You are using an unsupported browser. Please update your browser to the latest version on or before July 31, 2020.
close
You are viewing the article in preview mode. It is not live at the moment.
Please note: Support.getacvideo.com will be moving to help.getac.com on January 1st, 2025. Please update your bookmarks accordingly to avoid unplanned interruptions.
OAuth Configuration
print icon
Note:
This article showcases features that are typically only made available to Administrator roles.

However, since Getac Enterprise is highly configurable, the ability to complete tasks described in this article may be different for each User, depending on policy. Please contact an administrator with all access questions and concerns.

 

Note:
This feature is currently available to single-tenant server customers ONLY. Contact a Getac representative for more details.
Warning:
The information listed here is to explain this feature. This is configured by the Getac implementation teams and should NOT be modified without first contacting [email protected]. Getac is not responsible for data loss or interruption of services due to improper configuration of this feature.

 

Overview

This page is for configuring OpenID authentication.

See the image below for how to access the OAuth Configuration page:

Ex. OAuth Configuration Page

 

Create or Modify existing OAuth Configuration

Perform the following steps:

In Azure AD OpenID Connect:

  1. Sign in to the Azure portal.
  2. Search for and select Azure Active Directory.
  3. Under Manage, select App registrations New registration.
  4. Enter an application Name, Getac-OpenID. Users may see this name, and it can be changed later.
  5. Add the SSL URL in Redirect URLe.g. https://g201.getaccloud.com.
  6. Select Register.
  7. Under Manage, select Authentication.
  8. In the Implicit grant and hybrid flows section, select Accounts in this organizational directory only, select ID tokens, and then select Save.

In Getac Enterprise:

  1. Click on the Page icon or select an existing Configuration from the list and click on the Wrench icon.
  2. Enter the following items:
    1. Station - Select a Station to apply this OAuth Configuration to.
    2. Application Client ID - Enter ID for the Application Client.
    3. Directory Tenant ID - Enter Directory Tenant ID.
    4. ApplicationRedirectUrl - Enter URL.
    5. ApplicationName - Enter name.
    6. Client Secret ID - Enter secret ID.
  3. Click on Create or Save to finalize.

See the image below for an example:

Ex. OAuth Configuration
Feedback
0 out of 0 found this helpful

Custom PIN Entry
scroll to top icon