Introduction
Oracle Application Server Single Sign-On (SSO) Authentication provides a
centralized authentication mechanism that allows users to access multiple
Oracle applications with a single set of credentials. By integrating Oracle
APEX with Oracle Application Server SSO, organizations can streamline user
login experiences, improve security through unified identity management, and
reduce the complexity of managing multiple user accounts. This approach is
ideal for enterprises seeking seamless and secure access across their
application ecosystem.
Oracle Application Server Single Sign-On (SSO) Authentication in Oracle APEX allows users to log in once and gain access to multiple applications without re-entering credentials. This is achieved by integrating APEX with Oracle Application Server’s SSO infrastructure, which manages user identities centrally and provides seamless authentication across connected applications.
To configure Oracle Application Server SSO Authentication, start by ensuring that your Oracle Application Server environment is set up with the SSO component enabled and properly configured. This includes having the Oracle Internet Directory (OID) or another LDAP directory as the user store, and the WebGate or mod_osso agent installed and configured on your web server to intercept and authenticate requests.
In Oracle APEX, navigate to your application and go to Shared Components > Authentication Schemes. Click Create, then select Based on a Preconfigured Scheme from Gallery. Choose Oracle Application Server Single Sign-On from the list and proceed.
Configure the authentication scheme by specifying parameters such as:
- The SSO login and logout URLs provided by your Oracle Application Server environment.
- The HTTP header name (usually REMOTE_USER) where the authenticated username is passed by the SSO agent.
- Any additional attributes or user mapping settings required to align the SSO username with APEX user records.
Once configured, set this scheme as the current authentication method for your application. When a user accesses the application, the Oracle Application Server SSO will check if they are already authenticated. If not, the user is redirected to the centralized login page. Upon successful login, the SSO agent passes the user’s identity to APEX via HTTP headers, allowing APEX to create a session for that user without requiring further authentication.
You can also define a Post-Authentication Procedure in PL/SQL within APEX to load additional user information, roles, or preferences based on the SSO user identity.
This setup allows enterprises to enforce consistent security policies, simplify password management, and provide a unified user experience across Oracle applications. It also supports advanced features like single logout, session management, and auditing through the Oracle Application Server.
Care must be taken to ensure that communication between the web server, SSO infrastructure, and APEX is secure, typically using HTTPS and proper firewall rules. Additionally, mapping between the SSO user and APEX user accounts should be maintained to provide appropriate authorization within the application.
By implementing Oracle Application Server Single Sign-On Authentication, Oracle APEX applications benefit from centralized identity management and seamless user access, improving both security and user convenience.
Oracle APEX supports authentication through Oracle Application Server Single Sign-On (SSO), allowing users to log in once and access multiple applications without re-entering credentials. This method delegates authentication to the Oracle AS SSO Server, ensuring centralized authentication across enterprise applications.
Prerequisites for Using Oracle AS SSO Authentication
To use this authentication scheme, the following conditions must be met:
- Partner Application Registration – Your site must be registered as a partner application with the Oracle AS SSO server.
- Oracle 9iAS SSO Software Developer Kit (SDK) – This authentication scheme only appears if the SDK is installed in your database.
- SSO Server Setup – The Oracle AS SSO server must be properly configured to handle authentication requests.
How Oracle AS SSO Authentication Works
- User Requests Access – When a user accesses an APEX application for the first time in a new browser session, APEX redirects them to the Oracle AS SSO login page.
- SSO Authentication – The user logs in using SSO credentials, and the Oracle AS SSO server verifies their identity.
- Redirect to APEX – Once authenticated, the SSO server redirects the user back to the APEX application.
- Session Management – The APEX engine retrieves the user identity and grants access to the application.
- Continued Access – The user remains authenticated until they log out or terminate their session.
Limitations and Modern Alternatives
- Legacy Technology – Oracle AS SSO is an older authentication method and requires specific Oracle infrastructure.
- Requires Additional Setup – Applications must be manually registered as partner applications, which can be complex.
- No Integrated Login Page – Authentication is fully handled by the SSO server, limiting customization options.
Recommended Modern Alternatives
- SAML 2.0 Authentication – Secure and widely adopted Single Sign-On protocol for enterprise authentication.
- OAuth2 & OpenID Connect (OIDC) – Supports authentication via identity providers like Oracle Identity Cloud Service (IDCS), Microsoft Entra ID (formerly Azure AD), and Google.
- Social Sign-In – Allows users to authenticate with Google, Facebook, or other social providers.
Oracle recommends transitioning to a modern Single Sign-On method, such as SAML or OAuth2, for enhanced security, flexibility, and support for cloud-based identity providers.
Learn how to set up Single Sign-On authentication.
To set up Oracle Application Server Single Sign-On:
- On the Workspace home page, click the App Builder icon.
- Select an application.
- On the Application home page, click Shared Components.
The Shared Components page appears.
- Under Security, select Authentication Schemes.
- On the Authentication Schemes page, click Create.
- Select Based on a pre-configured scheme from the gallery and click Next.
- Under Name:
- Name - Enter the name used to reference the authentication scheme by other application developers.
- Scheme Type - Select Oracle Application Server Single Sign-On.
- Under Settings:
a. Partner Application Name - If you authenticate with Oracle Application Server Single Sign-On and your application is a registered partner application with SSO, then enter exactly the same name you used when registering the partner application with SSO.
b. If you are relying on APEX to be the registered partner application, leave this field blank.
c. Logout URL of SSO Server - Enter the logout path of the Single Sign-On Server (for example https://login.example.com/sso/logout). On logout of your application, APEX will use this value, concatenate '?p_done_url=' and the application's login url, and use the resulting URL to log out of Single Sign-On before redirecting back to your application.
Finally, Click Create Authentication Scheme.
Conclusion
Implementing Oracle Application Server Single Sign-On (SSO) Authentication in
Oracle APEX enhances both security and usability by centralizing authentication
processes. It simplifies user management, reduces password fatigue, and enables
consistent enforcement of access policies. When properly configured, SSO
integration ensures that users can efficiently and securely navigate multiple
Oracle applications without repeated logins, delivering a smoother and more
professional user experience.