Hello there!

Need Help? We are right here!

miniOrange Email Support
success

Thanks for your inquiry.

If you dont hear from us within 24 hours, please feel free to send a follow up email to info@xecurify.com

Oracle EBS OneLogin SSO Integration


Oracle E-Business Suite is a major product line of Oracle Corporation. Oracle EBS is a combined set of business applications for automating customer relationship management (CRM), Enterprise Resource Planning (ERP) and Supply Chain Management (SCM) which helps in automating the processes within organizations.

"miniOrange SSO connector enables the Single Sign-On (SSO) between Oracle EBS and OneLogin without the need to purchase and install Oracle Access Manager (OAM) and Oracle Internet Directory (OID) license."

Oracle EBS OneLogin SSO integration is enabled with the help of miniOrange SSO Connector. This integration involves registering the miniOrange connector as a SAML Service Provider (SP) in OneLogin, and OneLogin as a SAML Identity Provider (IdP) in the miniOrange connector. The authentication flow works like this: when a user tries to login into Oracle EBS, the authentication is delegated to miniOrange, which redirects the user to OneLogin for Single Sign On Login. Upon successful authentication, the user is granted access to Oracle EBS. Oracle EBS can also be protected with OneLogin Multi-Factor. Oracle EBS URL can be added to OneLogin Applications Dashboard by OneLogin Admin, and users can launch it like any other OneLogin Application. miniOrange SSO connector can enable OneLogin SSO for the following supported Oracle EBS versions - R12 and R12.2 and it can also enable Oracle EBS integrations such as OBIEE, Hyperion/EPM Suite, ADF Applications, WebCenter and Agile. miniOrange SSO Connector can also enable OneLogin Cloud SSO for other Oracle Products as well such as Peoplesoft, Siebel and JD Edwards.



Oracle EBS OneLogin SSO Authentication Flow with miniOrange Oracle EBS Solution:


Oracle EBS(E-Business Suite) OneLogin SSO Authentication

1. The User sends the request to access the Oracle E-Business Suite.

2. Oracle EBS redirects the request to the miniOrange SSO Connector for authentication.

3. The miniOrange SSO Connector redirects the user to OneLogin for authentication.

4. The user is prompted for their OneLogin credentials, and is authenticated upon a successful response.

5. The connector receives the user’s Oracle EBS registered username/email from OneLogin via SAML attributes.

6. The connector checks the value of the username/email received from OneLogin against the FND_USER table in the Oracle EBS Database & creates a session for them.

7. Upon successfully creating a session, user is redirected to the Oracle E-Business Suite portal as logged-in user



Connect with External Source of Users


miniOrange provides user authentication from various external sources, which can be Directories (like ADFS, Microsoft Active Directory, Azure AD, OpenLDAP, Google, AWS Cognito etc), Identity Providers (like Shibboleth, Ping, Okta, OneLogin, KeyCloak), Databases (like MySQL, Maria DB, PostgreSQL) and many more.



Follow the step-by-step Guide given below for Oracle E-Business Single Sign-On (SSO) with OneLogin

1. Configure miniOrange Broker Agent as a SAML Service Provider in OneLogin

  • Log in to OneLogin.
  • Go to Apps >> Company Apps >> Add Apps from the Navbar.
  • In the search box, type SAML Test Connector and click on the App to add it.
  • OneLogin SSO Add App

  • Enter the display name and click on Save.
  • Click on the Configuration Tab.
  • For Basic SAML configuration you need to get the Entity ID, ACS URL Validator, ACS URL and Single Logout URL from miniOrange.
  • Go to miniOrange Dashboard in the left navigation menu. Click on Add External IdP.
  • onelogin sso add external IDP

  • Now click on the Click here link to get miniorange metadata as shown in Screen below.
  • onelogin sso get miniorange metadata

  • For SP -INITIATED SSO section Select Show Metadata Details.
  • onelogin sso SP intiated Metadata

  • Enter the values in the SAML configuration as shown in below screen.
  • Audience (EntityID) Entity ID or Issuer
    ACS (Consumer) URL Validator ACS URL
    Single Logout URL Single Logout URL
    Sign on URL (optional required during IDP-initiated SSO) Show SSO Link from Step 4

  • You can view or edit the claims sent in the SAML token to the application under the Parameters tab.

  • onelogin sso-claims

  • Go to the SSO Tab. Click on the More Actions button and download the SAML metadata. This will be used while configuring Onelogin as IDP in Step 2.

