Before You Begin

This 30-minute tutorial shows you how to access the Cloud Manager instance in a browser and fill out the Cloud Manager settings and infrastructure settings pages.

Background

After you install the Cloud Manager image on an Oracle Cloud Infrastructure instance, you must fill in the settings pages to prepare to use it for provisioning environments.

The method that you use to access the Cloud Manager instance in a browser depends upon the choices that you made when you installed Cloud Manager and the VCN.

  • If you created Network resources, private subnets, and a bastion, you must create an SSH port forwarding session, and then access the Cloud Manager PIA URL.

    See the section Access a Private Cloud Manager Instance with an SSH Port Forwarding Session.

  • If you created Network resources, public subnets, and a bastion, you must create an SSH port forwarding session, and then access the Cloud Manager PIA URL.

    See the section Access the Cloud Manager Instance with an SSH Port Forwarding Session. Alternatively, you can modify the Cloud Manager subnet to allow Internet access.

  • If you created Network resources, public subnets, and no bastion, you can access the Cloud Manager PIA URL.

    Note that when you create Network resources with no bastion, the subnet includes a security rule that allows traffic from the Internet (0.0.0.0/0) to the default PIA TCP ports 8000 and 8443.

    See the section Access the Cloud Manager Instance in a Browser.

This is the twelfth tutorial in the Install PeopleSoft Cloud Manager series. Read the tutorials in the order listed. The optional tutorials offer alternate methods for setup.

Step 1: Access the Cloud Manager Instance in a Browser

This section assumes that you have set up the networking resources to allow Internet access to the Cloud Manager instance. If you set up the Cloud Manager instance with private subnets and a bastion, skip this section and follow the instructions in the section Access a Private Cloud Manager Instance with an SSH Port Forwarding Session.

To access Cloud Manager in a browser:

  1. To locate the URL for Cloud Manager, review the /home/opc/bootstrap/CloudManagerStatus.log file created after the successful completion of the Resource Manager Apply job for the Cloud Manager stack.

    See the tutorial Log in to the Cloud Manager Instance.

    The URLs for Cloud Manager Pure Internet Architecture (PIA) are included at the end of the file. For example:

    CM installed successfully
    Cloud Manager PIA URL: http://psftcm.subnet1.pscmnetwork.oraclevcn.com:8000
    Cloud Manager PIA SSL URL: https://psftcm.subnet1.pscmnetwork.oraclevcn.com:8443
  2. To access the URL over the Internet, the DNS for the instance must be successfully resolved. 

    If you do not have a public DNS, edit the etc\hosts file (for example, C:\Windows\System32\drivers\etc\hosts on Microsoft Windows 10) on the machine from which you want to access the Cloud Manager URL. To modify the file, add a line with the Public IP address and fully-qualified domain name for the Cloud Manager instance, such as:

    198.51.100.67  psftcm.subnet1.pscmnetwork.oraclevcn.com
  3. Enter the Cloud Manager URL in a browser. You see a window for Weblogic Application Server.

    Welcome to Weblogic Application Server window
  4. Click the link Please click here to PeopleSoft logon page to display the Cloud Manager sign-in window.

    Cloud Manager PIA sign window
    Description of this illustration (access_cloud_manager_browser_PIAsignin.png)

Note:

Oracle strongly recommends that you change the default PeopleSoft Pure Internet Architecture (PIA) user passwords, especially when the Cloud Manager instances are on the public Internet.

Access a Private Cloud Manager Instance with an SSH Port Forwarding Session

If you created Network resources, private or public subnets, and a bastion as part of the Cloud Manager installation, you must create an SSH port forwarding session to access the Cloud Manager PIA URL. Use these instructions to connect to the Cloud Manager instance in a browser.

For more information on creating and using bastions, see the Oracle Cloud Infrastructure documentation for the Bastion service.

