Integrate with Database User Management (Oracle)

The Database User Management connector integrates Oracle Access Governance with database user management tables in Oracle Database. You can establish a connection between Oracle Database and Oracle Access Governance by entering connection details and configuring the connector. To achieve this, use the Orchestrated Systems functionality available in the Oracle Access Governance Console.

Prerequisites

Before you install and configure a Database User Management (Oracle) orchestrated system, you should consider the following pre-requisites and tasks.

Certified Components

You can integrate any one of the following Oracle Database types with Oracle Access Governance:

  • Exadata V2.
  • Oracle Database 12c as single database, pluggable database (PDB), or Oracle RAC implementation.
  • Oracle Database 18c as single database, pluggable database (PDB), or Oracle RAC implementation.
  • Oracle Database 19c as single database, pluggable database (PDB), or Oracle RAC implementation.
  • Oracle Database 23ai as single database, pluggable database (PDB), or Oracle RAC implementation.
  • Oracle Autonomous Database

Supported Operations

The Database User Management (Oracle) orchestrated system supports the following operations:

  • Create user
  • Reset password
  • Add roles
  • Revoke Roles
  • Add privileges
  • Revoke privileges

Default Supported Attributes

The Database User Management (Oracle) orchestrated system supports the following default attributes.

Table - Default Attributes - Manage Permission Mode

DBUM User Entity Target Account Attribute Oracle Access Governance Account Attribute
  Return Id uid
  Username name
  Authentication Type authenticationType
  Global DN globalDN
  Default Tablespace defaultTablespace
  Default Tablespace Quota (in MB) defaultTablespaceQuotaInMB
  Temporary Tablespace temporaryTablespace
  Profile Name profileName
  Account Status accountStatus
  Status status
  Password password

Role

DBUM (Oracle) roles are mapped to Oracle Access Governance entitlements

   
  adminOption roleAdminOption

Privilege

DBUM (Oracle) privileges are mapped to Oracle Access Governance entitlements

   
  adminOption privilegeAdminOption

Default Matching Rule

The default matching rule for Database User Management (Oracle) orchestrated system

is:

Table - Default Matching Rules

Mode Default Matching Rule
Manage Permissions userNameOracle = userLogin

Create a Target System User Account for Database User Management (Oracle) Orchestrated System Operations

Oracle Access Governance requires a user account to access the system during service operations. Depending on the system you are using, you can create the user, and assign specific permissions and roles to them.

For Oracle database:

  1. Create a service user using the following SQL statement:
    CREATE USER agserviceuser IDENTIFIED BY password
    DEFAULT TABLESPACE users
    TEMPORARY TABLESPACE temp QUOTA UNLIMITED ON users;
  2. Assign the following permissions and roles to the service user created:
    GRANT SELECT on dba_role_privs TO agserviceuser;
    GRANT SELECT on dba_sys_privs TO agserviceuser;
    GRANT SELECT on dba_ts_quotas TO agserviceuser;
    GRANT SELECT on dba_tablespaces TO agserviceuser;
    GRANT SELECT on dba_users TO agserviceuser;
    GRANT CREATE USER TO agserviceuser;
    GRANT ALTER ANY TABLE TO agserviceuser;
    GRANT GRANT ANY PRIVILEGE TO agserviceuser;
    GRANT GRANT ANY ROLE TO agserviceuser;
    GRANT DROP USER TO agserviceuser;
    GRANT SELECT on dba_roles TO agserviceuser;
    GRANT SELECT ON dba_profiles TO agserviceuser;
    GRANT ALTER USER TO agserviceuser;
    GRANT CREATE ANY TABLE TO agserviceuser;
    GRANT DROP ANY TABLE TO agserviceuser;
    GRANT CREATE ANY PROCEDURE TO agserviceuser;
    GRANT DROP ANY PROCEDURE TO agserviceuser;
    

Configure

You can establish a connection between Oracle Database and Oracle Access Governance by entering connection details and configuring your database environment. To achieve this, use the Orchestrated Systems functionality available in the Oracle Access Governance Console.

Navigate to the Orchestrated Systems Page

Navigate to the Orchestrated Systems page of the Oracle Access Governance Console, by following these steps:
  1. From the Oracle Access Governance navigation menu icon Navigation menu, select Service Administration → Orchestrated Systems.
  2. Click the Add an orchestrated system button to start the workflow.

Select system

On the Select system step of the workflow, specify which type of system you would like to onboard. You can search for the required system by name using the Search field.

  1. Select the Database User Management (Oracle DB) tile. Once selected, a value of Database User Management (Oracle DB) is displayed on the right hand side under What I've selected.
  2. Click Next.

Enter details

On the Enter Details step of the workflow, enter the details for the orchestrated system:
  1. Enter a name for the system you want to connect to in the What do you want to call this system? field.
  2. Enter a description for the system in the How do you want to describe this system? field.
  3. Determine if this orchestrated system is an authoritative source, and if Oracle Access Governance can manage permissions by setting the following checkboxes.
    • This is the authoritative source for my identities
    • I want to manage permissions for this system
    The default value in each case is Selected.
  4. Click Next.

