Oracle Corporation UK Limited

Identity Cloud Service

The service (APN B86144) provides an innovative, fully integrated platform of identity and access management capabilities through a UK-hosted, multi-tenant, IDaaS Cloud platform. It is cloud-native and designed to be an integral part of the enterprise security fabric, providing modern identity for modern applications across employees, contractors, partners, and citizens.


  • Single administrative and end-user view of connected applications
  • Self-service based profile and password management
  • Federated single sign-on using industry open standards
  • Integrates with existing, on-premise identity and access management systems
  • Enable use of on-premise AD/IAM for federated authentication
  • Integrates with public cloud, external SaaS
  • 100% API accessible
  • Enables Bring-Your-Own-Application to accelerate custom application development
  • Authentication Service via IDCS as SAML/OpenID Connect/OAuth
  • SCIM Identity Provider for simplified user management


  • Platform approach reduces integration/maintenance costs associated with point solutions
  • Improved business responsiveness through immediate access to applications
  • Enhanced user productivity and experience by providing SSO/self-service
  • Hybrid multi-channel access through one-click application access
  • Reduced administration through easy management of users
  • Simplified IT – Oracle provides upgrades and system maintenance
  • Reduced cost by leveraging existing directory infrastructure
  • Reduced application development through delegating Identity management to IDCS


£204 per licence

  • Free trial available

Service documents

G-Cloud 9


Oracle Corporation UK Limited

Adrienne Belton

+44 118 92 43257

Service scope

Service scope
Service constraints N/a
System requirements None. Can integrate with existing IAM but not mandatory

User support

User support
Email or online ticketing support Email or online ticketing
Support response times Target response times are withn in 15 minutes for severity 1 issues.
User can manage status and priority of support tickets Yes
Online ticketing support accessibility None or don’t know
Phone support Yes
Phone support availability 24 hours, 7 days a week
Web chat support Web chat
Web chat support availability 24 hours, 7 days a week
Web chat support accessibility standard WCAG 2.0 AA or EN 301 549 9: Web
Web chat accessibility testing Oracle products are tested for accessibility using a variety of techniques including automated tools, expert heuristic review, visual inspection, manual operation, and testing with various AT by both disabled and non-disabled users. We report the outcome of that testing using the Voluntary Product Accessibility Template (VPAT). The VPAT was developed by ITI and GSA to assist Federal contracting officials and other buyers in making preliminary assessments regarding the availability of commercial ICT products and services with features that support accessibility. See Voluntary Product Accessibility Templates for an in-depth discussion of how we use the VPAT, and to locate the VPATs for Oracle products.
Onsite support Yes, at extra cost
Support levels Oracle provides enhanced electronic-based and telephone technical support to customers with a current technical support services agreement. Customers have access to the largest and most advanced support organization in the world, with more than 50,000 development engineers and customer support specialists, working in 29 languages from 28 global support centers across 145 countries.
Technical support services are available to resolve product issues quickly and accurately by providing answers to product questions that are general or routine in nature. This includes questions about product functionality, syntax, setup, and use. Technical support engineers will also work with customers to diagnose and troubleshoot errors, determine workarounds, and process enhancement requests.
Technical support is provided for issues (including problems created by the user) that are demonstrable, running unaltered, and on an appropriate hardware, database and operating system configuration, as specified in the customer order or program documentation.
In addition, working with the global support hubs, Oracle provides onsite hardware support for Oracle and Sun branded systems either directly, or in some countries through an extensive partner network. For further information please refer to Oracle Technical Support Policy documents provided at:
Support available to third parties Yes

