text
stringlengths
65
20k
You need to assign the required roles and privileges to a user.Note: For prebuilt integrations, you must use the name CUSTOMER_OIC_INTEG_USER .In prebuilt integrations, connections and filter expressions for echo suppression refer to CUSTOMER_OIC_INTEG_USER as the user name.For new integrations, the user name can be anything.Role Description ALL_INTEGRATION_POINTS_ALL_DATA Starting with release 12, this role is no longer supported.When existing customers upgrade to release 12, users with this role continue using it, although it is hidden from the Security Console.If you create a new integration user in release 12 or later, you cannot assign this role.Customer Relationship Management Application AdministratorThis role is supported in releases 12 and later.SOAOperator This role is required to receive business events.FND_MANAGE_CATALOG_SERVICE_PRIV Role for managing the web services catalog.Additional roles may be required per each interface requirement.Note: You must have administrator privileges in Oracle Authorization Policy Manager to perform the following steps.Chapter 2 Prerequisites for Creating a Connection 2-5Assigning Integration Roles in Releases 12 and Later Use the Security Console to manage application security such as roles, users, certificates, and administration tasks.Access to the Security Console is provided by the predefined Security Manager role.Access the Security Console in the following ways: Use the Manage Job Roles or Manage Duties tasks in the Setup and Maintenance work area.Select Navigator > Tools > Security Console .
Note: For prebuilt integrations, you must use the name CUSTOMER_OIC_INTEG_USER .In prebuilt integrations, connections and filter expressions for echo suppression refer to CUSTOMER_OIC_INTEG_USER as the user name.For new integrations, the user name can be anything.Role Description ALL_INTEGRATION_POINTS_ALL_DATA Starting with release 12, this role is no longer supported.When existing customers upgrade to release 12, users with this role continue using it, although it is hidden from the Security Console.If you create a new integration user in release 12 or later, you cannot assign this role.Customer Relationship Management Application AdministratorThis role is supported in releases 12 and later.SOAOperator This role is required to receive business events.FND_MANAGE_CATALOG_SERVICE_PRIV Role for managing the web services catalog.Additional roles may be required per each interface requirement.Note: You must have administrator privileges in Oracle Authorization Policy Manager to perform the following steps.Chapter 2 Prerequisites for Creating a Connection 2-5Assigning Integration Roles in Releases 12 and Later Use the Security Console to manage application security such as roles, users, certificates, and administration tasks.Access to the Security Console is provided by the predefined Security Manager role.Access the Security Console in the following ways: Use the Manage Job Roles or Manage Duties tasks in the Setup and Maintenance work area.Select Navigator > Tools > Security Console .For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .
In prebuilt integrations, connections and filter expressions for echo suppression refer to CUSTOMER_OIC_INTEG_USER as the user name.For new integrations, the user name can be anything.Role Description ALL_INTEGRATION_POINTS_ALL_DATA Starting with release 12, this role is no longer supported.When existing customers upgrade to release 12, users with this role continue using it, although it is hidden from the Security Console.If you create a new integration user in release 12 or later, you cannot assign this role.Customer Relationship Management Application AdministratorThis role is supported in releases 12 and later.SOAOperator This role is required to receive business events.FND_MANAGE_CATALOG_SERVICE_PRIV Role for managing the web services catalog.Additional roles may be required per each interface requirement.Note: You must have administrator privileges in Oracle Authorization Policy Manager to perform the following steps.Chapter 2 Prerequisites for Creating a Connection 2-5Assigning Integration Roles in Releases 12 and Later Use the Security Console to manage application security such as roles, users, certificates, and administration tasks.Access to the Security Console is provided by the predefined Security Manager role.Access the Security Console in the following ways: Use the Manage Job Roles or Manage Duties tasks in the Setup and Maintenance work area.Select Navigator > Tools > Security Console .For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.
For new integrations, the user name can be anything.Role Description ALL_INTEGRATION_POINTS_ALL_DATA Starting with release 12, this role is no longer supported.When existing customers upgrade to release 12, users with this role continue using it, although it is hidden from the Security Console.If you create a new integration user in release 12 or later, you cannot assign this role.Customer Relationship Management Application AdministratorThis role is supported in releases 12 and later.SOAOperator This role is required to receive business events.FND_MANAGE_CATALOG_SERVICE_PRIV Role for managing the web services catalog.Additional roles may be required per each interface requirement.Note: You must have administrator privileges in Oracle Authorization Policy Manager to perform the following steps.Chapter 2 Prerequisites for Creating a Connection 2-5Assigning Integration Roles in Releases 12 and Later Use the Security Console to manage application security such as roles, users, certificates, and administration tasks.Access to the Security Console is provided by the predefined Security Manager role.Access the Security Console in the following ways: Use the Manage Job Roles or Manage Duties tasks in the Setup and Maintenance work area.Select Navigator > Tools > Security Console .For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.2.Under Search , select Users from the For dropdown list.
Role Description ALL_INTEGRATION_POINTS_ALL_DATA Starting with release 12, this role is no longer supported.When existing customers upgrade to release 12, users with this role continue using it, although it is hidden from the Security Console.If you create a new integration user in release 12 or later, you cannot assign this role.Customer Relationship Management Application AdministratorThis role is supported in releases 12 and later.SOAOperator This role is required to receive business events.FND_MANAGE_CATALOG_SERVICE_PRIV Role for managing the web services catalog.Additional roles may be required per each interface requirement.Note: You must have administrator privileges in Oracle Authorization Policy Manager to perform the following steps.Chapter 2 Prerequisites for Creating a Connection 2-5Assigning Integration Roles in Releases 12 and Later Use the Security Console to manage application security such as roles, users, certificates, and administration tasks.Access to the Security Console is provided by the predefined Security Manager role.Access the Security Console in the following ways: Use the Manage Job Roles or Manage Duties tasks in the Setup and Maintenance work area.Select Navigator > Tools > Security Console .For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.2.Under Search , select Users from the For dropdown list.3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.
When existing customers upgrade to release 12, users with this role continue using it, although it is hidden from the Security Console.If you create a new integration user in release 12 or later, you cannot assign this role.Customer Relationship Management Application AdministratorThis role is supported in releases 12 and later.SOAOperator This role is required to receive business events.FND_MANAGE_CATALOG_SERVICE_PRIV Role for managing the web services catalog.Additional roles may be required per each interface requirement.Note: You must have administrator privileges in Oracle Authorization Policy Manager to perform the following steps.Chapter 2 Prerequisites for Creating a Connection 2-5Assigning Integration Roles in Releases 12 and Later Use the Security Console to manage application security such as roles, users, certificates, and administration tasks.Access to the Security Console is provided by the predefined Security Manager role.Access the Security Console in the following ways: Use the Manage Job Roles or Manage Duties tasks in the Setup and Maintenance work area.Select Navigator > Tools > Security Console .For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.2.Under Search , select Users from the For dropdown list.3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.
