This topic describes the general steps to federate Oracle Cloud Infrastructure with any identity provider that supports the Security Assertion Markup Language (SAML) 2.0 protocol. If you want specific instructions for Oracle Identity Cloud Service or Microsoft Active Directory, see Federating with Oracle Identity Cloud Service or Federating with Microsoft Active Directory.
Tip
Find detailed setup steps for more IdPs in the following white papers:
Following is the general process an administrator goes through to set up the identity provider, and below are instructions for each step. It's assumed that the administrator is an Oracle Cloud Infrastructure user with the required credentials and access.
Note
Before following the steps in this topic, see Federating with Identity Providers to ensure that you understand general federation concepts.
In the Oracle Cloud Infrastructure Console, get the federation metadata required to establish a trust relationship with the Identity Provider (IdP).
In the IdP, configure Oracle Cloud Infrastructure as an application (sometimes called a trusted relying party).
In the IdP, assign users and groups to your new Oracle Cloud Infrastructure application.
In the IdP, get the required information needed by Oracle Cloud Infrastructure.
In Oracle Cloud Infrastructure:
Add the identity provider to your tenancy and provide information you got from the IdP.
Map the IdP's groups to IAM groups.
In Oracle Cloud Infrastructure, make sure you have IAM policies set up for the groups so you can control users' access to Oracle Cloud Infrastructure resources.
Inform your users of the name of your Oracle Cloud Infrastructure
tenant and the URL for the Console: https://cloud.oracle.com.
Step 1: Get information from Oracle Cloud Infrastructure
Summary: Download the federation metadata document.
The federation metadata document is a standard SAML 2.0 document, which provides information about Oracle Cloud Infrastructure you'll need to provide to your IdP. Depending on your provider's setup requirements, you may need to upload the entire document, or you may be asked to provide only specific metadata values from the document.
Sign in to the Oracle Cloud Infrastructure Console as an administrator.
Open the navigation menu and select Identity & Security. Under Identity, select Federation.
Right-click the Download this document link and save the document.
Step 2: Set up Oracle Cloud Infrastructure as a trusted application
Consult your IdP documentation for how to set up a trusted application. Refer to the metadata document you downloaded for required parameters.
Step 3: Assign users and groups to the new application.
Follow your IdP's procedures for adding users and groups to the application you set up for Oracle Cloud Infrastructure.
Step 4: Download the IdP's metadata document.
Your IdP should provide a SAML 2.0 document that contains the information Oracle Cloud Infrastructure needs to complete the federation. See your IdP documentation for instructions on downloading this document.
Step 5: Federate the IdP with Oracle Cloud Infrastructure
Summary: Add the identity provider to your tenancy. You can set up the group mappings at the same time, or set them up later.
Go to the Console and sign in with your Oracle Cloud Infrastructure login and password.
Open the navigation menu and select Identity & Security. Under Identity, select Federation.
Select Add Identity Provider.
Enter the following:
Name: A unique name for this federation trust. This is the
name federated users see when choosing which identity provider to
use when signing in to the Console,
so consider making this a friendly, intuitive name your users will
understand. The name must be unique across all identity providers
you add to the tenancy. You cannot change this later.
Description: A friendly description.
Type: Select Microsoft Active Directory Federation Service
(ADFS) or SAML 2.0 Compliant Identity Provider.
XML: Upload the metadata.xml document that you downloaded
from your IdP.
Encrypt Assertion: Selecting the checkbox lets the IAM service know to expect the
encryption from the IdP. If you select this checkbox, you must also
set up encryption of the assertion in your IdP. For more
information, see Encrypt Assertion under General Concepts. See
also your IdP's documentation.
Force Authentication: Selected by default. When selected, users are required to provide their credentials to the IdP (re-authenticate) even when they are already signed in to another session.
Authentication Context Class References: This field is required for Government Cloud customers. When one or more values are specified, Oracle Cloud Infrastructure (the relying party), expects the identity provider to use one of the specified authentication mechanisms when authenticating the user. The returned SAML response from the IdP must contain an authentication statement with that authentication context class reference. If the SAML response authentication context does not match what is specified here, the Oracle Cloud Infrastructure auth service rejects the SAML response with a 400. Several common authentication context class references are listed in the menu. To use a different context class, select Custom, then manually enter the class reference.
If you have permissions to create a resource, then you also have permissions to apply free-form tags to that resource. To apply a defined tag, you must have permissions to use the tag namespace. For more information about tagging, see Resource Tags. If you're not sure whether to apply tags, skip this option or ask an administrator. You can apply tags later.
Select Continue.
Set up the mappings between the IdP groups and IAM groups in Oracle Cloud Infrastructure. A given IdP group can be
mapped to zero, one, or multiple IAM groups, and conversely. However, each individual mapping is between
only a single IdP group and a single IAM group. Changes to group
mappings take effect typically within seconds in your home region, but
may take several minutes to propagate to all regions.
Note
If you don't want to set up the group mappings now, you can simply
select Create and come back to add the mappings later.
To create a group mapping:
Under Identity Provider Group, enter the name of the group
in your IdP. You must enter the name exactly, including the
correct case.
Choose the IAM group you want to map this group to from the list under OCI Group.
Tip
Requirements for IAM group name: No spaces.
Allowed characters: letters, numerals, hyphens, periods,
underscores, and plus signs (+). The name cannot be changed
later.
Repeat the above sub-steps for each mapping you want to create, and
then select Create.
The identity provider is now added to your tenancy and appears in the list on the
Federation page. Select the identity provider to view its details and
the group mappings you just set up.
Oracle assigns the identity provider and each group mapping a unique ID called an
Oracle Cloud ID (OCID). For more information, see Resource Identifiers.
In the future, come to the Federation page if you want to edit or add
group mappings or delete the identity provider from your tenancy.
Step 6: Set up IAM policies for the groups
If you haven't already, set up IAM policies to control the access the federated users have to your organization's Oracle Cloud Infrastructure resources. For more information, see Getting Started with Policies and Common Policies.
Step 7: Give your federated users the name of the tenant and URL to sign in
The federated users need the URL for the Oracle Cloud Infrastructure
Console: https://cloud.oracle.com, and the name of
your tenant. They'll be prompted to provide the tenant name when they sign in to the Console.