________  ________  ________  ________  ________  ________  ________ 
 ╱        ╲╱        ╲╱    ╱   ╲╱        ╲╱    ╱   ╲╱        ╲╱    ╱   ╲
╱        _╱    ╱    ╱         ╱         ╱         ╱    ╱    ╱         ╱
╱       ╱╱        _╱         ╱       --╱╲__      ╱         ╱         ╱ 
╲_____╱╱ ╲____╱___╱╲________╱╲________╱   ╲_____╱╲___╱____╱╲__╱_____╱  

OCI – Configure Delegated Authentication [Part 3]


Create Linux PAM Confidential Application

A Confidential Application in OCI acts as a service account of sorts. The application serves as a gateway with a set of credentials that allows outside resources to interact with OCI objects. In this case, we will create a Confidential Application with a set of credentials that will permit the Linux PAM module on Linux systems to access OCI IDCS and authenticate user accounts.


1. On the domain Overview page in OCI, select Integrated applications on the left and then Add application


2. Choose Confidential Appliance and then Launch workflow


3. Populate the Name and Description fields and click Next


4. Under Client Configuration, select Configure and check Client credentials and JWT assertion


5. Scroll down to the bottom and check Add app roles. Click Add roles with the below items and click Next

  • Signin
  • User Administrator
  • Me
  • Posix Viewer


6. Select Finish to complete


7. Click Activate to enable the new application


Pages: 1 2 3 4 5 6 7 8