Add owners

You can associate resource ownership by adding primary and additional owners. This drives self-service as these owners can then manage (read, update or delete) the resources that they own. By default, the resource creator is designated as the resource owner. You can assign one primary owner and up to 20 additional owners for the resources.

Note:

When setting up the first Orchestrated System for your service instance, you can assign owners only after you enable the identities from the Manage Identities section.
To add owners:
  1. Select an Oracle Access Governance active user as the primary owner in the Who is the primary owner? field.
  2. Select one or more additional owners in the Who else owns it? list. You can add up to 20 additional owners for the resource.
You can view the Primary Owner in the list. All the owners can view and manage the resources that they own.

Account settings

On the Account settings step of the workflow, enter details of how you would like to manage accounts with Oracle Access Governance when configured as a managed system:
  1. Select where to send notification emails when an account is created. The default setting is User. You can select one, both, or none of these options. If you select no options then notifications will not be sent when an account is created.
    • User
    • User manager
  2. When an identity moves within your enterprise, for example when moving from one department to another, you may need to adjust what accounts the identity has access to. In some cases the identity will no longer require certain accounts which are not relevant to their new role in the enterprise. You can select what to do with the account when this happens. Select one of the following options:
    • Disable
    • Delete
  3. When an identity leaves your enterprise you should remove access to their accounts. You can select what to do with the account when this happens. Select one of the following options:
    • Disable
    • Delete

Note:

If you do not configure your system as a managed system then this step in the workflow will display but is not enabled. In this case you proceed directly to the Integration settings step of the workflow.

Note:

If your orchestrated system requires dynamic schema discovery, as with the Generic REST and Database Application Tables (Oracle) integrations, then only the notification email destination can be set (User, Usermanager) when creating the orchestrated system. You cannot set the disable/delete rules for movers and leavers. To do this you need to create the orchestrated system, and then update the account settings as described in Configure Orchestrated System Account Settings.

Integration settings

On the Integration settings step of the workflow, enter the configuration details required to allow Oracle Access Governance to connect to the specified database.

  1. In the Easy Connect URL for Database field, enter the connect string for the database you want to integrate with Oracle Access Governance. For Oracle Database use the format host/port/database service/sid. For Oracle Autonomous Database use the format jdbc:oracle:thin:@<SERVICE_NAME>?TNS_ADMIN=<WALLET-DIR> as described in Configure Wallet for Autonomous Database Integration.
  2. In the User Name field, enter the DB user you will use to connect to the database. This is the user you created in Create a Target System User Account for Database User Management (Oracle) Orchestrated System Operations.
  3. Enter the password of the target database user in the Password field. Confirm the password in the Confirm password field.
  4. In Connection Properties enter any connection properties in the format prop1=val1#prop2=val2
  5. Check the right hand pane to view What I've selected. If you are happy with the details entered, select Add to create the orchestrated system.

Finish up

On the Finish Up step of the workflow, you are asked to download the agent you will use to interface between Oracle Access Governance and Oracle Database. Select the Download link to download the agent zip file to the environment in which the agent will run.

After downloading the agent, follow the instructions explained in the Agent Administration article.

Finally, you are given a choice whether to further configure your orchestrated system before running a data load, or accept the default configuration and initiate a data load. Select one from:
  • Customize before enabling the system for data loads
  • Activate and prepare the data load with the provided defaults

Post Configuration

Configure Wallet for Autonomous Database Integration

A connection to Oracle Autonomous Database requires the client, in this case the Oracle Access Governance agent, to be configured to support SSL communication between the agent and the database service. To enable this feature, you should download the autonomous database wallet to your agent host, and then update the Easy Connect URL for Database field in the orchestrated system configuration. Complete the following steps to configure this feature:

  1. Create a Database User Management (Oracle) orchestrated system and configure the agent.
  2. Download the autonomous database wallet using the instructions in Download Client Credentials (Wallets).
  3. Create a wallet directory inside the installed agent folder, <PERSISTENT_VOLUME_LOCATION><WALLET-DIR>. For example:
    mkdir /myagent/install/db-wallet
  4. Copy the zipfile containing the wallet you downloaded in Step 2, to the <PERSISTENT_VOLUME_LOCATION><WALLET-DIR> and unzip using the command:
    cp -rf Wallet_<DATABASENAME>.zip <PERSISTENT_VOLUME_LOCATION><WALLET-DIR>
  5. The unzipped wallet file will contain the tnsnames.ora file, which contains the service names available for the Oracle Autonomous Database. Choose from one of the following depending on your workload:
    • databasename_tpurgent
    • databasename_tp
    • databasename_high
    • databasename_medium
    • databasename_low
    For further details on Oracle Autonomous Database service names see Database Service Names for Autonomous Transaction Processing and Autonomous JSON Database.
  6. Edit the integration settings for your orchestrated system by following the instructions in Configure settings for an Orchestrated System. Update the Easy Connect URL for Database field with the connect string for your database, based on the service name you selected in the previous step. The connect string should take the following format:
    jdbc:oracle:thin:@<SERVICE_NAME>?TNS_ADMIN=<WALLET-DIR>
    For example:
    jdbc:oracle:thin:@MYAUTDB_TP?TNS_ADMIN=/agent/install