Learn how to configure a connection to Oracle via SAML.
Each SSO Identity Provider requires specific information to create and configure a new connection. Often, the information required to create a connection will differ by Identity Provider.
To create an Oracle SAML connection, you’ll need the Identity Provider Metadata URL that is available from the organization's Oracle SAML instance.
The ACS URL is the location an Identity Provider redirects its authentication response to. The SP Entity ID is a URI used to identify the issuer of a SAML request, response, or assertion.
In order to integrate you’ll need the IdP Metadata URL.
Normally, this will come from the organization's IT management team when they set up your application’s SAML configuration in their Oracle instance. But, should that not be the case during your setup, here’s how to obtain it.
Follow the Oracle Cloud documentation to create a new SAML application.
Copy and paste the ACS URL and SP Entity ID into the corresponding fields for Service Provider details and configuration.
In the Advanced Settings of the SSO Configuration page, ensure that you select Signed SSO for Assertion and Response, and Include Signing Certificate in Signature.
Expand the Attribute Configuration section on the SSO Configuration page and add the following 4 required attributes:
Ensure the following attribute mapping is set:
Users can automatically be assigned roles within your application by sending their group memberships. To enable this, set up a group attribute statement following the guidance below.
This feature is currently in beta, contact customer support for more information.
To return this information in the attribute statement, map the groups in your identity provider to a SAML attribute named