Skip to content

Commit d0ef2b3

Browse files
author
Donna-Marie Smith
committed
added additional documentation
1 parent 9cb138d commit d0ef2b3

4 files changed

Lines changed: 29 additions & 10 deletions

File tree

content/en/docs/2025.9/FAQs/configure-oidc-authentication/microsoft-entra.md

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -25,9 +25,9 @@ In order to configure a Microsoft Entra Provider a Microsoft Azure account with
2525
1. Click `+ Add a platform`.
2626
1. Select Single-page application and set:
2727
* `Redirect URIs` to `https://<Gateway-Server>/gateway/redirect`.
28-
* `Front-channel logout URL` to `https://localhost:44321/signout-calback-oidc`.
28+
* `Front-channel logout URL` to `https://localhost:44321/signout-callback-oidc`.
2929
* `Implicit grant and hybrid flows` to `ID tokens`.
30-
1. Click `Save`.
30+
1. Click `Configure`.
3131
1. Configure application permissions for a web API from Microsoft Graph using API Permissions:
3232
1. Select the application registration created in Step 1.
3333
1. Select `API permissions` from the menu on the left.
@@ -61,7 +61,7 @@ In order to configure a Microsoft Entra Provider a Microsoft Azure account with
6161
The Application ID URI must contain a unique identifier; this is prepopulated by default.
6262

6363
* Click `+ Add a scope`.
64-
* Set the `Scope name` to `Flows.Read`.
64+
* Enter the `Scope name` as `Flows.Read`.
6565
* Set `Who can consent?` to `Admins and users`.
6666
* Enter an `Admin consent display name`, e.g. `Read Flows`.
6767
* Enter an `Admin consent description`, e.g. `Allows {{% ctx %}} client to read flows`.

content/en/docs/2025.9/Guides/user-guides/user-interfaces/gateway/Admin/Authentication.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -26,9 +26,9 @@ Groups set up in Microsoft Entra, provide for {{% ctx %}} Role assignment and {{
2626
The fields available in the OIDC form are:
2727

2828
* `Provider Type` – the OIDC provider type. Currently, only Microsoft is the OIDC provider supported.
29-
* `Identifier`Free-format, friendly unique name for this provider
30-
* `Display Name` – the text displayed in the {{% ctx %}} Gateway sign-in button
31-
* `Authority` – the URL for authentication to which to send authentication requests
29+
* `Identifier`free-format, friendly unique name for this provider.
30+
* `Display Name` – the text displayed in the {{% ctx %}} Gateway sign-in button.
31+
* `Authority` – the URL for authentication to which to send authentication requests.
3232
* `Tenant Identifier` – the Microsoft Entra Tenant ID for the organisation managing authentication.
3333
* `Client Identifier` – the unique identifier to identify the {{% ctx %}} Gateway application to the authentication provider.
3434
* `Client Secret` – the client secret that validate the Client Identifier to the authentication provider.
@@ -50,7 +50,7 @@ The fields available in the LDAP form are:
5050
* `Use SSL` – a checkbox to select the LDAPS protocol rather than LDAP.
5151
* `Username` – the name of a user with read permissions in Active Directory. A Service Account is used.
5252
* `Password` – the password associated with the username entered in the Username field.
53-
* `Base DNs` – the Active Directory objects that can be accessed by {{% ctx %}} Gateway. The identity of the objects is expressed using their Distinguished Names. More than one Distinguished Name can be set to refer to multiple objects within Active Directory. If no Distinguished Names are set, the whole of the Active Directory is accessible.
53+
* `Base DNs` – the Active Directory objects that can be accessed by {{% ctx %}} Gateway. The identity of the objects is expressed using their Distinguished Names. More than one Distinguished Name can be set to refer to multiple objects within Active Directory. If no Distinguished Names are set, the whole of Active Directory is accessible.
5454

5555
## Actions
5656

content/en/docs/2025.9/Guides/user-guides/user-interfaces/gateway/Admin/Authorisation.md

Lines changed: 22 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,15 +13,34 @@ The Authorisation page is used to assign roles within {{% ctx %}} Gateway based
1313

1414
## Anatomy
1515

16-
{{< figure src="/images/Authentication - OIDC.png" title="Open ID Connect Provider Configuration" >}}
16+
{{< figure src="/images/Authorisation.png" title="Authorisation" >}}
1717

18-
TODO
18+
The Authorisation grid allows roles to be assigned to groups:
19+
20+
* `Name` shows:
21+
* For [LDAP Authentication][], the Active Directory domain, organisational units, containers and Security Groups in a hierarchical tree; these groups are limited to those defined by the Base DNs configured.
22+
* For [OIDC Authentication][], the Provider's display name and groups in a hierarchical tree.
23+
24+
* `Type` identifies the type of object for that row.
25+
* `Admin` and `Studio` are roles that can be assigned and contain checkboxes to indicated which object has access to which role.
26+
27+
* Admin – provides access to administrative functions within {{% ctx %}} Gateway, including the ability to set user roles and permissions, import and export flows, creation and management of packages, etc.
28+
* Studio – provides access to set the permissions to view and/or edit any flow in the Flow Editor.
29+
30+
* View permissions allow users to view and execute flows in the Flow Editor.
31+
* Edit permissions allow users to view, execute, create, edit, delete and commit flows.
32+
33+
Both the `Admin` and `Studio` roles may be assigned to a single group or groups of groups, to provide access to both the administrative functions in {{% ctx %}} Gateway and flows in the Flow Editor.
34+
35+
Note: The `LiveView` and `Reporting` roles do not apply to {{% ctx %}}.
1936

2037
## Actions
2138

2239
### Assign {{% ctx %}} Roles to Security Groups
2340

24-
TODO
41+
If an individual Group object is checked (tick on a block background), then its parent objects will also be implicitly set (tick on a muted blue background). If a parent object is checked (tick on a saturated blue background), all its child objects will be implicitly set (tick on a muted grey background). Objects may be individually unset by clicking the checked checkbox.
42+
43+
When all the role assignments have been completed, click the Save Changes button to commit the current role assignments.
2544

2645
See the [Assign {{% ctx %}} Roles to Security Groups][Assign {{% ctx %}} Roles to Security Groups tutorial] tutorial for a step-by-step guide.
2746

259 KB
Loading

0 commit comments

Comments
 (0)