If you set up the Cloud Manager instance to allow Internet access, skip this section and use the instructions in the previous section, Access the Cloud Manager Instance in a Browser.

You must supply an SSH private key in the OpenSSH format for these commands. If you created an SSH private key in PuTTY in the RSA format, convert it to the OpenSSH format, as follows:

  1. Open the PuTTY generator and load the current private key.
  2. Select Conversions > Export OpenSSH key.
  3. Save the file, and make a note of the full path and key name.

    Note:

    If you want to distinguish this private key from the private key that you use with PuTTY, you can save the file to a different name. You cannot use this version of the key with PuTTY.
  4. Use the newly exported key in the command to create the SOCKS proxy.

To create the bastion SSH port forwarding session:

  1. In the Compute console, click the menu icon at the top left, and select Compute > Instances.
  2. If necessary, select your compartment, and locate the Cloud Manager instance.
  3. Select the Oracle Cloud Agent tab, and verify that the Bastion plugin has been enabled. If it is not enabled, turn it on.

    The Resource Manager Apply job for the Cloud Manager instance enables the Bastion plugin by default. If you are using these instructions to access a PeopleSoft provisioned environment, you may need to enable the Bastion plugin. It will take a little time to become active.

    Instance details page, Oracle Cloud Agent tab
    Description of this illustration (ssh_access_instance_details_bastion_enabled.png)
  4. Select Resource Manager, then Stacks, and locate the Cloud Manager stack.
  5. On the Stack Details page for the Cloud Manager instance, select the Apply job.
  6. On the Job Details page, select Outputs from the Resources list on the left, and make a note of the bastion name.
  7. Select Identity & Security, then Bastion, and locate the bastion.
  8. If there is no active session, click Create Session.
  9. Select SSH port forwarding session from the Session type drop-down list.
  10. Enter a name for the session, or accept the default.
  11. Select Instance name as the method to connect to the target host (Cloud Manager instance).
  12. If necessary, change the compartment, and select the Cloud Manager instance from the Compute instance drop-down list.
  13. Enter the target port number that you want to connect to, such as port 8000 for the default Cloud Manager PIA URL.
    Create an SSH port forwarding session
    Description of this illustration (create_ssh_port_fwd_session.png)
  14. Alternatively, select the IP address option and enter the private IP address for the Cloud Manager instance.
  15. Supply the public SSH key by browsing to the key file, pasting the text for the key file, or generating a new key pair.
  16. Click Create session.
  17. Wait until the session state is Active. Click the Actions icon and select Copy SSH command.
  18. Paste the command in a text editor, and replace <privateKey> with the full path and key name to the OpenSSH-formatted key.
  19. Replace <localPort> with the port to access the Cloud Manager PIA URL through the bastion.

    Supply a port that is greater than 1024 and is not in use by any other process on your system.

  20. In a Bash shell (Linux) or a git bash shell (Microsoft Windows), enter the edited command to create the SSH port forwarding session to the Cloud Manager instance.

    If you created a passphrase when generating the private key, you will be prompted to enter it two times. The process does not exit. That is, it does not return to the prompt.

    Note:

    If you are unable to connect, it may be due to the version of git bash you are using. See the workaround at the end of this section.

    Tip:

    The session lasts until you close the Bash shell or git bash shell, or until the bastion session ends. If the prompt closes, it means the session has disconnected. By default the session will time out after a few minutes of inactivity. For information on managing bastion sessions, see the Oracle Cloud Infrastructure documentation for the Bastion service.
  21. Edit the etc\hosts file (for example, C:\Windows\System32\drivers\etc\hosts on Microsoft Windows 10) on the machine from which you want to access the Cloud Manager URL.

