12 Setting Up Single Sign-On for Pricing Design Center
Learn how to set up a single sign-on (SSO) login method for Oracle Communications Pricing Design Center (PDC) using SAML.
SSO allows you to log in to applications using a single user name and password combination. You set up SSO for PDC by using SAML 2.0.
You can configure SAML authentication in a PDC domain using an Oracle Access Management service provider or an Oracle Identity Cloud Service (IDCS) service provider.
To implement SSO for PDC:
-
Create a SAML authentication or identity assertion provider. See "Creating a SAML Authentication or Identity Assertion Provider".
-
Create a SAML2 web single sign-on identity provider partner. See "Creating a SAML2 Web Single Sign-On Identity Provider Partner"
-
Create a SAML authenticator. See "Creating a SAML Authenticator".
-
Configure SAML2 on the administration server. See "Configuring SAML2 on the Administration Server".
-
Generate a metadata file and publish it to all SAML identity providers. See "Publishing the Service Provider Metadata".
-
Update the PDC deployment plan. See "Updating the Deployment Plan for PDC".
Creating a SAML Authentication or Identity Assertion Provider
The SAML assertion provider validates a client's identity by mapping a client-supplied token to a user name.
To create a SAML authentication or identity assertion provider:
-
Log in to WebLogic Server Remote Console.
-
Click Edit Tree, then Security, and then Realms.
The Summary of Security Realms page appears.
-
Click the myrealm link.
The myrealm configuration page appears.
-
Click Authentication Providers at the tree on the left side.
A page with an Authentication Providers table appears.
-
Click New.
The Create a New Authentication Provider page appears.
-
In the Name field, enter samlPDC.
-
From the Type list, select SAML2IdentityAsserter.
-
Click Create.
-
Restart WebLogic Server.
Creating a SAML2 Web Single Sign-On Identity Provider Partner
To create a SAML2 web single sign-on identity provider partner:
-
Log in to WebLogic Server Remote Console.
-
Click Security Data Tree and then Realms.
The Summary of Security Realms page appears.
-
Click the myrealm link.
The myrealm configuration page appears.
-
Click Authentication Providers at the tree on the left side.
A page with an Authentication Providers table appears.
-
In the table, select samlPDC.
The configuration page for samlPDC appears.
-
Click Partners in the tree on the left side.
-
Click New.
The Create a new Identity Provider Partner page appears.
-
In the Name field, enter WebSSO-IdP-Partner-1.
-
From the Type list, select Web Single Sign-On Identity Partner.
-
In the Meta Data File Name field, enter the name and the path to the XML file that contains the identity provider’s metadata.
-
Click Create.
-
Click WebSSO-IdP-Partner-1 at the tree on the left side.
-
Click the General tab.
-
In the General tab, turn on Enabled, Virtual User, and Process Attributes.
-
In Redirect URIs, enter /pdc/*.
-
Click Save.
Creating a SAML Authenticator
The SAML authenticator verifies the identity of users or system processes, and makes identity information available to PDC when that information is needed.
To create a SAML authenticator:
-
Log in to WebLogic Server Remote Console.
-
Click Edit Tree, then Security, and then Realms.
The Summary of Security Realms page appears.
-
Click the myrealm link.
The myrealm configuration page appears.
-
Click Authentication Providers at the tree on the left side.
A page with an Authentication Providers table appears.
-
Click New.
-
In the Name field, enter samlPDCAuth.
-
From the Type list, select SAMLAuthenticator.
-
From the Control Flag list, select SUFFICIENT.
-
Click Create.
-
In the Authentication Providers table, click the DefaultAuthenticator, and change the Control Flag to SUFFICIENT.
-
Click Save.
-
In the Authentication Provider table, arrange the providers in the following order using the Move Down and Move Up buttons.
-
samlPDCAuth
-
samlPDC
-
DefaultAuthenticator
-
DefaultIdentityAsserter
-
Trust Service Identity Asserter
-
-
Restart the Weblogic Server.
Configuring SAML2 on the Administration Server
To configure SAML 2.0 on the administration server:
-
Log in to WebLogic Server Remote Console.
-
Click Edit Tree, then Environment, and then Servers.
The Summary of Servers page appears.
-
In the Servers table, click the administration server.
A page containing settings for the administration server appears.
-
Click the Security subtab, and then the SAML 2.0 General subtab.
-
In the Published Site URL field, enter http://pdc_hostname:port/saml2.
where:
-
pdc_hostname is the PDC application host.
-
port is the port on which PDC is listening on.
-
-
In the Entity ID field, enter samlPDC.
-
Click Save.
-
Click the SAML 2.0 Service Provider subtab.
-
Turn on Enabled.
-
Turn on POST Binding Enabled.
-
From the Preferred Binding list, select HTTP/POST.
-
In the Default URL field, enter http://pdc_hostname:port/pdc/faces/oracle/communications/brm/pdc/ui/pages/login.jspx.
where:-
pdc_hostname is the PDC application host.
-
port is the port on which PDC is listening on.
-
-
Click Save.
-
Restart WebLogic Server.
Publishing the Service Provider Metadata
To publish the service provider metadata:
-
Log in to WebLogic Server Remote Console.
-
Click Monitoring Tree, then Environment, and then Servers.
The Summary of Servers page appears.
-
In the Servers table, click the administration server.
A page containing settings for the administration server appears.
-
Click SAML 2.0 subtab.
-
Click Publish metadata.
-
In the File Name field, enter the full path and the name of the file.
-
Click Done.
Updating the Deployment Plan for PDC
To update your deployment plan for PDC:
-
Create a new plan.xml file with the PDC deployment plan, or edit your existing plan.xml file.
-
In the file, add a logoutURL variable set to your identity provider (IDP) logout URL:
<variable-definition> <variable> <name>logoutUrl</name> <value>IDP_LOGOUT_URL</value> </variable> </variable-definition>
-
Add the following module-override element:
<module-override> <module-name>BPA.war</module-name> <module-type>war</module-type> <module-descriptor external="false"> <root-element>web-app</root-element> <uri>WEB-INF/web.xml</uri> <variable-assignment> <name>logoutUrl</name> <xpath>/web-app/context-param/[param-name="loginURL"]/param-value</xpath> <operation>replace</operation> </variable-assignment> </module-descriptor> </module-override>
-
Save and close your plan.xml file.
-
Redeploy the PDC application with your new plan.xml file.
For more information about updating and deploying your deployment plan, see the "Create and Use a Deployment Plan in Oracle WebLogic Server" tutorial.