Pacific Timesheet

Before You Begin

Introduction

This document describes how to configure Oracle Identity Cloud Service to provide Single Sign-On (SSO) for Pacific Timesheet using SAML.

About Pacific Timesheet

Pacific Timesheet is a web-based timesheet software for payroll and projects. Pacific timesheet tracks project hours, expenses, attendance, time off, costing, and billing.

After integrating Pacific Timesheet with Oracle Identity Cloud Service:

  • Users can access Pacific Timesheet using their Oracle Identity Cloud Service login credentials.
  • Users can start Pacific Timesheet using the Oracle Identity Cloud Service My Apps console.
  • Admins can assign and revoke user access to the Pacific Timesheet app using the Oracle Identity Cloud Service administration console.

What Do You Need?

  • An Oracle Identity Cloud Service account with authorization rights to manage apps and users (Identity Domain Administrator or Application Administrator).
  • A Pacific Timesheet account with authorization rights to configure federated authentication.
  • Ensure that the email ID of each user in Pacific Timesheet matches the primary email ID of the Oracle Identity Cloud Service account.

Configuring the Pacific Timesheet App in Oracle Identity Cloud Service

Use this section to register and activate the Pacific Timesheet app, and then assign users to the app.

Prerequisite Step

A domain name is required before you can register and activate the Pacific Timesheet app. You obtain that domain name from Pacific Timesheet.

The Pacific Timesheet domain name appears in the Pacific Timesheet home URL: https://<Domain_Name>.pacifictimesheet.com.

Registering and Activating the Pacific Timesheet App

  1. Access the Oracle Identity Cloud Service administration console, select Applications, and then click Add.

  2. Click App Catalog.

  3. Search for Pacific Timesheet, and then click Add.

  4. In the App Details section, enter your Pacific Timesheet Domain Name, and then click Next.

    Note: This is the domain name that you obtained in the "Prerequisite Step" section.

  5. Click Download Identity Provider Metadata.

    Tip: Use this file later during the Pacific Timesheet configuration in the "Configuring SSO for Pacific Timesheet" section.

  6. Click Download Signing Certificate. Open the certificate, copy the text between -----BEGIN CERTIFICATE----- and -----END CERTIFICATE-----, and then save as a .txt file.

    Tip: Use this updated certificate file later during the Pacific Timesheet configuration in the "Configuring SSO for Pacific Timesheet" section.

  7. Click Finish. Oracle Identity Cloud Service displays a confirmation message.

  8. Click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.

Assigning Users to the Pacific Timesheet App

  1. On the Pacific Timesheet app page in Oracle Identity Cloud Service, select Users, and then click Assign. The Assign Users window appears.

  2. Select users that you need to assign to Pacific Timesheet, and then click OK. Oracle Identity Cloud Service displays a confirmation message stating that the Pacific Timesheet app is assigned to the users that you selected.

Configuring SSO for Pacific Timesheet

  1. Access Pacific Timesheet using the URL: https://<Domain_Name>.pacifictimesheet.com, and then click Login via Application Account.

  2. Log in as an administrator. The Pacific Timesheet home page appears.

  3. Click System, and then click Security.

  4. Under the Security section, click Edit.

  5. Use the table to update the federated authentication attributes, and then click OK.

    This table lists the mandatory federated authentication attributes that you must set to complete the SSO configuration.
    Attribute Settings
    Authentication Type Select SAML 2.0 SSO from the drop-down list.
    Name Enter the name. Use this name later to access Pacific Timesheet in the "Verifying Service Provider Initiated SSO from Pacific Timesheet" section.
    Issuer URL Enter the Issuer URL: https://<Domain_Name>.pacifictimesheet.com/timesheet/home.do.
    SAML 2.0 Endpoint (HTTP) Enter the SAML 2.0 Endpoint (HTTP) URL: https://<IDCS-Service-Instance>.identity.oraclecloud.com/fed/v1/idp/sso.
    Certificate (Primary) Copy the certificate contents from the .txt file that you created while performing the steps in the "Registering and Activating the Pacific Timesheet App" section, and paste into the certificate box.

    Note: The name value you enter appears as a part of the login button on the login page.

Verifying the Integration

Use this section to verify that SSO works when initiated from Oracle Identity Cloud Service (IdP initiated SSO) or from Pacific Timesheet (SP initiated SSO).

Verifying Identity Provider Initiated SSO from Oracle Identity Cloud Service

  1. Access the Oracle Identity Cloud Service My Profile console using the URL: https://<IDCS-Service-Instance>.identity.oraclecloud.com/ui/v1/myconsole.

  2. Log in using credentials for a user that is assigned to the Pacific Timesheet app. Oracle Identity Cloud Service displays a shortcut to Pacific Timesheet under My Apps.

  3. Click Pacific Timesheet. The Pacific Timesheet home page appears.

  4. Confirm that the user that is logged in is the same for both Pacific Timesheet and Oracle Identity Cloud Service.

    This confirms that SSO that is initiated from Oracle Identity Cloud Service works.

Verifying Service Provider Initiated SSO from Pacific Timesheet

  1. Access Pacific Timesheet using the URL: https://<Domain_Name>.pacifictimesheet.com, and then click Login via < Organization Name >. You are redirected to the Oracle Identity Cloud Service login page.

    Tip: See the "Configuring SSO for Pacific Timesheet" section for your organization name.

  2. Log in using credentials for a user that is assigned to the Pacific Timesheet app. The Pacific Timesheet home page appears.

  3. Confirm that the user that is logged in is the same for both Pacific Timesheet and Oracle Identity Cloud Service.

    This confirms that SSO that is initiated from Pacific Timesheet works.

Troubleshooting

Use this section to locate solutions to common integration issues.

Known Issues

Pacific Timesheet displays the message, "Could not find active application account that matches "< email ID > "."

Cause: The email attribute sent by Oracle Identity Cloud Service during SSO doesn't match any existing user in Pacific Timesheet.

Solution: Ensure that the user that you assign to the Pacific Timesheet app has an account in both Oracle Identity Cloud Service and Pacific Timesheet with the same email address.

Oracle Identity Cloud Service displays the message, "You are not authorized to access the app. Contact your system administrator." or “There is a problem with your account. Please contact Support."

Cause: The SAML 2.0 integration between the Oracle Identity Cloud Service Pacific Timesheet app and Pacific Timesheet is deactivated.

Solution:

  • Access the Oracle Identity Cloud Service administration console, select Applications, and then select Pacific Timesheet.
  • In the App Details section, click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.
Oracle Identity Cloud Service displays the message, "You are not authorized to access the app. Contact your system administrator."

Cause: The administrator revokes access for the user at the same time that the user tries to access the Pacific Timesheet app using Oracle Identity Cloud Service.

Solution:

  • Access the Oracle Identity Cloud Service administration console, select Applications, and then select Pacific Timesheet.
  • In the App Details section, select Users, and then click Assign to re-assign the user.

Unknown Issues

For unknown issues, contact Oracle Support:

  1. Go to https://support.oracle.com.

  2. Select Cloud Support, and then sign in with your support credentials.

  3. In the Cloud Dashboard, confirm that there are no planned outages in Oracle Identity Cloud Service, and then click Create Service Request.

  4. Select Oracle Identity Cloud Service as the service type.

  5. Complete your service request.