Qubole

Before You Begin

Introduction

This document describes how to configure Oracle Identity Cloud Service to provide Single Sign-On (SSO) for Qubole using SAML.

About Qubole

Qubole is designed to explore, model, integrate, and manage data. It builds data pipelines to data stores enabling users to manage and process large amounts of data at once.

After integrating Qubole with Oracle Identity Cloud Service:

  • Users can access Qubole using their Oracle Identity Cloud Service login credentials.
  • Users can start Qubole using the Oracle Identity Cloud Service My Apps console.
  • Admins can assign and revoke user access to the Qubole app using the Oracle Identity Cloud Service administration console.

What Do You Need?

  • An Oracle Identity Cloud Service account with authorization rights to manage apps and users (Identity Domain Administrator or Application Administrator).
  • A Qubole account with authorization rights to configure federated authentication.
  • Make sure that the email ID of each user in Qubole matches the primary email ID of the Oracle Identity Cloud Service account.

Configuring the Qubole App in Oracle Identity Cloud Service

Use this section to register and activate the Qubole app, and then assign users to the app.

Prerequisite Steps

A dedicated account type is required before you can register and activate the Qubole app.

The Qubole account type appears in the Qubole login URL: https://<Account_Type>.qubole.com that you received in an email from Qubole.

Registering and Activating the Qubole App

  1. Access the Oracle Identity Cloud Service administration console, select Applications, and then click Add.

  2. Click App Catalog.

  3. Search for Qubole, and then click Add.

  4. In the App Details section, enter your Qubole Account Type, and then click Next.

    Note: This is the account type that you registered with Qubole while creating the account.

  5. Click Download Identity Provider Metadata.

    Tip: Use this file later during the Qubole configuration in the "Configuring SSO for Qubole" section.

  6. Click Finish. Oracle Identity Cloud Service displays a confirmation message.

  7. Click Activate, and then click Activate Application. The Oracle Identity Cloud Service displays a confirmation message.

Assigning Users to the Qubole App

  1. On the Qubole app page in Oracle Identity Cloud Service, select Users, and then click Assign. The Assign Users window appears.

  2. Select users that you want to assign to Qubole, and then click OK. Oracle Identity Cloud Service displays a confirmation message stating that the Qubole app is assigned to the users that you selected.

Configuring SSO for Qubole

Forward the identity provider metadata via email to the respective account executive of Qubole. The Qubole engineers configure the Oracle Identity Cloud Service metadata and then notify you after SSO is configured for your Qubole account.

Verifying the Integration

Use this section to verify that SSO works when initiated from Oracle Identity Cloud Service (IdP Initiated SSO) and Qubole (SP Initiated SSO).

Verifying Identity Provider Initiated SSO from Oracle Identity Cloud Service

  1. Access the Oracle Identity Cloud Service My Profile console using the URL: https://<IDCS-Service-Instance>.identity.oraclecloud.com/ui/v1/myconsole.

  2. Log in using credentials for a user that is assigned to the Qubole app. Oracle Identity Cloud Service displays a shortcut to Qubole under My Apps.

  3. Click Qubole. The Qubole home page appears.

  4. In the upper-right corner, confirm that the user that is logged in is the same for both Qubole and Oracle Identity Cloud Service.

    This confirms that SSO that is initiated from Oracle Identity Cloud Service works.

Verifying Service Provider Initiated SSO from Qubole

  1. Access Qubole using the URL: https://<Account_Type>.qubole.com.

  2. Click SIGN IN WITH SAML, enter your email address, and then click SIGN IN USING SAML. You are redirected to the Oracle Identity Cloud Service login page.

  3. Log in using credentials for a user that is assigned to the Qubole app. The Qubole home page appears.

  4. In the upper-right corner, confirm that the user that is logged in is the same for both Qubole and Oracle Identity Cloud Service.

    This confirms that SSO that is initiated from Qubole works.

Troubleshooting

Use this section to locate solutions to common integration issues.

Known Issues

Qubole displays the message, "<User_Name> can login only using following methods: username-password, google_auth"

Cause: The email attribute sent by Oracle Identity Cloud Service during SSO doesn't match any existing user in Qubole.

Solution: Ensure that the user that you assign to the Qubole app has an account in both Oracle Identity Cloud Service and Qubole with the same email address.

Oracle Identity Cloud Service displays the message, "You are not authorized to access the app. Contact your system administrator."

Cause 1: The SAML 2.0 integration between the Oracle Identity Cloud Service Qubole app and Qubole is deactivated.

Solution 1:

  • Access the Oracle Identity Cloud Service administration console, select Applications, and then select Qubole.
  • In the App Details section, click Activate, and then click Activate Application. Oracle Identity Cloud Service displays a confirmation message.

Cause 2: The administrator revokes access for the user at the same time that the user tries to access the Qubole app using Oracle Identity Cloud Service.

Solution 2:

  • Access the Oracle Identity Cloud Service administration console, select Applications, and then select Qubole.
  • In the App Details section, select Users, and then click Assign to re-assign the user.

Unknown Issues

For unknown issues, contact Oracle Support:

  1. Go to https://support.oracle.com.

  2. Select Cloud Support, and then sign in with your support credentials.

  3. In the Cloud Dashboard, confirm that there are no planned outages in Oracle Identity Cloud Service, and then click Create Service Request.

  4. Select Oracle Identity Cloud Service as the service type.

  5. Complete your service request.