3 Configuring the Identity Cloud Service Connector

While creating an application, you must configure connection-related parameters that the connector uses to connect Oracle Identity Governance with your target system and perform connector operations. In addition, you can view and edit attribute mappings between the process form fields in Oracle Identity Governance and target system columns, predefined correlation rules, situations and responses, and reconciliation jobs.

3.1 Basic Configuration Parameters

These are the connection-related parameters that Oracle Identity Governance requires to connect to the Identity Cloud Service.

Table 3-1 Basic Configuration Parameters for Identity Cloud Service

Parameter Mandatory? Description

acceptType

Yes

The accept type for the header denotes how the request body must be parsed. The request body should only be parsed as JSON if the Content-Type header is application/json.

Sample value: application/json

authenticationServerUrl

Yes

The URL of the authentication server if authentication type is “BASIC”.

Sample value: https://api.example.com/oauth2/token

baseURI

Yes

The base URI is the base relative URL of the Identity Cloud Service target system.

Sample value: If the target system URL is http://host:port/admin/v1, then the base URI is /admin/v1.

contentType

Yes

The content type for the header denotes the format of the request being sent to the target system. The request body should only be parsed as JSON if the Content-Type header is application or JSON.

Sample value: application/json

customAuthHeaders

Yes

Client identifier and client secret values used for authorization with your target system.

Enter a value for this parameter in the following format:

“Authorization=Basic <Base64 Encode ClientID:ClientSecret>”

In this format, replace <Base64 Encode ClientID:ClientSecret> with the Base64 encoded string. You create this string by using the client ID and client secret values generated while registering your client application. See Configuring the Target System.

Sample value: "Authorization=Basic AbC123XY1aBCXYZxYZabCl23XyzabCABCXYZ123AbC1XY1aBCXYZxYZabCl23XyzabCABCXYZ123"

grantType

Yes

Type of authentication used by your target system.

Sample value: password or client_credentials

host

Yes

Host name or IP address of the computer hosting the target system.

Sample value: www.example.com

port

Yes

Port number at which the target system is listening.

Sample value: 80

scope

Yes

Scope is required to authenticate request based on “OAuth2.0 Resource Owners Password or Client Credentials” authentication type.

Sample value: urn:opc:idm:__myscopes__

sslEnabled

Yes

If the target system requires SSL connectivity, set the value of this parameter to true. Otherwise, set the value to false.

Connector Server Name

No

Name of the IT resource of type “Connector Server”.

By default, this field is blank. If you have deployed the connector in a Java Connector Server, then enter the name of the IT resource for the Connector Server.

username

No

User name or User ID used if authentication type is “basic” or “password”.

Sample value: johnsmith

password

No

Password used if authentication type is “basic” or “password”.

Sample value: password

3.2 Advanced Settings Parameters

These are the configuration-related entries that the connector uses during reconciliation and provisioning operations.

Table 3-2 Advanced Settings Parameters for Identity Cloud Service

Parameter Mandatory? Description

relURLs

No

This entry holds the relative URL of every object class supported by this connector and the connector operations that can be performed on these object classes.

Default value: "__ACCOUNT__.password.UpdateOp=/Users/$(__ACCOUNT__.__UID__)$"

Note:

You can update this parameter to delete a user that is associated with one or more entities (Groups or Applications) in Identity Cloud Service. To do so, add the "__ACCOUNT__.DeleteOp=/Users/$(__ACCOUNT__.__UID__)$?forceDelete=true" value at the end of this entry.

The updated sample value is: "__ACCOUNT__.password.UpdateOp=/Users/$(__ACCOUNT__.__UID__)$","__ACCOUNT__.DeleteOp=/Users/$(__ACCOUNT__.__UID__)$?forceDelete=true".

If you do not update this entry and try to delete the user, an error message is displayed. For details on the error message, see Troubleshooting the Identity Cloud Service Connector.

Bundle Name

No

This entry holds the name of the connector bundle package.

Default value: org.identityconnectors.genericscim

Bundle Version

No

This entry holds the version of the connector bundle.

Default value: 12.3.0

Connector Name

No

This entry holds the name of the connector class.

Default value: org.identityconnectors.genericscim.GenericSCIMConnector

nameAttributes

Yes

This entry indicates the attributes that need to be treated as the __NAME__ attribute for an Object class.

Default value: "Users=userName","Groups=displayName"

uidAttributes

Yes

This entry holds the UID attribute for the objects that are handled by the connector. For example, the UID attribute is ID for User accounts.

