Add an Oracle Access Gate Application

The purpose of this tutorial is to step through the process of setting up an Oracle Access Gate application through the Access Gateway Admin UI console.

Access Gate Architecture

Before you begin

Ensure that:

  • Access Gateway is installed and configured for use.
    See Manage Access Gateway deployment.
  • Access Gateway has been configured to use your Okta tenant as IDP.
    See Configure your Okta tenant as an Identity Provider for more information about configuring your Okta tenant as an IDP.
  • You have administrator rights on your Okta tenant and can assign applications to users and create groups.
  • An external Oracle Access Gate application that requires protection.
  • The external app version is supported. Oracle Access Gate supported versions include:
    • v10g or later
  • Appropriate DNS entries for both the legacy application and the exposed new URL exist.
  • Appropriate DNS entries for both the protected application and the external URL exist. For example:
    ValueDescription
    https://access-gate.externalexample.comExternal or customer facing application URL.
    https://access-gate.internalexample.com

    Internal or protected application URL of Oracle EBS Access Gate.

  • Access information for the OID instance is available, including:
    ValueDescription
    Name of OID HostThe resolvable name of the machine hosting OID.
    OID Port

    OID Port

    Bind Name/password

    The binding name and password on the OID host.

    CN
    cn=Users,dc=domain,dc=com

    User search attribute and base.

 

Tip

Tip

This application is part of a class of applications which exchange user information using header variables. See Add a generic header application for more information about the Access Gateway generic header application.

Access Gateway also provides a sample header application. See Add a sample header application.

Create the application in Access Gateway

  1. Sign in to the Access Gateway Admin UI console.
  2. Click the Applications tab.

  3. Click +Add to add a new application.

  4. Select the Oracle Access Gate option from the application menu, and click Create.

    Select header based and click create.

    The New Protected Application wizard starts and displays the Essentials pane for the application being added.

  5. In the Essentials pane specify the following:

    Field Value
    Label A name for the application.
    Public Domain A fully qualified host name such as <yourexternalname>.<your domain>.
    In the example provided, this would be access-gate.externalexample.com.
    Protected Web Resource

    The URL of the internal, protected, application.
    In the example provided, this would be access-gate.internalexample.com:<port>/<path>
    Where:

    • port - the port Oracle Access Gate is listening on for HTTP requests.
    • path - represents the path to the application.
    Group Enter the group containing the users who should have access to the application.

    Post Login URL

    Enter or modify the Post Login URL. By default this field is enabled and contains value:
    access-gateexternalexample.com/OA_HTML/AppsLogin.

    Description Optional. An appropriate description for your application.
  6. Important Note

    Important

    While optional, Okta recommends that all applications include certificates.
    See About Access Gateway Certificates for general information about certificate.
    See Certificate management tasks for a general task flow for obtaining and assigning certificates.  

  7. Expand the Certificates tab.
    Note

    Note

    By default a wild card self signed certificate is created and assigned to the application when the application is initially created.

  8. Optional. Click Generate self-signed certificate

    A self-signed certificate is created and automatically assigned to the application.
  9. Optional. Select an existing certificate from the list of provided certificates.
    Use the Search field to narrow the set of certificates by common name.
    Use the page forward (>)and backward(<) arrows to navigate through the list of available certificates.

  10. Click Next. The Attributes pane appears.
  11. The Applications page provides a list settings particular to Oracle Access Gate.
    Confirm the following fields and click Validate.
    FieldValue
    OID DatasourceEnabled.  For more information on data sources see Administer data stores
    OID HostFully qualified host name of the OID Host.
    Default ebs-iam.internalhost.com.
    OID PortThe port used to connect to the OID host.
    Defaults 3060.
    Bind UserThe user use for OID access.
    Defaults cn=oracleuser.
    Bind User PasswordPassword for Bind User.
    BaseUser search base
    Default cn=Users,dc=domain,dc=com

    User Search Attribute

    Attribute to search OID using.
    Default CN.

    Matching Attribute

    Attribute used for matching in the attributes step.
    Default: USER_NAME.

  12. Click Next when complete.
  13. The Attributes page provides a list of attributes that are passed into the application as header fields.
    Datasource

    Value

    NAME
    idp

    email

    USER_NAME
    oid

    orclguid

    USER_ORCLGUID
  14. Use the pencil icon to edit the name and other values associated with this attribute as required.
    Add or modify any required attributes. See Application attributes for more information on the attribute options.
  15. Click Next. The Policies pane appears.
  16. Leave all policies unchanged and click Done.
    See Managing Application Policy for more information on application policies.

Test the application

The following steps assign the application to a test account and then execute the application to verify basic functionality.

Assign the application

  1. Sign in to your Okta tenant as administrator.

  2. In the Admin Console, go to Applications > Applications.

  3. Click the name of the newly added header application.

  4. Select the Assignments tab.

  5. Select Assign > Assign To People.

  6. Select an appropriate user and click Assign.

    Info

    Note

    Testing is typically initially done using the same user who is associated with administering Access Gateway

  7. Click Done.

Execute the Application

  1. Return to the Access Gateway Admin UI console.

  2. On the row representing the newly added app, select one of Goto application > IDP Initiated or Goto application > SP Initiated.

  3. Verify the resulting page displays as expected.
  4. Close the results page.

Related topics