Skip to content

Commit 6d05e1c

Browse files
author
Donna-Marie Smith
committed
Changes following PO Review of Authentication
1 parent 239901b commit 6d05e1c

7 files changed

Lines changed: 38 additions & 31 deletions

File tree

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
---
22
title: "How do I configure OpenID Connect authentication?"
33
linkTitle: "How do I configure OpenID Connect authentication?"
4-
description: "Instructions on how to configure OpenID Connect authentication."
4+
description: "Instructions on how to configure OpenID Connect authentication for {{% ctx %}} Gateway."
55
weight: 300
66
---

content/en/docs/2025.9/FAQs/configure-oidc-authentication/microsoft-entra.md

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -19,7 +19,7 @@ In order to configure a Microsoft Entra Provider a Microsoft Azure account with
1919
1. Enter a meaningful Name for the {{% ctx %}} Gateway application.
2020
1. Select the appropriate Supported account type, e.g. `Accounts in this organizational directory only`.
2121
1. Click `Register`.
22-
1. Add a Redirect URL:
22+
1. Add a Redirect URI:
2323
1. Select the application registration created in Step 1.
2424
1. Click `Redirect URIs`.
2525
1. Click `+ Add a platform`.
@@ -35,16 +35,16 @@ In order to configure a Microsoft Entra Provider a Microsoft Azure account with
3535
1. Click `+ Add a permission`
3636
* Select `Microsoft Graph`
3737
* Select `Application permissions`.
38-
* Locate and Expand `GroupMember` and select `GroupMember.Read.All` to allow the application to authenticate itself without user interaction or consent.
38+
* Locate and expand `GroupMember` and select `GroupMember.Read.All` to allow the application to authenticate itself without user interaction or consent.
3939
* Click `Add permissions`.
4040
1. Click `+ Add a permission` again.
4141
* Select `Microsoft Graph`
4242
* Select `Delegated permissions`
43-
* Locate and Expand `Openid permissions`, and select:
44-
* `email` to allow access view the users’ email address.
43+
* Locate and expand `Openid permissions`, and select:
44+
* `email` to allow access to view the users’ email address.
4545
* `offline_access` to maintain access to data already accessed.
4646
* `openid` to allow users to sign in.
47-
* `profile` to allow access to view user’s basic profile.
47+
* `profile` to allow access to view the user’s basic profile.
4848
* Click `Add permissions`.
4949
1. Configure the token for group claim:
5050
1. Select the application registration created in Step 1.
@@ -65,8 +65,8 @@ In order to configure a Microsoft Entra Provider a Microsoft Azure account with
6565
* Set `Who can consent?` to `Admins and users`.
6666
* Enter an `Admin consent display name`, e.g. `Read Flows`.
6767
* Enter an `Admin consent description`, e.g. `Allows {{% ctx %}} client to read flows`.
68-
* Enter an `User consent display name`, e.g. `Read Your Flows`.
69-
* Enter an `User consent description`, e.g. `Allows {{% ctx %}} client to read Flows`.
68+
* Enter an `User consent display name`, e.g. `Read Your flows`.
69+
* Enter an `User consent description`, e.g. `Allows {{% ctx %}} client to read flows`.
7070
* Ensure `State` is set to `Enabled`.
7171
1. Click `Add scope`.
7272
1. Create Credentials for the Application:

content/en/docs/2025.9/Guides/user-guides/user-interfaces/gateway/Admin/Authentication.md

Lines changed: 25 additions & 20 deletions
Original file line numberDiff line numberDiff line change
@@ -1,56 +1,60 @@
11
---
22
title: "Authentication"
33
linkTitle: "Authentication"
4-
description: "Setup authentication for accessing {{% ctx %}} Gateway."
4+
description: "Setup authentication providers used to control access to {{% ctx %}} Gateway."
55
weight: 20
66
---
77

88
# {{% param title %}}
99

1010
## Summary
1111

12-
The Authentication page is used to setup authentication for accessing {{% ctx %}} Gateway.
12+
The Authentication page is used to setup one or more authentication providers used to control access to {{% ctx %}} Gateway.
1313