Default value: "Users=id","Groups=id"

statusAttributes

No

This entry lists the name of the target system attribute that holds the status of an account.

This entry indicates the status field: The __ENABLE__ field on the target for an object class.

Default value: "Users=active"

passwordAttributes

No

This entry indicates the attributes that need to be treated as the __PASSWORD__ attribute for an object class.

Default value: "Users=password"

attrToOClassMapping

No

This entry denotes that the groups attribute of the __ACCOUNT__ object class is mapped to the Groups object class on the target.

Default value: "__ACCOUNT__.groups=Groups"

scimVersion

Yes

This indicates the SCIM version on which the target is implemented.

Default value: 17

jsonResourcesTag

No

This JSON tag value is used during reconciliation for parsing multiple entries in a single response payload.

Default value: Resources

customPayload

No

This entry holds the payloads for all operations that are not in the standard format.

Default value: "__ACCOUNT__.password.UpdateOp={\"Operations\":[{\"op\":\"replace\",\"path\":\"password\",\"value\":\"$(__ACCOUNT__.password)$\"}],\"schemas\":[\"urn:ietf:params:scim:api:messages:2.0:PatchOp\"]}","__ACCOUNT__.groups.AddOp={\"schemas\":[\"urn:ietf:params:scim:api:messages:2.0:PatchOp\"],\"Operations\":[{\"op\":\"add\",\"path\":\"members\",\"value\":[{\"value\":\"$(__ACCOUNT__.__UID__)$\"}]}]}"

Any Incremental Recon Attribute Type

No

By default, during incremental reconciliation, Oracle Identity Governance accepts time stamp information sent from the target system only in Long datatype format. A decode value of True for the Incremental Recon Attribute Type entry indicates that Oracle Identity Governance will accept time stamp information in any datatype format.

Default value: true

httpOperationTypes

No

This entry indicates that for a Password Update operation, the target needs a PUT operation instead of PATCH.

Default value: "__ACCOUNT__.password.UpdateOp=PATCH"

reconSortByAttrs

No

This entry holds the attribute used for sorting the records during a reconciliation operation.

Default value: "Users=id","Groups=id"

managedObjectClasses

No

This entry holds the value of object classes used by the target system. Operations related to users and groups use this parameter to store the corresponding object classes of the target system.

Default value: "Users","Groups"

hashPasswordEnabled

No

This entry specifies whether hashing must be enabled on the default password that is sent to the target system when a new account is created.

Default value: false

This implies that hashing is not enabled and the default password is sent in a plain text format.

Note: To enable hashing on the default password, set the value of this parameter to true.

For more information on enabling hashing during the Create User provisioning operation, see Guidelines on Performing Provisioning Operations.

hashAlgorithm

No

This entry holds the value of hash algorithm that the connector uses if the hashPasswordEnabled parameter is set to true.

Default value: PBKDF2WithHmacSHA256

The supported algorithms are:
  • PBKDF2WithHmacSHA1

  • PBKDF2WithHmacSHA256

  • PBKDF2WithHmacSHA384

  • PBKDF2WithHmacSHA512

3.3 Attribute Mappings

The Schema page for a Target application displays the default schema (provided by the connector) that maps Oracle Identity Governance attributes to target system attributes. The connector uses these mappings during reconciliation and provisioning operations.

Identity Cloud Service User Account Attributes

Table 3-3 lists the user-specific attribute mappings between the process form fields in Oracle Identity Governance and Identity Cloud Service attributes. The table also lists whether a specific attribute is used during provisioning or reconciliation and whether it is a matching key field for fetching records during reconciliation.

If required, you can edit the default attribute mappings by adding new attributes or deleting existing attributes as described in Creating a Target Application of Oracle Fusion Middleware Performing Self Service Tasks with Oracle Identity Governance.

Table 3-3 Default Attribute Mappings for the Identity Cloud Service User Account

Display Name Target Attribute Data Type Mandatory Provisioning Property? Provision Field? Recon Field? Key Field? Case Insensitive?

