You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/en/docs/2025.9/Guides/user-guides/user-interfaces/gateway/Admin/Authentication.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,9 +26,9 @@ Groups set up in Microsoft Entra, provide for {{% ctx %}} Role assignment and {{
26
26
The fields available in the OIDC form are:
27
27
28
28
*`Provider Type` – the OIDC provider type. Currently, only Microsoft is the OIDC provider supported.
29
-
*`Identifier` – Free-format, friendly unique name for this provider
30
-
*`Display Name` – the text displayed in the {{% ctx %}} Gateway sign-in button
31
-
*`Authority` – the URL for authentication to which to send authentication requests
29
+
*`Identifier` – free-format, friendly unique name for this provider.
30
+
*`Display Name` – the text displayed in the {{% ctx %}} Gateway sign-in button.
31
+
*`Authority` – the URL for authentication to which to send authentication requests.
32
32
*`Tenant Identifier` – the Microsoft Entra Tenant ID for the organisation managing authentication.
33
33
*`Client Identifier` – the unique identifier to identify the {{% ctx %}} Gateway application to the authentication provider.
34
34
*`Client Secret` – the client secret that validate the Client Identifier to the authentication provider.
@@ -50,7 +50,7 @@ The fields available in the LDAP form are:
50
50
*`Use SSL` – a checkbox to select the LDAPS protocol rather than LDAP.
51
51
*`Username` – the name of a user with read permissions in Active Directory. A Service Account is used.
52
52
*`Password` – the password associated with the username entered in the Username field.
53
-
*`Base DNs` – the Active Directory objects that can be accessed by {{% ctx %}} Gateway. The identity of the objects is expressed using their Distinguished Names. More than one Distinguished Name can be set to refer to multiple objects within Active Directory. If no Distinguished Names are set, the whole of the Active Directory is accessible.
53
+
*`Base DNs` – the Active Directory objects that can be accessed by {{% ctx %}} Gateway. The identity of the objects is expressed using their Distinguished Names. More than one Distinguished Name can be set to refer to multiple objects within Active Directory. If no Distinguished Names are set, the whole of Active Directory is accessible.
The Authorisation grid allows roles to be assigned to groups:
19
+
20
+
*`Name` shows:
21
+
* For [LDAP Authentication][], the Active Directory domain, organisational units, containers and Security Groups in a hierarchical tree; these groups are limited to those defined by the Base DNs configured.
22
+
* For [OIDC Authentication][], the Provider's display name and groups in a hierarchical tree.
23
+
24
+
*`Type` identifies the type of object for that row.
25
+
*`Admin` and `Studio` are roles that can be assigned and contain checkboxes to indicated which object has access to which role.
26
+
27
+
* Admin – provides access to administrative functions within {{% ctx %}} Gateway, including the ability to set user roles and permissions, import and export flows, creation and management of packages, etc.
28
+
* Studio – provides access to set the permissions to view and/or edit any flow in the Flow Editor.
29
+
30
+
* View permissions allow users to view and execute flows in the Flow Editor.
31
+
* Edit permissions allow users to view, execute, create, edit, delete and commit flows.
32
+
33
+
Both the `Admin` and `Studio` roles may be assigned to a single group or groups of groups, to provide access to both the administrative functions in {{% ctx %}} Gateway and flows in the Flow Editor.
34
+
35
+
Note: The `LiveView` and `Reporting` roles do not apply to {{% ctx %}}.
19
36
20
37
## Actions
21
38
22
39
### Assign {{% ctx %}} Roles to Security Groups
23
40
24
-
TODO
41
+
If an individual Group object is checked (tick on a block background), then its parent objects will also be implicitly set (tick on a muted blue background). If a parent object is checked (tick on a saturated blue background), all its child objects will be implicitly set (tick on a muted grey background). Objects may be individually unset by clicking the checked checkbox.
42
+
43
+
When all the role assignments have been completed, click the Save Changes button to commit the current role assignments.
25
44
26
45
See the [Assign {{% ctx %}} Roles to Security Groups][Assign {{% ctx %}} Roles to Security Groups tutorial] tutorial for a step-by-step guide.
0 commit comments