End To End Steps To Configure IDCS SSO (SAML) for OAS Using OHS + Shibboleth
(Doc ID 3061598.1)
Last updated on DECEMBER 20, 2024
Applies to:
Oracle Analytics Server - Version 2022 (6.4) and laterInformation in this document applies to any platform.
Goal
This document provides comprehensive steps to be followed to implement IDCS SAML SSO for OAS using OHS + Shiboleth
This document is based on the solution provided by the CEAL team in the blog
https://blogs.oracle.com/analytics/post/oas-saml-sso-ohs-shibd-sp
In this implementation we use IDCS as Identity Provide (IdP) and OHS + Shiboleth as Service Provider ( SP )
Following architecture is taken into consideration for this use case.
Please note that the same steps can be used to implement when OHS+Shiboleth and OAS are on On-Premise network.
Ensure OHS instance has access to the Internet ( if public IDCS ) or Fast Connect/VPN if the IDCS is in Private network.
Solution
To view full details, sign in with your My Oracle Support account. |
|
Don't have a My Oracle Support account? Click to get started! |
In this Document
Goal |
Solution |
1. Prerequisites |
1. Ensure IDCS and OAS end point are reachable from OHS host. |
2. Ensure OAS 6.4+ Instance in working status. |
3. Collect SSL Certificates for the DV URL |
4. Setup oracle user on Linux 8 |
2. Download Required Software Binaries |
3. Create SAML application in IDCS for the OHS + Shibboleth Service Provider |
4. Run Automated Scripts |
5. Configure IDCS Integrator in WebLogic Server |
6. Create Load Balancer |
6. Configure DNS A-Record for the OAS Load Loadbalancer. |
7. Test SSO Login |