Task 6: Set Up Identity Federation (Optional)

Learn how to set up identity federation for Oracle Database@Google Cloud.

Setting up identity federation for Oracle Database@Google Cloud is optional. Federation lets users sign in to the OCI tenancy associated with the service using Google Cloud IAM & Admin credentials. While most day-to-day database operations are performed in the Google Cloud environment and don't require the use of the OCI Console, some database management tasks do require signing in to OCI.

Use the following instructions to make Google Cloud IAM & Admin the identify provider for the OCI tenancy.

  1. In the OCI Console, navigate to Identity & Security, then click Domains.

    An image showing the OCI Console Identity and Security page.
  2. In the Domains list view, click the name of the "Default" domain to open the domain details page. Optionally, you can select another domain to configure single sign-on (SSO) for that domain.

    An image of the OCI Console list view for Identity domains.
  3. Click Security in the Identity domain Overview page's navigation menu.

    An image showing the OCI Console's Identity domain Security page.
  4. On the Security page for the domain, click Identity providers in the navigation menu.

    An image of the OCI Console's Domain security page.
  5. On the Identity providers page, click Add IdP, then select Add SAML IdP.

    An image of the OCI Console showing the Identity providers page and the selection of the Add SAML IdP operation.
  6. Enter the Name that you want to display on the OCI login page when using Single sign-on (SSO) to access the OCI Console. Optionally, you can add a Description. Click Next to continue.

    Leave this window or tab open while you perform the next steps that require the Google Cloud admin Console.

    An image of the OCI Console showing the Add SAML identity provider screen.
  7. From the web browser, open another tab or window and navigate to the Google Cloud admin Console at https://admin.google.com/ac/apps/unified.

    An image of the Google Cloud admin Console.
  8. Select Add custom SAML app from the Add app menu.

    An image of the Add custom SAML app menu selection.
  9. Enter the following details and click Continue:
    • App name: OracleCloudFederation
    • Description: Configures identity federation between Google Cloud and Oracle Cloud for Oracle Database@Google Cloud use.
    An image of the App details form for the SAML app.
  10. Under Option1: Download IdP metadata, click DOWNLOAD METADATA.

    An image of the IdP metadata download option in the Google Cloud admin Console.

    Click CONTINUE. Leave this window or tab open while you perform the next steps in the OCI Console.

    An image of the IdP metadata download screen in the Google Cloud admin Console.
  11. Return to the window or tab that displays the OCI Console. Click Import IdP metadata Upload metadata XML file. In the Upload identity provider metadata section, click select one..., then navigate to the XML file downloaded in the previous step from the Google Cloud admin console and upload the file.

    An image of the OCI Console showing the Add SAML identity provider page.
  12. Click Export SAML metadata.

    An image of the OCI Console Add SAML identity provider page.
  13. On the Export SAML metadata dialog, click Manual export. Copy the Provider ID and Assertion consumer service URL values into a notepad file on the local machine. Leave this window or tab open while you perform the next steps that require the Google Cloud admin console.

    An image of the Export SAML metadata dialog in the OCI Console.
  14. Return to the tab or window displaying the Google Cloud admin console. On the Service provider details page, enter the following:

    • ACS URL: Enter the "Assertion consumer service URL" value copied from the OCI Console in the previous step.
    • Entity ID: Enter the "Provider ID" value copied from the OCI Console in the previous step.

    Click CONTINUE.

    An image of the Google Cloud admin Console Service provider details page.
  15. On the Attribute mapping page, click ADD MAPPING.

    An image of the Google Cloud admin Console Attributes page.
  16. Add the following attribute mappings:

    • First name → FirstName
    • Last name → LastName
    • Primary email → PrimaryEmail

    For example, for the Basic Information attribute "First Name", enter the App attribute FirstName.

    An image of the Google Cloud admin Console Attributes mapping.
  17. On the Attribute mapping page, in the Group membership section, add the following groups created for role based access control (RBAC). The App attribute for the groups is MemberOf. Click FINISH to continue.

