Skip to content

Commit c4438b3

Browse files
authored
Update oracle-idcs-for-ebs-tutorial.md
1 parent e1f0fe9 commit c4438b3

File tree

1 file changed

+7
-4
lines changed

1 file changed

+7
-4
lines changed

articles/active-directory/saas-apps/oracle-idcs-for-ebs-tutorial.md

Lines changed: 7 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -64,10 +64,13 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
6464

6565
a. In the **Identifier** textbox, type a URL using the following pattern: ` https://<SUBDOMAIN>.oraclecloud.com/`
6666

67-
b. In the **Reply URL** textbox, type a URL using the following pattern: `https://<SUBDOMAIN>.oraclecloud.com/v1/saml/<UNIQUEID>>`
67+
b. In the **Reply URL** textbox, type a URL using the following pattern: `https://<SUBDOMAIN>.oraclecloud.com/v1/saml/<UNIQUEID>`
6868

6969
c. In the **Sign on URL** textbox, type a URL using the following pattern:
7070
` https://<SUBDOMAIN>.oraclecloud.com/`
71+
72+
>[!NOTE]
73+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [Oracle IDCS for E-Business Suite support team](https://www.oracle.com/support/advanced-customer-services/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
7174
7275
1. Your Oracle IDCS for E-Business Suite application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but Oracle IDCS for E-Business Suite expects this to be mapped with the user's email address. For that you can use **user.mail** attribute from the list or use the appropriate attribute value based on your organization configuration.
7376

@@ -79,11 +82,11 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
7982

8083
## Configure Oracle IDCS for E-Business Suite SSO
8184

82-
To configure single sign-on on Oracle IDCS for E-Business Suite side, you need to send the downloaded Federation Metadata XML file from Azure portal to [Oracle IDCS for E-Business Suite support team](https://www.oracle.com/support/advanced-customer-support/products/cloud.html). They set this setting to have the SAML SSO connection set properly on both sides.
85+
To configure single sign-on on Oracle IDCS for E-Business Suite side, you need to send the downloaded Federation Metadata XML file from Azure portal to [Oracle IDCS for E-Business Suite support team](https://www.oracle.com/support/advanced-customer-services/). They set this setting to have the SAML SSO connection set properly on both sides.
8386

8487
### Create Oracle IDCS for E-Business Suite test user
8588

86-
In this section, you create a user called Britta Simon at Oracle IDCS for E-Business Suite. Work with [Oracle IDCS for E-Business Suite support team](https://www.oracle.com/support/advanced-customer-support/products/cloud.html) to add the users in the Oracle IDCS for E-Business Suite platform. Users must be created and activated before you use single sign-on.
89+
In this section, you create a user called Britta Simon at Oracle IDCS for E-Business Suite. Work with [Oracle IDCS for E-Business Suite support team](https://www.oracle.com/support/advanced-customer-services/) to add the users in the Oracle IDCS for E-Business Suite platform. Users must be created and activated before you use single sign-on.
8790

8891
## Test SSO
8992

@@ -102,4 +105,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
102105

103106
## Next steps
104107

105-
Once you configure Oracle IDCS for E-Business Suite you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
108+
Once you configure Oracle IDCS for E-Business Suite you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).

0 commit comments

Comments
 (0)