1414
## Anatomy
1515

16-
Authentication can be configured using [LDAP Authentication][] against a Microsoft Active Directory, and [OpenID Connect (OIDC) Authentication][OIDC Authentication] with one or more providers.
16+
Authentication can be configured using [LDAP][] against a Microsoft Active Directory, and [OpenID Connect (OIDC)][OIDC] with one or more providers.
1717

18-
### LDAP Authentication
18+
### LDAP
1919

2020
{{< figure src="/images/Authentication - LDAP.png" title="LDAP Authentication Configuration" >}}
2121

2222
LDAP authentication defines the connection to a Microsoft Active Directory server to authorise Active Directory users with different roles and permissions within {{% ctx %}} Gateway.
2323

24-
The LDAP form provides for the connection details to the LDAP server (URL or domain), port and protocol, plus the credentials of an AD User (typically a Service Account) that can read the Active Directory.
24+
It requires connection details to the Active Directory server (URL or domain), port and protocol, plus the credentials of an Active Directory account (typically a service account) that can read the Active Directory.
2525

26-
For additional security, and to avoid the clutter of irrelevant information, it is possible to filter the Active Directory information available for use in {{% ctx %}} Gateway to that defined by a set of Base DNs.
26+
For additional security, and to avoid the clutter of irrelevant information, it is possible to filter the Active Directory information available for use in {{% ctx %}} Gateway to that defined by a set of [Base DNs (Distinguished Names)][DNs].
2727

28-
The fields available in the LDAP form are:
28+
{{% ctx %}} Roles and Flow Editor permissions can be assigned to groups set up in Active Directory.
29+
30+
The fields available are:
2931

3032
* `Server` – specifies either URL or IPv4 address of the Active Directory server, or the domain name for the Active Directory domain.
31-
* `Port` – specifies the IPv4 port used to access Active Directory, typically either 389 or 636.
32-
* `Use SSL` – a checkbox to select the LDAPS protocol rather than LDAP.
33-
* `Username` – the name of a user with read permissions in Active Directory. A Service Account is used.
34-
* `Password` – the password associated with the username entered in the Username field.
35-
* `Base DNs` – the Active Directory objects that can be accessed by {{% ctx %}} Gateway. The identity of the objects is expressed using their Distinguished Names. More than one Distinguished Name can be set to refer to multiple objects within Active Directory. If no Distinguished Names are set, the whole of Active Directory is accessible.
33+
* `Port` – specifies the port used to access Active Directory, typically either 389 for LDAP or 636 for LDAPS.
34+
* `Use SSL` – a checkbox to connect via the LDAPS protocol rather than LDAP.
35+
* `Username` – the username of an account with read permissions in Active Directory; typically a service account is used.
36+
* `Password` – the password associated with the username entered in the `Username` field.
37+
* `Base DNs` – the Active Directory objects that can be accessed by {{% ctx %}} Gateway. The identity of the objects is expressed using their Distinguished Names. More than one Distinguished Name can be set to refer to multiple objects within the Active Directory. If no Distinguished Names are set, the whole of the Active Directory is accessible.
3638

37-
### OpenID Connect Authentication
39+
### OpenID Connect
3840

3941
{{< figure src="/images/Authentication - OIDC.png" title="Open ID Connect Provider Configuration" >}}
4042

41-
OpenID Connect provides connections to third-party authentication services, e.g. Microsoft Entra. The OpenID Connect tab allows for one or more providers to be configured for users to authenticate with {{% ctx %}} Gateway, using Multi-Factor Authentication (MFA) if required.
43+
OpenID Connect provides connections to third-party authentication services to authenticate users in {{% ctx %}} Gateway, using Multi-Factor Authentication (MFA) if the provider supports it.
44+
45+
The OpenID Connect tab currently only supports the Microsoft Entra provider but allows for one or more instances to be configured.
4246

43-
Groups set up in Microsoft Entra, provide for {{% ctx %}} Role assignment and {{% ctx %}} Flow Editor permissions.
47+
{{% ctx %}} Roles and Flow Editor permissions can be assigned to groups set up in Microsoft Entra.
4448

45-
The fields available in the OIDC form are:
49+
The fields available are:
4650

