JDE SSO and MFA

Datawiza empowers SSO (Single Sign-On) and MFA (Multi-Factor Authentication) for Oracle JD Edwards (JDE) by integrating with the identity provider of your choice. The solution not only enhances security, but also improves user experience.

jde sso and mfa with datawiza
Play Video

Integrate with your chosen identity provider like Microsoft Entra ID (Azure AD), Okta, Ping (PingOne), Duo, Oracle Identity Cloud Service (IDCS), Google Workspace and more.

Why Datawiza?

Quick Implementation

Datawiza can typically be deployed in minutes, without the need for OAM (Oracle Access Manager) or IDCS.

Multi-Tenant SSO Integration

Integrate with any identity providers including Microsoft Entra ID (Azure AD), Okta, Ping, Cisco Duo, IDCS, Google Workspace and others via OpenID Connect (OIDC), OAuth, SAML, LDAP.

Patch-Free Solution

No patches or additional installations on your existing JDE. Simply run our container on a separate server for an easy and seamless integration.

Datawiza JDE SSO and MFA. Integrates with Microsoft Entra ID (Azure AD), Okta, Ping, Cisco Duo, Oracle Cloud Identity Service (IDCS), Google Workspace and others via OpenID Connect (OIDC), OAuth, SAML, LDAP.
JDE SSO and MFA. integrates with Microsoft Entra ID (Azure AD, M365), Okta, Ping, Google and more.

How It Works

The Datawiza platform consists of two major components:

The Datawiza Access Proxy (DAP) is a lightweight container-based proxy. DAP integrates with identity providers to enable SSO, MFA and granular authorization.

The Datawiza Cloud Management Console (DCMC) is a centralized console for configuring access policies. DCMC aggregates logs and provides visibility. 

Here’s our joint tutorial with Microsoft on adding Microsoft Entra ID (Azure AD) SSO and MFA to JDE. Similarly, the process can be applied to other identity providers such as Okta, Cisco Duo and Ping.

5 Steps to Implement JDE SSO and MFA via Datawiza

Create an app integration in your identity platform
Configure JDE in DCMC
Run DAB as a reverse proxy to JDE
Test the configuration by logging into JDE via your SSO account
Inform your JDE users that SSO is available!