    • odbg-exa-infra-administrators
    • odbg-vm-cluster-administrator
    • odbg-exa-cdb-administrators
    • odbg-exa-pdb-administrators
    • odbg-dbmgmt-administrators
    • odbg-adbs-db-administrators
    • odbg-db-family-administrators
    • odbg-network-administrators
    • odbg-costmgmt-administrators
    • odbg-db-family-readers
    • odbg-network-readers
    • odbg-metrics-readers
    An image of the Google Cloud admin Console Group membership rbac roles.
  18. The Google Cloud admin console automatically redirects to the details page for the SAML application you have created. Expand the User access section.

    An image of the Google Cloud admin Console SAML application details page.
  19. In the Service status section, select ON for everyone, then click SAVE.

    An image of the Google Cloud admin Console SAML application Service status page.
  20. Return to the window or tab that displays the OCI Console. On the Add SAML identity provider page select Map user identity. Enter the following values:

    • Requested Name ID format: Select "Email address".
    • Identity provider user attribute: Select "SAML assertion Name ID"
    • Identity domain user attribute: Select "Username"
    An image of the OCI Console showing the Add SAML identity provider work flow's Map user identity page.
  21. On the Add SAML identity provider page select Review and Create.

    Review the SAML identity provider details, then click Create IdP.

    An image of the OCI Console showing the Add SAML identity provider work flow's Review and Create page.
  22. Click Activate to activate the identity provider (IdP).

    An image of the OCI Console showing the Add SAML identity provider work flow's What's Next? page.
  23. After you see the confirmation message that the identity provider has been activated, the identity provider is activated, click Add to IdP policy.

    An image of the OCI Console showing the Add SAML identity provider work flow's What's Next? page.
  24. On the Identity provider (IdP) policies page, click Default Identity Provider Policy in the Name column of the list of policies.

    An image of the OCI Console showing the IdP policy details page.
  25. On the Default Identity Provider Policy policy details page, in the Identity prover rules section, click Edit IdP rule.

    An image of the OCI Console showing the Default Identity Provider policy details page,
  26. On the Edit Identity provider rule page, find the Assign identity providers field. The field displays "Username-Password". Add "Google Cloud Federation", then click Save changes.

    An image of the OCI Console showing the Edit identity provider rule page.

    After adding "Google Cloud Federation":

    An image of the OCI Console showing the Edit identity provider rule page.
  27. On the details page for the Google Cloud Federation identity provider, click Configure JIT.

    An image of the details page for the Google Cloud Federation identity provider in the OCI Console.
  28. On the Configure Just-in-time (JIT) provisioning page, enable Enable Just-In-Time (JIT) provisioning using the toggle switch. Remain on this page for the next few steps.

    The Configure Just-in-time (JIT) provisioning page in the OCI Console.
  29. On the Configure Just-in-time (JIT) provisioning page, select Create a new identity domain user and Update the existing identity domain user.

    The Configure Just-in-time (JIT) provisioning page in the OCI Console.
  30. On the Configure Just-in-time (JIT) provisioning page, map the user attributes as follows:

    IdP user attribute type IdP user attribute name Maps to Identity domain user attributes
    NameID NameID value userName
    Attribute LastName familyName
    Attribute PrimaryEmail primaryEmailAddress
    Attribute FirstName firstName
    The Configure Just-in-time (JIT) provisioning page in the OCI Console.
  31. On the Configure Just-in-time (JIT) provisioning page, toggle the Assign group mapping switch to enable the group mapping you configured. The Assign group mapping section expands to display group mapping configuration options (see next step).

    The Configure Just-in-time (JIT) provisioning page in the OCI Console.
  32. On the Configure Just-in-time (JIT) provisioning page, select or enter the following values:

    • Group membership attribute name: MemberOf
    • Assign implicit group membership: Select the radio button to enable this option
    • When assigning group membership...: Merge with existing group memberships
    • When a group is not found...: Ignore the missing group

    Click Save changes after you select and enter the values.

    The Configure Just-in-time (JIT) provisioning page in the OCI Console.
  33. You have now completed the required steps to configure the identity federation between OCI and Google Cloud. To test the SSO:

    1. Sign Out on the OCI Console
    2. In the Or sign in with section of the login screen, click Google Cloud Federation.
    An image of the OCI Console sign in page offering the option to sign in with Google Cloud Federation.

What's Next?

If you want to allow additional users to open My Oracle Support (MOS) service requests, see the instructions in Task 4: Register with My Oracle Cloud Support. Federation does not automatically grant users access to My Oracle Support.