Overview
OAuth 2.0 PKCE authentication provides enterprise-grade security for connecting to Oracle Fusion Cloud. This feature integrates with your organization’s existing Single Sign-On (SSO) through Oracle Identity and Access Management (IAM).OAuth PKCE authentication requires a paid license. See Free vs Paid Features for more information.
Benefits of OAuth PKCE
Enhanced Security
- No password storage in VS Code
- Token-based authentication with PKCE
- Automatic token refresh
- Leverages existing enterprise SSO and MFA
Enterprise Integration
- Uses your existing Oracle Identity Domain
- Centralized access management through Oracle IAM
- Compliance with corporate security policies
- Full audit trail in Oracle systems
User Experience
- Single sign-on with enterprise credentials
- No password management required
- Seamless re-authentication
- Session persistence across VS Code restarts
Authentication Flow
Koala Data Explorer implements OAuth 2.0 PKCE authentication specifically with:- Oracle Identity Domains (part of Oracle Cloud Infrastructure)
- Oracle Fusion Cloud Applications resource access
- PKCE (Proof Key for Code Exchange) for enhanced security
Setting Up OAuth PKCE Authentication
OAuth PKCE setup requires coordination between your Oracle administrator and end users. The process has two phases:Phase 1: Administrator Setup (One-Time)
Your Oracle administrator must first configure OAuth in Oracle Identity and Access Management (IAM).Prerequisites for Administrators
- Access to Oracle Cloud console
- Administrator privileges in the Fusion Identity Domain
- Same identity domain used by your Oracle Fusion instance
Admin Configuration Steps
Step 1: Access Oracle IAM Console- Log into Oracle Cloud console
- Navigate to Identity & Security → Identity Domains
- Select your Fusion Identity Domain
- Go to Applications
- Click Add Application
- Select Mobile Application (creates a public PKCE client)
- Click Launch Workflow
- Name:
Koala Data Explorer OAuth Client
- Description:
VS Code extension for Oracle Fusion data access
- Client Type: Public (automatically set)
- Grant Types: Select “Authorization Code”
- PKCE: Enabled (automatic for mobile apps)
- Redirect URI: Add exactly:
This URI must match exactly - no trailing slashes or variations
- Add Resource: Select “Oracle Applications Cloud (Fusion)”
- Scopes: System auto-generates required scope like:
- Bypass Consent: Enable (recommended for internal use)
- Trust Scope: Enable for all selected scopes
- Client ID: Found in General → Client ID
- Authorization Endpoint:
https://your-idcs-instance.identity.oraclecloud.com/oauth2/v1/authorize
- Token Endpoint:
https://your-idcs-instance.identity.oraclecloud.com/oauth2/v1/token
- Scope: The auto-generated resource identifier from Step 3
Phase 2: End User Setup
Once administrators complete Phase 1, end users can configure OAuth connections:Step 1: Add OAuth Connection
- Open Koala Data Explorer in VS Code
- Press
Ctrl+Shift+P
→ “Koala: Manage Connections” - Click Add Connection
- Select OAuth PKCE as authentication type
Step 2: Enter Configuration Details
Use the values provided by your administrator:- Connection Name: Descriptive name (e.g., “Production OAuth”)
- Oracle Fusion URL: Your Fusion instance URL
- Client ID: From administrator
- Authorization Endpoint: From administrator
- Token Endpoint: From administrator
- Scope: From administrator
Step 3: Authenticate
- Click Save to save the connection
- Select the connection and click Connect
- Your browser opens for SSO authentication
- Log in with your enterprise credentials
- Complete any MFA requirements
- VS Code receives the authentication token
- Connection is established
Step 4: BIP Catalog Deployment
OAuth connections cannot automatically deploy the required BIP catalog.
- Click Deploy to BIP button in the query editor
- Select Download Catalog option
- Save the
Koala.catalog
file - Send this file to your Oracle administrator
- Request deployment to
/Custom/Koala/
in the BIP catalog
Token Management
OAuth PKCE authentication uses secure token-based access with automatic refresh capabilities.Automatic Token Refresh
Koala Data Explorer automatically:- Monitors token expiration
- Refreshes tokens before expiry
- Handles refresh failures gracefully
- Prompts for re-authentication when needed
Token Security
- Tokens stored in VS Code’s secure credential storage
- Encrypted at rest and in transit
- Never logged or exposed in diagnostics
- Automatically cleared when connection is removed
Troubleshooting OAuth PKCE
Common Issues
“Client authentication failed”- Verify application is configured as Mobile/Public client in Oracle IAM
- Ensure PKCE is enabled in grant types
- Check Client ID matches exactly
- Verify redirect URI matches exactly:
vscode://btss-corp.koala-data-explorer/oauth/callback
- Check for typos or extra characters
- Ensure no trailing slashes
- Verify scope string from Oracle administrator
- Check that Fusion resource is properly configured in Oracle IAM
- Ensure identity domain matches Fusion instance
- Check that default browser is set in your system
- Try copying the authorization URL manually to browser
- Verify network firewall settings allow browser communication
- Verify token endpoints are correct
- Check Oracle Fusion URL is accessible
- Ensure user has proper Fusion access rights and roles
Best Practices
For Administrators
- Use descriptive names for OAuth applications in Oracle IAM
- Document configuration values for end users
- Regularly review OAuth application permissions
- Monitor authentication logs in Oracle IAM console
- Keep identity domain aligned with Fusion instance
For End Users
- Use OAuth PKCE for production environments
- Leverage existing enterprise SSO and MFA policies
- Test connections after Oracle system maintenance
- Remove unused connections to maintain security
- Contact administrators for configuration issues
Security Considerations
- OAuth PKCE provides enhanced security over Basic authentication
- No passwords stored in VS Code
- Centralized access control through Oracle IAM
- Full audit trail in Oracle systems
- Automatic compliance with corporate identity policies