Okta

How to Configure SAML 2.0 for Oracle Hyperion EPM

Environment and Prerequisites

These SAML instructions were tested on an Oracle 11G database in the following environment:

Hyperion_env.png

You must have a configured EPM Weblogic Domain. These instructions are based on the following environment:

Setup Instructions

  1. Logon to EPM Weblogic console using Admin credentials: http://win-citrix.krish.com:7001/console

  2. Navigate to Security Realms > myrealm > Providers. Then, select Lock & edit in the left top corner of the weblogic console and create a new SAML2 IdentityAsserter. Name it SAML2_IdentityAsserter.

  3. Select Activate Changes and restart the managed server and Admin server. 
  4. Login again to Weblogic Admin console and create Weblogic as a SP. 
    1. Navigate to EPMServer0 > Federation Services > SAML 2.0 Service Provider. Configure the parameters as below.

      Hyperion_1.png
    2.  Save the configuration and go to the SAML 2.0 General tab and select the configuration shown below. Do not enable Recipient Check.

      Hyperion_3.png
    3.  Save the configuration.
  5.  Add the following lines into the mod_wl_ohs.conf file located under the OHS config directory to forward requests to WLS from OHS. Restart the server after making the changes.

    <LocationMatch ^/saml2/>
    SetHandler weblogic-handler
    WebLogicCluster HSS Server name:HSS port
    </LocationMatch>
  6. Login back to the Admin console and navigate to the EPMServer0 > Federation Services > SAML 2.0 General tab. Select Publish Metadata and save the file in any desired location. 
  7. Next, sign in to Okta and create a Template SAML 2.0 App. Use the configuration shown below.

    Hyperion_3.png

    Note: You can find the Post Back URL from the metadata that you published in Step 6. Be sure the Request is Uncompressed as shown above.
  8. After you configure the SAML 2.0 template App in Okta, navigate to the Sign On tab for the template app, and select View Setup Instructions. Download the metadata and save it on the EPM server, in any desired location.

  9. Sign in to Weblogic Admin console and navigate to Security Realms > myrealm > Providers.
  10. Select SAML2_IdentityAssertor and go to Management tab. Create a new Web Single Sign-On Identity provider Partner as shown below.

    Hyperion_4.png
  11.  Select the Okta IDP metadata and the select OK, as shown below.

    Hyperion_5.png
  12.   Edit the identity partner. Enable and configure it as shown below.

    Hyperion_6.png
  13. Save the file and activate the changes. Restart the weblogic if necessary. 
  14.  If you have already integrated a LDAP directory to EPM, enable SSO by completing steps a–e, below.
    1. Sign in to the EPM console and open the Shared Service console. A screen similar to the following displays.

      Hyperion_7.png
      Note: In this example, active directory is configured in addition to the EPM directory store.
    2. Select Administration > Configure User Directories, as shown below.

      Hyperion_8.png
    3. The following screen opens. Select the Security Options tab, as shown below.

      Hyperion_9.png
    4. On the Security Options tab, check Enable SSO, in the Single Sign-On Configuration section. Configure the other options as shown below.

      Hyperion_10.png
    5. Select OK.
  15. Sign in to the Weblogic Admin console. Make sure you have the users available in Weblogic realm. In this example, AD is integrated in the EPM as directory store; consequently, use the same directory store in Weblogic to pull the users to ensure the user set is the same in both Weblogic and Oracle EPM. 
  16. Navigate to Security Realms > myrealm > Providers and create a new Active Directory authenticator. In this example, it is named AD. Use this or any name that meets your organization's naming conventions.
  17. Edit the new provider and select the Provider Specific tab. Configure according to your environment, using the configuration shown below as a guide.

    Hyperion_11.png
  18. Save the configuration.
  19. Edit the config.xml located under domain C:\Oracle\Middleware\user_projects\domains\EPMSystem\config. Change the Sharedservices app deployment from DD only to customRolesandPolicies, as shown below. <app-deployment>
    <name>SHAREDSERVICES#11.1.2.0</name>
    <target>EPMServer</target>
    <module-type>ear</module-type>
    <source-path>C:\Oracle\Middleware\EPMSystem11R1/products/Foundation/AppServer/InstallableApps/common/interop.ear</source-path>
    <security-dd-model>CustomRolesAndPolicies</security-dd-model>
    <staging-mode>nostage</staging-mode>
    </app-deployment>
  20. To enable an SP-initiated session, go to the Weblogic Admin console and edit the EPMServer0. Navigate to the screen shown below and add the condition for the default policy. You can specify the group or users that are allowed access. In example shown below, a username is added.

    Hyperion_12.png
  21. Save the file and restart the server. This imports all the users and groups to Weblogic if you have integrated a LDAP store. You can also create a user inside Weblogic without integrating with LDAP server.  Be sure you have the user both in Weblogic and EPM.

  22. Finally, sign in to Okta and assign users to the template app. Be sure to test as necessary.
  23. Done!