    To modify the file, add a line with the local IP address and fully-qualified domain name for the Cloud Manager instance, such as:

    127.0.0.1  psftcm.subnet1.pscmnetwork.oraclevcn.com
  22. To access Cloud Manager in a browser, modify the PIA URL from the CloudManagerStatus.log:
    http://psftcm.subnet1.pscmnetwork.oraclevcn.com:8000

    Replace the port with the <localPort> value you used in the SSH command. For example, if you entered 8888 for the <localPort>:

    http://psftcm.subnet1.pscmnetwork.oraclevcn.com:8888

With some versions of git bash, you may see an error message such as "Unable to negotiate with <port number>" when you enter the command to create the SSH port forwarding session. Use these steps to avoid the error.

  1. Make a note of the bastion host from the SSH command that you copied after creating the session (step 17). In this sample command, it would be the text in bold beginning host.bastion.
    ssh -i <privateKey> -N -L <localPort>:xx.x.x.xxx:8000 -p 22 ocid1.bastionsession.oc1.iad.xxxxxxxxx@host.bastion.us-ashburn-1.oci.oraclecloud.com
  2. In the git-bash shell, change to the user's home directory:
    $ cd ~
  3. Make a new directory called ".ssh" under the home directory:
    $ mkdir .ssh
  4. Change to the .ssh directory.
    $ cd .ssh
  5. Create a file called config; for example using vi or another editor:
    $ vi config

    Tip:

    Review the usage with vi --help.
  6. Add these contents to the file and save.
    Host <bastion host>
    User opc
    PubkeyAcceptedAlgorithms +ssh-rsa
    HostkeyAlgorithms +ssh-rsa

    For <bastion host> enter the information from the SSH command; for example:

    Host host.bastion.us-ashburn-1.oci.oraclecloud.com
    User opc
    PubkeyAcceptedAlgorithms +ssh-rsa
    HostkeyAlgorithms +ssh-rsa
  7. Enter the SSH command to create the SSH port forwarding session to the Cloud Manager instance.

Alternatively, you can create the .ssh directory and config file in Windows File Explorer before using them in the git-bash shell.

  1. Make a note of the bastion host from the SSH command that you copied after creating the session (step 15). In this sample command, it would be the text in bold.
    ssh -i <privateKey> -N -L <localPort>:xx.x.x.xxx:8000 -p 22 ocid1.bastionsession.oc1.iad.xxxxxxxxx@host.bastion.us-ashburn-1.oci.oraclecloud.com
  2. In the git-bash shell, change to the user's home directory.
    $ cd ~
  3. Determine the user's home directory.
    $ pwd
    /c/Users/username

    The path /c/Users/username in the git-bash shell corresponds to C:\Users\username in Windows File Explorer.

  4. In Windows File Explorer, go to C:\Users\username and create the .ssh directory.
  5. Go to the C:\Users\username\.ssh directory.
  6. Using Notepad or another text editor, create the config file with these contents, and save.
    Host <bastion host>
    User opc
    PubkeyAcceptedAlgorithms +ssh-rsa
    HostkeyAlgorithms +ssh-rsa
    For <bastion host> enter the information from the SSH command; for example:
    Host host.bastion.us-ashburn-1.oci.oraclecloud.com
    User opc
    PubkeyAcceptedAlgorithms +ssh-rsa
    HostkeyAlgorithms +ssh-rsa
  7. Go to the git-bash shell and run the SSH command to create the SSH port forwarding session to the Cloud Manager instance.

Step 2: Specify Cloud Manager Settings

Use the Cloud Manager Settings page to specify user IDs and other information before using Cloud Manager to create topologies and templates.

  1. Sign in to Cloud Manager in a browser using the Cloud Administrator user ID and password.

  2. On the home page, select the Cloud Manager Settings tile.

    Note that the Cloud Manager Settings tile appears only for users who sign in with the Cloud Administrator user ID.

    Cloud Manager home page with Setting tile
    Description of this illustration (cldmgrsettings_cldmgr_homepage_settingstile.png)
  3. Select Cloud Manager Settings from the left-hand panel if necessary.

