Add an Oracle Forms App
The purpose of this tutorial is to walk through the process of setting up an Oracle Forms application through the Access Gateway Admin Console.
- Access Gateway is installed and configured for use.
See Manage Access Gateway deployment.
- Access Gateway has been configured to use your Okta tenant as IDP.
See Configure your Okta tenant as Identity Provider for more information about configuring your Okta tenant as an IDP.
- You have administrator rights on your Okta tenant and can assign applications to users, and create groups.
- An external Oracle Access Gateway Server based application which requires protection.
- Appropriate DNS entries for both the legacy application and the exposed new URL exist.
- Appropriate DNS entries for both the protected application and the external URL for example:
Value Description https://app-forms.externalexample.com External or customer facing application URL. https://app-forms.internalexample.com
Internal or protected application URL of Oracle Forms application.
This application is part of a class of applications which exchange user information using header variables. For more information about the Access Gateway generic header application please see Add a generic header application.
Access Gatewayalso provides a sample header application. Please see Add a sample header application for more information.
Navigate to your Access Gateway Instance.
In the Access Gateway Admin UI, sign in as an administrator.
Click the Applications tab.
Click +Add to add a new application.
Select the Oracle WebLogic option from the left column menu, and click Create.
The New Protected Application wizard will start and display the Essentials pane for the application being added.
In the Essentials pane specify the following:
Field Value Label A name for the application such as "Oracle Forms" Public Domain A fully qualified host name such as <yourexteralname>.<your domain>.
In the example provided this would be app-forms.externalexample.com.
Protected Web Resource
The URL of the internal, protected, application.
In the example provided this would be app-forms.internalexample.com:<port>/<path>
- port - the port Oracle Forms is listening on for http requests.
- path - represents the path to the application.
Group Enter the group containing the users who should have access to the application.
Post Login URL
Enter or modify the post login URL. By default this field is enabled and contains value:
Description [optional] An appropriate description for your application.
The Attributes page provides a list of attributes that will be
passed into the application as header fields.
Use the edit () to modify the name and other values associated with this attribute as required.
Add or modify any required attributes, and click Next.
For more information on the attribute options, see Application attributes.
The Policies pane appears.
- Leave all policies unchanged and click Done.
For more information on Application policies see About application policy and Manage application policy .
The following steps assign the application to a test account and then execute the application to verify basic functionality.
Assign the application
Login to your Okta tenant as administrator.
Select Application > Applications.
Click the name of the newly added header application.
Select the Assignments tab.
Select Assign > Assign To People.
Select an appropriate user and click Assign.
Testing is typically initially done using the same user who is associated with administering Access Gateway
Execute the Application
Return to the Access Gateway admin console.
On the row representing the newly added app, select one of Goto application > IDP Initiated or Goto application > SP Initiated.
- Verify the resulting page displays as expected.
- Close the results page.
- For information about the generic header application please see Add a generic header application.
- For information about the sample header application please see Add a sample header application.
- For information on the sample policy application please see Add a sample policy application.
- Add or review application essential settings. For more details see About application essentials and Manage application essentials.
- Add application behaviors. For details and examples of behaviors see About application behaviors.
- Add fine grained policy to further protect resources. An overview of user policy can be found in About application policy.
For details and examples of policy see Manage application policy .
- Extend existing policy using Custom configuration, see Advanced Access Gateway Policy.
- Define one or more certificates for use with this application. See Configure certificates.
- Add supplemental database or LDAP based data stores. For more information see Administer data stores.