If you create a new integration user in release 12 or later, you cannot assign this role.Customer Relationship Management Application AdministratorThis role is supported in releases 12 and later.SOAOperator This role is required to receive business events.FND_MANAGE_CATALOG_SERVICE_PRIV Role for managing the web services catalog.Additional roles may be required per each interface requirement.Note: You must have administrator privileges in Oracle Authorization Policy Manager to perform the following steps.Chapter 2 Prerequisites for Creating a Connection 2-5Assigning Integration Roles in Releases 12 and Later Use the Security Console to manage application security such as roles, users, certificates, and administration tasks.Access to the Security Console is provided by the predefined Security Manager role.Access the Security Console in the following ways: Use the Manage Job Roles or Manage Duties tasks in the Setup and Maintenance work area.Select Navigator > Tools > Security Console .For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.2.Under Search , select Users from the For dropdown list.3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.6.Click Map.
Customer Relationship Management Application AdministratorThis role is supported in releases 12 and later.SOAOperator This role is required to receive business events.FND_MANAGE_CATALOG_SERVICE_PRIV Role for managing the web services catalog.Additional roles may be required per each interface requirement.Note: You must have administrator privileges in Oracle Authorization Policy Manager to perform the following steps.Chapter 2 Prerequisites for Creating a Connection 2-5Assigning Integration Roles in Releases 12 and Later Use the Security Console to manage application security such as roles, users, certificates, and administration tasks.Access to the Security Console is provided by the predefined Security Manager role.Access the Security Console in the following ways: Use the Manage Job Roles or Manage Duties tasks in the Setup and Maintenance work area.Select Navigator > Tools > Security Console .For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.2.Under Search , select Users from the For dropdown list.3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.6.Click Map.7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.
SOAOperator This role is required to receive business events.FND_MANAGE_CATALOG_SERVICE_PRIV Role for managing the web services catalog.Additional roles may be required per each interface requirement.Note: You must have administrator privileges in Oracle Authorization Policy Manager to perform the following steps.Chapter 2 Prerequisites for Creating a Connection 2-5Assigning Integration Roles in Releases 12 and Later Use the Security Console to manage application security such as roles, users, certificates, and administration tasks.Access to the Security Console is provided by the predefined Security Manager role.Access the Security Console in the following ways: Use the Manage Job Roles or Manage Duties tasks in the Setup and Maintenance work area.Select Navigator > Tools > Security Console .For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.2.Under Search , select Users from the For dropdown list.3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.6.Click Map.7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .
FND_MANAGE_CATALOG_SERVICE_PRIV Role for managing the web services catalog.Additional roles may be required per each interface requirement.Note: You must have administrator privileges in Oracle Authorization Policy Manager to perform the following steps.Chapter 2 Prerequisites for Creating a Connection 2-5Assigning Integration Roles in Releases 12 and Later Use the Security Console to manage application security such as roles, users, certificates, and administration tasks.Access to the Security Console is provided by the predefined Security Manager role.Access the Security Console in the following ways: Use the Manage Job Roles or Manage Duties tasks in the Setup and Maintenance work area.Select Navigator > Tools > Security Console .For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.2.Under Search , select Users from the For dropdown list.3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.6.Click Map.7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .
Additional roles may be required per each interface requirement.Note: You must have administrator privileges in Oracle Authorization Policy Manager to perform the following steps.Chapter 2 Prerequisites for Creating a Connection 2-5Assigning Integration Roles in Releases 12 and Later Use the Security Console to manage application security such as roles, users, certificates, and administration tasks.Access to the Security Console is provided by the predefined Security Manager role.Access the Security Console in the following ways: Use the Manage Job Roles or Manage Duties tasks in the Setup and Maintenance work area.Select Navigator > Tools > Security Console .For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.2.Under Search , select Users from the For dropdown list.3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.6.Click Map.7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .The role is mapped for the user under crm.
Note: You must have administrator privileges in Oracle Authorization Policy Manager to perform the following steps.Chapter 2 Prerequisites for Creating a Connection 2-5Assigning Integration Roles in Releases 12 and Later Use the Security Console to manage application security such as roles, users, certificates, and administration tasks.Access to the Security Console is provided by the predefined Security Manager role.Access the Security Console in the following ways: Use the Manage Job Roles or Manage Duties tasks in the Setup and Maintenance work area.Select Navigator > Tools > Security Console .For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.2.Under Search , select Users from the For dropdown list.3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.6.Click Map.7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .The role is mapped for the user under crm.8.Click Map.
Access to the Security Console is provided by the predefined Security Manager role.Access the Security Console in the following ways: Use the Manage Job Roles or Manage Duties tasks in the Setup and Maintenance work area.Select Navigator > Tools > Security Console .For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.2.Under Search , select Users from the For dropdown list.3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.6.Click Map.7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .The role is mapped for the user under crm.8.Click Map.9.Perform the following steps in the Map Application Roles to User dialog.
Access the Security Console in the following ways: Use the Manage Job Roles or Manage Duties tasks in the Setup and Maintenance work area.Select Navigator > Tools > Security Console .For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.2.Under Search , select Users from the For dropdown list.3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.6.Click Map.7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .The role is mapped for the user under crm.8.Click Map.9.Perform the following steps in the Map Application Roles to User dialog.a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.
Select Navigator > Tools > Security Console .For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.2.Under Search , select Users from the For dropdown list.3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.6.Click Map.7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .The role is mapped for the user under crm.8.Click Map.9.Perform the following steps in the Map Application Roles to User dialog.a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.b.The role is mapped for the user under hcm.
For example, the Roles page for the Integration Specialist user looks as follows: See Oracle Cloud Applications Security Console of Securing Sales and Service .Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.2.Under Search , select Users from the For dropdown list.3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.6.Click Map.7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .The role is mapped for the user under crm.8.Click Map.9.Perform the following steps in the Map Application Roles to User dialog.a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.b.The role is mapped for the user under hcm.10.Click Map.
Assigning Integration Roles in Releases 10 and 11 1.Log in to Oracle Authorization Policy Manager.2.Under Search , select Users from the For dropdown list.3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.6.Click Map.7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .The role is mapped for the user under crm.8.Click Map.9.Perform the following steps in the Map Application Roles to User dialog.a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.b.The role is mapped for the user under hcm.10.Click Map.11.Perform the following steps in the Map Application Roles to User dialog.
2.Under Search , select Users from the For dropdown list.3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.6.Click Map.7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .The role is mapped for the user under crm.8.Click Map.9.Perform the following steps in the Map Application Roles to User dialog.a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.b.The role is mapped for the user under hcm.10.Click Map.11.Perform the following steps in the Map Application Roles to User dialog.a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.
3.Enter CUSTOMER_OIC_INTEG_USER (for prebuilt integrations) or any name (for new integrations) in the Search field, then click the Search icon.4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.6.Click Map.7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .The role is mapped for the user under crm.8.Click Map.9.Perform the following steps in the Map Application Roles to User dialog.a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.b.The role is mapped for the user under hcm.10.Click Map.11.Perform the following steps in the Map Application Roles to User dialog.a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.The role is mapped for the user under fscm .
