JavaScript must be enabled to correctly display this content
Integrate with Oracle Identity Governance
Register and Download the Oracle Identity Governance Agent
To enable the Oracle Identity Governance agent to connect to Oracle Access Governance, you need to enter connection details and credentials for the target system and build
an agent specific to your environment.
Note:
Oracle Access Governance supports building an agent for Oracle Identity Governance Version 12.2.1.4 Bundle Patch Number 11 (12.2.1.4.220703) or later. If
your current version of Oracle Identity Governance is not compatible then contact Oracle Support, who
can arrange a patch for your Oracle Identity Governance system
Note:
Applications in Oracle Identity Governance must be marked as Certifiable in order to be ingested by Oracle Access Governance. Log in to the Oracle Identity Governance Self Service application and navigate to Request Access → Request for
Self → [Search for Your App] and click the information icon, and
select the Certifiable flag.
In a browser, navigate to the Oracle Access Governance service home page and log in as a user with the Administrator
application role.
On the Oracle Access Governance service home page, click on the icon and select Service Administration and then
Connected Systems.
Select the Add a connected system button, to navigate to
the Add a Connected System page and begin the
configuration.
On the Let's connect a system step, select the tile for
OIG Connector Template to configure the agent for a
target Oracle Identity Governance connected system, and then click Add.
On the Enter Details step, enter the following
details:
Name
Description
Click Next.
On the Configure step, enter connection details for the
target system:
JDBC URL: JDBC URL for the target
OIG database.
Note:
To
obtain the JDBC URL:
Log on to the Oracle WebLogic Server Administration Console associated with your Oracle Identity Governance instance.
Navigate to Services → Data
Sources.
Select oimOperationsDB from the
Configurations tab.
Select Connections Pool, and copy
the value from the URL: field to
use as the JDBC URL for Oracle Identity Governance.
OIG Database User Name: Database
user to connect to the OIG database.
Note:
This can be any user
with read access to the OIG database.
Password: Password for the OIG
Database User Name.
Confirm Password: Password for the
OIG Database User Name.
OIG Server URL: The URL of the target
OIG server.
Note:
To
obtain the OIG Server URL:
Log on to the Oracle Enterprise Manager Fusion Middleware Control.
Navigate to the System MBean
Browser and locate the
XMLConfig.DiscoveryConfig
MBean.
Copy the value of the
OimExternalFrontEndURL
attribute and use this as the value for the Oracle Identity Governance Server URL.
OIG Server User Name: OIG user used
for remediation and schema discovery.
Note:
The Oracle Identity Governance Server user can be any Oracle Identity Governance user that is a member of the System
Administrator administration role. This role is
required to perform the remediation process, and to support schema
discovery for custom attributes. In the case where only remediation
support is needed then user can be a member of the
OrclOAGIntegrationAdmin administration role. With this
user the schema discovery operation will fail.
Note:
Information about the Oracle Identity Governance Server (URL, Username, and Password), and Oracle Identity Governance datasource (JDBC URL, Username, and Password) is required to integrate Oracle Access Governance and Oracle Identity Governance. Oracle Access Governance will use the Oracle Identity Governance data source to load the data and the Oracle Identity Governance Server URL to perform remediation operations. In case of a connection failure, the Oracle Access Governance agent automatically retries a maximum of three times to secure a connection with the Oracle Identity Governance server.
Verify the details entered are correct, and click the Add button
On the Download Agent step, select the
Download link and download the agent zip file to the
environment in which the agent will run.
After downloading the agent, follow the instructions explained in the Agent Administration article.