The login prompt looked normal, but this time my SQL*Plus session came alive only after a browser window flashed open and asked me to sign in. No password stored in tnsnames. No wallet on disk. Just OpenID Connect doing its quiet work and linking my identity to the database in seconds.
OpenID Connect (OIDC) with SQL*Plus isn’t theory anymore. It’s now possible to enforce strong, federated identity without sacrificing the command-line workflow that DBAs and developers trust. By binding SQL*Plus login to an OIDC provider, you control authentication at the identity layer, not the network layer. You can integrate with Okta, Azure AD, or any compliant IdP. The handshake is direct and standards-based.
It starts when SQL*Plus requests a token. The tool sends you to your browser, where you authenticate through your OIDC provider. Once approved, an access token comes back. SQL*Plus uses it to open your session. No secrets are stored locally. No static passwords to rotate. Access control shifts to your IdP, where you can apply MFA, conditional rules, or session expiry policies.
This approach strengthens security because credentials never pass in plain text over SQL*Net. Revoking access is instant—disable the user in the IdP and the database login dies with it. Session logging improves too: the database knows exactly which federated identity mapped to which schema.