Add an Oracle PeopleSoft app

The purpose of this guide is to walk through the process of setting up an Oracle PeopleSoft application with Okta through the Access Gateway Admin UI console.

PeopleSoft Architecture

Access Gateway works with all major PeopleSoft modules including:

  • CRM: /crm/*

  • HCM: /hcm/*

  • Learning: /elm/*

  • Financial: /fscm/*

  • Campus: /camp/*

Ensure you use the correct path for your specific module.




This application is part of a class of applications which exchange user information using header variables. See Add a generic header application for more information about the Access Gateway generic header application.

Access Gateway also provides a sample header application. See Add a sample header application.

Before you begin

Ensure that:

  • Access Gateway is installed and configured for use.
    See Manage Access Gateway deployment.
  • Access Gateway has been configured to use your Okta tenant as IDP.
    See Configure your Okta tenant as an Identity Provider for more information about configuring your Okta tenant as an IDP.
  • You have administrator rights on your Okta tenant and can assign applications to users and create groups.
  • You have access to the PeopleTools desktop client.
  • You have access to the PeopleSoft web portal and can access it as super user.
  • Confirm that the external app version is supported. Oracle Peoplesoft supported versions include:
    • v9.2.00 or later.


  1. Configure PeopleCode using the PeopleTools desktop client
  2. Configure PeopleSoft using the PeopleSoft web portal
  3. Create the application in Access Gateway
  4. Configure the PeopleSoft application
  5. Test the PeopleSoft application


The PeopleSoft admin and Access Gateway admin tasks can and should be performed in parallel. The following general ordering is recomended.

  1. Create PUBUSER.
  2. Activate people code.
  3. Configure the PeopleSoft gateway.
  4. Update the PeopleSoft virtual addressing field.
  5. Restarting PeopleSoft

Configure PeopleCode using the PeopleTools desktop client

Peoplesoft deployments typically support a pre-provided Sign-on Peoplecode.
In this section, we update the code to accept header-based authentication from the PS_USER header.
These steps are typically performed by the PeopleSoft admin.

  1. Open the PeopleTools application Designer.
  2. Click File > Open > Definition: Record > Name: FUNCLIB_LDAP.


  4. Right-click Open > Cancel

  5. Right-click LDAPAUTH > View PeopleCode

  6. Search for the getWWWAuthConfig() function.
    Change &defaultUserId = ""; to &defaultUserId = "PUBUSER";.

  7. Search for the OAMSSO_AUTHENTICATION() function.

  8. Change the header value from OAM_REMOTE_USER to PS_USER.
  9. Click File > Save.

Configure PeopleSoft using the PeopleSoft web portal

  1. Navigate to the PeopleSoft Web Portal and sign in as the PeopleSoft super user.

  2. From the main menu, select PeopleTools > Security > Security Objects > Signon PeopleCode > [+] button.

  3. Select the Signon PeopleCode page.

  4. Enable the OAMSSO_AUTHENTICATION function, and click Save.

  5. Add a default user profile to PeopleSoft:

    1. From the main menu, navigate to PeopleTools > Security > User Profiles > User Profiles > Add a New Value.

    2. Select the General tab.

    3. Create user: PUBUSER. Enter a password.
    4. Select the ID Tab.

    5. Set ID type as none.

    6. Click Save.

  6. Configure the web profile:

    1. From the main menu, navigate to PeopleTools > Web Profile > Web Profile Configuration > Search > PROD > Security.



      If the Public Users section is populated, note the User ID.

    2. Set the following fields:


      Field Value
      Main PIA Use HTTP Same Server Unselected.
      Public Users User ID PUBUSER
      Note: This field must match the attribute used when creating the Access Gateway.
      Public Users Password Matching previously created user
      Public Users Allow Public Access Checked
    3. Click Save.

  7. Set default proxy address:

    1. From the Main Menu navigate to PeopleTools > Web Profile > Web Profile Configuration > Search > PROD > Virtual Addressing.

    2. Set the following fields:


      Field Value
      Default Addressing Protocol https
      Default Addressing Name FQDN of the Access Gateway PeopleSoft app public domain
      For example: ps-external.<>.
      Default Addressing Port 443
      Public Users Allow Public Access Checked
    3. Click Save.

  8. Restart PeopleSoft.

Create the application in Access Gateway

  1. Sign in to the Access Gateway Admin UI console.
  2. Click the Applications tab.

  3. Click +Add to add a new application.

  4. Select Oracle PeopleSoft from the left column menu, and upper right-click Create.

Configure the PeopleSoft application

To configure the Access Gateway PeopleSoft application.

  1. In the Essentials pane enter:
    LabelThe name of the application, as shown in your Okta tenant.
    For example:PeopleSoft SSO.
    Public DomainThe customer facing URL of the PeopleSoft application.
    For example: https://ps-external.<>


    <> must match the PeopleSoft domain, which is in the Protected Web Resource section as domain.tld.

    Protected Web ResourceThe URL and port combination of the Oracle PeopleSoft Implementation being protected.
    For example: http://psft-app.<domain.tld>:8000
    Post Login URLBrowseable route-through location to pick up the required cookie from Okta Access Gateway and pass along to the Oracle PeopleSoft implementation.
    For example https://ps-external.<>/psp/ps/.
    Note that the post login URL is automatically populated and can contain other elements specific to the implementation.
    GroupThe group containing users who can access the PeopleSoft instance.
  2. Expand Advanced section and click enable Content Rewrite.

  3. Important Note


    While optional, Okta recommends that all applications include certificates.
    See About Access Gateway certificates for general information about certificate.
    See Certificate management tasks for a general task flow for obtaining and assigning certificates.  

  4. Expand the Certificates tab.


    By default a wild card self signed certificate is created and assigned to the application when the application is initially created.

  5. Optional. Click Generate self-signed certificate

    A self-signed certificate is created and automatically assigned to the application.
  6. Optional. Select an existing certificate from the list of provided certificates.
    Use the Search field to narrow the set of certificates by common name.
    Use the page forward (>)and backward(<) arrows to navigate through the list of available certificates.

  7. Click Next. The Attributes pane appears. See Application attributes.



    The required attributes are pre-populated, and are presented for reference.

  8. In the Attributes pane, click Add Add attribute(plus) icon..

  9. Verify the login attribute:

    Data Source Field Type Name




    The attribute in your Okta tenant that stores the PeopleSoft username. This can be a different attribute or can use Okta username mapping to create the PeopleSoft username dynamically.

    Header PUBUSER
    1. Click the (+) icon
    2. From the Data Source drop-down box, select Static.

    3. From the Field drop-down box, select login.

    4. From the Type drop-down box,select the appropriate target type, either Header or Cookie.

    5. In the Name field, enter the associated name.

    6. Click Okay when the attribute is complete.

    7. Repeat to create any additional attributes.

    8. Click Done when complete.

Test the PeopleSoft application

  1. Select Goto application > IDP Initiated.
    Test the application



    If you are using an SP initiated test, you will need to test from another browser tab and not from the SP Initiated option.
    PeopleSoft requires a landing page for SSO to function correctly. IDP initiated handles this by sending the Post Login URL, SP Initiated does not.



    Your Okta tenant administrator may need to assign the application to you.

    In addition, if you do not already have an active session for Okta open in your browser, you may be prompted to log in to your Okta account and provide credentials.

  2. Verify that you are signed in to Oracle PeopleSoft correctly.

Related topics