    Cloud Manager Settings page
    Description of this illustration (cldmgrsettings_select_cloud_manager_settings.png)
  4. In the My Oracle Support (MOS) Credentials section, the values that you entered in the Cloud Manager stack input form are used to populate the User ID and password fields. If you change to a different user, the new user's credentials will be used for subsequent environment provisioning.

    Note:

    If you use the Lift Utility to create and upload DPKs, you can specify this user as the required Oracle Cloud Infrastructure user.
    • User ID: Confirm the user ID for the registered My Oracle Support account, or change to another registered user ID.
    • Password: Enter the password for the My Oracle Support account.
    • Url: This field displays the URL https://updates.oracle.com for access to My Oracle Support. Do not change this value.
    • Authorization Mechanism: Accept the default OAuth 2.0, or select Basic Auth.
      This determines which mechanism is used to authorize access to My Oracle Support downloads, for example when downloading to the Repository. Note that choosing OAuth 2.0, which is the recommended mechanism, does not change the way you log in to Cloud Manager or provisioned environments. With Basic Auth, your MOS user account credentials are used for authorization. With OAuth 2.0, the Cloud Manager application is configured with the necessary authorization token.
    Cloud Manager Settings page, My Oracle Support (MOS) Credentials section
    Description of this illustration (cldmgrsettings_MOSCreds.png)
  5. In the PeopleSoft Credentials section, expand the REST Services section, and verify the delivered Cloud Manager Administrator user name, CLADM, and password. This information is based on the input to the Cloud Manager stack input form.

    REST Services refers to the standard Integration Broker REST services that are available in the Cloud Manager instance. These REST services are used internally by Cloud Manager modules to send and receive the results of long-running, asynchronous activities.

    Cloud Manager Settings page, PeopleSoft Credentials for REST Services section
    Description of this illustration (cldmgrsettings_RESTcreds.png)
  6. Expand the User Credentials section.

    The user and passwords listed are based on the input to the Cloud Manager stack configuration variables. If you want to use different values for provisioned environments, you can change them here. See the tutorial Install the PeopleSoft Cloud Manager Stack with Resource Manager.

  7. In the Lift & Shift Container section, the container name is included for information.
    Cloud Manager Settings page, Lift & Shift Container section
    Description of this illustration (cldmgrsettings_lascontain.png)
  8. If you want to use COBOL in a provisioned environment, select Visual Cobol 4, Visual Cobol 6, Visual Cobol 7, or Visual Cobol 9 from the Version drop-down list.

    Using COBOL for a provisioned environment is optional. If you do choose to use one of the supported Micro Focus Visual COBOL versions, you must use the same version of Visual COBOL for every node in a given provisioned environment. Similarly, if you use the lift and shift process, you must use the same version of Visual COBOL for every node that you provision for the shifted environment.

    See the tutorial Prepare to Install PeopleSoft Cloud Manager for information on obtaining the licenses and the PeopleTools releases that are supported for each type of compiler.

    Cloud Manager Settings page, Cobol license section
    Description of this illustration (cldmgrsettings_visualcobolversion.png)
  9. For either Visual COBOL version, select a license type from the drop-down list, and enter the necessary information.

    • Authorization code — Enter the code.
    • File — Enter the absolute path and license file name.

      The number of characters in the absolute path and license file name must be less than 30.

      Upload the license file to the Cloud Manager instance, for example using PSCP. As the root user, copy the file to a convenient location, such as /home/psadm2. Change the file owner to psadm2 so that the file is accessible to psadm2, and save the absolute path.

    • Server — Enter the server name.

      For information on setting up a license file server, see the Micro Focus Visual COBOL documentation.

    Cobol License section showing Visual COBOL licence menu
    Description of this illustration (cldmgrsettings_visualcobollicense.png)
  10. If you want to add the license information for an additional Visual COBOL compiler version, click the plus button to add another row.
  11. To enable monitoring of provisioned environments using the PeopleSoft Health Center, change the Enable monitoring services switch to Yes.

