This topic points to the appropriate topics for federating Oracle Cloud Infrastructure with Oracle Identity Cloud Service depending on when you activated your tenancy.
Tenancies created December 21, 2018 and after
These tenancies are automatically federated with Oracle Identity Cloud Service and configured to provision federated users in Oracle Cloud Infrastructure.
Tenancies created between December 18, 2017 and December 20, 2018 🔗
These tenancies are automatically federated with Oracle Identity Cloud Service but are not configured to provision federated users in Oracle Cloud Infrastructure to allow these users to have additional credentials (API keys, auth tokens, etc.).
Manually Federating with Oracle Identity Cloud Service 🔗
Your organization can have multiple Oracle Identity Cloud Service accounts (e.g., one for each division of the organization). You can federate multiple Identity Cloud Service accounts with Oracle Cloud Infrastructure, but each federation trust that you set up must be for a single Identity Cloud Service account.
Note
Before following the steps in this topic, see Federating with Identity Providers to ensure that you understand general federation concepts.
Components of the Manual Federation to Understand 🔗
Web Application and Client Credentials 🔗
For each trust, you must set up a web application in Oracle Identity Cloud Service (also called a trusted application); instructions are in Instructions for Federating with Oracle Identity Cloud Service. The resulting application has a set of client credentials (a client ID and client secret). When you federate your Identity Cloud Service account with Oracle Cloud Infrastructure, you must provide these credentials.
COMPUTEBAREMETAL application 🔗
A trusted application in Oracle Identity Cloud Service that contains the set of client credentials (a client ID and client secret) you'll need to provide when you federate your Identity Cloud Service account with Oracle Cloud Infrastructure.
Required URLs 🔗
The easiest way to federate with Oracle Identity Cloud Service is through the Oracle Cloud Infrastructure Console, although you could do it programmatically with the API. If you're using the Console, you're asked to provide a base URL instead of the metadata URL. The base URL is the left-most part of the URL in the browser window when you're signed in to the Identity Cloud Service console:
Base URL:<Identity Cloud Service account name>.identity.oraclecloud.com
If you're using the API to federate, you need to provide the metadata URL, which is the base URL with /fed/v1/metadata appended, like so:
Metadata URL:<Identity Cloud Service account name>.identity.oraclecloud.com/fed/v1/metadata
The metadata URL links directly to the IdP-provided XML required to federate. If you're using the API, you need to provide both the metadata URL and the metadata itself when federating. For more information, see Managing Identity Providers in the API.
OCI-V2-<tenancy_name> app 🔗
When you manually federate an Oracle Identity Cloud Service account with Oracle Cloud Infrastructure, a new SAML application called OCI-V2-<tenancy_name> is automatically created in that Oracle Identity Cloud Service account. If you later need to delete the Oracle Identity Cloud Service identity provider from your Oracle Cloud Infrastructure tenancy, make sure to also delete the OCI-V2-<tenancy_name> from Oracle Identity Cloud Service. If you don't, and you later try to federate the same Oracle Identity Cloud Service account again, you'll get a 409 error saying that an application with the same name already exists (that is, OCI-V2-<tenancy_name>).
Provisioned User
A provisioned user is provisioned by Oracle Identity Cloud Service in Oracle Cloud Infrastructure and is synched to a federated user that is managed in Oracle Identity Cloud Service. The provisioned user can have the special Oracle Cloud Infrastructure credentials like API keys and auth tokens to enable programmatic access. Provisioned users cannot have Console passwords.
Instructions for Federating with Oracle Identity Cloud Service 🔗
Following is the general process an administrator goes through to set up the identity provider, and below are instructions for each step. It's assumed that the administrator is an Oracle Cloud Infrastructure user with the required credentials and access.
Sign in to Oracle Identity Cloud Service. Perform one of the following, as appropriate:
Option A: Get the required information from the COMPUTEBAREMETAL application you'll need to perform the set up steps in Oracle Cloud Infrastructure.
Option B: If Oracle Identity Cloud Service does not include the COMPUTEBAREMETAL application, set up a trusted application.
In Oracle Cloud Infrastructure, set up the federation:
Set up Oracle Identity Cloud Service as an identity provider.
Map Oracle Identity Cloud Service groups to IAM groups.
In Oracle Cloud Infrastructure, set up the IAM policies for the IAM groups to define the access you want the members of the mapped groups to have.
Inform your users of the name of your Oracle Cloud Infrastructure
tenant and the URL for the Console, https://cloud.oracle.com.
Perform this step only if you were unable to complete Step 1 Option A.
Summary: For Oracle Identity Cloud Service, you need to create a
confidential application (also referred to as a trusted
application) with particular properties described in the following
instructions. For the general Oracle Identity Cloud Service documentation,
see Add a Confidential Application.
Instructions for Oracle Identity Cloud Service:
Go to the Oracle Identity Cloud Service console and sign in with
privileges to create the application. Make sure you're viewing the Admin
Console.
Add a confidential (or trusted)
application, which enables secure, programmatic
interaction between Oracle Cloud Infrastructure and
Oracle Identity Cloud Service. Specify these items when setting up
the application:
On the first page:
Enter an application a name (e.g., Oracle Cloud Infrastructure Federation).
Leave other fields empty or unselected.
On the next page:
Select Configure this application as a client
now.
For the Allowed Grant Types, select the checkbox
for Client Credentials.
