Follow these steps to configure IDCS as part of the SSO setup for your organization.
There are two ways to complete this setup. It depends on what your screen looks like when you start the process. Most of you will be using an Identity Domain in Oracle Cloud, while others will use IDCS (this article).
Configuring SSO requires knowledge of SAML concepts and access to your company’s Identity Provider (IdP) to add configurations. This will normally be a member of the IT or Identity Management team within your company.
Your IdP will typically be a system such as Microsoft Azure Active Directory. You will need an Oracle Identity Cloud Service (IDCS) company account.
A Foundation license for IDCS is provided with our Cloud SaaS products such as Aconex. If your company already has an IDCS company account (often because they use other Oracle products), it’s usually best to use the same account for access to Aconex. If no account is currently available you can create one.
Details of this step are specific to your IdP application and provider (Microsoft Azure Active Directory, Microsoft ADFS, Okta), but for all SAML-based IdP integrations, the process is similar.
Follow your application’s instructions to create a new SAML-based integration. This will involve downloading a Federation Metadata XML file that you will later import into IDCS. Once IDCS setup is complete you can return to your IdP SAML setup screen (it’s good to have it open in the other window) and complete it the process.
Once you have the Federation Metadata XML file, the first stage of your IdP setup is now complete – you will return to complete this later. You can now continue to set up your IDCS configuration.
Note: for some IdP it is required to populate the Entity ID and the Reply URL of a SAML counterpart (e.g. IDCS in this case). Entity ID and Reply URL can be formed from IDCS URL as follows:
Entity ID: https://idcs-.identity.oraclecloud.com:443/fed Reply URL: https://idcs- .identity.oraclecloud.com/fed/v1/sp/sso
Once you have the Federated Metadata XML file from your IdP, switch to IDCS.
If your dashboard screen looks different, you may have been upgraded to an Identity Domain on Oracle Cloud Infrastructure.
You can now return to the configuration of your IdP service.
Your connection is successful. You may close this window and go back to the admin console.
If the test login failed you will see a screen similar to the one below. Please read the error description to amend the setup or create missing data:
Connection failed. Configuration may need to be modified. No user was returned during the SAML assertion to user mapping via the NameID attribute for partner Azure AD: NamedID poleary@majestic.com, user attribute name userNamed, message: ***See below***. Show Assertion Details You may close this window and go back to the admin console.
After configuring IDCS you need to provide Oracle with the ID for your IDCS account.
The easiest way to do this is to paste your IDCS console URL into the ticket. The URL will look something like this: https://idcs-
You will not be able to create an Identity Provider Policy in IDCS until Oracle confirms the Lobby is configured to use your IDCS account.
You've successfully configured IDCS.
Next, you need to create an Identity Provider Policy in IDCS. Note: Oracle needs to have confirmed the Lobby is configured to use your IDCS account before you complete these next steps.