Add a social identity provider (IdP) so that users can sign in to an identity domain
in IAM with their social credentials.
Configure the IdP to Redirect to IAM.
-
Create an application for the social IdP.
For example, go to the Google developer site to create a Google
application.
-
Configure the value of redirectUrl
in the application
The value of redirectUrl
must have the format:
https://<Identity domain base URL>/oauth2/v1/social/callback
Note
Ensure that the value of redirectUrl
doesn't contain
port number :443
. If it does, update the existing URL
to remove the port number or add a new URL without the port number to
the IdP application by using the external provider developers'
website.
Each social IdP calls these URLs by a different name:
-
Ensure that you retain the Client ID and the
Client Secret values from the application that
you created at the social IdP. You use this ID and secret when configuring
the social IdP in the identity domain.
You can choose from the following predefined social login types:
-
Facebook
-
Google
-
LinkedIn
-
Microsoft
-
OpenID Connect
-
Twitter
-
Open the navigation menu and click Identity & Security.
Under Identity, click Domains.
-
Click the name of the identity domain that you want to work in. You might need to change the compartment to find the domain that you want. Then, click Security and then Identity providers.
-
Click Add IdP, and then select Add Social
IdP.
-
In the Add social identity provider panel, select a
social login.
-
Enter a name and description for the social IdP.
-
In the Name and Description fields, enter a name and description
for the social identity provider.
Note
The social identity
provider name can contain spaces. However, it can't contain special
characters. Avoid entering confidential information.
-
Enter the client ID and the client secret for the social login type.
-
To allow users to link their social accounts, select the Enable
account linking check box. To prevent users from linking their
social accounts, clear the check box.
Note
You can prevent users from linking to their social
accounts for security or organizational purposes. For example, if a hacker
accesses the user's social account, the hacker can't sign in to the identity
domain to access resources and applications.
-
Click IdP.
-
On the details page for the IdP you created, click Activate
IdP.
-
Log in with the social IdP.
Note
You might encounter this error message: “Not Logged In: You are not
logged in. Please log in and try again.”
The most likely cause is that the application you created on the social
IdP side has the wrong client ID or redirect URL in the configuration.
Check the client ID and the redirect URL configuration, and try to log
in again.