Getting Started

Authentication ensures that an individual is recognized and granted an appropriate level of access to Digital Self Service - Transactions.

Note: Previous versions of this documentation provided configuration steps using Oracle Identity Cloud Service. Authentication for Digital Self Service - Transactions is supported through Oracle Cloud Infrastructure Identity and Access Management. If you require configuration steps that cover the previously supported Identity Cloud Service, contact your Oracle Utilities Delivery Team.

General Requirements

Digital Self Service - Transactions supports the following authentication approaches:

  • Authentication using OAuth if integrating with Oracle Cloud Infrastructure Identity and Access Management.
  • Single Sign-On (SSO), using OpenID Connect if integrating with Oracle Cloud Infrastructure Identity and Access Management, or Security Assertion Markup Language (SAML) 2.0 if using another identity provider to implement SSO with utilities.

Accessing Your Digital Self Service - Transactions Cloud Service

The following information assumes that you have completed your Digital Self Service - Transactions Initial Configurations including Linking Services to a Cloud Account described in the Oracle Utilities Opower Digital Self Service - Transactions Configuration Guide.

Oracle Cloud Infrastructure Identity and Access Management provides identity and access management functionality for the Oracle Utilities Cloud Services and supports SSO and identity federation capabilities.

In Identity and Access Management, an Identity Domain is enabled with each Digital Self Service - Transactions subscription to access non-production Digital Self Service - Transactions environments in OAuth mode. Once provisioned, the Identity Domain is administered exclusively by the client.

A security administrator uses the Identity Domain to manage applications and users, who are given access to a one or more application environments. The security administrator can also assign other users to an administrative role in the Identity Domain and delegate user management privileges.