Configure Oracle Access Management as an Identity Provider
Configure Oracle Access Management (OAM) as an Identity Provider (IdP) in Oracle Identity Cloud Service to provide seamless SSO for your cloud application users. Users of your Oracle Identity Cloud Service protected cloud applications will be able to authenticate using their on-premises OAM credentials.
Creating a SAML 2.0 federation agreement involves exchanging metadata files to aid in configuring the IdP in Oracle Identity Cloud Service and the service provider in OAM. You then test the connection and add the IdP to the default identity provider policy.
After creating the federation agreement, you test the integration and mark users as federated.
Export SAML 2.0 Metadata from OAM
Export the SAML 2.0 Metadata from OAM. This metadata will later be used to add the IdP in Oracle Identity Cloud Service.
Add an Identity Provider in Oracle Identity Cloud Service
Add an identity provider in Oracle Identity Cloud Service using the metadata file you exported from OAM. These steps assume you are using email address for the unique user attribute.
Register Oracle Identity Cloud Service as a Trusted Relying Party
Add a new service provider partner in Oracle Access Management (OAM) to make Oracle Identity Cloud Service a trusted relying party.
Test the Identity Provider Connection
Test the SAML IdP configuration in Oracle Identity Cloud Service.
Enable the Identity Provider
Enable the OAM Identity Provider in Oracle Identity Cloud Service.
- Login to the Oracle Identity Cloud Service console as an administrator.
- In the Identity Providers page, select Activate from the drop down menu for the OAM identity provider you created.
- Click Activate to confirm.
- If the Show on Login Page icon is not shown, select Show on Login Page from the drop down menu for the OAM identity provider.
- click Show to confirm.