You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/2025.9/Guides/user-guides/user-interfaces/gateway/Admin/Authentication.md
+25-25Lines changed: 25 additions & 25 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -13,25 +13,7 @@ The Authentication page is used to setup authentication for accessing {{% ctx %}
13
13
14
14
## Anatomy
15
15
16
-
Authentication can be configured using [OpenID Connect (OIDC) Authentication][OIDC Authentication] with one or more providers, and [LDAP Authentication][] against Microsoft Active Directory.
OpenID Connect provides connections to third-party authentication services, e.g. Microsoft Entra. The OpenID Connect tab allows for one or more providers to be configured for users to authenticate with {{% ctx %}} Gateway, using Multi-Factor Authentication (MFA) if required.
23
-
24
-
Groups set up in Microsoft Entra, provide for {{% ctx %}} Role assignment and {{% ctx %}} Flow Editor permissions.
25
-
26
-
The fields available in the OIDC form are:
27
-
28
-
*`Provider Type` – the OIDC provider type. Currently, only Microsoft is the OIDC provider supported.
29
-
*`Identifier` – free-format, friendly unique name for this provider.
30
-
*`Display Name` – the text displayed in the {{% ctx %}} Gateway sign-in button.
31
-
*`Authority` – the URL for authentication to which to send authentication requests.
32
-
*`Tenant Identifier` – the Microsoft Entra Tenant ID for the organisation managing authentication.
33
-
*`Client Identifier` – the unique identifier to identify the {{% ctx %}} Gateway application to the authentication provider.
34
-
*`Client Secret` – the client secret that validate the Client Identifier to the authentication provider.
16
+
Authentication can be configured using [LDAP Authentication][] against a Microsoft Active Directory, and [OpenID Connect (OIDC) Authentication][OIDC Authentication] with one or more providers.
35
17
36
18
### LDAP Authentication
37
19
@@ -52,22 +34,40 @@ The fields available in the LDAP form are:
52
34
*`Password` – the password associated with the username entered in the Username field.
53
35
*`Base DNs` – the Active Directory objects that can be accessed by {{% ctx %}} Gateway. The identity of the objects is expressed using their Distinguished Names. More than one Distinguished Name can be set to refer to multiple objects within Active Directory. If no Distinguished Names are set, the whole of Active Directory is accessible.
54
36
55
-
##Actions
37
+
### OpenID Connect Authentication
56
38
57
-
### Add New OpenID Connect Authentication Provider
To configure {{% ctx %}} Gateway to use OpenID Connect Authentication, the application must be registered and configured with the provider. For assistance with configuring this see [FAQs][configure OIDC provider].
41
+
OpenID Connect provides connections to third-party authentication services, e.g. Microsoft Entra. The OpenID Connect tab allows for one or more providers to be configured for users to authenticate with {{% ctx %}} Gateway, using Multi-Factor Authentication (MFA) if required.
60
42
61
-
An Open ID Connect provider can be added to the authentication providers by selecting the `OpenID Connect` tab, then selecting the `+ New Provider` option and entering the connection information. Once the details have been entered it is necessary to validate the connection before being able to save them.
43
+
Groups set up in Microsoft Entra, provide for {{% ctx %}} Role assignment and {{% ctx %}} Flow Editor permissions.
62
44
63
-
See the [Add New OpenID Connect Authentication Provider][Add New OpenID Connect Authentication Provider tutorial] tutorial for a step-by-step guide.
45
+
The fields available in the OIDC form are:
46
+
47
+
*`Provider Type` – the OIDC provider type. Currently, only Microsoft is the OIDC provider supported.
48
+
*`Identifier` – free-format, friendly unique name for this provider.
49
+
*`Display Name` – the text displayed in the {{% ctx %}} Gateway sign-in button.
50
+
*`Authority` – the URL for authentication to which to send authentication requests.
51
+
*`Tenant Identifier` – the Microsoft Entra Tenant ID for the organisation managing authentication.
52
+
*`Client Identifier` – the unique identifier to identify the {{% ctx %}} Gateway application to the authentication provider.
53
+
*`Client Secret` – the client secret that validate the Client Identifier to the authentication provider.
54
+
55
+
## Actions
64
56
65
57
### Configure LDAP Authentication
66
58
67
59
LDAP Authentication can be configured by selecting the `LDAP` tab and entering the connection information. Once the details have been entered it is necessary to test the connection before being able to save them.
68
60
69
61
See the [Configure LDAP Authentication][Configure LDAP Authentication tutorial] tutorial for a step-by-step guide.
70
62
63
+
### Add New OpenID Connect Authentication Provider
64
+
65
+
To configure {{% ctx %}} Gateway to use OpenID Connect Authentication, the application must be registered and configured with the provider. For assistance with configuring this see [FAQs][configure OIDC provider].
66
+
67
+
An Open ID Connect provider can be added to the authentication providers by selecting the `OpenID Connect` tab, then selecting the `+ New Provider` option and entering the connection information. Once the details have been entered it is necessary to validate the connection before being able to save them.
68
+
69
+
See the [Add New OpenID Connect Authentication Provider][Add New OpenID Connect Authentication Provider tutorial] tutorial for a step-by-step guide.
70
+
71
71
## Remarks
72
72
73
73
### Known Limitations
@@ -84,8 +84,8 @@ None
84
84
85
85
### Related Tutorials
86
86
87
-
*[Add New OpenID Connect Authentication Provider][Add New OpenID Connect Authentication Provider tutorial]
0 commit comments