    This is a requirement for the Auto Scaling feature. See the section Data Science Settings Page in PeopleSoft Cloud Manager. Select the PeopleSoft Cloud Manager page on the Oracle Help Center.

    Cloud Manager Settings page, Monitoring services section
    Description of this illustration (cldmgrsettings_monitoring_services.png)
  12. To enable automatic updating of Cloud Manager pages, accept the default setting, Yes, for the Enable automatic page updates switch.

    When this option is set to Yes, Cloud Manager pages display the real-time status of operations. For example, if you perform a PeopleTools Update on a provisioned environment, status changes will be reflected as they occur, in the Provision Task Status page and on the status field on the environment tile.

    If you set this option to No, Cloud Manager pages will not be automatically refreshed, and you may need to refresh the browser manually before you can see the status change. You may try setting this option to No if you notice a problem with automatic updates.

    Automatic Page Updates section of the Cloud Manager Settings page
    Description of this illustration (cldmgrsettings_auto_page_updates.png)
  13. Click Save Settings at the top of the page if you make any changes.

Step 3: Specify Infrastructure Settings

Use the Infrastructure Settings page to verify account, instance, and operating system information.

  1. Select Infrastructure Settings from the left-hand panel.

  2. In the Oracle Cloud Infrastructure Service section, the tenancy, user, and API signing key information that you supplied when provisioning the instance are shown.

    Note:

    This illustration includes sample text and masking characters. The text you see will vary.
    Top portion of Infrastructure Settings page
    Description of this illustration (infrastruct_settings_tenancy_keys_reg.png)
  3. Verify the following information that you supplied when filling out the Resource Manager stack:

    • User name and OCID
    • Full path and name for the API Signing Public Key
    • Full path and name for the API Signing Private Key
    • API Signing Private Key passphrase
    • API Version
    • Home Region
    • Deployment Region
  4. If you want to change the User OCID or API signing keys, see the following section Reset User and API Keys.
  5. In the Object Storage - Bucket area, accept the default name or enter a new name.

    You can use the default bucket, cm_default_storage, that Cloud Manager creates in Oracle Cloud Infrastructure Object Storage, or create another bucket and enter the name here. The bucket is required for compare reports generated when upgrading the PeopleTools version of a provisioned environment. See the information on Managing Environments in PeopleSoft Cloud Manager. Select the PeopleSoft Cloud Manager page on the Oracle Help Center.

    Object Storage Bucket section of Infrastructure Settings page
    Description of this illustration (infrastruct_settings_obj_stor_bucket.png)
  6. In the Operating System Images section, if you want to select a Linux image from the Oracle Cloud Marketplace, change the Marketplace Image switch to YES and select an image from the Image Version drop-down list.
    Linux Image section on Infrastructure Settings page
    Description of this illustration (infrastruct_settings_linux_marketplace.png)
  7. If you prepared a custom Linux image, or you created an instance for an Oracle Platform image, change the Marketplace Image switch to NO and enter the OCID for the Linux image.

    See the section Choose an Oracle Linux Image in the tutorial Prepare to Install PeopleSoft Cloud Manager.

    This example shows the Operating System Images section of the Infrastructure Settings page.

    Linux image section on the Infrastructure Settings page
    Description of this illustration (infrastruct_settings_os_ocids.png)
  8. In the Operating System Images section, enter the Image OCID for the Microsoft Windows image.

    See the section Choose a Microsoft Windows Image in the tutorial Prepare to Install PeopleSoft Cloud Manager.

    Note:

    When you add a Microsoft Windows node in Cloud Manager, you will enter an administrator password for accessing the VM created from the Microsoft Windows image.
  9. In the Notifications section, change the Enable External Notification switch to Yes if you want to allow users to receive email notifications for these features:

    Allow users to receive weekly email notifications of the recommended action for managed environments when using monitoring. See the information on Monitoring in PeopleSoft Cloud Manager. Select the PeopleSoft Cloud Manager page on the Oracle Help Center.

