You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/active-directory/saas-apps/oracle-idcs-for-ebs-tutorial.md
+7-4Lines changed: 7 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -64,10 +64,13 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
64
64
65
65
a. In the **Identifier** textbox, type a URL using the following pattern: ` https://<SUBDOMAIN>.oraclecloud.com/`
66
66
67
-
b. In the **Reply URL** textbox, type a URL using the following pattern: `https://<SUBDOMAIN>.oraclecloud.com/v1/saml/<UNIQUEID>>`
67
+
b. In the **Reply URL** textbox, type a URL using the following pattern: `https://<SUBDOMAIN>.oraclecloud.com/v1/saml/<UNIQUEID>`
68
68
69
69
c. In the **Sign on URL** textbox, type a URL using the following pattern:
70
70
` https://<SUBDOMAIN>.oraclecloud.com/`
71
+
72
+
>[!NOTE]
73
+
> These values are not real. Update these values with the actual Identifier, Reply URL and Sign on URL. Contact [Oracle IDCS for E-Business Suite support team](https://www.oracle.com/support/advanced-customer-services/) to get these values. You can also refer to the patterns shown in the **Basic SAML Configuration** section in the Azure portal.
71
74
72
75
1. Your Oracle IDCS for E-Business Suite application expects the SAML assertions in a specific format, which requires you to add custom attribute mappings to your SAML token attributes configuration. The following screenshot shows an example for this. The default value of **Unique User Identifier** is **user.userprincipalname** but Oracle IDCS for E-Business Suite expects this to be mapped with the user's email address. For that you can use **user.mail** attribute from the list or use the appropriate attribute value based on your organization configuration.
73
76
@@ -79,11 +82,11 @@ Complete the following steps to enable Azure AD single sign-on in the Azure port
79
82
80
83
## Configure Oracle IDCS for E-Business Suite SSO
81
84
82
-
To configure single sign-on on Oracle IDCS for E-Business Suite side, you need to send the downloaded Federation Metadata XML file from Azure portal to [Oracle IDCS for E-Business Suite support team](https://www.oracle.com/support/advanced-customer-support/products/cloud.html). They set this setting to have the SAML SSO connection set properly on both sides.
85
+
To configure single sign-on on Oracle IDCS for E-Business Suite side, you need to send the downloaded Federation Metadata XML file from Azure portal to [Oracle IDCS for E-Business Suite support team](https://www.oracle.com/support/advanced-customer-services/). They set this setting to have the SAML SSO connection set properly on both sides.
83
86
84
87
### Create Oracle IDCS for E-Business Suite test user
85
88
86
-
In this section, you create a user called Britta Simon at Oracle IDCS for E-Business Suite. Work with [Oracle IDCS for E-Business Suite support team](https://www.oracle.com/support/advanced-customer-support/products/cloud.html) to add the users in the Oracle IDCS for E-Business Suite platform. Users must be created and activated before you use single sign-on.
89
+
In this section, you create a user called Britta Simon at Oracle IDCS for E-Business Suite. Work with [Oracle IDCS for E-Business Suite support team](https://www.oracle.com/support/advanced-customer-services/) to add the users in the Oracle IDCS for E-Business Suite platform. Users must be created and activated before you use single sign-on.
87
90
88
91
## Test SSO
89
92
@@ -102,4 +105,4 @@ In this section, you test your Azure AD single sign-on configuration with follow
102
105
103
106
## Next steps
104
107
105
-
Once you configure Oracle IDCS for E-Business Suite you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
108
+
Once you configure Oracle IDCS for E-Business Suite you can enforce session control, which protects exfiltration and infiltration of your organization’s sensitive data in real time. Session control extends from Conditional Access. [Learn how to enforce session control with Microsoft Cloud App Security](/cloud-app-security/proxy-deployment-aad).
0 commit comments