Onboarding and offboarding

Onboarding and offboarding
Getting started Within the Oracle Help Center, alongside product documentation are a number of videos, tutorials, and blogs showing users of the service how to accomplish different tasks and get up to speed on the use of the service.
Service documentation Yes
Documentation formats
  • HTML
  • PDF
End-of-contract data extraction For a period of no less than 60 days after the termination or expiration of the Services, Oracle will make available Your production data via secured protocols, or keep the service system accessible, for the purpose of data retrieval by You. During this period, the service system should not be used for production activities. Oracle has no obligation to retain Your Content after this 60 day period.
End-of-contract process After termination or expiration of the Services under Your order, or at Your request, Oracle will delete or otherwise render inaccessible the production Services, including Your Content residing therein, in a manner designed to ensure that they cannot reasonably be accessed or read, unless there is a legal obligation imposed on Oracle preventing it from deleting all or part of the service environment.

Using the service

Using the service
Web browser interface Yes
Using the web interface All functions can be controlled via the WebUI.
Web interface accessibility standard None or don’t know
How the web interface is accessible N/a
Web interface accessibility testing Oracle products are tested for accessibility using a variety of techniques including automated tools, expert heuristic review, visual inspection, manual operation, and testing with various AT by both disabled and non-disabled users. We report the outcome of that testing using the Voluntary Product Accessibility Template (VPAT). The VPAT was developed by ITI and GSA to assist Federal contracting officials and other buyers in making preliminary assessments regarding the availability of commercial ICT products and services with features that support accessibility. See-Voluntary-Product Accessibility Templates for an in-depth discussion of how we use-the VPAT, and to locate the VPATs for Oracle products.
What users can and can't do using the API Identity Cloud Service is 100% API accessible. All features that are available in the web interface are available via API. In fact, the API is written first and then the web interface written against that API.

API automation tools Other
Other API automation tools
  • All APIs are SCIM 2.0 compliant, utilising JSON, REST, HTTP,
  • Requiring Oauth token for authentication and authorisation.
  • Any automation tools supporting those standards will work
API documentation Yes
API documentation formats HTML
Command line interface No


Scaling available Yes
Scaling type Automatic
Independence of resources Oracle’s cloud services are architected from the ground up to serve the needs of large enterprises. Our elastic cloud architecture supports independent scaling at each of 3 tiers: Web, Application, and Database. Our provisioning and load balancing processes dynamically add additional resources based on current and anticipated usage. Because Oracle owns its own data centers and all elements of the hardware and software stack, we are also uniquely able to scale our cloud solutions.
Usage notifications Yes
Usage reporting Email


Infrastructure or application metrics Yes
Metrics types Other
Other metrics Status and Uptime Percentage
Reporting types Real-time dashboards


Supplier type Not a reseller

Staff security

Staff security
Staff security clearance Other security clearance
Government security clearance None

Asset protection

Asset protection
Knowledge of data storage and processing locations Yes
Data storage and processing locations
  • European Economic Area (EEA)
  • EU-US Privacy Shield agreement locations
User control over data storage and processing locations No
Datacentre security standards Supplier-defined controls
Penetration testing frequency At least once a year
Penetration testing approach Another external penetration testing organisation
Protecting data at rest Physical access control, complying with another standard
Data sanitisation process Yes
Data sanitisation type Deleted data can’t be directly accessed
Equipment disposal approach Complying with a recognised standard, for example CSA CCM v.30, CAS (Sanitisation) or ISO/IEC 27001

Backup and recovery

Backup and recovery
Backup and recovery Yes
Backup controls As an Oracle-managed PaaS service, Oracle is responsible for backing up the service
Datacentre setup Multiple datacentres
Scheduling backups Supplier controls the whole backup schedule
Backup recovery Users contact the support team

Data-in-transit protection

Data-in-transit protection
Data protection between buyer and supplier networks
  • TLS (version 1.2 or above)
  • Other
Other protection between networks IPSec VPN available as an option
Data protection within supplier network Other
Other protection within supplier network Data-in-transit within Oracle internal network is unencrypted. However it is monitored by the McAfee Intrusion Detection System (IDS) for detection of anomalous and/or malicious activity.

