FlexDeploy supports the use of OAuth authentication for Oracle Integration Cloud. You can follow one of the 2 options for configuring OAuth.

or

Oracle Integration 3 instances only support OAuth authentication. Basic Auth cannot be used in FlexDeploy for v3 instances.

Resource Owner

Steps are:

Create a Confidential Application in Oracle Identity Console

image-20240910-163025.pngimage-20240214-083234.pngimage-20240910-163233.pngimage-20240910-163726.pngimage-20240910-164029.pngimage-20240910-164316.pngimage-20240910-164411.png

Create the Cloud Account in FlexDeploy

Note that you will need scope URL that was copied in previous step.

image-20240108-102445.png

JWT User Assertion

JWT User Assertion requires an ssl certificate to be uploaded to Oracle Cloud Infrastructure and referenced in FlexDeploy. The key can be self-signed or from a more trusted chain.

For JWT User Assertion, we need a certificate to be generated from the endpoint where FlexDeploy server is going to execute the plugin operations for OIC/VBCS.

Generate certificate

note

If you already have a public/private key and their keystore location feel free to skip this step.

If you already have a public/private key and their keystore location feel free to skip this step.

Continuing with this step, we assume you don’t have third party certificates and going to generate a self signed cert.

Keystore

Create the Keystore.

keytool -genkey -keyalg RSA -alias <your_alias ex FlexDeploySandbox> -keystore <keystore_file ex FDSandboxkeystore.jks> -storepass <new_keystore_pass> -validity 365 -keysize 2048

 if you don’t need to use password in the command, you can remove -storepass <new_keystore_pass>, it will prompt to enter the keystore password.

Export to generate a cert file. Make sure that the aliases are unique.

keytool -exportcert -alias <your_alias ex FlexDeploySandbox> -file <filename ex flexdeployad.cer> -keystore <keystore_file ex FDSandboxkeystore.jks> -storepass <keystore_pass> -rfc

Create Oracle Identity Application with the JWT Assertion grant type

image-20240214-061654.pngimage-20240214-083234.pngimage-20240521-173514.pngimage-20240521-173604.png

Add cer file to Partner Settings

We have configured the signing certificate in the Confidential Application, IDCS requires to configure the signing certificate as a Trusted Partner Certificate as well. Go to Settings → Partner Settings and Import the cer file. Make sure to use the same alias name used to generate the file(ex FlexDeployDev).

image-20240214-085008.png

Create FlexDeploy Cloud Account

Lastly you need to create a cloud account in FlexDeploy specifying your client application information as well as the certificate information.