SAML Configuration Using IPD
SAML Configuration Using IPD
PowerView is Off Switch to Cloud Support Syed (Available) (0) Contact Us Help
OBIEE 12c : How To Configure SAML SSO on OBIEE 12c With OKTA Identity Provider (IdP) (Doc ID 2348673.1) To Bottom
Purpose Yes
No
Scope
Details
Document Details
1. Prerequisites
1.1 OKTA Prerequisites
Type:
BULLETIN
1.2 OBIEE 12c Prerequisites Status:
PUBLISHED
2. Configuring BI Domain as a Partner (SP) with OKTA (IdP) Last Major
25-Apr-2019
Update:
3. Configuring BI Domain for SAML Authentication 18-Oct-2019
Last Update:
3.1 Adding OKTA as an Identity Provider Partner
3.2 Configuring managed server ( bi_server1 ) as Service Provider Related Products
4. Enable Analytics Application for SSO Business Intelligence Suite
4.1 Update analytics.ear to include required security role Enterprise Edition
Recently Viewed
APPLIES TO: OBIEE 12c: How to
Configure SAML 2.0 SSO on
Business Intelligence Suite Enterprise Edition - Version 12.2.1.2.0 and later OBIEE 12c using ADFS -
Single Node [2248571.1]
Information in this document applies to any platform.
OBIEE 12c : How To
Configure SAML SSO on
PURPOSE OBIEE 12c With OKTA
Identity Provider (IdP)
[2348673.1]
The main purpose of the document is to provide the configuration steps to implement Security Assertion Markup Language OBIEE 12c : How To
(SAML) 2.0 Web Single Sign On (SSO) for OBIEE 12c using OKTA as Identity Provider (IdP). If you encounter issues while Configure SAML SSO on
implementing these steps, then they are not necessarily handled by OBIEE product support group. Based the issue, the OBIEE 12c With OKTA
appropriate support team (e.g. - OKTA IdP, HTTP Server, Loadbalancer, webLogic or OBI team may need to be engaged. Identity Provider (IdP)
[2348673.1]
This is a Service Provider (SP) Initiated SSO which means the user directly access the Analytics SP URL that gets re-directed to OBIEE 12c: How to Setup
OKTA for Authentication. SAML 2.0 SSO on OBIEE 12c
using ADFS In A Cluster
Environment [2258128.1]
SCOPE OBIEE 12c: How to
Configure SAML 2.0 SSO on
OBIEE 12c using ADFS -
This document is informational and intended for Administrators and Advanced Users.This document covers very basic and Single Node [2248571.1]
typical SAML 2.0 implementation steps for OBIEE 12c. Show More
This document does not cover all the implementation scenarios.
This document is intended as a "cookbooK" enhancement to the documentation to fill in any gaps, missing or ambiguous
information and to tie multiple documentation together in one location. It is not meant to replace the official
documentation.
The server names , locations and passwords used in this document are for example, should not be copy and paste.
This document does not cover OBIEE Installation and SSL Configuration for OBIEE.
This document assumes having administration login to OKTA.
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=433804686376781&id=2348673.1&_afrWindowMode=0&_adf.ctrl-state=186asq… 1/15
12/26/2019 Document 2348673.1
DETAILS
1. Prerequisites
Configure all the required alternative Authentication and Authorization providers and SSL prior configuring SAML SSO.
Click on Applications
Provide App Name and Optionally change the Logo for the application.
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=433804686376781&id=2348673.1&_afrWindowMode=0&_adf.ctrl-state=186asq… 3/15
12/26/2019 Document 2348673.1
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=433804686376781&id=2348673.1&_afrWindowMode=0&_adf.ctrl-state=186asq… 4/15
12/26/2019 Document 2348673.1
With this step, you have successfully added the OBIEE Analytics as a Partner application to OKTA.
Next, you need to export the metadata and save into a file , Ex: okta_idp_metadata.xml
Click on DefaultAuthenticator
Change "Control Flag" to "SUFFICIENT"
Click Save
Activate Changes
Restart the services
$DOMAIN_HOME/bitools/bin/stop.sh
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=433804686376781&id=2348673.1&_afrWindowMode=0&_adf.ctrl-state=186asq… 6/15
12/26/2019 Document 2348673.1
$DOMAIN_HOME/bitools/bin/start.sh
Copy the OKTA IdP metadata file ( okta_idp_metadata.xml ) to OBIEE Server machine, ensure that user has read and
write permissions on the file.
Login to WebLogic Console as an Administrator User
Click on Lock & Edit
Security Realms -> myrealm -> Providers
Click on Newly Created SAML Asserter
Click on Management
Click New for "Identity Provider Partner"
Select "New Web Single Sign-On Identiry Provider Partner"
Provider name for the IdP partner , Ex: WebSSO-IdP-Partner-0
Select the IdP metadata file for import.
