Integrate with Eloqua

Prerequisites

Before you install and configure an Eloqua orchestrated system, you must consider the following prerequisites and tasks.

Certified Components

The system can be any one of the following:

  • Eloqua

Supported Modes

Eloqua orchestrated system supports the following mode(s):
  • Managed System

Supported System Operations

The Eloqua orchestrated system supports the following operations:
  • Create user
  • Delete user
  • Reset Password
  • Assign Groups to a user
  • Remove Groups from a user
  • Assign Licences to a user
  • Remove Licences from a user

Obtain Client ID and Client Secret

Register the application in Eloqua to receive a unique Client ID and Client Secret.

  1. Sign in to the Eloqua instance.
  2. Navigate to Settings, and then AppCloud Developer.
  3. Select Create New App.
  4. Complete the required application details.
  5. In the OAuth section, enter the application URL in the OAuth Callback URL field.
  6. Select Save. Eloqua generates the Client ID and Client Secret. Save these credentials. You use them when you configure OAuth.

For detailed steps, see Authenticate using OAuth 2.0.

Generate Authorization Code (Browser)

Start the OAuth process by directing users to Eloqua’s authorization endpoint in a web browser.

  1. Open a browser and use the following URL. Replace the placeholders with the actual values:
    https://login.eloqua.com/auth/oauth2/authorize?response_type=code&client_id=<CLIENT_ID>&redirect_uri=<YOUR_CALLBACK_URL>&scope=full
  2. Authenticate and approve.
  3. After approval, you're redirected to the callback URL:
    https://yourapp.com/callback?code=AUTH_CODE_VALUE
  4. Copy and save the AUTH_CODE_VALUE from the URL.

Exchange Authorization Code for Tokens

Send the authorization code, along with the credentials, to Eloqua’s token endpoint using a REST client.

Use a REST client (such as Postman) to make a POST request:

  1. Endpoint
    POST https://login.eloqua.com/auth/oauth2/token
  2. Headers
    Authorization: Basic <BASE64(CLIENT_ID:CLIENT_SECRET)>
             Content-Type: application/x-www-form-urlencoded
  3. Body (form-data)
    grant_type=authorization_code
             code=<AUTH_CODE_VALUE>
             redirect_uri=<YOUR_CALLBACK_URL>

A successful request returns a JSON response that contains both access token and refresh token. Copy and save the refresh token. You use it when you configure OAuth.

Configure

You can establish a connection between Eloqua and Oracle Access Governance by entering connection details. To achieve this, use the Orchestrated Systems functionality available in the Oracle Access Governance Console.

Navigate to the Orchestrated Systems Page

Navigate to the Orchestrated Systems page of the Oracle Access Governance Console, by following these steps:
  1. From the Oracle Access Governance navigation menu  icon Navigation menu, select Service Administration → Orchestrated Systems .
  2. Select the Add an orchestrated system button to start the workflow.

Select system

On the Select system step of the workflow, you can specify which type of system you would like to onboard.

  1. Select Eloqua.
  2. Select Next.

Enter details

On the Add Details step of the workflow, enter the details for the orchestrated system:
  1. Enter a name for the system you want to connect to in the Name field.
  2. Enter a description for the system in the Description field.
  3. Decide if this orchestrated system is an authoritative source, and if Oracle Access Governance can manage permissions by setting the following check boxes.
    • This is the authoritative source for my identities

      Select one of the following:

      • Source of identities and their attributes: System acts as a source identities and associated attributes. New identities are created through this option .
      • Source of identity attributes only: System ingests additional identity attributes details and apply to existing identities. This option doesn't ingest or creates new identity records.
    • I want to manage permissions for this system
    The default value in each case is Unselected.
  4. Select Next.

Add owners

You can associate resource ownership by adding primary and additional owners. This drives self-service as these owners can then manage (read, update or delete) the resources that they own. By default, the resource creator is designated as the resource owner. You can assign one primary owner and up to 20 additional owners for the resources.
Note

When setting up the first Orchestrated System for your service instance, you can assign owners only after you enable the identities from the Manage Identities section.
To add owners:
  1. Select an Oracle Access Governance active user as the primary owner in the Who is the primary owner? field.
  2. Select one or more additional owners in the Who else owns it? list. You can add up to 20 additional owners for the resource.
You can view the Primary Owner in the list. All the owners can view and manage the resources that they own.

