MFA for Oracle Access Manager
The guide below outlines the setup process to install the Okta Multifactor Authentication (MFA) provider for Oracle Access Manager. With this feature, customers can use OAM as their Identity Provider (IdP) to applications and also use Okta for MFA to provide a strong method of authentication for applications. For version history see Okta Oracle Access Manager Plugin Version History
Note: If you're currently using the RSA SecurID agent (version 1.1.0 or earlier), you should upgrade to the latest version of the On-Prem MFA agent at your earliest convenience. For the latest version and version history, see Okta On-Prem MFA Agent Version History.
Requirements and versions
The Okta MFA Provider for Oracle Access Manager has been tested against the following:
Name | Version |
---|---|
WebLogic Server | 11g (10.3.6.0) |
Oracle Access Manager | 11g (11.1.2.0.0) |
Operating System | Windows Server |
Java Runtime | 1.7.0_80 or later |
Note: Only applications that support Embedded Credential Collector (ECC) WebGates are supported.
Typical workflow
Task |
Description |
---|---|
Configure MFA factors | Configure MFA factors for use with Oracle Access Manager. |
Download the agent | Org admins need to request that Okta Support provide the download link for the Oracle Access Manager Plugin. The downloaded plugin file must be in a location that the Oracle Access Manager Console can access. |
Install and configure the Oracle Access Manager plugin | Install and configure the plug in for Oracle Access Manager. If required, manually activate the OAM plugin. |
Deploy OktaWidget.war | Using the Oracle WebLogic Server console, deploy the Okta OktaWidget war file. |
Configure Module, Scheme and Policy | Using the Oracle Access Manager console, configure module, scheme and policy to protect the OAM resources. |
Enable SSL on OAM servers | (Optional) Using the WebLogic Server console to enable SSL (HTTPS) on OAM servers. |