Set Up Identity Orchestration between Oracle Access Governance and Oracle Cloud Infrastructure Identity and Access Management (OCI IAM)

Introduction

Oracle Access Governance is a cloud-native Identity Governance and Administration (IGA) solution that provides insights-based access reviews, identity analytics, and intelligence capabilities for businesses. Oracle Access Governance can be integrated with the identity systems by defining a connected system. A connected system allows you to load identity and access data from identity system to Oracle Access Governance. You can connect on-premises systems as well as cloud services to Oracle Access Governance.

For more information on Oracle Access Governance, see:

Objective

In this tutorial, you’ll set up Identity Orchestration between Oracle Access Governance(AG) and Oracle Cloud Infrastructure Identity and Access Management (OCI IAM). For this, you’ll need to:

Intended Audience

This tutorial is specifically for OCI Tenancy Administrators and Access Governance Administrators so that they can learn to integrate Oracle Access Governance with OCI IAM.

Prerequisites

Tutorial Scenario

You want to setup seamless and secure identity orchestration between Oracle Access Governance and Oracle Cloud Infrastructure Identity and Access Management (OCI IAM) to allow you to run Access Governance tasks against the OCI identities.

Task 1: Set Up Identity Resources on OCI to Connect to Oracle Access Governance

To setup the target OCI instance for Oracle Access Governance integration, complete the following:

  1. Create an identity user, agcs_user, in the Default domain for Oracle Access Governance access. For more information on creating an identity user, see Managing Users.

  2. Edit user capabilities and select API keys for agcs_user:

    • API keys: Select the check box for API authentication. For more information on editing user capabilities, see Managing User Credentials.
  3. Create an identity group, agcs_group, in the Default domain for Oracle Access Governance API access and user assignment. For more information on creating a group, see Creating a Group.

  4. Assign the identity user (agcs_user) to the identity group (agcs_group). For more information on assigning an identity user, see Assigning Identity User.

  5. On the OCI Console, open the navigation menu and select Identity & Security -> Policies.

  6. On the left pane, select the root compartment of your tenancy.

  7. Click Create Policy.

  8. Enter name and description of the policy. In this tutorial, enter name as OCI_AGCS and description as Policies for Access Governance Agent to connect with Access Governance.

  9. In the Compartment field, select the root compartment.

  10. Turn on the Show manual editor toggle button.

  11. Enter the following policy statements:

    ALLOW GROUP agcs_group to read all-resources IN TENANCY
    ALLOW GROUP agcs_group to manage policies IN TENANCY
    ALLOW GROUP agcs_group to manage domains IN TENANCY
    
  12. Click Create.

    Description of the illustration AGCS_Policy.png

After you have set up the identity resources, you need to generate API Keys for the identity user (agcs_user) and note OCID for that identity user. You will use it to configure your cloud environment on the Oracle Access Governance Console. For more information on OCID, see OCID

  1. In OCI console, from the navigation menu, select Identity & Security, and then Domains -> your compartment, and then from the left pane, select Users.

  2. Select the agcs_user that you have created.

  3. On the left navigation panel, in the Resources section, select API keys.

  4. Click Add API key then select Generate API key pair.

  5. Click Download private key and save it.

  6. Click Add. The configuration file is created displaying ocid, fingerprint, tenancy and region details. Save the information available on the configuration file in a separate text file.

    Description of the illustration APIKeys.png

Task 2: Configure a new OCI IAM Cloud Service Connection in Oracle Access Governance Console

  1. In a browser, navigate to the Oracle Access Governance service home page and log on as a user with the Administrator application role.

  2. On the Oracle Access Governance service home page, click on the Navigation menu icon, and select Service AdministrationConnected Systems.

  3. Select the Add a connected system button from the Connected Systems page.

  4. Select the Oracle Cloud Infrastructure tile and then click Next.

  5. In the Enter details step, enter name and description of the connected system, and then click Next.

    Note: Do not add space while naming your connected system.

  6. In the Configure step, add the connection details:

    • Enter the user’s OCID and fingerprint details.
    • To fetch the OCID of the user, follow the steps given here
    • To fetch fingerprint of the user, follow the steps given here.
    • Enter the OCID for target tenancy. To fetch OCID for your tenancy, follow the steps given here.
    • Enter the region identifier of the home region for the target OCI tenancy. For this tutorial, enter us-ashburn-1.

    Description of the illustration Configure_Details.png

  7. Click Add. If the connection details are successfully validated, you will see the Success status for the Validate operation. The Full Data Load operation may take upto a few minutes, depending upon the data available in your OCI tenancy. The incremental data load is run every four hours for this connected system to sync the most recent data.

    Description of the illustration OCIConnection_Status.png

Task 3: Manage Identities in Oracle Access Governance Console

After connecting Oracle Access Governance with OCI IAM, you must activate identities from the Manage Identities page. To learn more about this, read the Activate/Inactivate Identities for License Management article.

A few examples can be:

For this tutorial, we will include users from a specific domain only.

  1. On the Oracle Access Governance service home page, click the navigation menu icon, and select Service AdministrationManage Identities.

  2. Select Any if any one of the set conditions should be satisfied, or select All if all the set conditions must be satisfied for that identity. For this tutorial, select All.

  3. In the attribute list, select Domain OCID.

  4. Select an appropriate conditional operator. For this tutorial, select Equals.

  5. In the Attribute value field, enter the OCID for the domain that you want to include.

    Note: You can see the number of identities included based on the selected rules by clicking the preview link.

  6. Click Save and then Confirm.

    Description of the illustration Manage_Identities.png

Upon successful execution of this rule, you can see a few more menu options, for example, Identity Attributess, enabled for you.

You have successfully learnt to set up identity orchestration between Oracle Access Governance and OCI IAM. You have also learnt to manage identities for license management and to utilize Oracle Access Governance features.

Acknowledgments

More Learning Resources

Explore other labs on docs.oracle.com/learn or access more free learning content on the Oracle Learning YouTube channel. Additionally, visit education.oracle.com/learning-explorer to become an Oracle Learning Explorer.

For product documentation, visit Oracle Help Center.