening. For example, in the URL, enter port 443https://fa-test.example.com:443/fcsUI/faces/FuseWelcomeApplication Type: Both, ERP OAuth: OCI IAM for Authentication Select the checkbox to use OCI IAM for authenticating your Oracle Fusion Cloud Applications instance. Perform the prerequisites for OAuth. See Authenticating with OCI OAuth. How do you want to give access to the credentials? -
- From an OCI vault secret: (Recommended) Select this to use OCI Vault for managing and storing credentials.
- Credentials received and stored in Access Governance: Select this to store credentials within Oracle Access Governance.
OCI Vault What is the OCI tenancy OCID hosting the vault secret? Enter the tenancy OCID where you have created your vault. See Configuring OCI Vault for Credentials. OCI Vault What is the secret OCID for access credentials? Enter the OCI Secret OCID where you have stored credentials. See Configuring OCI Vault for Credentials. Note: You must add the displayed IAM policies in the root compartment of the tenancy where your vault is created.
- Application Type: Both and HCM
- Mode: Managed System
Areas of Responsibility Select this Areas of Responsibility to ingest AOR as an account attribute when a user account is linked to a person. AOR in Oracle Fusion Cloud Applications defines the scope of a user's functional access. Application Type: Both, ERP Do you want to manage Procurement Agent from Access Governance? Select this to manage procurement agent provisioning. Note: User must be registered as an employee and must have an associated worker information. The user must have an active predefined roles for procurement.
- Application Type: Both and HCM
- Mode: Authoritative Source
Do you want to load additional lookup objects? Enter lookup object name to load additional attributes. For example, enter job.Currently, you can load additional attributes for job and location lookup objects. Use inbound transformation to use these system attributes. See Support for Lookup Objects.
- Select Test Integration to validate your configuration.
- Select Add to create the orchestrated system.
Finish Up
Finish up configuration of your orchestrated system by providing details of whether to perform further customization, or activate and run a data load.
The final step of the workflow is Finish Up.
- Customize before enabling the system for data loads
- Activate and prepare the data load with the provided defaults
Migrate Oracle Fusion Cloud Applications Credentials to OCI Vault
If you have an existing orchestrated systems, we recommend to use OCI Vault and Secret Management for storing and managing the Oracle Fusion Cloud Applications credentials.
- Navigate to the Integration settings page following the instructions given in Configure Orchestrated System Integration Settings.
- On the Integration settings page you will see a deprecation warning. Select the Learn more about migrating button.
- Complete the necessary prerequisites. See OCI Vault Configuration.
- After you have applied your policies, select the Test integration button to check the connection. If you have any errors or messages, review your configuration. You will not be able to complete the migration until the test is successful.
- If your connection is confirmed then select the Migrate button to start the migration.
- When the migration completes, you will see a message confirming that the integration is now using OCI Vault storage method.
Post Configuration
There are no postinstall steps associated with a Oracle Fusion Cloud Applications system.
, select Service Administration → Orchestrated Systems
.