Id

__UID__

String

No

Yes

Yes

Yes

Not Applicable

User Name

__NAME__

String

Yes

Yes

Yes

No

Not Applicable

First Name

name.givenName

String

Yes

Yes

Yes

No

Not Applicable

Last Name

name.familyName

String

Yes

Yes

Yes

No

Not Applicable

Middle Name

name.middleName

String

No

Yes

Yes

No

Not Applicable

Manager

manager.value

String

No

Yes

Yes

No

Not Applicable

Employee Number

employeeNumber

String

No

Yes

Yes

No

Not Applicable

Email

__ACCOUNT__.emails.value,type:work,primary:true

String

Yes

Yes

Yes

No

Not Applicable

User Type

userType

String

No

Yes

Yes

No

Not Applicable

Organization

organization

String

No

Yes

Yes

No

Not Applicable

Password

__PASSWORD__

String

No

Yes

No

No

Not Applicable

Creation Mechanism

creationMechanism

String

No

Yes

No

No

Not Applicable

Status

__ENABLE__

String

No

Yes

Yes

No

Not Applicable

Figure 3-1 shows the default user account attribute mappings.

Figure 3-1 Default Attribute Mappings for the Identity Cloud Service User Account

Description of Figure 3-1 follows
Description of "Figure 3-1 Default Attribute Mappings for the Identity Cloud Service User Account"

Group Names Child Attributes

Table 3-4 lists the attribute mappings for group names between the process form fields in Oracle Identity Governance and Identity Cloud Service attributes. The table lists whether a given attribute is mandatory during provisioning. It also lists whether a given attribute is used during reconciliation and whether it is a matching key field for fetching records during reconciliation.

If required, you can edit the default attribute mappings by adding new attributes or deleting existing attributes as described in Creating a Target Application of Oracle Fusion Middleware Performing Self Service Tasks with Oracle Identity Governance.

Table 3-4 Default Attribute Mappings for the Identity Cloud Service Group Names

Display Name Target Attribute Data Type Mandatory Provisioning Property? Recon Field Key Field? Case Insensitive?

Group Value

__ACCOUNT__.groups~__ACCOUNT__.groups~value

String

No

Yes

Yes

Not Applicable

Figure 3-2 shows the default group name attribute mappings.

Figure 3-2 Default Attribute Mappings for the Identity Cloud Service Group Names

Description of Figure 3-2 follows
Description of "Figure 3-2 Default Attribute Mappings for the Identity Cloud Service Group Names"

3.4 Correlation Rules, Situations, and Responses

Learn about the predefined rules, responses and situations for an Identity Cloud Service Target application. The connector use these rules and responses for performing reconciliation.

Predefined Identity Correlation Rules

By default, the Identity Cloud Service connector provides a simple correlation rule when you create a Target application. The connector uses this correlation rule to compare the entries in Oracle Identity Governance repository and the target system repository, determine the difference between the two repositories, and apply the latest changes to Oracle Identity Governance.

If required, you can edit the default correlation rule or add new rules. You can create simple correlation rules also. For more information about adding or editing simple or complex correlation rules, see Updating Identity Correlation Rule in Oracle Fusion Middleware Performing Self Service Tasks with Oracle Identity Governance.

Table 3-5 Predefined Identity Correlation Rule for an Identity Cloud Service Target Application

Target Attribute Element Operator Identity Attribute Case Sensitive?

__NAME__

Equals

User Login

No

In this identity rule:
  • __NAME__ is a single-valued attribute on the target system that identifies the user account.

  • User Login is the field on the OIG User form.

Figure 3-3 shows the simple correlation rule for the Identity Cloud Service connector.

Figure 3-3 Simple Correlation Rule for an Identity Cloud Service Target Application

Description of Figure 3-3 follows
Description of "Figure 3-3 Simple Correlation Rule for an Identity Cloud Service Target Application"

Predefined Situations and Responses

The Identity Cloud Service connector provides a default set of situations and responses when you create a Target application. These situations and responses specify the action that Oracle Identity Governance must take based on the result of a reconciliation event.

Table 3-6 lists the default situations and responses for the Identity Cloud Service connector. If required, you can edit these default situations and responses or add new ones. For more information about adding or editing situations and responses, see Creating a Target Application in Oracle Fusion Middleware Performing Self Service Tasks with Oracle Identity Governance.

Table 3-6 Predefined Situations and Responses for an Identity Cloud Service Target Application

Situation Response

No Matches Found

None

One Entity Match Found

Establish Link

One Process Match Found

Establish Link

Figure 3-4 shows the default situations and responses for the Identity Cloud Service connector.

Figure 3-4 Default Situations and Responses for an Identity Cloud Service Target Application

Description of Figure 3-4 follows
Description of "Figure 3-4 Default Situations and Responses for an Identity Cloud Service Target Application"

3.5 Reconciliation Jobs

Learn about the reconciliation jobs that are automatically created in Oracle Identity Governance after you create the application for your target system.

