Note: DNS zones are region-specific. If you have Oracle Integration instances in multiple regions, you must create a DNS zone with a unique subdomain for each region.
Delegate the DNS zone and update the name servers with your registrar
Create Oracle Cloud Infrastructure Identity
and Access Management (IAM) policies to allow your Oracle Integration tenancy to manage the public DNS zone
A generic endorse policy to allow your Oracle Integration instance to manage certificate resources in the Oracle Integration tenancy. This is the endorse part of the cross-tenant policy.
ENDORSE any-user TO MANAGE certificate-authority-family IN any-tenancy
Modify your custom hostname IP record to point to the Oracle Integration origin. If you use a CNAME record, you must enter the FQDN for your load balancer's public IP address.
If you're using three-legged OAuth with third-party identity providers (such as Google, Facebook, etc.), update the redirect URL in your identity provider (IdP) application with the custom hostname. If the custom hostname for your Oracle Integration instance is mycustom.example.org, your redirect URL must be, for example, https://mycustom.example.org/icsapis/agent/oauth/callback.
After updating the redirect URL in the IdP application, you must reacquire the access token by providing consent on the connection page.
If you created integration flows prior to mapping a custom endpoint to your instance, they will continue to work without any issues. However, if you want to update your integrations to use the custom endpoint:
For triggers, deactivate and re-activate those integrations to regenerate the WSDLs.
For parent-child integrations, edit the existing connection to replace the hostname with the custom host; test and save the connection; then reactivate the integration.
Note
If you're using the Oracle NetSuite Adapter, the adapter's TBA Authorization Flow security policy won't work with custom endpoints for Oracle Integration.