    Allow end users performing a PeopleTools upgrade to enable report notifications on the Cloud Manager Upgrade PeopleTools page for an environment. This applies to upgrades to PeopleTools 8.60.x. See the information on Upgrading PeopleTools in PeopleSoft Cloud Manager. Select the PeopleSoft Cloud Manager page on the Oracle Help Center.

    Notifications section of Infrastructure Settings page
    Description of this illustration (infrastruct_settings_notifications.png)
  10. Enter a Topic OCID for the PeopleTools upgrade compare reports and monitoring notification.

    A topic in the Oracle Cloud Infrastructure Notification service is defined as "A communication channel for sending messages to the subscriptions in the topic." Subscribers to this topic will receive notifications when compare reports are generated during the PeopleTools upgrade and from the weekly Recommendation Job (ECL_RECOMEND) for managed environments when using monitoring feature. See the Oracle Cloud Infrastructure documentation, Managing Topics.

  11. Click Save and then Refresh OCI Metadata at the top of the page if you make any changes, to refresh the metadata related to the operating system images.

  12. Click OK on the dialog box with "Import of latest Infrastructure data has been initiated."

    Import message box
  13. Wait a few minutes for the data to be refreshed before creating a file server.

    This example shows the Operating System Images section with a Linux Marketplace image after the data has been saved and refreshed.

    Note:

    This illustration includes sample text and masking characters. The text you see will vary.
    Completed Infrastructure Settings page
    Description of this illustration (infrastruct_settings_complete.png)
  14. After the OCI metadata is refreshed, you can use the options in the OCI Metadata Refresh Across Region section.

    See the information on disaster recovery in PeopleSoft Cloud Manager. Select the PeopleSoft Cloud Manager page on the Oracle Help Center.

    OCI metadata refresh Across Region section
    Description of this illustration (infrastruct_settings_refresh_across_region.png)

Reset User and API Keys (Optional)

Use these instructions if you need to change the Cloud Manager administrator user and the API private key associated to new values. This may be necessary, for example, in case of job or organization changes.

The new Cloud Manager administrator user must possess the same permissions and roles as the previous user. Otherwise, after you add the new user and new key some Cloud Manager features may not work.

  1. Follow the instructions in the tutorial Log in to the Cloud Manager Instance to access the Cloud Manager instance with SSH.
  2. Sign in as user opc, and then change to the psadm2 user; for example:
    $ sudo su - psadm2

    Note:

    This is one of the default users created as part of the Cloud Manager deployment.
  3. Create an API signing key pair for the new Cloud Manager user, and save it in a directory under /home/psadm2, such as /home/psadm2/new_api_keys.

    Make a note of the key names, path, and the passphrase. The new keys should be owned by the psadm2 account.

    See Required Keys and OCIDs in the Oracle Cloud Infrastructure Documentation.

    Tip:

    To avoid confusion with the key pair generated for the existing user, it is probably a good idea to create the API signing keys with a different name.
  4. Add the new API public key to the new user's account in the Oracle Cloud Infrastructure console, as shown in the tutorial Generate API Signing Keys for PeopleSoft Cloud Manager.
  5. In the Cloud Manager instance, change directory to /home/psadm2/psft/data/cloud/ocihome/keys.
    $ cd /home/psadm2/psft/data/cloud/ocihome/keys
  6. Make a backup copy of the directory; for example:
    $ cp -r /home/psadm2/psft/data/cloud/ocihome/keys ./keys_backup
  7. On the Cloud Manager Infrastructure Settings page, replace the User OCID with that for the new user.
  8. Replace the API Signing Private Key with the full path and name for the new private key.
  9. Replace the API Signing Prv Key Passphrase with the value for the new key, if you specified one.
  10. Click Save.