4.Select that name in the search results, then click the View icon.Chapter 2 Prerequisites for Creating a Connection 2-65.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click the Application Role Assignments subtab.6.Click Map.7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .The role is mapped for the user under crm.8.Click Map.9.Perform the following steps in the Map Application Roles to User dialog.a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.b.The role is mapped for the user under hcm.10.Click Map.11.Perform the following steps in the Map Application Roles to User dialog.a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.The role is mapped for the user under fscm .12.Click Map.
6.Click Map.7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .The role is mapped for the user under crm.8.Click Map.9.Perform the following steps in the Map Application Roles to User dialog.a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.b.The role is mapped for the user under hcm.10.Click Map.11.Perform the following steps in the Map Application Roles to User dialog.a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.The role is mapped for the user under fscm .12.Click Map.13.Perform the following steps in the Map Application Roles to User dialog.
7.In the Map Application Roles to User dialog: a.Select crm from the Application Name dropdown list.b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .The role is mapped for the user under crm.8.Click Map.9.Perform the following steps in the Map Application Roles to User dialog.a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.b.The role is mapped for the user under hcm.10.Click Map.11.Perform the following steps in the Map Application Roles to User dialog.a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.The role is mapped for the user under fscm .12.Click Map.13.Perform the following steps in the Map Application Roles to User dialog.a.Select soa-infra from the Application Name dropdown list.
b.Select Contains from the Role Name dropdown list, enter ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the Role Name field, and then click Search .c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .The role is mapped for the user under crm.8.Click Map.9.Perform the following steps in the Map Application Roles to User dialog.a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.b.The role is mapped for the user under hcm.10.Click Map.11.Perform the following steps in the Map Application Roles to User dialog.a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.The role is mapped for the user under fscm .12.Click Map.13.Perform the following steps in the Map Application Roles to User dialog.a.Select soa-infra from the Application Name dropdown list.b.Select Contains from the dropdown menu next to Display Name .
c.Select ALL_INTEGRATION_POINTS_ALL_DATA (for releases 11 and earlier) or Customer Relationship Management Application Administrator (for releases 12 and later) in the search results, then click Map Roles .The role is mapped for the user under crm.8.Click Map.9.Perform the following steps in the Map Application Roles to User dialog.a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.b.The role is mapped for the user under hcm.10.Click Map.11.Perform the following steps in the Map Application Roles to User dialog.a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.The role is mapped for the user under fscm .12.Click Map.13.Perform the following steps in the Map Application Roles to User dialog.a.Select soa-infra from the Application Name dropdown list.b.Select Contains from the dropdown menu next to Display Name .c.Enter SOA Operator in the Display Name field, and then click Search .
The role is mapped for the user under crm.8.Click Map.9.Perform the following steps in the Map Application Roles to User dialog.a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.b.The role is mapped for the user under hcm.10.Click Map.11.Perform the following steps in the Map Application Roles to User dialog.a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.The role is mapped for the user under fscm .12.Click Map.13.Perform the following steps in the Map Application Roles to User dialog.a.Select soa-infra from the Application Name dropdown list.b.Select Contains from the dropdown menu next to Display Name .c.Enter SOA Operator in the Display Name field, and then click Search .d.Select the SOA Operator role in the search results, then click Map Roles .
8.Click Map.9.Perform the following steps in the Map Application Roles to User dialog.a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.b.The role is mapped for the user under hcm.10.Click Map.11.Perform the following steps in the Map Application Roles to User dialog.a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.The role is mapped for the user under fscm .12.Click Map.13.Perform the following steps in the Map Application Roles to User dialog.a.Select soa-infra from the Application Name dropdown list.b.Select Contains from the dropdown menu next to Display Name .c.Enter SOA Operator in the Display Name field, and then click Search .d.Select the SOA Operator role in the search results, then click Map Roles .The role is mapped to the user under soa-infra .
9.Perform the following steps in the Map Application Roles to User dialog.a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.b.The role is mapped for the user under hcm.10.Click Map.11.Perform the following steps in the Map Application Roles to User dialog.a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.The role is mapped for the user under fscm .12.Click Map.13.Perform the following steps in the Map Application Roles to User dialog.a.Select soa-infra from the Application Name dropdown list.b.Select Contains from the dropdown menu next to Display Name .c.Enter SOA Operator in the Display Name field, and then click Search .d.Select the SOA Operator role in the search results, then click Map Roles .The role is mapped to the user under soa-infra .14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.
a.Select hcm from the Application Name dropdown list, and repeat steps 7.b, and 7.c.b.The role is mapped for the user under hcm.10.Click Map.11.Perform the following steps in the Map Application Roles to User dialog.a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.The role is mapped for the user under fscm .12.Click Map.13.Perform the following steps in the Map Application Roles to User dialog.a.Select soa-infra from the Application Name dropdown list.b.Select Contains from the dropdown menu next to Display Name .c.Enter SOA Operator in the Display Name field, and then click Search .d.Select the SOA Operator role in the search results, then click Map Roles .The role is mapped to the user under soa-infra .14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.The Search Authorization Policies tab is displayed.
b.The role is mapped for the user under hcm.10.Click Map.11.Perform the following steps in the Map Application Roles to User dialog.a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.The role is mapped for the user under fscm .12.Click Map.13.Perform the following steps in the Map Application Roles to User dialog.a.Select soa-infra from the Application Name dropdown list.b.Select Contains from the dropdown menu next to Display Name .c.Enter SOA Operator in the Display Name field, and then click Search .d.Select the SOA Operator role in the search results, then click Map Roles .The role is mapped to the user under soa-infra .14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.The Search Authorization Policies tab is displayed.16.Click the New icon under Functional Policies on the Search Authorization Policies page.
10.Click Map.11.Perform the following steps in the Map Application Roles to User dialog.a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.The role is mapped for the user under fscm .12.Click Map.13.Perform the following steps in the Map Application Roles to User dialog.a.Select soa-infra from the Application Name dropdown list.b.Select Contains from the dropdown menu next to Display Name .c.Enter SOA Operator in the Display Name field, and then click Search .d.Select the SOA Operator role in the search results, then click Map Roles .The role is mapped to the user under soa-infra .14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.The Search Authorization Policies tab is displayed.16.Click the New icon under Functional Policies on the Search Authorization Policies page.17.On the Untitled tab, enter Policy for manage services catalog in the Name field.
11.Perform the following steps in the Map Application Roles to User dialog.a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.The role is mapped for the user under fscm .12.Click Map.13.Perform the following steps in the Map Application Roles to User dialog.a.Select soa-infra from the Application Name dropdown list.b.Select Contains from the dropdown menu next to Display Name .c.Enter SOA Operator in the Display Name field, and then click Search .d.Select the SOA Operator role in the search results, then click Map Roles .The role is mapped to the user under soa-infra .14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.The Search Authorization Policies tab is displayed.16.Click the New icon under Functional Policies on the Search Authorization Policies page.17.On the Untitled tab, enter Policy for manage services catalog in the Name field.18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .
a.Select fscm from the Application Name dropdown list, and repeat steps 7.b, 7.c.The role is mapped for the user under fscm .12.Click Map.13.Perform the following steps in the Map Application Roles to User dialog.a.Select soa-infra from the Application Name dropdown list.b.Select Contains from the dropdown menu next to Display Name .c.Enter SOA Operator in the Display Name field, and then click Search .d.Select the SOA Operator role in the search results, then click Map Roles .The role is mapped to the user under soa-infra .14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.The Search Authorization Policies tab is displayed.16.Click the New icon under Functional Policies on the Search Authorization Policies page.17.On the Untitled tab, enter Policy for manage services catalog in the Name field.18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .If the use is not listed under Principals , then click + next to Principals .