4751
* `Provider Type` – the OIDC provider type. Currently, only Microsoft is the OIDC provider supported.
4852
* `Identifier` – free-format, friendly unique name for this provider.
4953
* `Display Name` – the text displayed in the {{% ctx %}} Gateway sign-in button.
50-
* `Authority` – the URL for authentication to which to send authentication requests.
54+
* `Authority` – the URL to send authentication requests to.
5155
* `Tenant Identifier` – the Microsoft Entra Tenant ID for the organisation managing authentication.
5256
* `Client Identifier` – the unique identifier to identify the {{% ctx %}} Gateway application to the authentication provider.
53-
* `Client Secret` – the client secret that validate the Client Identifier to the authentication provider.
57+
* `Client Secret` – the client secret that validates the {{% ctx %}} Gateway application with the authentication provider.
5458

5559
## Actions
5660

@@ -87,10 +91,11 @@ None
8791
* [Configure LDAP Authentication][Configure LDAP Authentication tutorial]
8892
* [Add New OpenID Connect Authentication Provider][Add New OpenID Connect Authentication Provider tutorial]
8993

90-
[OIDC Authentication]: {{< ref "#openid-connect-authentication" >}}
91-
[LDAP Authentication]: {{< ref "#ldap-authentication" >}}
94+
[OIDC]: {{< ref "#openid-connect" >}}
95+
[LDAP]: {{< ref "#ldap" >}}
9296

9397
[Add New OpenID Connect Authentication Provider tutorial]: {{< url path="Cortex.Tutorials.Administration.Authentication.OpenID" >}}
9498
[Configure LDAP Authentication tutorial]: {{< url path="Cortex.Tutorials.Administration.Authentication.LDAP" >}}
9599

96100
[configure OIDC provider]: {{< url path="Cortex.Faqs.ConfigureOidcAuthentication.MainDoc" >}}
101+
[DNs]: {{< url path="MSDocs.Windows.Ldap.DNs" >}}

content/en/docs/2025.9/Tutorials/Administration/authentication.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
title: "Authentication"
33
linkTitle: "Authentication"
4-
description: "This section includes tutorials about configuring authentication."
4+
description: "This section includes tutorials about setting up authentication providers used to control access to {{% ctx %}} Gateway."
55
weight: 20
66
---
77

557 Bytes
Loading
-1.19 KB
Loading

data/urls.toml

Lines changed: 4 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1216,8 +1216,8 @@
12161216
MainDoc = "/docs/guides/user-guides/user-interfaces/gateway/admin/"
12171217
[Cortex.Guides.UserGuides.UserInterfaces.Gateway.Admin.Authentication]
12181218
MainDoc = "/docs/guides/user-guides/user-interfaces/gateway/admin/authentication/"
1219-
LdapAuth = "/docs/guides/user-guides/user-interfaces/gateway/admin/authentication/#ldap-authentication"
1220-
OidcAuth = "/docs/guides/user-guides/user-interfaces/gateway/admin/authentication/#openid-connect-authentication"
1219+
LdapAuth = "/docs/guides/user-guides/user-interfaces/gateway/admin/authentication/#ldap"
1220+
OidcAuth = "/docs/guides/user-guides/user-interfaces/gateway/admin/authentication/#openid-connect"
12211221
[Cortex.Guides.UserGuides.UserInterfaces.Gateway.Admin.Packages]
12221222
MainDoc = "/docs/guides/user-guides/user-interfaces/gateway/admin/packages/"
12231223
[Cortex.Guides.UserGuides.UserInterfaces.Gateway.Admin.Packages.Overview]
@@ -3628,6 +3628,8 @@
36283628
MainDoc = "https://learn.microsoft.com/en-us/windows/win32/fileio/naming-a-file"
36293629
NamingConventions = "https://learn.microsoft.com/en-us/windows/win32/fileio/naming-a-file#naming-conventions"
36303630
Paths = "https://learn.microsoft.com/en-us/windows/win32/fileio/naming-a-file#paths"
3631+
[MSDocs.Windows.Ldap]
3632+
DNs = "https://learn.microsoft.com/en-us/previous-versions/windows/desktop/ldap/distinguished-names"
36313633
[MSDocs.Windows.WindowsServer]
36323634
LogonTypes = "https://learn.microsoft.com/en-us/windows-server/identity/securing-privileged-access/reference-tools-logon-types"
36333635
NamingConventions = "https://learn.microsoft.com/en-us/troubleshoot/windows-server/active-directory/naming-conventions-for-computer-domain-site-ou"

0 commit comments

Comments
 (0)