Close this search box.


Datawiza enables Oracle JD Edwards (JDE) Single Sign-On (SSO) login and Multi-Factor Authentication (MFA) or Two-Factor Authentication (2FA) in mins. It seamlessly integrates with your chosen identity provider like Microsoft Entra ID (Azure AD, Office 365, M365), Okta, Ping Identity (PingOne), Cisco Duo, Google and more.

jde sso and mfa with datawiza
Play Video

Acting as a reverse proxy, Datawiza enables JDE SSO login and MFA (2FA) in mins without patching anything to your JDE systems.

Why Datawiza for JDE SSO & MFA?

Quick Implementation

Datawiza can typically be deployed in minutes, without the need for OAM (Oracle Access Manager) or IDCS.

Multi-Tenant SSO Integration

Integrate with any identity providers including Microsoft Entra ID (Azure AD), Okta, Ping, Cisco Duo, IDCS, Google Workspace and others via OpenID Connect (OIDC), OAuth, SAML, LDAP.

Patch-Free Solution

No patches or additional installations on your existing JDE. Simply run our container on a separate server for an easy and seamless integration.

Datawiza JDE SSO and MFA. Integrates with Microsoft Entra ID (Azure AD), Okta, Ping, Cisco Duo, Oracle Cloud Identity Service (IDCS), Google Workspace and others via OpenID Connect (OIDC), OAuth, SAML, LDAP.
JDE SSO and MFA. integrates with Microsoft Entra ID (Azure AD, M365), Okta, Ping, Google and more.

How Datawiza Enables JDE SSO and MFA?

The Datawiza platform consists of two major components:

The Datawiza Access Proxy (DAP) is a lightweight container-based proxy. DAP integrates with identity providers to enable SSO, MFA and granular authorization.

The Datawiza Cloud Management Console (DCMC) is a centralized console for configuring access policies. DCMC aggregates logs and provides visibility. 

Here’s our joint tutorial with Microsoft on adding Microsoft Entra ID (Azure AD) SSO and MFA to JDE. Similarly, the process can be applied to other identity providers such as Okta, Cisco Duo and Ping.

5 Steps to Implement JDE SSO and MFA via Datawiza

Create an app integration in your identity platform
Configure JDE in DCMC
Run DAB as a reverse proxy to JDE
Test the configuration by logging into JDE via your SSO account
Inform your JDE users that SSO is available!