The role is mapped for the user under fscm .12.Click Map.13.Perform the following steps in the Map Application Roles to User dialog.a.Select soa-infra from the Application Name dropdown list.b.Select Contains from the dropdown menu next to Display Name .c.Enter SOA Operator in the Display Name field, and then click Search .d.Select the SOA Operator role in the search results, then click Map Roles .The role is mapped to the user under soa-infra .14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.The Search Authorization Policies tab is displayed.16.Click the New icon under Functional Policies on the Search Authorization Policies page.17.On the Untitled tab, enter Policy for manage services catalog in the Name field.18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .If the use is not listed under Principals , then click + next to Principals .19.Perform the following steps in the Search Principal dialog.
12.Click Map.13.Perform the following steps in the Map Application Roles to User dialog.a.Select soa-infra from the Application Name dropdown list.b.Select Contains from the dropdown menu next to Display Name .c.Enter SOA Operator in the Display Name field, and then click Search .d.Select the SOA Operator role in the search results, then click Map Roles .The role is mapped to the user under soa-infra .14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.The Search Authorization Policies tab is displayed.16.Click the New icon under Functional Policies on the Search Authorization Policies page.17.On the Untitled tab, enter Policy for manage services catalog in the Name field.18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .If the use is not listed under Principals , then click + next to Principals .19.Perform the following steps in the Search Principal dialog.a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .
13.Perform the following steps in the Map Application Roles to User dialog.a.Select soa-infra from the Application Name dropdown list.b.Select Contains from the dropdown menu next to Display Name .c.Enter SOA Operator in the Display Name field, and then click Search .d.Select the SOA Operator role in the search results, then click Map Roles .The role is mapped to the user under soa-infra .14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.The Search Authorization Policies tab is displayed.16.Click the New icon under Functional Policies on the Search Authorization Policies page.17.On the Untitled tab, enter Policy for manage services catalog in the Name field.18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .If the use is not listed under Principals , then click + next to Principals .19.Perform the following steps in the Search Principal dialog.a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .c.Select the user name in the search results, then click Add Selected .
a.Select soa-infra from the Application Name dropdown list.b.Select Contains from the dropdown menu next to Display Name .c.Enter SOA Operator in the Display Name field, and then click Search .d.Select the SOA Operator role in the search results, then click Map Roles .The role is mapped to the user under soa-infra .14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.The Search Authorization Policies tab is displayed.16.Click the New icon under Functional Policies on the Search Authorization Policies page.17.On the Untitled tab, enter Policy for manage services catalog in the Name field.18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .If the use is not listed under Principals , then click + next to Principals .19.Perform the following steps in the Search Principal dialog.a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .c.Select the user name in the search results, then click Add Selected .d.Click Add Principals .
b.Select Contains from the dropdown menu next to Display Name .c.Enter SOA Operator in the Display Name field, and then click Search .d.Select the SOA Operator role in the search results, then click Map Roles .The role is mapped to the user under soa-infra .14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.The Search Authorization Policies tab is displayed.16.Click the New icon under Functional Policies on the Search Authorization Policies page.17.On the Untitled tab, enter Policy for manage services catalog in the Name field.18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .If the use is not listed under Principals , then click + next to Principals .19.Perform the following steps in the Search Principal dialog.a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .c.Select the user name in the search results, then click Add Selected .d.Click Add Principals .20.Select All next to Match under Principals .
c.Enter SOA Operator in the Display Name field, and then click Search .d.Select the SOA Operator role in the search results, then click Map Roles .The role is mapped to the user under soa-infra .14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.The Search Authorization Policies tab is displayed.16.Click the New icon under Functional Policies on the Search Authorization Policies page.17.On the Untitled tab, enter Policy for manage services catalog in the Name field.18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .If the use is not listed under Principals , then click + next to Principals .19.Perform the following steps in the Search Principal dialog.a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .c.Select the user name in the search results, then click Add Selected .d.Click Add Principals .20.Select All next to Match under Principals .21.Click + next to Targets .
d.Select the SOA Operator role in the search results, then click Map Roles .The role is mapped to the user under soa-infra .14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.The Search Authorization Policies tab is displayed.16.Click the New icon under Functional Policies on the Search Authorization Policies page.17.On the Untitled tab, enter Policy for manage services catalog in the Name field.18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .If the use is not listed under Principals , then click + next to Principals .19.Perform the following steps in the Search Principal dialog.a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .c.Select the user name in the search results, then click Add Selected .d.Click Add Principals .20.Select All next to Match under Principals .21.Click + next to Targets .22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.
The role is mapped to the user under soa-infra .14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.The Search Authorization Policies tab is displayed.16.Click the New icon under Functional Policies on the Search Authorization Policies page.17.On the Untitled tab, enter Policy for manage services catalog in the Name field.18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .If the use is not listed under Principals , then click + next to Principals .19.Perform the following steps in the Search Principal dialog.a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .c.Select the user name in the search results, then click Add Selected .d.Click Add Principals .20.Select All next to Match under Principals .21.Click + next to Targets .22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .
14.On the username tab ( CUSTOMER_OIC_INTEG_USER or whatever name you created), click Find Policies at the top-right corner of the page 15.In the Choose an Application dialog, select fscm and click OK.The Search Authorization Policies tab is displayed.16.Click the New icon under Functional Policies on the Search Authorization Policies page.17.On the Untitled tab, enter Policy for manage services catalog in the Name field.18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .If the use is not listed under Principals , then click + next to Principals .19.Perform the following steps in the Search Principal dialog.a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .c.Select the user name in the search results, then click Add Selected .d.Click Add Principals .20.Select All next to Match under Principals .21.Click + next to Targets .22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .24.Select Manage Webservices catalog in the search results, then click Add Selected .
The Search Authorization Policies tab is displayed.16.Click the New icon under Functional Policies on the Search Authorization Policies page.17.On the Untitled tab, enter Policy for manage services catalog in the Name field.18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .If the use is not listed under Principals , then click + next to Principals .19.Perform the following steps in the Search Principal dialog.a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .c.Select the user name in the search results, then click Add Selected .d.Click Add Principals .20.Select All next to Match under Principals .21.Click + next to Targets .22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .24.Select Manage Webservices catalog in the search results, then click Add Selected .25.Ensure Manage Webservices catalog is added onto Selected Targets .
16.Click the New icon under Functional Policies on the Search Authorization Policies page.17.On the Untitled tab, enter Policy for manage services catalog in the Name field.18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .If the use is not listed under Principals , then click + next to Principals .19.Perform the following steps in the Search Principal dialog.a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .c.Select the user name in the search results, then click Add Selected .d.Click Add Principals .20.Select All next to Match under Principals .21.Click + next to Targets .22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .24.Select Manage Webservices catalog in the search results, then click Add Selected .25.Ensure Manage Webservices catalog is added onto Selected Targets .26.Click Add Targets .
