Enabling SAML Authentication with Oracle Access Manager for Web Applications

Enabling SAML Authentication with Oracle Access Manager for Web Applications

SAML Authentication Process for Oracle Access Manager

SAML Authentication Process for Oracle Access Manager

Informatica web applications and Oracle Access Manager identity provider exchange authentication information to enable SAML authentication in an Informatica domain.
The following image illustrates the process flow for SAML authentication for Informatica users:
The following steps correspond to the numbered elements in the illustration:
  1. The user uses a URL to access a resource of a service provider. In Informatica, the service provider is the domain, and the resource is a web application that the domain serves. For example, the Administrator tool web UI.
  2. The service provider forwards the unauthenticated user to the identity provider (idP) via saml:authnRequest.
  3. The identity provider points to its SingleSignOnService URL, so the user must sign in.
  4. The IdP checks the entered credentials against a user database such as Active Directory and forms a saml:response about the status of the verification request.
  5. The IdP sends the saml:response in the form of an XHTML form back to the service provider. This XHTML form contains, among other things, the AssertionConsumerService URL, which is automatically opened for the user.
The existing user session in the browser is used for subsequent authentication. To access another Informatica web application configured to use SAML authentication, the user selects the LDAP security domain on the application log in page. It is not necessary for the user to supply a user name or password.
The user remains logged in to all Informatica web applications that are running in the same browser session. However, if the user logs out of a web application, the user is also logged out of other Informatica web applications running in the same browser session.

0 COMMENTS

We’d like to hear from you!