Availability and resilience

Availability and resilience
Guaranteed availability The service level objective is 99.95%. Refunds are through negotiation.
Approach to resilience Redundancy is built in to all Oracle Systems. Each site in turn has its own redundancies built in with dual data feeds, backup power solutions and each operated in a N+1 configuration.
Outage reporting Outages originating from Data Centre are initially reported to Oracle via email to nominated support staff. Customers are alerted via emails from relevant Oracle service team to nominated Customer administrators.

Identity and authentication

Identity and authentication
User authentication Username or password
Access restrictions in management interfaces and support channels The customer Admin User and the administrators they create are granted access to the My Oracle Support (MOS) channel. This enables them to raise Service Requests via the MOS Portal or via phone-call.
Access restriction testing frequency At least once a year
Management access authentication
  • 2-factor authentication
  • Dedicated link (for example VPN)
Devices users manage the service through Any device but through a bastion host (a bastion host is a server that provides access to a private network from an external network such as the internet)

Audit information for users

Audit information for users
Access to user activity audit information Users have access to real-time audit information
How long user audit data is stored for At least 12 months
Access to supplier activity audit information You control when users can access audit information
How long supplier audit data is stored for At least 12 months
How long system logs are stored for Between 1 month and 6 months

Standards and certifications

Standards and certifications
ISO/IEC 27001 certification No
ISO 28000:2007 certification No
CSA STAR certification No
PCI certification No
Other security accreditations Yes
Any other security accreditations SOC1 and 2

Security governance

Security governance
Named board-level person responsible for service security Yes
Security governance accreditation No
Security governance approach N.a
Information security policies and processes Information Security policies and processes for PaaS services in Oracle Public Cloud are aligned with existing policies, controls and processes in place for SaaS, which has ISO27001 certification.

Operational security

Operational security
Configuration and change management standard Supplier-defined controls
Configuration and change management approach The Cloud Change Management process manages the introduction of changes into any Cloud environment and is designed to ensure minimal disruption from planned outages and quick recovery from unplanned outages. Oracle Cloud Operations performs changes to cloud hardware infrastructure, operating software, product software, and supporting application software to maintain  operational stability, availability, security, performance, and currency of the Oracle Cloud.
Vulnerability management type Supplier-defined controls
Vulnerability management approach Oracle Cloud follows a vulnerability management process and procedure that includes identification of vulnerabilities, ranking of vulnerabilities by severity, prioritization of vulnerability remediations by severity and re-testing.  All changes required by vulnerability remediations follow our standard change management processes
Protective monitoring type Supplier-defined controls
Protective monitoring approach Oracle have implemented protective monitoring controls in order to oversee how Cloud systems are used (or abused) and to assure user accountability for their use of these services. The controls include mechanisms for collecting log information and configuring logs in order to provide an audit trail of security relevant events of interest.
Incident management type Supplier-defined controls
Incident management approach "The Oracle Information Security Incident Reporting and Response Policy details the procedures that must be followed by all Oracle employees should an incident be identified. It includes:
·          Mandatory reporting of security events
·          Mandatory reporting of security weaknesses
·          Assessment and classification of security incidents
·          Incident classification and escalation
·          Preservation of evidence"

Secure development

Secure development
Approach to secure software development best practice Supplier-defined process

Separation between users

Separation between users
Virtualisation technology used to keep applications and users sharing the same infrastructure apart Yes
Who implements virtualisation Supplier
Virtualisation technologies used Oracle VM
How shared infrastructure is kept separate Each customer organisation is provisioned with their own VM environment ensuring segregation from other organisations sharing the same physical server infrastructure.

Energy efficiency

Energy efficiency
Energy-efficient datacentres No


Price £204 per licence
Discount for educational organisations No
Free trial available Yes
Description of free trial 30 Day Trial - On Application.


Pricing document View uploaded document
Terms and conditions document View uploaded document
Return to top ↑