  • onelogin sso-metadata

2.Configure OneLogin as a SAML Identity Provider in the miniOrange Broker Agent

  • Go to miniOrange Admin Console.
  • From the left navigation bar select Identity Provider.
  • onelogin add-identity-provider
  • Select SAML. Click on Import IDP metadata.
  •  import idp metadata
  • Enter IDP name and and browse for the file downloaded in step 1. Click on Import.
  • If you don't have metadata file, you can also provide the details manually. You need to configure following endpoints:
  • IDP Entity ID Entity ID of IDP
    Single Login URL Login Url from IDP
    Single Logout URL Logout Url from IDP
    X.509 Certificate The public key certificate of your IDP.
  • Few other optional features that can be configured to the Identity Provider(IDP) are listed in the table below:
  • Domain Mapping Can be used to redirect specific domain user to specific IDP
    Show IdP to Users Enable this if you want to show this IDP to all users during Login
    Send Configured Attributes Enabling this would allow you to add attributes to be sent from IDP
  • Click on Save.

3. Configure miniOrange Broker Agent in miniOrange EBS Connector

  • Add the miniOrange EBS SSO Connector as an OpenID Connect application in the Broker Agent
  • Log in as a customer from the Admin Console.
  • Go to Apps. Click Add Application button at right corner of your screen.
  • SAML configure app

  • In Choose Application Type click on Create App button in OAUTH/OIDC application type.
  •  Oracle EBS onelogin SSO : Choose Application type

  • Click on the 'OAuth2/OpenID Connect’ App Type
  • Oracle EBS onelogin SSO : Select Oauth/OpenID

  • Enter the Redirect URL for the miniOrange EBS SSO Connector. For example, https://ebsauth.example.com/ebsauth/redirect
  • Select the Group Name from dropdown & enter Policy Name (Optional).
  • Select Password as your login method. You can also opt for 2-factor authentication.
  • Scroll down and click on the “Save Button”.
  • Oracle EBS onelogin SSO : Submit Configuration Details

  • The miniOrange EBS SSO Connector is now successfully configured with the Broker Agent.
  • You can edit Application by using the following steps:

  • Go to Apps.
  • Search for your app and Click on the edit in action menu against your app.


  • Note down Client id and Client secret, you will need this info for configuring the miniOrange EBS SSO connector.
  • Get Client ID and Secret for Oracle EBS onelogin SSO

  • Open the miniOrange EBS SSO Connector connector.properties file located under /webapps/ebsauth/WEB-INF/classes for editing.
  • Set the miniorange.base.url property to the base URL of your miniOrange tenant. For Cloud version, this is the base URL: https://.xecurify.com/moas For On-Premise version, this is the base URL: https://fqdn-of-onpremise-server
  • Set the customer.id property to the customer ID of your Broker Agent (found under product settings).
  • Set the 'authentication.source' and property to ‘external’.
  • Set the value of the redirect.uri property to the FQDN of your EBS connector, with /redirect appended to it For example, https://ebsauth.example.com/ebsauth/redirect
  • Set the client.id & client.secret properties to the values from the miniOrange Broker Agent OIDC application
  • Set the value of the identity.attribute property to either ‘username’ or ‘email’, depending on whether you want to log into Oracle EBS using your EBS username or your EBS email. Note that email should be unique in Oracle EBS in case you set this property to ‘email’.
  • Set the value of the username.attribute & email.attribute to the name of the attributes sent from OneLogin, that contain the user’s Oracle EBS username & email respectively. Leave email.attribute blank in case you set the identity.attribute property to ‘username’
  • miniOrange Broker Agent is now configured with the miniOrange EBS SSO connector.

4. Configure Oracle EBS with miniOrange SSO Connector

  • Set aside a sub-domain for the miniOrange EBS SSO connector on the same domain as the EBS installation. For example, if the EBS installation has the FQDN apps.example.com, then miniOrange EBS SSO connector could be installed on the sub-domain ebsauth.example.com.
    • Create a new user, and assign them the role with code: UMX|APPS_SCHEMA_CONNECT. Make a note of the credentials for this user.
    • Navigate to Functional Administrator → Core Services → Profiles, and make the following changes:
      • Search for the Profile with code APPS_SSO; change its site value from SSWA to SSWA w/SSO.
      • Search for the Profile with the code APPS_AUTH_AGENT; change its site value to the full URL (FQDN) of the miniOrange EBS SSO connector (e.g. http://ebsauth.example.com/ebsauth).
      • Search for the Profile with the name Oracle Applications Session Cookie Domain; change its value from Host to Domain.
    • Bounce the Application Tier of the E-Business Suite to reflect the changes.
  • Generate a DBC file with the miniOrange EBS SSO connector domain (e.g. ebsauth.example.com) using the AdminDesktop utility in EBS; make a note of the APPL_SERVER_ID value present in this newly generated file.
  • Update the connector.properties file in your miniOrange EBS SSO connector to reflect the credentials for the user created, the path of the DBC file & the APPL_SERVER_ID and the endpoint URLs from the above points.

References

Our Other Identity & Access Management Products