Configuring Application Interface To Use OAuth For Siebel REST Inbound Authentication

Next, the Application Interface needs to be configured with the SSO parameter for the IDCS integration to use OAuth for REST Inbound.

  1. Select the correct Application Interface profile and click on the Edit (pencil) icon.
  2. Go to the first tab which will show the REST Inbound parameters enabled in the Application Interface (AI).
  3. Configure the REST API oAuth authentication using the following parameters:
    • Introspection URL: Required field. This is the OAuth introspection URL.
    • Client ID: Required field. This is the client ID for the IDCS Confidential Application created with Introspect enabled.
    • Client Secret: Required field. This is the client secret for the IDCS Confidential Application created with Introspect enabled.
    • Custom Subject Field: Optional field that allows you to specify a field created by an OAuth server to hold the Subject attribute to use in validation. Typically, this is the username or sub field, but some OAuth servers create their own. If you leave this field blank the sub or username or user_id field will be used. If this field has a value, subject information will be taken from this custom field from the OAuth token. Specifying which field to use allows flexibility in the OAuth server choice.

    • Trust Token: Required field. The Trust Token value must be the same as the security adapter TrustToken parameter value.
    • Session Timeout (seconds): Required field. This is the REST Object Manager session timeout.
    • Secure Channel: Set this parameter to true and import the Introspection URL’s CA certificate into the Application Interface truststore. Deselect this check box when the Introspection URL’s CA certificate is not available in the Application Interface truststore, however Oracle does not recommend this option.
    Screenshot of REST Inbound Authentication screen.
  4. After checking the Secure Channel checkbox, you should import the RootCA certificate of your IDCS federation into the AI trust store in order for the communication to be secure. This is a mandatory step that must be followed.
    1. Copy the rootCA certificate of your Federation and keep it in a directory on your AI server, for example, C:/Certs/rootCA.crt.
    2. Go to $SIEBEL_ROOT/ai/jre/bin and execute the below keytool command to import the rootCA certificate into the truststore of the AI.
      keytool -import -alias rootCAFederation -file C:/Certs/rootCA.crt -keystore $SIEBEL_ROOT/ai/applicationcontainer_external/siebelcerts/siebeltruststore.jks
    3. When prompted for keystore password, provide the password and you will be asked to trust the certificate. Type Yes.

    4. The certificate will be added to the truststore.
  5. Restart the Siebel AI Tomcat server for changes to take effect.