17.On the Untitled tab, enter Policy for manage services catalog in the Name field.18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .If the use is not listed under Principals , then click + next to Principals .19.Perform the following steps in the Search Principal dialog.a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .c.Select the user name in the search results, then click Add Selected .d.Click Add Principals .20.Select All next to Match under Principals .21.Click + next to Targets .22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .24.Select Manage Webservices catalog in the search results, then click Add Selected .25.Ensure Manage Webservices catalog is added onto Selected Targets .26.Click Add Targets .A new Policy for manage services catalog is added to the user.
18.Ensure your username ( CUSTOMER_OIC_INTEG_USER or whatever name you created) is listed under Principals .If the use is not listed under Principals , then click + next to Principals .19.Perform the following steps in the Search Principal dialog.a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .c.Select the user name in the search results, then click Add Selected .d.Click Add Principals .20.Select All next to Match under Principals .21.Click + next to Targets .22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .24.Select Manage Webservices catalog in the search results, then click Add Selected .25.Ensure Manage Webservices catalog is added onto Selected Targets .26.Click Add Targets .A new Policy for manage services catalog is added to the user.27.Click Save on the Untitled tab.
If the use is not listed under Principals , then click + next to Principals .19.Perform the following steps in the Search Principal dialog.a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .c.Select the user name in the search results, then click Add Selected .d.Click Add Principals .20.Select All next to Match under Principals .21.Click + next to Targets .22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .24.Select Manage Webservices catalog in the search results, then click Add Selected .25.Ensure Manage Webservices catalog is added onto Selected Targets .26.Click Add Targets .A new Policy for manage services catalog is added to the user.27.Click Save on the Untitled tab.28.Sign out from Oracle Authorization Policy Manager.
19.Perform the following steps in the Search Principal dialog.a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .c.Select the user name in the search results, then click Add Selected .d.Click Add Principals .20.Select All next to Match under Principals .21.Click + next to Targets .22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .24.Select Manage Webservices catalog in the search results, then click Add Selected .25.Ensure Manage Webservices catalog is added onto Selected Targets .26.Click Add Targets .A new Policy for manage services catalog is added to the user.27.Click Save on the Untitled tab.28.Sign out from Oracle Authorization Policy Manager.Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).
a.Select the Users tab.Chapter 2 Prerequisites for Creating a Connection 2-7b.Select Starts With from the User Name dropdown list, enter the user name (CUSTOMER_OIC_INTEG_USER or whatever name you created) in the User Name field, and then click Search .c.Select the user name in the search results, then click Add Selected .d.Click Add Principals .20.Select All next to Match under Principals .21.Click + next to Targets .22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .24.Select Manage Webservices catalog in the search results, then click Add Selected .25.Ensure Manage Webservices catalog is added onto Selected Targets .26.Click Add Targets .A new Policy for manage services catalog is added to the user.27.Click Save on the Untitled tab.28.Sign out from Oracle Authorization Policy Manager.Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.
c.Select the user name in the search results, then click Add Selected .d.Click Add Principals .20.Select All next to Match under Principals .21.Click + next to Targets .22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .24.Select Manage Webservices catalog in the search results, then click Add Selected .25.Ensure Manage Webservices catalog is added onto Selected Targets .26.Click Add Targets .A new Policy for manage services catalog is added to the user.27.Click Save on the Untitled tab.28.Sign out from Oracle Authorization Policy Manager.Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.
d.Click Add Principals .20.Select All next to Match under Principals .21.Click + next to Targets .22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .24.Select Manage Webservices catalog in the search results, then click Add Selected .25.Ensure Manage Webservices catalog is added onto Selected Targets .26.Click Add Targets .A new Policy for manage services catalog is added to the user.27.Click Save on the Untitled tab.28.Sign out from Oracle Authorization Policy Manager.Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.
20.Select All next to Match under Principals .21.Click + next to Targets .22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .24.Select Manage Webservices catalog in the search results, then click Add Selected .25.Ensure Manage Webservices catalog is added onto Selected Targets .26.Click Add Targets .A new Policy for manage services catalog is added to the user.27.Click Save on the Untitled tab.28.Sign out from Oracle Authorization Policy Manager.Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.
21.Click + next to Targets .22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .24.Select Manage Webservices catalog in the search results, then click Add Selected .25.Ensure Manage Webservices catalog is added onto Selected Targets .26.Click Add Targets .A new Policy for manage services catalog is added to the user.27.Click Save on the Untitled tab.28.Sign out from Oracle Authorization Policy Manager.Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.Upload a Security Certificate Certificates validate outbound SSL connections.
22.In the Search Target dialog, click the Entitlements tab, then select Starts With from the Name dropdown list.23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .24.Select Manage Webservices catalog in the search results, then click Add Selected .25.Ensure Manage Webservices catalog is added onto Selected Targets .26.Click Add Targets .A new Policy for manage services catalog is added to the user.27.Click Save on the Untitled tab.28.Sign out from Oracle Authorization Policy Manager.Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.Upload a Security Certificate Certificates validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.
23.Enter FND_MANAGE_CATALOG_SERVICE_PRIV , then click Search .24.Select Manage Webservices catalog in the search results, then click Add Selected .25.Ensure Manage Webservices catalog is added onto Selected Targets .26.Click Add Targets .A new Policy for manage services catalog is added to the user.27.Click Save on the Untitled tab.28.Sign out from Oracle Authorization Policy Manager.Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.Upload a Security Certificate Certificates validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.
24.Select Manage Webservices catalog in the search results, then click Add Selected .25.Ensure Manage Webservices catalog is added onto Selected Targets .26.Click Add Targets .A new Policy for manage services catalog is added to the user.27.Click Save on the Untitled tab.28.Sign out from Oracle Authorization Policy Manager.Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.Upload a Security Certificate Certificates validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.
25.Ensure Manage Webservices catalog is added onto Selected Targets .26.Click Add Targets .A new Policy for manage services catalog is added to the user.27.Click Save on the Untitled tab.28.Sign out from Oracle Authorization Policy Manager.Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.Upload a Security Certificate Certificates validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.See Upload an SSL Certificate .
26.Click Add Targets .A new Policy for manage services catalog is added to the user.27.Click Save on the Untitled tab.28.Sign out from Oracle Authorization Policy Manager.Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.Upload a Security Certificate Certificates validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.See Upload an SSL Certificate .Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.
A new Policy for manage services catalog is added to the user.27.Click Save on the Untitled tab.28.Sign out from Oracle Authorization Policy Manager.Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.Upload a Security Certificate Certificates validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.See Upload an SSL Certificate .Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.
27.Click Save on the Untitled tab.28.Sign out from Oracle Authorization Policy Manager.Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.Upload a Security Certificate Certificates validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.See Upload an SSL Certificate .Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.Once these tasks are completed, you can successfully configure a connection on the Connections page.
