Configure Mutiple Identity Stripes for Process Automation
For Oracle Cloud Infrastructure Process Automation, the primary (primordial) stripe is automatically federated using preconfigured groups. However, you can create separate environments for a single cloud service or application (for example, create one environment for development and one for production), where each environment has a different identity and security requirements.
This topic applies only to tenancies that do not use identity domains. See Differences Between Tenancies With and Without Identity Domains.
Implementing one or more secondary stripes enables you to create and manage multiple instances of Oracle Identity Cloud Service to protect your applications and Oracle Cloud services.
You can manually federate one or more secondary stripes with Oracle Cloud Infrastructure using SAML IDP federation in which multiple Oracle Identity Cloud Service stripes are associated with the same cloud account. Note that the account owner administers both primary and secondary stripes, but identities within the stripes are isolated from each other.
First, define a naming convention for the striping, as described in Define a Stripe Naming Convention. Then follow the steps below to manually federate a secondary stripe for your cloud account. You must be the account owner.
- Create an IDCS Group for Secondary Stripe Users
- Create an OAuth Client in the Secondary Stripe
- Create an IAM Group for Secondary Stripe Users
- Create the Federation and its Group Mapping
- Create an IAM Policy for Federated Users to Create Instances
- Provide Access to a Federated Stripe in the IAM Group for Secondary Stripe Users
- Create Process Automation Instances in the Secondary Stripe Compartments
Define a Stripe Naming Convention
As a best practice, define a <stripename>
for all the entities you'll create specific to the stripe. Uniquely identifying configurations associated with a stripe is important, especially when multiple stripes are configured.
In the sections that follow, you'll use stripename
in these entities:
Entity | Naming convention |
---|---|
IDCS group | stripename_administrators |
OCI group | oci_stripename_administrators |
Compartment | stripename_compartment |
Identity Provider | stripename_service |
Policy | stripename_adminpolicy |
Policy Statement | allow group oci_stripename_administrators to manage process-automation-instance in compartment stripename_compartment |
Create an IDCS Group for Secondary Stripe Users
In IDCS, create a group in the secondary stripe and add users from the secondary stripe to the group.
Create an OAuth Client in the Secondary Stripe
Create an IDCS confidential application that uses OAuth client credentials and is assigned the IDCS domain administrator role. You must create a confidential application per secondary stripe.
- As an IDCS administrator, sign in to the secondary IDCS admin console.
- Add a confidential application.
- Navigate to the Applications tab.
- Click Add.
- Choose Confidential Application.
- Name the application
Client_Credentials_For_SAML_Federation
. - Click Next.
- Configure client settings.
- Click Configure this application as a client now.
- Under Authorization, select Client Credentials.
- Under Grant the client access to Identity Cloud Service Admin APIs, click Add and select the app role Identity Domain Administrator.
- Click Next twice.
- Click Finish. Once the application is created, note its client ID and client secret. You’ll need this information in upcoming steps for federation
- Click Activate and confirm activating the application.
Create an IAM Group for Secondary Stripe Users
This group is needed because the Oracle Cloud Infrastructure SAML IDP federation requires group mapping for federating users from the federated IDP (IDCS), and OCI native group membership is required for defining and granting Oracle Cloud Infrastructure permissions (policies) for federated users.
Create the Federation and its Group Mapping
Now that you have the IDCS and IAM groups created and the client information needed, create the IDCS identity provider and map the groups.
Create an IAM Policy for Federated Users to Create Instances
With the federation done, set up IAM policies that allow federated users from the secondary IDCS stripe to create Oracle Cloud Infrastructure Process Automation instances. As a common pattern, the policy is scoped to a compartment.