This repository has been archived on 2024-05-31. You can view files and clone it, but cannot push or open issues or pull requests.
authentik/website/integrations/services/oracle-cloud/index.md

2.1 KiB

title
Oracle Cloud

Support level: Community

What is Oracle Cloud

From https://www.oracle.com/cloud/

:::note Oracle Cloud is the first public cloud built from the ground up to be a better cloud for every application. By rethinking core engineering and systems design for cloud computing, we created innovations that accelerate migrations, deliver better reliability and performance for all applications, and offer the complete services customers need to build innovative cloud applications. :::

Preparation

The following placeholders will be used:

  • authentik.company is the FQDN of authentik.

Step 1 - authentik

In authentik, under Providers, create an OAuth2/OpenID Provider with these settings:

:::note Only settings that have been modified from default have been listed. :::

Protocol Settings

  • Name: Oracle Cloud
  • Client ID: Copy and Save this for Later
  • Client Secret: Copy and Save this for later
  • Signing Key: Select any available key

Create an application which uses this provider. Optionally apply access restrictions to the application using policy bindings.

  • Name: Oracle Cloud
  • Slug: oracle-cloud
  • Provider: Oracle Cloud

Step 2 - Oracle Cloud

In Oracle Cloud, open the top-left navigation and go to Identity & Security and then Domains. Click on the domain of your choice. Click on Security in the sidebar, then on Identity providers.

Create a new Social IdP via the Add IdP button. Set the name to authentik and fill in the client ID and secret from above.

Set the Discovery service URL to https://authentik.company/application/o/oracle-cloud/.well-known/openid-configuration and save the IdP. The IdP has now been created but must be enabled before it can be used to login with.

Navigate to IdP Policies in the sidebar and open the default policy by clicking on it. Edit the first rule within the policy. Add authentik under Assign identity providers. Here you can optionally also remove username-based logins, however it is recommended to not remove the option until you've verified SSO works.