You can either use these predefined jobs or edit them to meet your requirements. Alternatively, you can create custom reconciliation jobs. For information about editing these predefined jobs or creating new ones, see Updating Reconciliation Jobs in Oracle Fusion Middleware Performing Self Service Tasks with Oracle Identity Governance.

IDCS Target Resource User Reconciliation Job

You use the IDCS Target Resource User Reconciliation job to perform full or incremental reconciliation, which involves reconciling all user records from a target application into Oracle Identity Governance.

Table 3-7 Parameters of the IDCS Target Resource User Reconciliation Job

Parameter Description

Application Name

Name of the application you created for your target system. This value is the same as the value that you provided for the Application Name field while creating your target application.

Note: Do not modify this value.

Batch Size

Enter the number of records that must be included in each batch fetched from the target system during reconciliation.

By default, the value of this attribute is empty, indicating that all records are included for reconciliation.

Filter

Enter the search filter for fetching records from the target system during a reconciliation run.

See Performing Limited Reconciliation for more information about filtered reconciliation.

Incremental Recon Attribute

This attribute holds the value of the target system attribute that is specified as the value of the Incremental Recon Attribute attribute.

Default value: meta.lastModified

Note: Do not modify this value.

Object Type

This attribute holds the name of the object type for the reconciliation run.

Default value: User

Note: User is the only object that is supported. Therefore, do not change the value of this attribute.

Latest Token

Attribute that holds the date on which the token record is modified. The Latest Token attribute is used for internal purposes. By default, this value is empty.

Note: Do not enter a value for this attribute. The reconciliation engine automatically enters a value in this attribute.

Sample value: <String>2016-10-19T07:24:49Z</String>

Scheduled Task Name

Name of the scheduled job.

Note: For the scheduled job included with this connector, you must not change the value of this attribute. However, if you create a new job or create a copy of the job, then enter the unique name for that scheduled job as the value of this attribute.

IDCS Target Resource User Delete Reconciliation Job

You use the IDCS Target Resource User Delete Reconciliation job to reconcile deleted user account data from the target system.

Table 3-8 Parameters of the IDCS Target Resource User Delete Reconciliation Job

Parameter Description

Application Name

Name of the application you created for your target system. This value is the same as the value that you provided for the Application Name field while creating your target application.

Note: Do not modify this value.

Object Type

This attribute holds the name of the object type for the reconciliation run.

Default value: User

Note: User is the only object that is supported. Therefore, do not change the value of this attribute.

Batch Size

Enter the number of records that must be included in each batch fetched from the target system during reconciliation.

By default, the value of this attribute is empty, indicating that all records are included for reconciliation.

Reconciliation Jobs for Entitlements

The following jobs are available for reconciling entitlements:
  • IDCS Group Lookup Reconciliation: Use this job to reconcile all group data in the target system into lookup fields in Oracle Identity Governance.

  • IDCS Manager Lookup Reconciliation: Use this job to reconcile all manager data in the target system into lookup fields in Oracle Identity Governance.

The parameters for all the reconciliation jobs are the same.

Table 3-9 Parameters of the Reconciliation Jobs for Entitlements

Parameter Description

Application Name

Name of the application you created for your target system. This value is the same as the value that you provided for the Application Name field while creating your target application.

Note: Do not modify this value.

Lookup Name

This parameter holds the name of the lookup definition that maps each lookup definition with the data source from which values must be fetched.

Depending on the reconciliation job you are using, the default values are as follows:

  • For IDCS Group Lookup Reconciliation: Lookup.IDCS.Groups

  • For IDCS Manager Lookup Reconciliation: Lookup.IDCS.Managers

Object Type

Enter the type of object whose values must be synchronized.

Depending on the scheduled job you are using, the default values are as follows:

  • For IDCS Group Lookup Reconciliation: Group

  • For IDCS Manager Lookup Reconciliation: __ACCOUNT__

Note: Do not modify this value.

Code Key Attribute

Enter the name of the connector or target system attribute that is used to populate the Code Key column of the lookup definition (specified as the value of the Lookup Name attribute).

Default value: __UID__

Note: Do not modify this value.

Decode Attribute

Enter the name of the connector or target system attribute that is used to populate the Decode column of the lookup definition (specified as the value of the Lookup Name attribute).

Default value: __NAME__