Panorama9

Before You Begin

Introduction

This document describes how to configure Oracle Identity Cloud Service to provide Single Sign-On (SSO) for Panorama9 using SAML.

About Panorama9

Panorama9 is a cloud-based service within enterprise network management. Panorama9 provides a hosted Dashboard to monitor everything on the network and to ensure that the servers, pc, peripherals, and external internet related services are functioning properly.

After integrating Panorama9 with Oracle Identity Cloud Service:

  • Users can access Panorama9 using their Oracle Identity Cloud Service login credentials.
  • Users can start Panorama9 using the Oracle Identity Cloud Service My Apps console.
  • Admins can assign and revoke user access to the Panorama9 app using the Oracle Identity Cloud Service administration console.

What Do You Need?

  • An Oracle Identity Cloud Service account with authorization rights to manage apps and users (Identity Domain Administrator or Application Administrator).
  • A Panorama9 account with authorization rights to configure federated authentication.
  • Make sure that the email ID of each user in Panorama9 matches the primary email ID of the Oracle Identity Cloud Service account.

Configuring the Panorama9 App in Oracle Identity Cloud Service

Use this section to register and activate the Panorama9 app, and then assign users to the app.

Prerequisite Steps

An account ID is required before you can register and activate the Panorama9 app. You obtain that account ID from Panorama9.

  1. Access Panorama9 as an administrator using the URL: https://dashboard.panorama9.com/portal. The Panorama9 home page appears.

  2. From the left navigation menu, click Extensions. The Extensions page appears.

  3. Click Single Sign-on, and then turn on the Enable Single Sign-On option.

  4. Copy the account ID from the end of the Issuer URL: http://www.panorama9.com/saml20/<Account_ID>.

Registering and Activating the Panorama9 App

  1. Access the Oracle Identity Cloud Service administration console, select Applications, and then click Add.

  2. Click App Catalog.

  3. Search for Panorama9, and then click Add.

  4. In the App Details section, enter your Panorama9 Account ID, and then click Next.

    Note: This is the account ID value that you obtained while performing the steps in the "Prerequisite Steps" section.

  5. Click Download Signing Certificate.

    Tip: Convert this certificate into Fingerprint format. See the "Converting Oracle Identity Cloud Service Certificate to Fingerprint Format" section.

  6. Click Finish. Oracle Identity Cloud Service displays a confirmation message.

  7. Click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.

Assigning Users to the Panorama9 App

  1. On the Panorama9 app page in Oracle Identity Cloud Service, select Users, and then click Assign. The Assign Users window appears.

  2. Select users that you want to assign to Panorama9, and then click OK. Oracle Identity Cloud Service displays a confirmation message stating that the Panorama9 app is assigned to the users that you selected.

Converting Oracle Identity Cloud Service Certificate to Fingerprint Format

  1. Go to https://www.samltool.com/fingerprint.php, and then paste the certificate that you downloaded earlier in the X.509 cert text box.

    Tip: This is the certificate that you downloaded during Panorama9 registration in the "Registering and Activating the Panorama9 App" section.

  2. Select SHA1 from the Algorithm drop-down list, and then click CALCULATE FINGERPRINT.

  3. Make note of the converted fingerprint from the Formatted Fingerprint text box.

    Note: Use this fingerprint later during SSO configuration in the "Configuring SSO for Panorama9" section.

Configuring SSO for Panorama9

  1. Access Panorama9 as an administrator using the URL: https://dashboard.panorama9.com/login. The Panorama9 home page appears.

  2. From the left navigation menu, click Extensions. The Extensions page appears.

  3. Click Single Sign-on, and then turn on the Enable Single Sign-On option.

  4. Use the table to update the federated authentication attributes, and then click Save Changes.

    This table lists the mandatory federated authentication attributes that you must set to complete the SSO configuration.
    Attribute Value
    Identity URL Enter the Sign-in URL/SSO Endpoint: https://<IDCS-Service-Instance>.identity.oraclecloud.com/fed/v1/idp/sso.
    Certificate fingerprint Paste the converted fingerprint that you obtained in the "Converting Oracle Identity Cloud Service Certificate to Fingerprint Format" section.
    Strict validation Turn on the option.

Verifying the Integration

Use this section to verify that SSO works when initiated from Panorama9 (SP Initiated SSO).

Verifying Service Provider Initiated SSO from Panorama9

  1. Access Panaroma9 using the login URL: https://dashboard.panorama9.com/saml/access/<Account_ID>. You are redirected to the Oracle Identity Cloud Service login page.

  2. Log in using credentials for a user that is assigned to the Panorama9 app. The Panorama9 home page appears.

  3. In the upper-right corner, click the menu icon and confirm that the user that is logged in is the same for both Panorama9 and Oracle Identity Cloud Service.

    This confirms that SSO that is initiated from Panorama9 works.

Troubleshooting

Use this section to locate solutions to common integration issues.

Known Issues

Panorama9 displays the message, "Unable to match Panorama9 username for requested email address: <User_ID>"

Cause: The email attribute sent by Oracle Identity Cloud Service during SSO doesn't match any existing user in Panorama9.

Solution: Ensure that the user that you assign to the Panorama9 app has an account in both Oracle Identity Cloud Service and Panorama9 with the same email address.

Oracle Identity Cloud Service displays the message, "You are not authorized to access the app. Contact your system administrator."

Cause 1: The SAML 2.0 integration between the Oracle Identity Cloud Service Panorama9 app and Panorama9 is deactivated.

Solution 1:

  • Access the Oracle Identity Cloud Service administration console, select Applications, and then select Panorama9.
  • In the App Details section, click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.

Cause 2: The administrator revokes access for the user at the same time that the user tries to access the Panorama9 app using Oracle Identity Cloud Service.

Solution 2:

  • Access the Oracle Identity Cloud Service administration console, select Applications, and then select Panorama9.
  • In the App Details section, select Users, and then click Assign to re-assign the user.

Unknown Issues

For unknown issues, contact Oracle Support:

  1. Go to https://support.oracle.com.

  2. Select Cloud Support, and then sign in with your support credentials.

  3. In the Cloud Dashboard, confirm that there are no planned outages in Oracle Identity Cloud Service, and then click Create Service Request.

  4. Select Oracle Identity Cloud Service as the service type.

  5. Complete your service request.