AC OAuth 2.0 IdP
Path: AC User Management > AC OAuth 2.0 IdP
In this section, you can find instructions on how to maintain LDAP / Windows AD authentication servers.

Create AC OAuth 2.0 IdP
In this section, you can find instructions on how to create AC OAuth 2.0 IdP using OAuth2.0. You can create an AC OAuth 2.0 IdP for login.
Click Create to access the AC OAuth 2.0 IdP creation page.

Fill in the data or make selections as instructed below. The fields marked with “*” are required.
IdP Client Id*: A unique identifier used by third-party applications for identification and accessing protected resources.
IdP Client Name*: An identifiable user name.
IdP Client Secret*: User password.
Type*: License Type, a third-party application authorized by the user.
Client Status*: This account is active (Y) or inactive (N).
dgR Callback URL*: Redirect the user back to the specific URL of the client application and include the license certificate.
IdP Well Known URL*: A set of public, fixed URL paths used to store specific configuration information or metadata for a website or application. It helps developers easily find and access important information about their applications without first knowing the specific configuration of the application.
IdP Auth URL: The URL used to guide users through the authentication process, and allows applications to obtain the necessary authorization to perform specific operations or access restricted resources.
IdP Access Token URL: The specific URL used to obtain the Access Token. During the OAuth 2.0 authorization process, the Access Token is a credential that represents that a user has been authorized to access protected resources.
- Once the client sends the request to the Access Token URL, the authorized service provider will check the legitimacy and validity of the request. If the verification is successful, the Access Token will be included in the response from the authorized service provider. Access tokens are used by the client to access protected resources and usually have a specific expiration date.
IdP Scope: Specify the range of the client application’s access to user resources. Scope might vary based on the needs of OAuth applications and is specified and implemented by an authorized service provider (usually an OAuth 2.0 licensed server).
Click Create to save and exit.

View AC OAuth 2.0 IdP
Click on the
icon to access the details page.

View the details of AC OAuth 2.0 IdP.

Update AC OAuth 2.0 IdP
Click on the
icon to access the Update page.

Modify the desired fields, and click Update to save and exit.

Delete AC OAuth 2.0 IdP
Search for the AC OAuth 2.0 IdP to delete, and click on the
icon to access the Delete page.

Click Delete to delete the AC OAuth 2.0 IdP and exit.

Link Google Account for Login
Get Client ID and Password on Google Cloud Platform
Path: Google Cloud Platform > Console >> APIs & Services
Go to the Google Cloud Platform to complete the required settings as instructed below.
Apply for an account.
Create a project.
Configure the OAuth Consent screen.
Edit application registration request.
Get the OAuth certificate.
Create an OAuth client ID.
Acquire the client ID and password.
Access the configured client ID and password.
Path: Google Cloud Platform > Console >> APIs & Services > Credentials
Click on the name in the OAuth 2.0 Client IDs section to access Client ID of the Web Application page, and the client number, password and creation date are displayed in the right-side of the page.
AC OAuth 2.0 IdP Settings
Path: AC User Management > AC OAuth 2.0 IdP
IdP Client Id*: The client ID (client_id), eg. client number, obtained from Google.
IdP Client Name*: Specify the client name for identification.
IdP Client Secret*: The client password (client_secret) obtained from Google.
Type*: Fixed value: GOOGLE
Client Status*: Fixed value: Y
dgR Callback URL*: Replace {{hostname}} with the hostname used by digiRunner, and leave the rest of the URL unchanged as it is fixed.
https://
{{hostname}}
/dgrv4/ssotoken/acidp/GOOGLE/acIdPCallback
IdP Well Known URL*: Fixed value: https://accounts.google.com/.well-known/openid-configuration
IdP Auth URL: Not required.
IdP Access Token URL: Not required.
IdP Scope: Not required.

Parameter Settings
Path: System Configs > Setting
AC_IDP_ACCALLBACK_URL: Replace {{hostname}} with the hostname used by digiRunner, and leave the rest of the URL unchanged as it is fixed.
https://
{{hostname}}
/dgrv4/ac4/idpsso/accallback
AC_IDP_LDAP_REVIEW_ENABLE: Whether true/false enables the automated user creation and approval letter process.
AC_IDP_MSG_URL: Replace {{hostname}} with the hostname used by digiRunner, and leave the rest of the URL unchanged as it is fixed.
https://
{{hostname}}
/dgrv4/ac4/idpsso/errMsg
AC_IDP_REVIEWER_MAILLIST: If AC_IDP_LDAP_REVIEW_ENABLE is enabled, you can specify reviewer emails here, separating multiple groups by commas (,).
AC_IDP_REVIEW_URL: Replace {{hostname}} with the hostname used by digiRunner, and leave the rest of the URL unchanged as it is fixed.
https://
{{hostname}}
/dgrv4/ssotoken/acidp/acIdPReview
Last updated
Was this helpful?