Leave other fields empty.
At the bottom of the page:
Select the checkbox for Grant the client
access to Identity Cloud Service Admin
APIs.
Select Identity Domain Administrator
from the list of roles.
On the next page, leave any fields empty or unselected and
continue until you select Finish.
Copy and paste the displayed client credentials so you can
later give them to Oracle Cloud Infrastructure when federating. You can view the application's client
credentials any time in the Oracle Identity Cloud Service
console. They look similar to this:
Go to the Console and sign in with your Oracle Cloud Infrastructure login and password.
Open the navigation menu and select Identity & Security. Under Identity, select Federation.
Select Add identity provider.
Enter the following:
Name: A unique name for this federation trust. This is the name federated users see when choosing which identity provider to use when signing in to the Console (for example., ABCCorp_IDCS as shown in the screenshot in Experience for Federated Users). The name must be unique across all identity providers you add to the tenancy. You cannot change this later.
Encrypt Assertion: Selecting the checkbox lets the IAM service know to expect the encryption from the IdP. If you select this checkbox, you must also set up encryption of the assertion in IDCS. For more information, see General Concepts. For information about setting this feature up in the IDCS, see Managing Oracle Identity Cloud Service Applications.
Force Authentication: Selected by default. When selected, users are required to provide their credentials to the IdP (re-authenticate) even when they are already signed in to another session.
Authentication Context Class References: This field is required for Government Cloud customers. When one or more values are specified, Oracle Cloud Infrastructure (the relying party), expects the identity provider to use one of the specified authentication mechanisms when authenticating the user. The returned SAML response from the IdP must contain an authentication statement with that authentication context class reference. If the SAML response authentication context does not match what is specified here, the Oracle Cloud Infrastructure auth service rejects the SAML response with a 400. Several common authentication context class references are listed in the menu. To use a different context class, select Custom, then manually enter the class reference.
If you have permissions to create a resource, then you also have permissions to apply free-form tags to that resource. To apply a defined tag, you must have permissions to use the tag namespace. For more information about tagging, see Resource Tags. If you're not sure whether to apply tags, skip this option or ask an administrator. You can apply tags later.
Select Continue.
Set up the mappings between Oracle Identity Cloud Service groups and IAM groups in Oracle Cloud Infrastructure.
A given Oracle Identity Cloud Service group can be mapped to zero, one, or multiple IAM groups, and vice versa. However, each individual mapping is between only a single Oracle Identity Cloud Service group and a single IAM group. Changes to group mappings take effect typically within seconds.
Note
If you don't want to set up the group mappings now, you can simply select Create and come back to add the mappings later.
To create a group mapping:
Select the Oracle Identity Cloud Service group from the list under Identity Provider Group.
Choose the IAM group you want to map this group to from the list under OCI Group.
Tip
Requirements for IAM group name: No spaces. Allowed characters: letters, numerals, hyphens, periods, underscores, and plus signs (+). The name cannot be changed later.
Repeat the above sub-steps for each mapping you want to create, and then select Create.
After the Federation Set Up
The identity provider is now added to your tenancy and appears in the list on the Federation page. Select the identity provider to view its details and the group mappings you just set up.
Oracle assigns the identity provider and each group mapping a unique ID called an Oracle Cloud ID (OCID). For more information, see Resource Identifiers.
In the future, come to the Federation page if you want to edit the group mappings or delete the identity provider from your tenancy.
Users that are members of the Oracle Identity Cloud Service groups mapped to the Oracle Cloud Infrastructure groups are now listed in the Console on the Users page. See Managing User Capabilities for Federated Users for more information on assigning these users additional credentials.
If you haven't already, set up IAM policies to control the access the federated users have to your organization's Oracle Cloud Infrastructure resources. For more information, see Getting Started with Policies and Common Policies.
Give your federated users need the URL for the Oracle Cloud Infrastructure
Console, https://cloud.oracle.com), and the name of
your tenant. They'll be prompted to provide the tenant name when they sign in to the
Console.
Open the navigation menu and select Identity & Security. Under Identity, select Federation.
A list of the identity providers in your tenancy is displayed.
Select the name you chose for your Oracle Identity Cloud Service federation to view its details.
Select Add Mappings.
Select the Oracle Identity Cloud Service group from the list under Identity Provider Group.
Choose the IAM group you want to map this group to from the list under OCI Group.
To add more mappings, select +Another Mapping.
When you are finished, select Add Mappings.
Your changes take effect typically within seconds in your home region. Wait several more minutes for changes to propagate to all regions.
Users that are members of the Oracle Identity Cloud Service groups mapped to the Oracle Cloud Infrastructure groups are now listed in the Console on the Users page. See Managing User Capabilities for Federated Users for more information on assigning these users additional credentials.
You can't update a group mapping, but you can delete the mapping and add a new one.
Open the navigation menu and select Identity & Security. Under Identity, select Federation.
A list of the identity providers in your tenancy is displayed.
Select the identity provider to view its details.
For the mapping you want to delete, select it, and then select Delete.
Confirm when prompted.
Add a new mapping, if wanted.
Your changes take effect typically within seconds in your home region. Wait several more minutes for changes to propagate to all regions.
If this action results in federated users no longer having membership in any group that is mapped to Oracle Cloud Infrastructure, the federated users' provisioned users' will also be removed from Oracle Cloud Infrastructure. Typically, this process takes several minutes.