28.Sign out from Oracle Authorization Policy Manager.Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.Upload a Security Certificate Certificates validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.See Upload an SSL Certificate .Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.Once these tasks are completed, you can successfully configure a connection on the Connections page.You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.
Verify the Status of Location-Based Access Control (LBAC) Check if you have enabled Location-Based Access Control (LBAC) for Fusion Applications (for the Oracle CX Sales and B2B Service).If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.Upload a Security Certificate Certificates validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.See Upload an SSL Certificate .Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.Once these tasks are completed, you can successfully configure a connection on the Connections page.You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.
If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.Upload a Security Certificate Certificates validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.See Upload an SSL Certificate .Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.Once these tasks are completed, you can successfully configure a connection on the Connections page.You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.a.Log in to the identity domain as the domain administrator.
If LBAC is enabled, you must allowlist (explicitly allow identified entities access) the Oracle Integration NAT Gateway IP address in your LBAC.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.Upload a Security Certificate Certificates validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.See Upload an SSL Certificate .Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.Once these tasks are completed, you can successfully configure a connection on the Connections page.You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.a.Log in to the identity domain as the domain administrator.b.In the navigation pane, click Identity & Security .
If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.Upload a Security Certificate Certificates validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.See Upload an SSL Certificate .Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.Once these tasks are completed, you can successfully configure a connection on the Connections page.You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.a.Log in to the identity domain as the domain administrator.b.In the navigation pane, click Identity & Security .c.Click Domains .
If you do not perform this task, you can receive a 401 Access Denied error or 403 Forbidden error from Oracle Fusion Applications.Upload a Security Certificate Certificates validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.See Upload an SSL Certificate .Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.Once these tasks are completed, you can successfully configure a connection on the Connections page.You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.a.Log in to the identity domain as the domain administrator.b.In the navigation pane, click Identity & Security .c.Click Domains .d.Select your compartment.
Upload a Security Certificate Certificates validate outbound SSL connections.If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.See Upload an SSL Certificate .Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.Once these tasks are completed, you can successfully configure a connection on the Connections page.You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.a.Log in to the identity domain as the domain administrator.b.In the navigation pane, click Identity & Security .c.Click Domains .d.Select your compartment.e.Click the identity domain.
If you make an SSL connection in which the root certificate does not exist in Oracle Integration, an exception is thrown.In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.See Upload an SSL Certificate .Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.Once these tasks are completed, you can successfully configure a connection on the Connections page.You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.a.Log in to the identity domain as the domain administrator.b.In the navigation pane, click Identity & Security .c.Click Domains .d.Select your compartment.e.Click the identity domain.f.In the navigation pane, click Integrated applications .
In that case, you must upload the appropriate certificate.A certificate enables Oracle Integration to connect with external services.See Upload an SSL Certificate .Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.Once these tasks are completed, you can successfully configure a connection on the Connections page.You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.a.Log in to the identity domain as the domain administrator.b.In the navigation pane, click Identity & Security .c.Click Domains .d.Select your compartment.e.Click the identity domain.f.In the navigation pane, click Integrated applications .g.Click Add application .
A certificate enables Oracle Integration to connect with external services.See Upload an SSL Certificate .Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.Once these tasks are completed, you can successfully configure a connection on the Connections page.You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.a.Log in to the identity domain as the domain administrator.b.In the navigation pane, click Identity & Security .c.Click Domains .d.Select your compartment.e.Click the identity domain.f.In the navigation pane, click Integrated applications .g.Click Add application .h.Select Confidential Application , then click Launch workflow .
See Upload an SSL Certificate .Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.Once these tasks are completed, you can successfully configure a connection on the Connections page.You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.a.Log in to the identity domain as the domain administrator.b.In the navigation pane, click Identity & Security .c.Click Domains .d.Select your compartment.e.Click the identity domain.f.In the navigation pane, click Integrated applications .g.Click Add application .h.Select Confidential Application , then click Launch workflow .2. a.
Perform Prerequisites to Set Up the OAuth Authorization Code Credentials Security Policy Perform the following prerequisites to set up the OAuth Authorization Code Credentials security policy with an Oracle Fusion Applications identity domain, a non-Oracle FusionChapter 2 Prerequisites for Creating a Connection 2-8Applications identity domain (for example, the Oracle Integration identity domain), or Oracle Identity Cloud Service.Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.Once these tasks are completed, you can successfully configure a connection on the Connections page.You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.a.Log in to the identity domain as the domain administrator.b.In the navigation pane, click Identity & Security .c.Click Domains .d.Select your compartment.e.Click the identity domain.f.In the navigation pane, click Integrated applications .g.Click Add application .h.Select Confidential Application , then click Launch workflow .2. a.On the Details page, provide a name (for example, FA Resource ), and click Next .
Topics: Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with a Non-Oracle Fusion Applications Identity Domain Set Up the OAuth Authorization Code Credentials Security Policy with Oracle Identity Cloud Service Set Up the OAuth Authorization Code Credentials Security Policy with the Oracle Fusion Applications Identity Domain You must create a resource application to represent the Oracle Fusion Applications resource and a client application for Oracle Integration to use the OAuth Authorization Code Credentials security policy.Once these tasks are completed, you can successfully configure a connection on the Connections page.You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.a.Log in to the identity domain as the domain administrator.b.In the navigation pane, click Identity & Security .c.Click Domains .d.Select your compartment.e.Click the identity domain.f.In the navigation pane, click Integrated applications .g.Click Add application .h.Select Confidential Application , then click Launch workflow .2. a.On the Details page, provide a name (for example, FA Resource ), and click Next .b.On the Client page, click Next without making changes.
Once these tasks are completed, you can successfully configure a connection on the Connections page.You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.a.Log in to the identity domain as the domain administrator.b.In the navigation pane, click Identity & Security .c.Click Domains .d.Select your compartment.e.Click the identity domain.f.In the navigation pane, click Integrated applications .g.Click Add application .h.Select Confidential Application , then click Launch workflow .2. a.On the Details page, provide a name (for example, FA Resource ), and click Next .b.On the Client page, click Next without making changes.c.On the Resources page, click Configure this application as a resource server now .
You do not need to create any JWT signing certificates for upload into Oracle Fusion Applications.Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.a.Log in to the identity domain as the domain administrator.b.In the navigation pane, click Identity & Security .c.Click Domains .d.Select your compartment.e.Click the identity domain.f.In the navigation pane, click Integrated applications .g.Click Add application .h.Select Confidential Application , then click Launch workflow .2. a.On the Details page, provide a name (for example, FA Resource ), and click Next .b.On the Client page, click Next without making changes.c.On the Resources page, click Configure this application as a resource server now .d.Optionally update the value in the Access Token Expiration field.
Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource Create the Confidential Client Application for Oracle Integration Resolve Errors That Occur When Clicking Provide Consent Create an Identity Domain Resource Application to Represent the Oracle Fusion Applications Resource 1.Create an identity domain resource application to represent the Oracle Fusion Applications resource.a.Log in to the identity domain as the domain administrator.b.In the navigation pane, click Identity & Security .c.Click Domains .d.Select your compartment.e.Click the identity domain.f.In the navigation pane, click Integrated applications .g.Click Add application .h.Select Confidential Application , then click Launch workflow .2. a.On the Details page, provide a name (for example, FA Resource ), and click Next .b.On the Client page, click Next without making changes.c.On the Resources page, click Configure this application as a resource server now .d.Optionally update the value in the Access Token Expiration field.e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.
a.Log in to the identity domain as the domain administrator.b.In the navigation pane, click Identity & Security .c.Click Domains .d.Select your compartment.e.Click the identity domain.f.In the navigation pane, click Integrated applications .g.Click Add application .h.Select Confidential Application , then click Launch workflow .2. a.On the Details page, provide a name (for example, FA Resource ), and click Next .b.On the Client page, click Next without making changes.c.On the Resources page, click Configure this application as a resource server now .d.Optionally update the value in the Access Token Expiration field.e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.This is the primary recipient where the token is processed.
b.In the navigation pane, click Identity & Security .c.Click Domains .d.Select your compartment.e.Click the identity domain.f.In the navigation pane, click Integrated applications .g.Click Add application .h.Select Confidential Application , then click Launch workflow .2. a.On the Details page, provide a name (for example, FA Resource ), and click Next .b.On the Client page, click Next without making changes.c.On the Resources page, click Configure this application as a resource server now .d.Optionally update the value in the Access Token Expiration field.e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.This is the primary recipient where the token is processed.https:// FA_URL :443 g.In the Scopes section, click Add.
c.Click Domains .d.Select your compartment.e.Click the identity domain.f.In the navigation pane, click Integrated applications .g.Click Add application .h.Select Confidential Application , then click Launch workflow .2. a.On the Details page, provide a name (for example, FA Resource ), and click Next .b.On the Client page, click Next without making changes.c.On the Resources page, click Configure this application as a resource server now .d.Optionally update the value in the Access Token Expiration field.e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.This is the primary recipient where the token is processed.https:// FA_URL :443 g.In the Scopes section, click Add.h.In the Scope field, enter /.
d.Select your compartment.e.Click the identity domain.f.In the navigation pane, click Integrated applications .g.Click Add application .h.Select Confidential Application , then click Launch workflow .2. a.On the Details page, provide a name (for example, FA Resource ), and click Next .b.On the Client page, click Next without making changes.c.On the Resources page, click Configure this application as a resource server now .d.Optionally update the value in the Access Token Expiration field.e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.This is the primary recipient where the token is processed.https:// FA_URL :443 g.In the Scopes section, click Add.h.In the Scope field, enter /.i.In the Description field, enter All.
e.Click the identity domain.f.In the navigation pane, click Integrated applications .g.Click Add application .h.Select Confidential Application , then click Launch workflow .2. a.On the Details page, provide a name (for example, FA Resource ), and click Next .b.On the Client page, click Next without making changes.c.On the Resources page, click Configure this application as a resource server now .d.Optionally update the value in the Access Token Expiration field.e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.This is the primary recipient where the token is processed.https:// FA_URL :443 g.In the Scopes section, click Add.h.In the Scope field, enter /.i.In the Description field, enter All.j.Select Requires Consent .
f.In the navigation pane, click Integrated applications .g.Click Add application .h.Select Confidential Application , then click Launch workflow .2. a.On the Details page, provide a name (for example, FA Resource ), and click Next .b.On the Client page, click Next without making changes.c.On the Resources page, click Configure this application as a resource server now .d.Optionally update the value in the Access Token Expiration field.e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.This is the primary recipient where the token is processed.https:// FA_URL :443 g.In the Scopes section, click Add.h.In the Scope field, enter /.i.In the Description field, enter All.j.Select Requires Consent .k.Click Add, then click Next .
g.Click Add application .h.Select Confidential Application , then click Launch workflow .2. a.On the Details page, provide a name (for example, FA Resource ), and click Next .b.On the Client page, click Next without making changes.c.On the Resources page, click Configure this application as a resource server now .d.Optionally update the value in the Access Token Expiration field.e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.This is the primary recipient where the token is processed.https:// FA_URL :443 g.In the Scopes section, click Add.h.In the Scope field, enter /.i.In the Description field, enter All.j.Select Requires Consent .k.Click Add, then click Next .l.On the Web Tier Policy and Authorization pages, click Next without making any changes.
h.Select Confidential Application , then click Launch workflow .2. a.On the Details page, provide a name (for example, FA Resource ), and click Next .b.On the Client page, click Next without making changes.c.On the Resources page, click Configure this application as a resource server now .d.Optionally update the value in the Access Token Expiration field.e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.This is the primary recipient where the token is processed.https:// FA_URL :443 g.In the Scopes section, click Add.h.In the Scope field, enter /.i.In the Description field, enter All.j.Select Requires Consent .k.Click Add, then click Next .l.On the Web Tier Policy and Authorization pages, click Next without making any changes.m.Click Finish to complete resource application creation.
2. a.On the Details page, provide a name (for example, FA Resource ), and click Next .b.On the Client page, click Next without making changes.c.On the Resources page, click Configure this application as a resource server now .d.Optionally update the value in the Access Token Expiration field.e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.This is the primary recipient where the token is processed.https:// FA_URL :443 g.In the Scopes section, click Add.h.In the Scope field, enter /.i.In the Description field, enter All.j.Select Requires Consent .k.Click Add, then click Next .l.On the Web Tier Policy and Authorization pages, click Next without making any changes.m.Click Finish to complete resource application creation.n.Click Activate to activate your client application.
On the Details page, provide a name (for example, FA Resource ), and click Next .b.On the Client page, click Next without making changes.c.On the Resources page, click Configure this application as a resource server now .d.Optionally update the value in the Access Token Expiration field.e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.This is the primary recipient where the token is processed.https:// FA_URL :443 g.In the Scopes section, click Add.h.In the Scope field, enter /.i.In the Description field, enter All.j.Select Requires Consent .k.Click Add, then click Next .l.On the Web Tier Policy and Authorization pages, click Next without making any changes.m.Click Finish to complete resource application creation.n.Click Activate to activate your client application.The resource server representing the resource is now active.
b.On the Client page, click Next without making changes.c.On the Resources page, click Configure this application as a resource server now .d.Optionally update the value in the Access Token Expiration field.e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.This is the primary recipient where the token is processed.https:// FA_URL :443 g.In the Scopes section, click Add.h.In the Scope field, enter /.i.In the Description field, enter All.j.Select Requires Consent .k.Click Add, then click Next .l.On the Web Tier Policy and Authorization pages, click Next without making any changes.m.Click Finish to complete resource application creation.n.Click Activate to activate your client application.The resource server representing the resource is now active.Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.
c.On the Resources page, click Configure this application as a resource server now .d.Optionally update the value in the Access Token Expiration field.e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.This is the primary recipient where the token is processed.https:// FA_URL :443 g.In the Scopes section, click Add.h.In the Scope field, enter /.i.In the Description field, enter All.j.Select Requires Consent .k.Click Add, then click Next .l.On the Web Tier Policy and Authorization pages, click Next without making any changes.m.Click Finish to complete resource application creation.n.Click Activate to activate your client application.The resource server representing the resource is now active.Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.2.In the navigation pane, click Identity & Security .
