Console terminology: In the Maverics Console, this section is called
Identity Fabric. The YAML configuration uses the
connectors key to define
identity provider integrations.Overview
The Oracle Universal Directory connector functions as an LDAP attribute provider. It retrieves user attributes from Oracle Unified Directory for header injection, claim enrichment, or authorization decisions. For general-purpose LDAP directories, see the LDAP connector. For Microsoft Active Directory environments, see the Active Directory connector.Use Cases
- Unify SSO across Oracle and non-Oracle stacks — Enrich sessions with OUD attributes so applications across Oracle and non-Oracle environments receive consistent identity data through a single orchestration layer
- Simplify Oracle directory consolidation — Route OUD attribute lookups through the Orchestrator to reduce direct directory integrations per application, supporting consolidation of Oracle identity infrastructure
- Cross-platform identity enrichment — Combine OIDC or SAML authentication from a cloud IdP with OUD attribute lookups, bridging identity data between Oracle directories and modern identity providers
- Legacy Oracle app header injection — Look up user attributes in OUD and inject them as HTTP headers for legacy Oracle applications that depend on header-based identity
Configuration
- Console UI
- Configuration
To create an Oracle Universal Directory (LDAP) connector in the Maverics Console:
- Navigate to Identity Fabric in the Console sidebar.
- Click Create and select Oracle Universal Directory (LDAP).
- Enter a Name — the friendly name for your OUD connector.
- Enter the URL of the OUD LDAP server (e.g.,
ldaps://oud.example.com:636). - Enter the Base DN — the search base for LDAP queries (e.g.,
dc=example,dc=com). - Enter the Service Account Username — the bind DN used to connect to OUD.
- Enter the Service Account Password — use the show/hide toggle to verify the value.
- Optionally set an Attribute Delimiter for multi-valued attributes (default:
,). - Enter the OUD Search Key — the attribute used for looking up user and group data (e.g.,
uidorcn). - Click Save.
Troubleshooting
- Test LDAP connectivity from the Orchestrator host — Use
ldapsearchor a similar tool to verify the Orchestrator can reach the OUD server on the configured port. Network firewalls or DNS issues are common causes of connection failures. - Verify the service account has read permissions on the baseDN — The bind DN specified in
serviceAccountUsernamemust have sufficient permissions to search thebaseDNsubtree and read the configured attributes. - For LDAPS, ensure the TLS profile includes the correct CA certificate — If the OUD server uses a private CA, the TLS profile referenced by the
tlsfield must include the CA certificate viacaFile. - Check attribute names in mapping — LDAP attribute names must match the Oracle Unified Directory schema. Common OUD attributes include
uid,cn,mail, andmemberOf.