Registering an Application as a Public Client in Oracle Cloud Identity Services

Oracle Enterprise Performance Management Cloud environments on an Oracle Cloud Infrastructure (OCI) / Gen 2 architecture enable you to use an OAuth 2 access token to issue REST APIs on EPM Cloud to satisfy the requirement of avoiding the use of passwords in your environment.

Setting Up Authentication with OAuth 2

In order for the EPM Integration Agent to access OCI (Gen 2) Oracle Enterprise Performance Management Cloud environments, an EPM Cloud Service Administrator has to request the Domain Administrator to set up an OAuth 2 client and provide the Identity Domain Cloud Service (IDCS) URL, application scope, and Client ID.

Register the Client

The first step is to update the service provider configuration to authorize requests from the client application. As a security measure, any client application that accesses Oracle Cloud resources must be authorized to do so. A domain administrator provides this authorization by registering a client and providing the appropriate registration information to the client's users.

Clients can be public (outside a data center) or confidential. Public clients are assigned a client_id. Confidential clients also have a client secret in addition to a client_id. Clients are also authorized to access particular scopes. The type of application you select determines the allowed grant types available to request access tokens.

Client applications require an access token in order to access server resources. To obtain an access token, the client implements one of the IDCS supported access grant types, see Refresh Token Grant Type.

The Identity Cloud Service domain administrator follows the steps in this topic to create a public client in the Identity Cloud Service Administrator console for the requested client. The domain administrator then shares the Identity Cloud Service application URL, and client identification with the EPM Cloud Service Administrator.

Identity Cloud Service Administrator tasks to register a client:

  1. Log in to the Identity Cloud Service Administrator console as a Domain Administrator.

    Image shows the Oracle Cloud Services page

  2. Configure the token properties for protected OAuth 2 APIs:

    1. From the Dashboard drawer, click Oracle Cloud Services, and then select the Cloud Service.

    2. On the Configuration tab, under Resources, select the Is Refresh Token Allowed checkbox.

      Image shows the Configuration tab.

    3. Optional: Change the Access Token Expiration and Refresh Token Expiration. Oracle recommends 3600 (1 hour) as the value of Access Token Expiration and 604,800 (7 days) as the value of Refresh Token Expiration.

    4. Click Save.

  3. From the Applications drawer, click Add .

    Image shows the Applications page

  4. From the Add Application page, select Mobile Application.

    Image shows the Add Application page.

    For detailed information about adding a mobile application, see Add a Mobile Application.

  5. In the App Details section, then Name, enter the name for the REST client.

    Image shows the Add Mobile Application page.

  6. Optional: Add other details as needed.

  7. Click Next.

  8. In the Authorization section, under Allowed Grant Types, select the Refresh Token and Device Code checkboxes.

    Image shows the Authorization section.

  9. Click Next and then click Finish.

    The Application Added page shows the generated Client ID.

    Image shows the Application Added page.

    This Client ID also appears on the Configuration tab under the Details section for the application.

    Image show the Client ID under General Information.

  10. Copy the ID to the Client_ID field in the agentparams.ini for the agent. See Enabling the OAUTH Option in the EPM Integration Agent.

  11. On the Application Added page, click Close.
  12. Click Activate to activate the client, and then click OK.

    Image shows the Applications page.

    The message: "application name has been activated" is displayed.

    Image shows the Applications page.