Okta

How to Configure SAML 2.0 for Oracle Cloud Infrastructure


Read this before you enable SAML

Enabling SAML will affect all users who use this application, which means that users will not be able to sign-in through their regular log-in page. They will only be able to access the app through the Okta service.

Backup URL

Oracle Cloud Infrastructure does not provide backup log-in URL where users can sign-in using their normal username and password. You can contact Oracle Cloud Infrastructure support to turn off SAML, if necessary.

Contents


Supported Features

The Okta/Oracle Cloud Infrastructure SAML integration currently supports the following features:

For more information on the listed features, visit the Okta Glossary.


Configuration Steps

  1. Save the following metadata as metadata.xml:

    Sign in to Okta Admin app to have this variable generated for you.
  2. Login to your Oracle Cloud Infrastructure account as administrator.

  3. Navigate to MENU > Identity > Federation:

    oracle1

  4. Save the Oracle Cloud Infrastructure metadata file by clicking the Download this document link:

    oracle2

  5. Open the metadata from step 4 in a text editor and save the entityID and AssertionConsumerService values:

    oracle3

  6. Go back to the Oracle Cloud Infrastructure Federation page and enter the following:

    • Click Add Identity Provider.

    • NAME: Enter Okta.

    • DESCRIPTION: Enter any description.

    • Click the MICROSOFT ACTIVE DIRECTORY FEDERATION SERVICE (ADFS) OR SAML 2.0 COMPLIANT IDENTITY PROVIDER radio button.

    • Click Browse and select the metadata.xml file from step 1.

    • Click Continue:

    • oracle4

  7. Set a mapping for groups as follows:

    • For the IDENTITY PROVIDER GROUP field: Enter a group name that will be passed from Okta and select a corresponding group from the OCI GROUP dropdown list.

      Note: In our example, we have used OCIAdmins for the Okta group name and the corresponding Administrators group for the OCI GROUP. You can create different groups in Okta, for example OCIAdmins, OCIEveryone etc., and set a mapping for each group.

    • Click Continue:

    • oracle5

  8. In Okta, select the Sign On tab for the Oracle Cloud Infrastructure app, then click Edit.

    • Select your preferred group filter from the https://auth.oraclecloud.com/saml/claims/groupName dropdown list and enter a required value.

      Note: In our example we have used the Starts with rule with the value OCI in order to send all Okta groups that start with OCI to the Oracle Cloud Infrastructure instance.

    • oracle6

    • Scroll down to the ADVANCED SIGN-ON SETTINGS section.

    • Enter the ACS URL (AssertionConsumerService value from step 5) into the corresponding field.

    • Enter the Audience Restriction (entityID value from step 5) into the corresponding field.

    • Click Save:

    • oracle7

  9. Done!

Notes

The following SAML attributes are supported:

SP-initiated SSO

  1. Open your Oracle Cloud Infrastructure login URL:

    https://console.[region].oraclecloud.com/?tenant=[tenantid]

  2. Select your Okta configuration from the IDENTITY PROVIDER dropdown list.

  3. Click Continue:

  4. oracle8