Update: March 5, 2018

Introduction

This is the first of several labs that are part of the Oracle Public Cloud Security and Management workshop.

First it will walk you through the steps necessary to request an Oracle Cloud Trial account as well as some of the services which will be required for lab exercises which follow.

Then it will walk you through the various capabilities of Oracle Identity Cloud Service.

Objectives

Oracle Cloud - Navigate

IDCS - overview

(Optional) IDCS - advanced

Pre-requisites

Request your free Promotional Account ($300 credit)

Proceed as indicated below to request your free Oracle Cloud account. This account comes with $300 credit to try out any cloud service and will be used primarily for the use cases defined in the workshop.

While your credit card is required to sign up, keep in mind that you won’t be charged unless you explicitly decide to extend the services after your $300 credit is fully used.

Go to https://cloud.oracle.com/tryit

After about 15 minutes your account will be provisioned and you will receive a welcome email with details on the next steps

Login to your Oracle Cloud Account

Arrange services on dashboard


IDCS - overview


Access IDCS Admin Console - (Persona: Administrator)

Create User - (Persona: Administrator)

IDCS supports user (also groups) on-boarding from on-premise Active Directory, using file upload, REST API, on-premise Oracle Identity Management solution, or manually from IDCS admin console.

For the exercise we will be manually creating a user from admin console.

Configure multi-factor authentication - (Persona: Administrator)

When a user signs in to an application, they are prompted for their user name and password, which is the first factor – something that they know. With Multi Factor Authentication (MFA) enabled in Oracle Identity Cloud Service, the user is then required to provide a second type of verification. This is called 2-Step Verification.

The two factors work together to add an additional layer of security by using either additional information or a second device to verify the user’s identity and complete the login process.

Activate account - (Persona: End-User)

For end-user flow, use either a separate browser or an incognito/ private browser session. This will ensure that administrator and user sessions are not mixed up.

Enroll in multi-factor authentication - (Persona: End-User)

Integration with Oracle Cloud Services


(Optional) IDCS - advanced


Onboard Users - (Persona: Administrator)

IDCS supports user (also groups) on-boarding from on-premise Active Directory, using file upload, REST API, on-premise Oracle Identity Management solution, or manually from IDCS admin console.

For the exercise we will be using file upload option for users.

STEP 0: Obtain upload CSV file

STEP 1: Navigate to IDCS User Management

STEP 2: Import users in IDCS

STEP 3: Verify user creation

Configure SSO for an app - (Persona: Administrator)

Oracle Identity Cloud Service(IDCS) provides integration with any service that can be integrated via SAML (Security Access Markup Language) protocol. Administrations will be able to manage users into various applications via single control panel and end users will be able to get to applications via single click.

IDCS provides support for standard SAML 2.0 browser POST login & logout profiles.

In this hands-on exercise, we will setup integration with Salesforce using SAML. IDCS will act as IdP (Identity Provider) and Salesforce org as SP (Service Provider also known as a Relying Party)

https://idcs-xxxxxx.identity.oraclecloud.com/fed/v1/metadata
where idcs-xxxxxx is your IDCS tenant name that you can grab from the browser URL of your IDCS console. Copy-paste the constructed URL on a new browser tab and save the XML file locally.

Following activities on Salesforce is optional. Email the metadata XML to your proctor.

Domain Name : demoidaas-dev-ed
Organization ID : 00D1N000002M18V

Congratulations, you successfully added and activated an application in IDCS.

Grant app to group - (Persona: Administrator)

Request group - (Persona: End-User)

Verify SSO - (Persona: End-User)