7.4 Validate the Microsoft Entra ID Configuration
Before you configure the database, confirm that the application registrations, scopes, client secret, and user and role assignments configured in Microsoft Entra ID are working as expected.
Validation consists of obtaining two tokens from Microsoft Entra ID and
inspecting their claims:
- Database-access token: Issued to the application through the client credentials grant.
- End-user token: Issued to the test user through the authorization code grant with Proof Key for Code Exchange (PKCE).
To complete this task, you need the following:
- Command-line environment with
curlandopensslinstalled. - Application (client) ID, application ID URI, redirect URI, and
the client secret value of
HCM APP. See Register the Application in Microsoft Entra ID. - Application ID URI of
OracleDB_Resource, and directory (tenant) ID. See Register the Database in Microsoft Entra ID. - User principal name (UPN) and password of a test user assigned at least one application role. See Create Users and Assign Roles in Microsoft Entra ID.
- JWT debugger, such as a command-line JWT decoder or a trusted web-based debugger, for inspecting token claims.
Note:
If your configuration uses v2 tokens, see Enabling Microsoft Entra ID v2 Access Tokens in Oracle AI Database Security Guide.Successful completion of both token requests confirms that Entra ID is configured
correctly for Oracle Deep Data Security. The
roles claim verified in the end-user token is what Oracle AI
Database reads at runtime to activate the corresponding data roles.
You can now proceed to configure Oracle AI Database to accept and validate these tokens.