Click Save
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=433804686376781&id=2348673.1&_afrWindowMode=0&_adf.ctrl-state=186asq… 7/15
12/26/2019 Document 2348673.1
If you have a cluster of Managed Servers, this should be the externally visible entry point to all Managed Servers in the
cluster. i.e. the url exposed via a web server (load balancer)in front of the Managed Servers.
like : https://loadbalancer_host/saml2
Ensure the value for Entity ID is same as the one provided in the Application Configuration in OKTA for Audience URI (SP
Entity ID)
Click Save
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=433804686376781&id=2348673.1&_afrWindowMode=0&_adf.ctrl-state=186asq… 8/15
12/26/2019 Document 2348673.1
Click on Servers -> bi_server1 -> Configuration -> Federation Services -> SAML 2.0 Service Provider
Check "Enabled"
Check "POST Binding Enabled"
Check "Artifact Binding Enabled"
Preferred Binding : POST
Default URL : URL for Analytics ( http://obiee_host:port/analytics )
Click Save.
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=433804686376781&id=2348673.1&_afrWindowMode=0&_adf.ctrl-state=186asq… 9/15
12/26/2019 Document 2348673.1
$cd /refresh/home/oracle/12c/Oracle_Home/bi/bifoundation/jee/
$mkdir analytics_test
$cd analytics_test/
$ls -lrt
-rw-r----- 1 oracle oracle 92147154 Mar 28 02:35 analytics.ear
$ls -lrt
-rw-rw-r-- 1 oracle oracle 96878571 Sep 23 2016 analytics.war
-rw-r----- 1 oracle oracle 92147154 Mar 28 02:35 analytics.ear
$cd /refresh/home/oracle/12c/Oracle_Home/bi/bifoundation/jee/analytics_temp/WEB-INF
$vi web.xml
look for
<login-config>
<auth-method>CLIENT-CERT</auth-method>
</login-config>
<security-constraint>
<web-resource-collection>
<web-resource-name>BI Analytics</web-resource-name>
<url-pattern>/*</url-pattern>
</web-resource-collection>
<auth-constraint>
<role-name>SSORole</role-name>
</auth-constraint>
</security-constraint>
<login-config>
<auth-method>CLIENT-CERT</auth-method>
</login-config>
<security-role>
<role-name>SSORole</role-name>
</security-role>
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=433804686376781&id=2348673.1&_afrWindowMode=0&_adf.ctrl-state=186as… 10/15
12/26/2019 Document 2348673.1
$cd /refresh/home/oracle/12c/Oracle_Home/bi/bifoundation/jee/analytics_temp/WEB-INF
$vi weblogic.xml
<session-descriptor>
<cookie-path>/</cookie-path>
</session-descriptor>
<security-role-assignment>
<role-name>SSORole</role-name>
<principal-name>BIUsers</principal-name>
<principal-name>BIAdmins</principal-name>
</security-role-assignment>
</weblogic-web-app>
$cd /refresh/home/oracle/12c/Oracle_Home/bi/bifoundation/jee/analytics_temp
$ ls -lrt
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=433804686376781&id=2348673.1&_afrWindowMode=0&_adf.ctrl-state=186as… 11/15
12/26/2019 Document 2348673.1
5. Enable SSO in EM
6. Setup Authorization
In order to access Analytics application, the Authenticated user should be a member of the any one of the groups defined in
weblogic.xml file
BIUsers
BIAdmins
In order to test the SSO Integration , here we are creating BIAdmins, BIUsers groups and the OKTA admin user in default LDAP.
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=433804686376781&id=2348673.1&_afrWindowMode=0&_adf.ctrl-state=186as… 12/15
12/26/2019 Document 2348673.1
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=433804686376781&id=2348673.1&_afrWindowMode=0&_adf.ctrl-state=186as… 13/15
12/26/2019 Document 2348673.1
$DOMAIN_HOME/bitools/bin
$./stop.sh
$./start.sh
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=433804686376781&id=2348673.1&_afrWindowMode=0&_adf.ctrl-state=186as… 14/15
12/26/2019 Document 2348673.1
9. Basic Troubleshooting
This section assumes that all the above steps are completed without any mistakes.
We are not covering the issues that are caused due to the misconfiguration.
You may face below issues even if you have competed all the steps correctly
As per the bug WebLogic 12.2.1+ onwards, saml2 servlet would not be deployed on bi_cluster if virtual host was defined within
weblogic domain.
By default OBIEE 12c domain has a virtual host named bi_internal_virtualhost1 which is configured to listen on channel
bi_internal_channel1 (Port: 9505)
Workaround >
Related
Products
Enterprise Performance Management and Business Intelligence > Business Intelligence > Business Intelligence Suite Enterprise Edition > Business Intelligence Suite Enterprise
Edition > Analytics > Security/Access Control
Back to Top
Copyright (c) 2019, Oracle. All rights reserved. Legal Notices and Terms of Use Privacy Statement
https://support.oracle.com/epmos/faces/DocumentDisplay?_afrLoop=433804686376781&id=2348673.1&_afrWindowMode=0&_adf.ctrl-state=186as… 15/15