DoubleCheck
Before You Begin
Introduction
This document describes how to configure Oracle Identity Cloud Service to provide Single Sign-On (SSO) for DoubleCheck using SAML.
About DoubleCheck
DoubleCheck is an enterprise Government, Risk, and Compliance (GRC) software that supports compliance, risk, and audit activities. DoubleCheck offers highly configurable solutions and embedded Business Intelligence features.
After integrating DoubleCheck with Oracle Identity Cloud Service:
- Users can access DoubleCheck using their Oracle Identity Cloud Service login credentials.
- Users can start DoubleCheck using the Oracle Identity Cloud Service My Apps console.
- Admins can assign and revoke user access to the DoubleCheck app using the Oracle Identity Cloud Service administration console.
What Do You Need?
- An Oracle Identity Cloud Service account with authorization rights to manage apps and users (Identity Domain Administrator or Application Administrator).
- A DoubleCheck account with authorization rights to configure federated authentication.
- Ensure that the email ID of each user in DoubleCheck matches the primary email ID of the Oracle Identity Cloud Service account.
Configuring the DoubleCheck App in Oracle Identity Cloud Service
Use this section to register and activate the DoubleCheck app, and then assign users to the app.
Prerequisite Step
A domain name and a company ID are required before you can register and activate the DoubleCheck app. You obtain these values from DoubleCheck.
The DoubleCheck domain name and company ID appears in the DoubleCheck home URL: https://<Domain_Name>.dbchk.com/<Company_ID>
.
Registering and Activating the DoubleCheck App
Access the Oracle Identity Cloud Service administration console, select Applications, and then click Add.
Click App Catalog.
Search for
DoubleCheck
, and then click Add.In the App Details section, enter your DoubleCheck Domain Name and Company ID, and then click Next.
Note: These are the values that you obtained in the "Prerequisite Step" section.
Click Download Identity Provider Metadata.
Tip: Use this file later during the DoubleCheck configuration in the "Configuring SSO for DoubleCheck" section.
Click Finish. Oracle Identity Cloud Service displays a confirmation message.
Click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.
Assigning Users to the DoubleCheck App
On the DoubleCheck app page in Oracle Identity Cloud Service, select Users, and then click Assign. The Assign Users window appears.
Select users that you need to assign to DoubleCheck, and then click OK. Oracle Identity Cloud Service displays a confirmation message stating that the DoubleCheck app is assigned to the users that you selected.
Configuring SSO for DoubleCheck
Send an email to DoubleCheck support team with downloaded Oracle Identity Provider metadata file and request to configure SSO for your DoubleCheck account.
Verifying the Integration
Use this section to verify that SSO works when initiated from Oracle Identity Cloud Service (IdP initiated SSO) or from Double Check (SP initiated SSO).
Verifying Identity Provider Initiated SSO from Oracle Identity Cloud Service
Access the Oracle Identity Cloud Service My Profile console using the URL:
https://<IDCS-Service-Instance>.identity.oraclecloud.com/ui/v1/myconsole
.Log in using credentials for a user that is assigned to the DoubleCheck app. Oracle Identity Cloud Service displays a shortcut to DoubleCheck under My Apps.
Click DoubleCheck. The DoubleCheck home page appears.
Confirm that the user that is logged in is the same for both DoubleCheck and Oracle Identity Cloud Service.
This confirms that SSO that is initiated from Oracle Identity Cloud Service works.
Verifying Service Provider Initiated SSO from DoubleCheck
Access DoubleCheck using the URL:
https://<Domain_Name>.dbchk.com/<Company_ID>/SAML
. You are redirected to the Oracle Identity Cloud Service login page.Log in using credentials for a user that is assigned to the DoubleCheck app. The DoubleCheck home page appears.
Confirm that the user that is logged in is the same for both DoubleCheck and Oracle Identity Cloud Service.
This confirms that SSO that is initiated from DoubleCheck works.
Troubleshooting
Use this section to locate solutions to common integration issues.
Known Issues
DoubleCheck displays the message, "Unable to log you in. Username < email ID > was recognized by Single Sign-On Service, but was not recognized by local system. Please contact your administrator."
Cause: The email attribute sent by Oracle Identity Cloud Service during SSO doesn't match any existing user in DoubleCheck.
Solution: Ensure that the user that you assign to the DoubleCheck app has an account in both Oracle Identity Cloud Service and DoubleCheck with the same email address.
Unknown Issues
For unknown issues, contact Oracle Support:
Go to https://support.oracle.com.
Select Cloud Support, and then sign in with your support credentials.
In the Cloud Dashboard, confirm that there are no planned outages in Oracle Identity Cloud Service, and then click Create Service Request.
Select Oracle Identity Cloud Service as the service type.
Complete your service request.