Panorama9
Before You Begin
Introduction
This document describes how to configure Oracle Identity Cloud Service to provide Single Sign-On (SSO) for Panorama9 using SAML.
About Panorama9
Panorama9 is a cloud-based service within enterprise network management. Panorama9 provides a hosted Dashboard to monitor everything on the network and to ensure that the servers, pc, peripherals, and external internet related services are functioning properly.
After integrating Panorama9 with Oracle Identity Cloud Service:
- Users can access Panorama9 using their Oracle Identity Cloud Service login credentials.
- Users can start Panorama9 using the Oracle Identity Cloud Service My Apps console.
- Admins can assign and revoke user access to the Panorama9 app using the Oracle Identity Cloud Service administration console.
What Do You Need?
- An Oracle Identity Cloud Service account with authorization rights to manage apps and users (Identity Domain Administrator or Application Administrator).
- A Panorama9 account with authorization rights to configure federated authentication.
- Make sure that the email ID of each user in Panorama9 matches the primary email ID of the Oracle Identity Cloud Service account.
Configuring the Panorama9 App in Oracle Identity Cloud Service
Use this section to register and activate the Panorama9 app, and then assign users to the app.
Prerequisite Steps
An account ID is required before you can register and activate the Panorama9 app. You obtain that account ID from Panorama9.
Access Panorama9 as an administrator using the URL:
https://dashboard.panorama9.com/portal
. The Panorama9 home page appears.From the left navigation menu, click Extensions. The Extensions page appears.
Click Single Sign-on, and then turn on the Enable Single Sign-On option.
Copy the account ID from the end of the Issuer URL:
http://www.panorama9.com/saml20/<Account_ID>
.
Registering and Activating the Panorama9 App
Access the Oracle Identity Cloud Service administration console, select Applications, and then click Add.
Click App Catalog.
Search for
Panorama9
, and then click Add.In the App Details section, enter your Panorama9 Account ID, and then click Next.
Note: This is the account ID value that you obtained while performing the steps in the "Prerequisite Steps" section.
Click Download Signing Certificate.
Tip: Convert this certificate into Fingerprint format. See the "Converting Oracle Identity Cloud Service Certificate to Fingerprint Format" section.
Click Finish. Oracle Identity Cloud Service displays a confirmation message.
Click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.
Assigning Users to the Panorama9 App
On the Panorama9 app page in Oracle Identity Cloud Service, select Users, and then click Assign. The Assign Users window appears.
Select users that you want to assign to Panorama9, and then click OK. Oracle Identity Cloud Service displays a confirmation message stating that the Panorama9 app is assigned to the users that you selected.
Converting Oracle Identity Cloud Service Certificate to Fingerprint Format
Go to
https://www.samltool.com/fingerprint.php
, and then paste the certificate that you downloaded earlier in the X.509 cert text box.Tip: This is the certificate that you downloaded during Panorama9 registration in the "Registering and Activating the Panorama9 App" section.
Select SHA1 from the Algorithm drop-down list, and then click CALCULATE FINGERPRINT.
Make note of the converted fingerprint from the Formatted Fingerprint text box.
Note: Use this fingerprint later during SSO configuration in the "Configuring SSO for Panorama9" section.
Configuring SSO for Panorama9
Access Panorama9 as an administrator using the URL:
https://dashboard.panorama9.com/login
. The Panorama9 home page appears.From the left navigation menu, click Extensions. The Extensions page appears.
Click Single Sign-on, and then turn on the Enable Single Sign-On option.
Use the table to update the federated authentication attributes, and then click Save Changes.
This table lists the mandatory federated authentication attributes that you must set to complete the SSO configuration. Attribute Value Identity URL Enter the Sign-in URL/SSO Endpoint: https://<IDCS-Service-Instance>.identity.oraclecloud.com/fed/v1/idp/sso
.Certificate fingerprint Paste the converted fingerprint that you obtained in the "Converting Oracle Identity Cloud Service Certificate to Fingerprint Format" section. Strict validation Turn on the option.
Verifying the Integration
Use this section to verify that SSO works when initiated from Panorama9 (SP Initiated SSO).
Verifying Service Provider Initiated SSO from Panorama9
Access Panaroma9 using the login URL:
https://dashboard.panorama9.com/saml/access/<Account_ID>
. You are redirected to the Oracle Identity Cloud Service login page.Log in using credentials for a user that is assigned to the Panorama9 app. The Panorama9 home page appears.
In the upper-right corner, click the menu icon and confirm that the user that is logged in is the same for both Panorama9 and Oracle Identity Cloud Service.
This confirms that SSO that is initiated from Panorama9 works.
Troubleshooting
Use this section to locate solutions to common integration issues.
Known Issues
Panorama9 displays the message, "Unable to match Panorama9 username for requested email address: <User_ID>
"
Cause: The email attribute sent by Oracle Identity Cloud Service during SSO doesn't match any existing user in Panorama9.
Solution: Ensure that the user that you assign to the Panorama9 app has an account in both Oracle Identity Cloud Service and Panorama9 with the same email address.
Unknown Issues
For unknown issues, contact Oracle Support:
Go to https://support.oracle.com.
Select Cloud Support, and then sign in with your support credentials.
In the Cloud Dashboard, confirm that there are no planned outages in Oracle Identity Cloud Service, and then click Create Service Request.
Select Oracle Identity Cloud Service as the service type.
Complete your service request.