Follow these steps to configure your Identity Domain as part of the SSO setup for your organization.
There are two ways to complete this setup. It depends on what your screen looks like when you start the process. Most of you will be using an Identity Domain in Oracle Cloud (this article), while others will use IDCS.
If your Identity Domain screen looks different you may be using the Redwood preview look and feel. You can switch this off at the bottom right of the screen.
Details of this step are specific to your IdP application and provider (Microsoft Azure Active Directory, Microsoft ADFS, Okta), but for all SAML-based IdP integrations, the process is similar.
Follow your application’s instructions to create a new SAML-based integration. This will involve downloading a Federation Metadata XML file that you will later import. Once the setup is complete you can return to your IdP SAML setup screen and complete the process.
Once you have the Federation Metadata XML file, the first stage of your IdP setup is now complete – you will return to complete this later.
Note: Your IdP requires you to populate the Entity ID and the Reply URL of the Identity Domain. Depending on your provider you’ll need to either upload a Federation Metadata XML, or enter these details manually.
As an example, the Entity ID and Reply URL can be formed from your Identity Domain URL as follows:
Entity ID: https://idcs-exampleid1234.identity.oraclecloud.com:443/fed
Reply URL: https://idcs-exampleid1234.identity.oraclecloud.com/fed/v1/sp/sso
If you already see this Overview screen, you can skip to the Identity Domain Configuration section below.
You should now be on the overview screen.
You can now return to the configuration of your IdP service.
Your connection is successful. You may close this window and go back to the admin console.
If the test login failed you will see a screen similar to the one below. Please read the error description to amend the setup or create missing data:
Connection failed. Configuration may need to be modified. No user was returned during the SAML assertion to user mapping via the NameID attribute for partner Azure AD: NamedID poleary@majestic.com, user attribute name userNamed, message: ***See below***. Show Assertion Details You may close this window and go back to the admin console.
Note: Activating your identity domain will not affect existing Lobby users. They can continue to sign into the Lobby as usual. Only after you create an IdP Policy will users see a change to their sign-in process and be directed to your organization's identity provider.
Turn off this setting so your users don't receive a welcome email from Oracle Cloud. This email will not take them into Aconex so it's best not to send it.
After configuring your Identity Domain you need to provide Oracle with the ID for your Identity Domain.
The easiest way to do this is to paste your Domain URL into the ticket. The URL will look something like this: https://idcs-
You can find your Domain URL in the overview screen.
You will not be able to create an Identity Provider (IdP) Policy until Oracle confirms the Lobby is configured to use your Identity Domain.
You've successfully configured your Identity Domain.
Next, you need to create an Identity Provider (IdP) Policy. Note: Oracle needs to have confirmed the Lobby is configured to use your Identity Domain before you complete these next steps.