    Cloud Manager validates the values. If the validation is successful, it displays updated values for the API Public Signing Key and Fingerprint.

  11. Click Refresh OCI Metadata.

Reset API Keys (Optional)

Use these instructions to change only the API signing keys, but not the user, for example to conform to a routine update for security reasons. In this case, skip the step to add the User OCID to the Infrastructure Settings page, and add the new API public key to the existing user's account.

  1. Follow the instructions in the tutorial Log in to the Cloud Manager Instance to access the Cloud Manager instance with SSH.
  2. Sign in as user opc, and then change to the psadm2 user; for example:
    $ sudo su - psadm2

    Note:

    This is one of the default users created as part of the Cloud Manager deployment.
  3. Create a new API signing key pair for the existing Cloud Manager user, and save it in a directory under /home/psadm2, such as /home/psadm2/new_api_keys.

    Make a note of the key names, path, and the passphrase. The new keys should be owned by the psadm2 account.

    See Required Keys and OCIDs in the Oracle Cloud Infrastructure Documentation.

    Tip:

    To avoid confusion with the key pair generated for the existing user, it is probably a good idea to create the API signing keys with a different name.
  4. Add the new API public key to the user's account in the Oracle Cloud Infrastructure console, as shown in the tutorial Generate API Signing Keys for PeopleSoft Cloud Manager.
  5. In the Cloud Manager instance, change directory to /home/psadm2/psft/data/cloud/ocihome/keys.
    $ cd /home/psadm2/psft/data/cloud/ocihome/keys
  6. Make a backup copy of the directory; for example:
    $ cp -r /home/psadm2/psft/data/cloud/ocihome/keys ./keys_backup
  7. Replace the API Signing Private Key with the full path and name for the new private key.
  8. Replace the API Signing Prv Key Passphrase with the value for the new key, if you specified one.
  9. Click Save.

    Cloud Manager validates the values. If the validation is successful, it displays updated values for the API Public Signing Key and Fingerprint.

  10. Click Refresh OCI Metadata.

Enter an SSH Public Key for Provisioned Environments

End users can enter or edit their public SSH key on the My Settings page. After adding this SSH key, Cloud Manager will inject the key into the Linux VM of any PeopleSoft environment that you provision. End users can then use Putty or other interfaces to access the provisioned environments, for example to use PSADMIN.

  1. From the Cloud Manager home page, click the My Settings tile.
    Cloud Manager home page with My Settings tile selected
    Description of this illustration (cldmgr_homepage_mysettings.png)
  2. If necessary, select My SSH Public Key from the frame on the left.
    Select My SSH Public Key
    Description of this illustration (mysettings_select_mysshpublickey.png)
  3. To enter a new SSH Public key, enter the text in the My SSH Publish Key field and click Save.
    My SSH Public Key page
    Description of this illustration (mysettings_ssh_public_key_save.png)
  4. To edit or replace an existing key, enter the text for the key, and then click Save.
  5. Click Edit, and change or replace the text.
  6. Click Save again.

Create a Password Group for Provisioned Environments

Use password groups to organize passwords saved in an Oracle Cloud Infrastructure vault. For example, you may want a group for your PUM environments using database compute, and another for environments that use Database as a Service. 

See the tutorial Create Vault Resources for Password Management for PeopleSoft Cloud Manager. 

See the information on password groups in PeopleSoft Cloud Manager on Oracle Help Center. Select the PeopleSoft Cloud Manager page on the Oracle Help Center.

To create a password group:

  1. From the Cloud Manager home page, click the My Settings tile.
  2. Select Password Groups from the frame on the left.
  3. Click Add New Group.
    Password Groups page
    Description of this illustration (mysettings_add_password_group.png)
  4. Select the compartment and OCI vault, and choose a vault secret for each password.
    Password Group Information page
    Description of this illustration (mysettings_password_group_page.png)

Next Steps

Use File Storage Service for PeopleSoft Cloud Manager Repository

Learn More