Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The Oracle Identity Cloud Service connector supports standard OIDC flows via Oracle IDCS’s OpenID Connect endpoints. The Orchestrator communicates with Oracle IDCS through standard OIDC discovery — no provider-specific configuration is required beyond the well-known URL.Use Cases
- Unify SSO across Oracle and non-Oracle apps — Extend Oracle IDCS authentication to legacy and on-premises applications that don’t support modern identity protocols, creating a unified SSO experience across your Oracle Cloud and hybrid environments
- Rationalize identity platforms — Orchestrate migration from Oracle IDCS to a strategic IdP or consolidate Oracle IDCS with other providers, reducing licensing costs while maintaining application access
- Oracle Cloud resilience — Configure Oracle IDCS as a primary or failover IdP alongside other providers, ensuring authentication continuity for Oracle-dependent workloads during outages
- Hybrid Oracle environments — Bridge Oracle IDCS-managed identities with applications running outside the Oracle Cloud ecosystem through identity orchestration
Configuration
- Console UI
- Configuration
To create an Oracle Identity Cloud Service (OIDC) connector in the Maverics Console:
- Navigate to Identity Fabric in the Console sidebar.
- Click Create and select Oracle Identity Cloud Service (OIDC).
- Enter a Name — this is the friendly name that identifies your Oracle IDCS provider.
- Enter the OIDC Well Known URL — for Oracle IDCS, this follows the pattern
https://{idcs-instance}.identity.oraclecloud.com/.well-known/openid-configuration. - Enter the OAuth Client ID — the client ID from your Oracle IDCS application registration.
- Enter the OAuth Client Secret — the client secret from your Oracle IDCS application registration.
- Under Redirect URLs, add the callback URL where Oracle IDCS will redirect after authentication. This URL must match the Redirect URL configured in your IDCS application.
- Optionally configure Logout Callback URLs for single logout support.
- Optionally set Scopes (space-separated). Default scopes are typically
openid profile email. - The PKCE toggle is enabled by default. Disable it only if your Oracle IDCS application is not configured to support Proof Key for Code Exchange.
- Optionally enable Offline Access for token refresh support (Proxy apps only).
- Click Save.
Troubleshooting
- Verify the
oidcWellKnownURLis accessible from the Orchestrator host — ensure the IDCS instance name is correct and the URL resolves to the Oracle IDCS discovery document - Ensure the
oauthRedirectURLmatches exactly what is registered in the Oracle IDCS application under Redirect URLs - Check that the client secret reference resolves correctly via your secret provider
- Verify IDCS application is activated — Oracle IDCS applications must be in an active state before they can process authentication requests