Account settings

On the Account settings step of the workflow, enter how you want Oracle Access Governance to manage accounts when the system is configured as a managed system:
  1. When a permission is requested and the account doesn't already exist, select this option to create new accounts . This option is selected by default. When selected, Oracle Access Governance creates an account if one doesn't exist when a permission is requested. If you clear this option, permissions are provisioned only for existing accounts in the orchestrated system. If no account exists, the provisioning operation fails.
  2. Select the recipients for notification emails when an account is created. The default recipient is User. If no recipients are selected, notifications aren't sent when accounts are created.
    • User
    • User manager
  3. Configure Existing Accounts
    Note

    You can only set these configurations if allowed by the system administrator. When global account termination settings are enabled, application administrators can't manage account termination settings at the orchestrated-system level.
    1. Select what to do with accounts when early termination begins: Choose the action to perform when an early termination begins. This happens when you need to revoke identity accesses before official termination date.
      • Delete: Deletes all accounts and permissions managed by Oracle Access Governance.
        Note

        If specific orchestrated system doesn't support the action, no action is taken.
      • Disable: Disables all accounts and disables permissions managed by Oracle Access Governance.
        • Delete the permissions for disabled accounts: To ensure zero residual access, select this to delete directly assigned permissions and policy-granted permissions during account disablement.
      • No action: No action is taken when an identity is flagged for early termination by Oracle Access Governance.
    2. Select what to do with accounts on the termination date: Select the action to perform during official termination. This happens when you need to revoke identity accesses on the official termination date.
      • Delete: Deletes all accounts and permissions managed by Oracle Access Governance.
        Note

        If specific orchestrated system doesn't support Delete action, then no action is taken.
      • Disable: Disables all accounts and disables permissions managed by Oracle Access Governance.
        • Delete the permissions for disabled accounts: To ensure zero residual access, select this to delete directly assigned permissions and policy-granted permissions during account disablement.
        Note

        If specific orchestrated system doesn't support the Disable action, then account is deleted.
      • No action: No action is taken on accounts and permissions by Oracle Access Governance.
  4. When an identity leaves your enterprise you must remove access to their accounts.
    Note

    You can only set these configurations if allowed by your system administrator. When global account termination settings are enabled, application administrators cannot manage account termination settings at the orchestrated-system level.

    Select one of the following actions for the account:

    • Delete: Delete all accounts and permissions managed by Oracle Access Governance.
    • Disable: Disable all accounts and mark permissions as inactive.
      • Delete the permissions for disabled accounts: Delete directly assigned and policy-granted permissions during account disablement to ensure zero residual access.
    • No action: Take no action when an identity leaves the organization.
    Note

    These actions are available only if supported by the orchestrated system type. For example, if Delete is not supported, you will only see the Disable and No action options.
  5. When all permissions for an account are removed, for example when an identity moves between departments, you may need to decide what to do with the account. Select one of the following actions, if supported by the orchestrated system type:
    • Delete
    • Disable
    • No action
  6. Manage accounts that aren't created by Access Governance: Select to manage accounts that are created directly in the orchestrated system. With this, you can reconcile existing accounts and manage them from Oracle Access Governance.
Note

If you don't configure the system as a managed system then this step in the workflow will display but is not enabled. In this case you proceed directly to the Integration settings step of the workflow.
Note

If your orchestrated system requires dynamic schema discovery, as with the Generic REST and Database Application Tables integrations, then only the notification email destination can be set (User, Usermanager) when creating the orchestrated system. You cannot set the disable/delete rules for movers and leavers. To do this you need to create the orchestrated system, and then update the account settings as described in Configure Orchestrated System Account Settings.

Configure Eloqua Using OAuth

On the Integration settings step of the workflow, enter the configuration details required to allow Oracle Access Governance to connect to Eloqua using OAuth.

Select the Do you want to use refresh token for authentication? checkbox and enter the details, as follows:

Field Description
Host

Enter the host name from the URL. For example secure.<pod>.eloqua.com.

Redirect URL

Callback URL after authentication. It must match with URL you entered during the application registration.

https://yourapp.example.com/callback
Authentication Server URL

The URL of Eloqua’s OAuth2 server for requesting tokens.

https://login.eloqua.com/auth/oauth2/token
Client ID

Client ID of the app displayed when registering the integration in Eloqua. See Obtain Client ID and Client Secret.

Client Secret

Client secret of the app displayed when registering the integration in Eloqua. See Obtain Client ID and Client Secret.

Refresh Token

A token used to refresh the access token automatically when it expires. For example, eyJraWQiOi...2IHpuqg. See Exchange Authorization Code for Tokens.

Request Timeout

Maximum time to wait (in milliseconds) before canceling the request. 30000.

Finish Up

The final step of the workflow is Finish Up, where you're specific a choice whether to further configure the orchestrated system before running a data load, or accept the default configuration and start a data load. Select one from:
  • Customize before enabling the system for data loads
  • Activate and prepare the data load with the provided defaults

Post Configuration

There are no post configuration steps associated with an Eloqua system.