d.Optionally update the value in the Access Token Expiration field.e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.This is the primary recipient where the token is processed.https:// FA_URL :443 g.In the Scopes section, click Add.h.In the Scope field, enter /.i.In the Description field, enter All.j.Select Requires Consent .k.Click Add, then click Next .l.On the Web Tier Policy and Authorization pages, click Next without making any changes.m.Click Finish to complete resource application creation.n.Click Activate to activate your client application.The resource server representing the resource is now active.Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.2.In the navigation pane, click Identity & Security .3.Click Domains .
e.Select Is Refresh Token Allowed .Chapter 2 Prerequisites for Creating a Connection 2-9f.In the Primary Audience field, add the Oracle Fusion Applications URL and port.This is the primary recipient where the token is processed.https:// FA_URL :443 g.In the Scopes section, click Add.h.In the Scope field, enter /.i.In the Description field, enter All.j.Select Requires Consent .k.Click Add, then click Next .l.On the Web Tier Policy and Authorization pages, click Next without making any changes.m.Click Finish to complete resource application creation.n.Click Activate to activate your client application.The resource server representing the resource is now active.Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.2.In the navigation pane, click Identity & Security .3.Click Domains .4.Select your compartment.
This is the primary recipient where the token is processed.https:// FA_URL :443 g.In the Scopes section, click Add.h.In the Scope field, enter /.i.In the Description field, enter All.j.Select Requires Consent .k.Click Add, then click Next .l.On the Web Tier Policy and Authorization pages, click Next without making any changes.m.Click Finish to complete resource application creation.n.Click Activate to activate your client application.The resource server representing the resource is now active.Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.2.In the navigation pane, click Identity & Security .3.Click Domains .4.Select your compartment.5.Click the identity domain.
https:// FA_URL :443 g.In the Scopes section, click Add.h.In the Scope field, enter /.i.In the Description field, enter All.j.Select Requires Consent .k.Click Add, then click Next .l.On the Web Tier Policy and Authorization pages, click Next without making any changes.m.Click Finish to complete resource application creation.n.Click Activate to activate your client application.The resource server representing the resource is now active.Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.2.In the navigation pane, click Identity & Security .3.Click Domains .4.Select your compartment.5.Click the identity domain.6.In the navigation pane, click Integrated applications .
h.In the Scope field, enter /.i.In the Description field, enter All.j.Select Requires Consent .k.Click Add, then click Next .l.On the Web Tier Policy and Authorization pages, click Next without making any changes.m.Click Finish to complete resource application creation.n.Click Activate to activate your client application.The resource server representing the resource is now active.Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.2.In the navigation pane, click Identity & Security .3.Click Domains .4.Select your compartment.5.Click the identity domain.6.In the navigation pane, click Integrated applications .7.Click Add application .
i.In the Description field, enter All.j.Select Requires Consent .k.Click Add, then click Next .l.On the Web Tier Policy and Authorization pages, click Next without making any changes.m.Click Finish to complete resource application creation.n.Click Activate to activate your client application.The resource server representing the resource is now active.Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.2.In the navigation pane, click Identity & Security .3.Click Domains .4.Select your compartment.5.Click the identity domain.6.In the navigation pane, click Integrated applications .7.Click Add application .8.Select Confidential Application , then click Launch workflow .
j.Select Requires Consent .k.Click Add, then click Next .l.On the Web Tier Policy and Authorization pages, click Next without making any changes.m.Click Finish to complete resource application creation.n.Click Activate to activate your client application.The resource server representing the resource is now active.Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.2.In the navigation pane, click Identity & Security .3.Click Domains .4.Select your compartment.5.Click the identity domain.6.In the navigation pane, click Integrated applications .7.Click Add application .8.Select Confidential Application , then click Launch workflow .9.Enter a name.
k.Click Add, then click Next .l.On the Web Tier Policy and Authorization pages, click Next without making any changes.m.Click Finish to complete resource application creation.n.Click Activate to activate your client application.The resource server representing the resource is now active.Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.2.In the navigation pane, click Identity & Security .3.Click Domains .4.Select your compartment.5.Click the identity domain.6.In the navigation pane, click Integrated applications .7.Click Add application .8.Select Confidential Application , then click Launch workflow .9.Enter a name.The remaining fields on this page are optional and can be ignored.
l.On the Web Tier Policy and Authorization pages, click Next without making any changes.m.Click Finish to complete resource application creation.n.Click Activate to activate your client application.The resource server representing the resource is now active.Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.2.In the navigation pane, click Identity & Security .3.Click Domains .4.Select your compartment.5.Click the identity domain.6.In the navigation pane, click Integrated applications .7.Click Add application .8.Select Confidential Application , then click Launch workflow .9.Enter a name.The remaining fields on this page are optional and can be ignored.10.Click Next .
m.Click Finish to complete resource application creation.n.Click Activate to activate your client application.The resource server representing the resource is now active.Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.2.In the navigation pane, click Identity & Security .3.Click Domains .4.Select your compartment.5.Click the identity domain.6.In the navigation pane, click Integrated applications .7.Click Add application .8.Select Confidential Application , then click Launch workflow .9.Enter a name.The remaining fields on this page are optional and can be ignored.10.Click Next .11.In the Client configuration box, select Configure this application as a client now .
n.Click Activate to activate your client application.The resource server representing the resource is now active.Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.2.In the navigation pane, click Identity & Security .3.Click Domains .4.Select your compartment.5.Click the identity domain.6.In the navigation pane, click Integrated applications .7.Click Add application .8.Select Confidential Application , then click Launch workflow .9.Enter a name.The remaining fields on this page are optional and can be ignored.10.Click Next .11.In the Client configuration box, select Configure this application as a client now .12.For authorization code, select Refresh token and Authorization code in the Allowed grant types section.
The resource server representing the resource is now active.Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.2.In the navigation pane, click Identity & Security .3.Click Domains .4.Select your compartment.5.Click the identity domain.6.In the navigation pane, click Integrated applications .7.Click Add application .8.Select Confidential Application , then click Launch workflow .9.Enter a name.The remaining fields on this page are optional and can be ignored.10.Click Next .11.In the Client configuration box, select Configure this application as a client now .12.For authorization code, select Refresh token and Authorization code in the Allowed grant types section.13.In the Redirect URL field, enter the redirect URL of the client application.
Create the Confidential Client Application for Oracle Integration 1.Sign in as the identity domain administrator to the Oracle Cloud Infrastructure Console.2.In the navigation pane, click Identity & Security .3.Click Domains .4.Select your compartment.5.Click the identity domain.6.In the navigation pane, click Integrated applications .7.Click Add application .8.Select Confidential Application , then click Launch workflow .9.Enter a name.The remaining fields on this page are optional and can be ignored.10.Click Next .11.In the Client configuration box, select Configure this application as a client now .12.For authorization code, select Refresh token and Authorization code in the Allowed grant types section.13.In the Redirect URL field, enter the redirect URL of the client application.After user login, this URL is redirected to with the authorization code.